Sign In
Not register? Register Now!
Pages:
2 pages/≈550 words
Sources:
Check Instructions
Style:
APA
Subject:
Health, Medicine, Nursing
Type:
Coursework
Language:
English (U.S.)
Document:
MS Word
Date:
Total cost:
$ 11.66
Topic:

HIPAA Technology. The PHI Security on Mobile Devices. Health, Medicine, Nursing Coursework

Coursework Instructions:

Discuss the risks posed to PHI security by mobile devices, and identify at least 10 directives that can be added to an organization’s policies and procedures to ensure the privacy and security of PHI on mobile devices. (A 2-page response is required.)

Coursework Sample Content Preview:

The PHI Security on Mobile Devices
Student’s Name
Institutional Affiliation

The PHI Security on Mobile Devices
When considering the use of public health information (PHI) on mobile electronic devices, the security and privacy of patients’ data become the most significant barrier. The Health Insurance Portability and Accountability Act (HIPAA) comprises of the regulations that were implemented by the United States of America’s (USA) Department of Health and Human Services (HHS). They are standards introduced to protect the privacy of patients’ information recorded in the electronic health record (EHR) (Drolet, Marwaha, Hyatt, Blazar, & Lifchez, 2017). For example, physicians are required not to use insecure media when sharing patients’ data to facilitate proper treatment. The paper focuses on risks posed to PHI when using mobile devices and the directives that can be added to an organization’s procedures and policies to ensure the security and privacy of patients’ data on portable electronic gadgets.
In particular, using the PHI on mobile devices poses numerous risks. Some of them include stolen devices, weak passwords, unsecured electronic gadgets, insecure wireless networks, insecure apps, and malware. If physicians are allowed to use mobile electronic devices to carry patients’ data, these gadgets might be stolen, hence posing a danger to the PHI stored in them. Many people do not use strong passwords to avoid forgetting and to facilitate faster access to the data (Storbrauck, 2015). In that case, if hackers get hold of such gadgets, they have an easy time accessing the recorded patients’ information. Additionally, individuals usually share mobile devices with friends and family. For this reason, if these individuals have the bad intention of retrieving or sharing the PHI in these gadgets, they would do it easily and without suspicion. In some instances, users of mobile devices might install malicious apps or malware, particularly if they click phishing links. That way, the PHI can be stolen, and users might not understand it.
A health organization can come up with various strategies and involve them in its information policies and procedures to foster the security and privacy of PHI on mobile devices. First, before physicians are allowed to have patients’ data on their mobile gadgets, they should be well trained on how to k...
Updated on
Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:

👀 Other Visitors are Viewing These APA Coursework Samples:

HIRE A WRITER FROM $11.95 / PAGE
ORDER WITH 15% DISCOUNT!