![]() |
![]() |
![]() |
Don't permit access to PHI by mobile devices without strong technical safeguards: encryption, data segmentation, remote data erasure and access controls, VPN software, etc.
– Kelly Hagan, attorney, Schwabe, Williamson & Wyatt
Mobile devices are an enforcement priority for the OCR and justify significant investment in secure technology by the covered entity. If such technology is beyond an organization's means, then organizations shouldn't permit mobile device access: It is inherently insecure and may end up costing your organization much more than supplying good technical safeguards.
Related Topics : In Their Own Words: The Four Dark Horses for the Third Major Mobile OS Speak, HTC, Mobile Search, 3G, Location-Based Services
Wearables are revolutionizing the workplace, with innovations that create a safer work environment or enhance the way professionals are able to go about their job. ... More >>
Here are the top 10 strategic technology trends that will impact most organizations in 2017. Strategic technology trends are defined as those with substantial disruptive potential or those reaching the tipping point over the next five years. ... More >>
Digital innovation is by far the biggest influencer, changing the way we do just about everything, from shopping to communication to running a business. ... More >>