« Why Healthcare Costs Don't Need to Continue to Rise | Main | Bee Patrol Diagnostic Team »

September 10, 2014

Comments

Feed You can follow this conversation by subscribing to the comment feed for this post.

Heather McFarland

Duff, this is where mobile devices and HIPAA cross, creating challenges for many businesses. With that said, I would just like to add that another big issue that Covered Entities and Business Associates often ignore – or don’t place much emphasis on – is securing remote access for end-users who can access PHI. Specifically, healthcare providers should have a comprehensive checklist covering aspects, such as securing the computer that is being used, ensuring anti-virus and proper passwords on the system, not using your home computer (which could be infected with all types of malware), only connecting using a company approved laptop, etc. And of course, all remote access should be done over encrypted and secure transmissions (i.e., port 443), which goes without saying. Also, don’t forget the importance of having a well-documented remote access policy and procedure in place, along with a remote access request form.

Simon

This new move by apple seems very interesting

The comments to this entry are closed.

My Photo