Security 500 conference     

 Don’t miss the networking event of the year for security executives!
Register today for the Security 500 Conference.

Hospitals & Medical Centers

Mobile Device Security Lacking in Hospital Policy Discussions

Even as the use of mobile health, or mHealth, technology grew over the last few years, health care executives have paid too little attention to the need for mobile device security, and existing policies are often not followed by physicians, according to presenters at the mHealth Summit 2012 as reported by Search HealthIT.

Andrew Litt, M.D., chief medical officer for Dell Healthcare, said the health care industry is currently experiencing an explosion of data resulting in part from the growing use of mobile devices and adoption of electronic health records, the article reports. The more data that organizations accumulate, the greater the need is for putting in place provisions to protect that information.

However, Litt points out that even though hospitals are a favorite target of hackers due to the high value of stolen patient records, hospital administrators have been slow to grasp the need for tight security, the article states.

"This has not been a priority for a lot of CIOs," he says in the article.

Security may be a low priority for some providers because they are not familiar with regulations and requirements. Rohit Nayak, vice president of Care360, says he has found physicians tend to be least familiar with the security requirements of meaningful use. This is particularly true of ambulatory care doctors; many of whom do not know what a security risk assessment is. Nayak says understanding both HIPAA and meaningful use security requirements should be the first step in protecting patient data, Search HealthIT reports.

The following are excerpts from the Search HealthIT article:

There are a number of reasons why security may not receive sufficient attention from hospital executives. One of the primary reasons is securing patient information in all its forms involves many different tasks, particularly for providers that utilize mobile devices and services. Information may exist on mobile phones, hospital information systems, cloud servers and medical devices, said Omar Hussain, president and CEO of information security company Imprivata.

He said protecting sensitive information is much easier in other industries, such as banking. There, systems must simply keep out those who do not have a right to access information. But security isn't so clear-cut when it comes to health care. There are many different entities, from payers, to patients, to nurses, who all have some right to access records. Developing systems that grant the right amount of access to the right people can be difficult.

To make matters worse, the health care industry is relatively new to these kinds of security considerations, Hussain said. While most other industries implemented computerized record keeping systems years ago, health care is still in the process of adopting EHRs. Providers are trying to figure out exactly how to secure new tools for accessing information.

The emerging trends surrounding bring your own device policies further complicate security matters. Providers can't guarantee the security of patient data when they don't know exactly how employees are accessing it. Various consumer electronics like smartphones and tablets all have different security protocols, which makes allowing physicians and nurses to use their personal devices to access patient information is a risk for hospitals that do not have a solid BYOD policy in place, said Brian Balow, a member of the law firm Dickinson Wright.

He recommended health care organizations develop a clearly defined BYOD policy that lets employees know exactly what's expected of them when it comes to accessing data, and then enforce that policy. Rules should instill professionalism and protect employees and the organization from liability. Since the use of personal smartphones and devices has become so common in health care settings today, it is hard for organizations to get around the issue otherwise.

"Today on the question of whether to allow BYOD, the cow has left the barn," Balow said.

On terms of ensuring that BYOD protocols are followed, the article recommends that healthcare institutions give physicians more secure devices in order to discourage the use of insecure communication tools. Developing secure, in-house solutions to services such as Dropbox can help keep information within the organization’s confines.

The article also recommends developing a policy and ongoing training program for employees. Litt says policies should be constantly updated to reflect any changes in the security or regulatory environment. Hackers, too, are always looking for new ways to obtain valuable records, so IT has to strive to stay ahead of them. 

Did you enjoy this article? Click here to subscribe to Security Magazine. 

You must login or register in order to post a comment.

Multimedia

Videos

Image Galleries

ASIS 2013 Product Preview

ASIS International 59th Annual Seminar and Exhibits, September 24-27 in Chicago, Illinois, will include an exhibit hall packed with innovative security solutions. Here are some of the products that will be shown at ASIS this year.

Podcasts

Virtualization and Data Center Security: What You Need to Know for 2014

Data centers are increasingly becoming the center of the enterprise, and data center and cyber security is following the same path for security departments. According to Justin Flynn, a consultant at the Burwood Group, the virtualization of data centers allows enterprises to scale more easily and faster, with a smaller footprint.

However, hosting enterprise data in the cloud can make intrusion detection more difficult – how can enterprise security leaders team up with other departments to keep aware of cyber risks and traffic, and physical and data compliance during the virtual transition? How can CISOs and CSOs discuss cyber threats with the C-Suite to get the resources they need? And how can the proper infrastructure test and verify possible malicious attacks? 

More Podcasts

Security Magazine

Security Magazine 2014 September cover

2014 October

Security takes a look at safety and preparedness for the harshest of weather phenomena in this October 2014 edition of the magazine. Also, we investigate supply chain security and the many benefits of PSIM. 

Table Of Contents Subscribe

Travel & the Ebola Risk

Are you and your enterprise restricting travel due to Ebola risks?
View Results Poll Archive

THE SECURITY STORE

comptiahighriseproductphoto
CompTIA Security+ Certification Study Guide
CompTIA's Security+ certification is a globally-recognized, vendor neutral exam that has helped over 60,000 IT professionals reach further and higher in their careers. The current Security+ exam (SY0-201) focuses more on being able to deal with security issues rather than just identifying them.
More Products

Clear Seas Research

Clear Seas ResearchWith access to over one million professionals and more than 60 industry-specific publications,Clear Seas Research offers relevant insights from those who know your industry best. Let us customize a market research solution that exceeds your marketing goals.

STAY CONNECTED

Facebook 40px 2-12-13 Twitter logo 40px 2-12-13  YouTube  LinkedIn logo 40px 2-12-13Google+

Vertical Sector Focus: Critical Infrastructures

criticalhomepagethumbFrom terrorism to vandalism, it’s preparedness, response, training and partnerships. Learn about some of the critical security issues facing this sector.

Visit the Critical Infrastructure page to read more.