StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Mobile device policy in healthcare - Essay Example

Cite this document
Summary
Most health care practitioners use mobile devices to access records of patients, prescribe drugs, conduct diagnosis, refer and research about health care issues. The Protected Health…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER92% of users find it useful
Mobile device policy in healthcare
Read Text Preview

Extract of sample "Mobile device policy in healthcare"

Mobile Device Policy in Healthcare Use of mobile devices and applications is becoming a common place in health care institutions. Most health care practitioners use mobile devices to access records of patients, prescribe drugs, conduct diagnosis, refer and research about health care issues. The Protected Health Information (PHI) is one of the elements that mobile devices help health care practitioners to practice. PHI has some issues that make it of great interest to practitioners in health care sector.

In its broadest definition, PHI refers to any information regarding health status, payment history and health history or a particular person (HealthIT.Gov, 2014). The PHI usually contains detailed information of patients including social security codes, identification details, residential, email and physical addresses, vehicle identifiers, certificates and license numbers, and biometric identifiers (HIPPA, 2015). It is because of containing such information that PHI deserves treatment and handling with highest possible security to protect privacy.

Clinical practitioners in the outpatient surgery center have the on-work privileges to use PHI. Practitioners will use mobile devices to access the PHI of patients only when within the surgery center. No person will carry the mobile device out of the premises of the surgery center. Every practitioner shall bear full responsibilities in case of physical damage of the mobile devices with PHI. The PHI of every patient has unique security preferences, and clinical practitioners should consult patients where access of critical information has restrictions.

No practitioner shall plug any foreign device except chargers into the PHI mobile devices. After every use, clinical practitioners should ensure to log out the PHI accounts accessed. The PHI presents various risks that may compromise the quality of care provided by clinicians. Some of the risks include:1. Hacking of the mobile devices to gain access to sensitive information.2. Virus attack that may manipulate the information and even destroy the device (HIPPA, 2015).3. Theft of the PHI mobile device.4. Breaching of privacy laws especially when one opens PHI application and forgets to close, and accessed by unauthorized persons.5. Risk of snoopers accessing information in case of absence of firewalls.6. Interception of text information in absence of encryption technology.

Measures To protect mobile devices and PHI1. Password codes should be ten alphanumeric characters. This element of security is important, as it is usually difficult to hack.2. The mobile devices shall not have internet capabilities so that they do not connect to the risky global cyber space.3. The mobile devices with PHI shall not go past the premises of the surgery center.4. The devices shall have a central management point with internal networking limited within the surgery center. Exchange of information can only happen via the central management point (American Bar Association, 2015). 5. If lost, the handling clinician must report within 30minutes to enable erasing of every details installed in the PHI mobile device.6. The devices will operate on de-identification mode so to delink common direct identifiers of individual clients. 7. Installation of malware and antivirus software in the mobile devices and the central access and exchange point within the surgery center.

ReferencesAmerican Bar Association. (2015). Protecting PHI on Mobile Devices. Retrieved March 4, 2015 from: http://www.americanbar.org/publications/aba_health_esource/2013-14/november/protecting_phi.htmlHealthIT. Gov. (2014). Your Mobile Device and Health Information Privacy and Security. Retrieved March 4, 2015 from: http://www.healthit.gov/providers-professionals/your-mobile-device-and-health-information-privacy-and-securityHIPPA. (2015). HIPAA ‘Protected Health Information: What Does PHI Include?

Retrieved March 4, 2015 from: http://www.hipaa.com/hipaa-protected-health-information-what-does-phi-include/

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Mobile device policy in healthcare Essay Example | Topics and Well Written Essays - 250 words”, n.d.)
Retrieved from https://studentshare.org/health-sciences-medicine/1681406-mobile-device-policy-in-healthcare
(Mobile Device Policy in Healthcare Essay Example | Topics and Well Written Essays - 250 Words)
https://studentshare.org/health-sciences-medicine/1681406-mobile-device-policy-in-healthcare.
“Mobile Device Policy in Healthcare Essay Example | Topics and Well Written Essays - 250 Words”, n.d. https://studentshare.org/health-sciences-medicine/1681406-mobile-device-policy-in-healthcare.
  • Cited: 0 times

CHECK THESE SAMPLES OF Mobile device policy in healthcare

Smartphone Usage in Healthcare Work

In the healthcare sector, the use of… For example, as of 2009, approximately 64% of physicians in the United States used Smartphones (Gill, et al, 2012).... Although the use of these technologies in the healthcare setting presents a number of benefits, there are challenges Privacy, security, ethical and legal challenges associated with the use of Smartphones and social media in the healthcare industry are significant.... Based on the scenario presented, this paper examines some of the key benefits and costs of using Smartphones and social media by healthcare professionals....
4 Pages (1000 words) Research Paper

Impact of Technology on Society

In mobile computing, micro sensors are utilized for capturing health data, as they are small size intelligent devices that use works on low power consumption.... Hence mobile computing devices enable and facilitate caregivers and health care cooperative roles instant access to patient information on a common platform or knowledge base regardless of geographical location.... However, to make the monitoring mechanism effective, there is no solution so far except the integration of social networking sites empowered with mobile computing called as mobile Health Monitoring (MHM) (Brahnam & Jain, )....
7 Pages (1750 words) Research Paper

The Impact of Mobile Communication on Advertising

mobile Communication has developed in the last century to become the most influential type of communication.... The use of mobile communication is a welcome relief from the traditional human means of communication that the 19th and 20th century embodied.... This paper‘s focal point is to illustrate that mobile communication has had an observable and immense impact on the field of communication.... The paper's main subject is to indicate that whether negatively or positively, mobile communication has changed the face and direction of advertising on a long-term basis....
6 Pages (1500 words) Research Paper

Technology, Politics and Values

Information from mobile phones empowers the women to claim their rights in addition to protecting their health and that of their unborn child.... In spite of most South African women living in poverty, mobile technology is providing the women with access to maternal health information that is life-saving.... Other innovative mobile programs in developing nations include the Text4Baby and mobile Midwife which deliver calls to pregnant women every week about their fetal health....
4 Pages (1000 words) Essay

Impact of Telephone on Society

The cloths utilized by healthcare are tailored via fiber incorporated by optical and electronic mechanisms.... In addition, all the discussed healthcare technologies are incorporated with devices that can communicate wirelessly along with high-value delivery, flexibility, quality in terms of health care and opportunity for the patients to cure early.... The flame is a good example, as it penetrates from one system to another and one mobile phone to another....
6 Pages (1500 words) Essay

The Positive and Negative Effects of Technology on the Aged

This paper ''The Positive and Negative Effects of Technology on the Aged'' tells that technology is gradually becoming an integral part of our society.... nbsp;The uptake of technologies has experienced a tremendous increase among the aged over time and there still exists some room for improvement (Czaja and Sharit, 2009)....
7 Pages (1750 words) Term Paper

ZigBee Technology and Its Overall Working and Operations

Thus, due to its cut down in processes that are one to two complete orders of scale less difficult as compared to Bluetooth device, costing for ZigBee devices is tremendously competitive, through complete nodes obtainable for a part of the price of a Bluetooth node (McGuigan, 2011), (Chen, Wu, Wen, Ye, & Liu, 2009) and (Sun & Zheng, 2009).... Additionally, a ZigBee communication network is able to facilitate up to 254 attached communication client nodes in addition to one complete functional device (that is also known as the master)....
12 Pages (3000 words) Coursework

The Global Communication Enterprises Strategy on Information Security

The organization's administration should be structured in such a way that a relationship with external parties promotes an effective management policy to all information security aspects in the organization.... Therefore, to make up this crucial decision and implement the project that the device is anticipated to help undertake, many aspects have to be put into consideration....
11 Pages (2750 words) Term Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us