dcsimg

Security Tips to Combat Mobile Device Threats to Health Care

  • Security Tips to Combat Mobile Device Threats to Health Care-

    Transparency and end-user consent opt-in.
    – David Allen, CTO, Locaid Technologies

    For any company collecting, sharing and/or storing personal information, clear and explicit user opt-in is key to maintaining a positive brand perception and authenticity. In spring 2012, Google and Apple, and a handful of popular smartphone applications were publicly scorned for compiling user information, including location data, and actual names, emails and phone numbers of contacts in users' address books. With numerous privacy lawsuits arising out of these cases, the important facet to recognize is that these companies are not under scrutiny for collecting the data; they're in trouble for not being transparent and obtaining consent with consumers.

1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14 | 15

Security Tips to Combat Mobile Device Threats to Health Care

  • 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14 | 15
  • Security Tips to Combat Mobile Device Threats to Health Care-13

    Transparency and end-user consent opt-in.
    – David Allen, CTO, Locaid Technologies

    For any company collecting, sharing and/or storing personal information, clear and explicit user opt-in is key to maintaining a positive brand perception and authenticity. In spring 2012, Google and Apple, and a handful of popular smartphone applications were publicly scorned for compiling user information, including location data, and actual names, emails and phone numbers of contacts in users' address books. With numerous privacy lawsuits arising out of these cases, the important facet to recognize is that these companies are not under scrutiny for collecting the data; they're in trouble for not being transparent and obtaining consent with consumers.