« Why Healthcare Costs Don't Need to Continue to Rise | Main | Bee Patrol Diagnostic Team »

September 10, 2014


Feed You can follow this conversation by subscribing to the comment feed for this post.

Heather McFarland

Duff, this is where mobile devices and HIPAA cross, creating challenges for many businesses. With that said, I would just like to add that another big issue that Covered Entities and Business Associates often ignore – or don’t place much emphasis on – is securing remote access for end-users who can access PHI. Specifically, healthcare providers should have a comprehensive checklist covering aspects, such as securing the computer that is being used, ensuring anti-virus and proper passwords on the system, not using your home computer (which could be infected with all types of malware), only connecting using a company approved laptop, etc. And of course, all remote access should be done over encrypted and secure transmissions (i.e., port 443), which goes without saying. Also, don’t forget the importance of having a well-documented remote access policy and procedure in place, along with a remote access request form.


This new move by apple seems very interesting

Verify your Comment

Previewing your Comment

This is only a preview. Your comment has not yet been posted.

Your comment could not be posted. Error type:
Your comment has been posted. Post another comment

The letters and numbers you entered did not match the image. Please try again.

As a final step before posting your comment, enter the letters and numbers you see in the image below. This prevents automated programs from posting comments.

Having trouble reading this image? View an alternate.


Post a comment

Your Information

(Name and email address are required. Email address will not be displayed with the comment.)

My Photo