
{"id":2170,"date":"2012-12-11T00:00:00","date_gmt":"2012-12-11T00:00:00","guid":{"rendered":"http:\/\/otava.test\/protecting-health-information-in-the-era-of-mobile-devices-the-practicalities-problems-of-byod\/"},"modified":"2012-12-11T00:00:00","modified_gmt":"2012-12-11T00:00:00","slug":"protecting-health-information-in-the-era-of-mobile-devices-the-practicalities-problems-of-byod","status":"publish","type":"post","link":"https:\/\/www.otava.com\/blog\/protecting-health-information-in-the-era-of-mobile-devices-the-practicalities-problems-of-byod\/","title":{"rendered":"Protecting Health Information in the Era of Mobile Devices: The Practicalities &#038; Problems of BYOD"},"content":{"rendered":"<p>I\u2019m attending the <em><strong>mHIMSS Virtual Briefing: Securing Protected Health Information<\/strong><\/em> held today from 12PM ET-3:15PM ET online at HIMSSVirtual.org. The event features several sessions on the best practices for mobile device use, BYOD (Bring Your Own Device) policy and practice; secure use of social media; and secure provider-patient communication.<\/p>\n<p>The virtual event focuses on the challenge of maintaining mobile security while taking advantage of new technology to more efficiently and cost-effectively track patient health, convert to EHRs, share patient information and more.<\/p>\n<p>Online Tech is an official Platinum Corporate Member of HIMSS, and we\u2019ll be exhibiting our <a href=\"https:\/\/onlinetech.com\/compliant-hosting\/hipaa-compliant-hosting\/overview\">HIPAA hosting<\/a> solutions at <a href=\"https:\/\/otavawebsite.wpengine.com\/blog\/meet-health-it-experts-at-himss-13\/\">HIMSS \u201813<\/a> in New Orleans from March 3-7. Check us out at Booth #1369!<\/p>\n<p>The first session is:<\/p>\n<figure id=\"attachment_8868\" aria-describedby=\"caption-attachment-8868\" style=\"width: 290px\" class=\"wp-caption alignright\"><a href=\"https:\/\/otavawebsite.wpengine.com\/blog\/protecting-health-information-in-the-era-of-mobile-devices-the-practicalities-problems-of-byod\/himss-virtual-event-mhealth\/\" rel=\"attachment wp-att-8868\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-8868 \" title=\"HIMSS Virtual Event - mHealth\" src=\"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/HIMSS-Virtual-Event-mHealth.png\" alt=\"HIMSS Virtual Event - mHealth\" width=\"290\" height=\"196\" \/><\/a><figcaption id=\"caption-attachment-8868\" class=\"wp-caption-text\">HIMSS Virtual Event &#8211; mHealth<\/figcaption><\/figure>\n<p><em><strong>Protecting Health Information in the Era of Mobile Devices: The Practicalities and Problems of BYOD<\/strong><\/em><br \/>\n12 PM-12:30 PM ET<\/p>\n<figure id=\"attachment_8863\" aria-describedby=\"caption-attachment-8863\" style=\"width: 112px\" class=\"wp-caption alignleft\"><a href=\"https:\/\/otavawebsite.wpengine.com\/blog\/protecting-health-information-in-the-era-of-mobile-devices-the-practicalities-problems-of-byod\/adam-greene\/\" rel=\"attachment wp-att-8863\"><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-8863 \" title=\"Adam Greene\" src=\"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/Adam-Greene.png\" alt=\"Adam Greene\" width=\"112\" height=\"129\" \/><\/a><figcaption id=\"caption-attachment-8863\" class=\"wp-caption-text\">Adam Greene<\/figcaption><\/figure>\n<p>Speaker: Adam H. Greene, JD, MPH, Partner, Davis, Wright and Tremaine, LLP<br \/>\nCo-Chair of DWT\u2019s Health Information Practice<br \/>\nFormer OCR Senior Advisor on HIT and Privacy<\/p>\n<p><strong>Description:<\/strong> While mobile computing platforms and devices have presented potentially lower costs and higher quality of service for healthcare businesses, the challenge still remains: 40 percent of security breaches occur today in relation to mobile devices.<\/p>\n<p><strong>Learning Objectives:<\/strong><\/p>\n<ol>\n<li dir=\"ltr\">Overview of how health IT is being transformed by mobile device use.<\/li>\n<li dir=\"ltr\">Assess the impact of the mobile platform on organizational privacy and security policies and procedures<\/li>\n<li dir=\"ltr\">Identify best practices that healthcare providers can take to ensure PHI is secure with the use of mobile devices<\/li>\n<\/ol>\n<p><strong>Takeaways:<\/strong><br \/>\nGreene presented an example, partially speculative case study:<\/p>\n<p>A doctor is presenting his research on a laptop (with PHI on it) in South Korea. While traveling, someone stole the doctor\u2019s laptop. While no SSNs or esp. sensitive PHI was on laptop, it included LoJack technology, and when it went on the Internet, it was monitored and remotely wiped.<\/p>\n<p>But what happened to the laptop before it went on the Internet? The hospital filed a breach report, and the OCR opened an investigation. After a breach, the OCR required documents from the hospital, including a copy of their risk assessment. They also asked a number of questions about the hospital&#8230;<\/p>\n<p><strong>OCR Questions Include:<\/strong><\/p>\n<ul>\n<li dir=\"ltr\"><em><strong>Where in the risk assessment do you address the risk of PHI going onto personal devices?<\/strong><\/em><\/li>\n<li dir=\"ltr\"><em><strong>What policies and procedures do you have regarding PHI going onto personal devices?<\/strong><\/em><\/li>\n<li dir=\"ltr\"><em><strong>What technical safeguards do you have to protect against PHI going onto personal devices?<\/strong><\/em><\/li>\n<\/ul>\n<p>After 1.5 million settlement with OCR, the hospital went into a three-year corrective action plan.<\/p>\n<p><strong>The moral of the story:<\/strong><br \/>\nYou can choose whether or not to have a BYOD policy, but you can\u2019t choose whether to have a BYOD problem.<\/p>\n<p><strong>Lessons:<\/strong><\/p>\n<ul>\n<li dir=\"ltr\">Ignoring BYOD doesn\u2019t make it go away<\/li>\n<li dir=\"ltr\">The OCR expects a risk assessment to address risks of personal devices &#8211; they ask very detailed granular questions<\/li>\n<li dir=\"ltr\">The risk management plan may include policy, procedures, training, inventory, technical controls, etc.<\/li>\n<\/ul>\n<p><strong>What BYOD approach works for your organization?<\/strong> (Based on risks you\u2019re seeing, what kind of resources you have available&#8230;)<\/p>\n<ul>\n<li dir=\"ltr\">Just prohibit the use of personal devices &#8211; set a policy of any PHI or confidential info on personal devices<\/li>\n<li dir=\"ltr\">Train staff on the policy<\/li>\n<li dir=\"ltr\">Include risk of ePHI on personal devices in the risk assessment\/management plan<\/li>\n<li dir=\"ltr\">Consider technical safeguards such as data loss prevention<\/li>\n<li dir=\"ltr\">Consistently sanction violations<\/li>\n<\/ul>\n<p><strong>Benefits of Prohibiting BYOD<\/strong><\/p>\n<ul>\n<li dir=\"ltr\">Greater IT control of end devices &#8211; lock down devices so apps can\u2019t be added without approval.<\/li>\n<li dir=\"ltr\">Greater inventory control<\/li>\n<li dir=\"ltr\">Standardization of end-user devices &#8211; making IT support easier<\/li>\n<li dir=\"ltr\">Strong technical controls can allow greater control over PHI &#8211; data loss prevention can control where your PHI is located, keeping it all on enterprise devices<\/li>\n<li dir=\"ltr\">Avoid issues of enforcing corporate policy on personal devices &#8211; can become problematic with wiping personal devices<\/li>\n<\/ul>\n<p><strong>Problems with Prohibition on BYOD<\/strong><\/p>\n<ul>\n<li dir=\"ltr\">Clinicians and others do not want to carry two phones<\/li>\n<li dir=\"ltr\">Staff will gravitate to most effective form of communication, even if it violates policy &#8211; prohibiting texting on devices, although it\u2019s the best form of communication between nurses, it will happen eventually despite violating policy<\/li>\n<li dir=\"ltr\">Challenge of consistently applying sanctions<\/li>\n<li dir=\"ltr\">Large risk of breach without strong technical controls<\/li>\n<li dir=\"ltr\">Cost of providing enterprise\u2010owned devices &#8211; equipping everyone with a mobile device can add up<\/li>\n<\/ul>\n<p><strong>The Middle of the Road Solution<\/strong><\/p>\n<ul>\n<li dir=\"ltr\">Policy permitting ePHI on personal devices with appropriate approval &#8211; not just anyone can put PHI on any device. There should be a structured process in place for putting PHI on a device.<\/li>\n<li dir=\"ltr\">IT ensures that device has authentication enabled, remote wipe enabled &#8211; password protected for authentication, and remote wipe based on lost or stolen devices, or even failed login attempts.<\/li>\n<li dir=\"ltr\">Train staff on appropriate access, password requirements, and what to do if device is lost, stolen, or replaced &#8211; if upgrading, IT should wipe the device first<\/li>\n<li dir=\"ltr\">Policy permitting ePHI on personal devices with appropriate approval<\/li>\n<li dir=\"ltr\">Include use of personal devices in enterprise risk assessment and risk management plan<\/li>\n<li dir=\"ltr\">Consider technical safeguards such as data loss prevention (to ensure ePHI is only going to approved devices)<\/li>\n<\/ul>\n<p><strong>Benefits of the Middle of the Road<\/strong><\/p>\n<ul>\n<li dir=\"ltr\">Workforce need only carry one device &#8211; much happier workforce<\/li>\n<li dir=\"ltr\">Potentially lower costs by not furnishing mobile devices<\/li>\n<\/ul>\n<p><strong>Problems with the Middle of the Road<\/strong><\/p>\n<ul>\n<li dir=\"ltr\">Addressing inventory of devices is challenging &#8211; if it\u2019s reasonable or appropriate. Consider what type of inventory you will have, and if you try to keep track of all approved devices.<\/li>\n<li dir=\"ltr\">Dangers of other apps on device &#8211; What free software or applications are being downloaded, and can they potentially intercept data and send to third parties?<\/li>\n<li dir=\"ltr\">Risk if staff do not follow password management policy &#8211; On a soft keyboard, good password management is particularly difficult.<\/li>\n<li dir=\"ltr\">Challenge of enforcing policies (e.g., remote wipe) on personal devices &#8211; People likely will not want their personal devices wiped, even if stolen.<\/li>\n<li dir=\"ltr\">Vulnerability if device is compromised before remote wipe occurs<\/li>\n<\/ul>\n<p><strong>Virtualization and Secure Tools<\/strong><\/p>\n<ul>\n<li dir=\"ltr\">Provide personal devices with virtual access to EHR, e\u2010mail, network files &#8211; only provide virtual access to applications, never put ePHI on the actual device<\/li>\n<li dir=\"ltr\">Policy permitting use of personal devices to access ePHI only through appropriate methods &#8211; if you have virtualization, ensure that people know they should use that and not webmail that could temporarily put email on devices<\/li>\n<li dir=\"ltr\">Consider whether to also add remote wiping and password requirements in case of data leakage onto devices<\/li>\n<li dir=\"ltr\">Consider providing secure applications &#8211; Secure texting: There may be circumstances when you can text limited health information between clinicians, but the government typically looks down upon it. Look into secure texting options.<\/li>\n<li dir=\"ltr\">Consider technical safeguards like data loss prevention to avoid ePHI going onto personal devices without appropriate knowledge<\/li>\n<li dir=\"ltr\">Include personal devices in risk assessment and risk management plan<\/li>\n<\/ul>\n<p><strong>Benefits of Virtualization and Secure Tools<\/strong><\/p>\n<ul>\n<li dir=\"ltr\">Workforce need only carry one device<\/li>\n<li dir=\"ltr\">Potentially lower costs by not furnishing mobile devices<\/li>\n<li dir=\"ltr\">Keep ePHI centralized and more secure while allowing access &#8211; better grasp on where your PHI is located throughout the organization<\/li>\n<li dir=\"ltr\">Provide tools that allow efficient work (e.g., texting) &#8211; you can potentially provide secure texting with a better idea of where information is going, and ensure that info is not being left on unprotected devices<\/li>\n<\/ul>\n<p><strong>Problems with Virtualization and Secure Tools<\/strong><\/p>\n<ul>\n<li dir=\"ltr\">Cost of virtualization and secure tools.<\/li>\n<li dir=\"ltr\">What to do when staff need to work offline &#8211; will need to figure out how to let people work from a plane, or other place where they do not have Internet access<\/li>\n<li dir=\"ltr\">Challenge of enforcing policies (e.g., remote wipe) on personal devices<\/li>\n<\/ul>\n<p><strong>Additional Information:<\/strong><\/p>\n<ul>\n<li dir=\"ltr\">Data loss prevention &#8211; It will stop some PHI, it will mitigate risk, but it will not be perfect. With DLP, you can\u2019t be entirely sure it will make its way out. DLP software can stop SSNs or keywords that indicate diagnostic information from being emailed or shared.<\/li>\n<li dir=\"ltr\">Does all PHI on mobile devices need to be encrypted?<\/li>\n<li dir=\"ltr\">The Security Rule makes it addressable; you must encrypt where appropriate and reasonable. You have to look at potential threats and risks in order to assess whether or not you need encryption. If you\u2019ve got documentation showing it was reasonable not to encrypt certain information, you may have a case after a data breach. But certain information, such as SSNs, should be encrypted.<\/li>\n<\/ul>\n<p>Everyone should figure out their own BYOD approach &#8211; what may work well for one organization may not work nearly as well for another organization. There are BYOD policies out there &#8211; mHIMSS.org, under \/resource has a BYOD agreement that may be helpful for org to look at.<\/p>\n<p>View a real case study of the use of a virtual environment to securely manage a BYOD environment without jeopardizing sensitive data, presented by Vice President and Chief Information Officer (CIO) Kirk Larson of the Children\u2019s Hospital Central California: <a href=\"https:\/\/www.onlinetech.com\/events\/byod-from-concept-to-reality\">BYOD: From Concept to Reality<\/a><\/p>\n<hr \/>\n<p><a href=\"https:\/\/www.onlinetech.com\/resources\/white-papers\/hipaa-compliant-data-centers\"><img loading=\"lazy\" decoding=\"async\" class=\"alignleft\" src=\"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/hipaa-white-paper.gif\" alt=\"HIPAA Compliant Data Centers\" width=\"150\" height=\"110\" \/><\/a>Learn about the specific HIPAA requirements for HIPAA hosting with IT vendors with our\u00a0<a href=\"https:\/\/www.onlinetech.com\/resources\/white-papers\/hipaa-compliant-data-centers\">HIPAA Compliant Hosting white paper<\/a>. With 36 pages of statistics, diagrams and researched information sourced from engineers and a CHSS (Certified HIPAA Security Specialist), this white paper is your complete guide to HIPAA hosting.<\/p>\n<p>Still have questions?\u00a0<a href=\"https:\/\/otavawebsite.wpengine.com\/contact\/\">Contact<\/a>\u00a0us or\u00a0<a href=\"https:\/\/hostedusa6.whoson.com\/chat\/chatstart.htm?domain=www.onlinetech.com\">chat\u00a0<\/a>now. Learn more about our\u00a0<a href=\"https:\/\/otavawebsite.wpengine.com\/compliance-security\/hipaa-compliant-cloud\/\">HIPAA hosting solutions<\/a>, including\u00a0<a href=\"https:\/\/otavawebsite.wpengine.com\/solutions\/cloud\/\">cloud<\/a>,\u00a0<a href=\"https:\/\/www.onlinetech.com\/colocation\/overview\">colocation<\/a>,\u00a0<a href=\"https:\/\/otavawebsite.wpengine.com\/solutions\/cloud\/private-cloud\/\">managed servers<\/a>\u00a0and\u00a0<a href=\"https:\/\/otavawebsite.wpengine.com\/solutions\/data-protection\/disaster-recovery-as-a-service\">disaster recovery<\/a>, or\u00a0<a href=\"https:\/\/otavawebsite.wpengine.com\/compliance-security\/hipaa-compliant-cloud\/\">submit a quote request<\/a>\u00a0today.<\/p>\n<hr \/>\n<p>References:<br \/>\n<a href=\"https:\/\/www.himssvirtual.org\/VB\/20121211_VB_security.asp?src=sm\">HIMSS Virtual Events: Securing Protected Health Information<\/a><strong id=\"internal-source-marker_0.45359074510633945\"><br \/>\n<\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>I\u2019m attending the mHIMSS Virtual Briefing: Securing Protected Health Information held today from 12PM ET-3:15PM ET online at HIMSSVirtual.org. The event features several sessions on the best practices for mobile device use, BYOD (Bring Your Own Device) policy and practice; secure use of social media; and secure provider-patient communication. The virtual event focuses on the challenge of maintaining mobile security while taking advantage of new technology to more efficiently and cost-effectively track patient health, convert to EHRs, share patient information and more. Online Tech is an official Platinum Corporate Member of HIMSS, and we\u2019ll be exhibiting our HIPAA hosting solutions at HIMSS \u201813 in New Orleans from March 3-7. Check us out at Booth #1369! The first session is: Protecting Health Information in the Era of Mobile Devices: The Practicalities and Problems of BYOD 12 PM-12:30 PM ET Speaker: Adam H. Greene, JD, MPH, Partner, Davis, Wright and Tremaine, LLP Co-Chair of DWT\u2019s Health Information Practice Former OCR Senior Advisor on HIT and Privacy Description: While mobile computing platforms and devices have presented potentially lower costs and higher quality of service for healthcare businesses, the challenge still remains: 40 percent of security breaches occur today in relation to mobile devices&#8230;.<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1],"tags":[],"other_category":[],"class_list":["post-2170","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Protecting Health Information in the Era of Mobile Devices: The Practicalities &amp; Problems of BYOD | OTAVA<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.otava.com\/blog\/protecting-health-information-in-the-era-of-mobile-devices-the-practicalities-problems-of-byod\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Protecting Health Information in the Era of Mobile Devices: The Practicalities &amp; Problems of BYOD\" \/>\n<meta property=\"og:description\" content=\"I\u2019m attending the mHIMSS Virtual Briefing: Securing Protected Health Information held today from 12PM ET-3:15PM ET online at HIMSSVirtual.org. The event features several sessions on the best practices for mobile device use, BYOD (Bring Your Own Device) policy and practice; secure use of social media; and secure provider-patient communication. The virtual event focuses on the challenge of maintaining mobile security while taking advantage of new technology to more efficiently and cost-effectively track patient health, convert to EHRs, share patient information and more. Online Tech is an official Platinum Corporate Member of HIMSS, and we\u2019ll be exhibiting our HIPAA hosting solutions at HIMSS \u201813 in New Orleans from March 3-7. Check us out at Booth #1369! The first session is: Protecting Health Information in the Era of Mobile Devices: The Practicalities and Problems of BYOD 12 PM-12:30 PM ET Speaker: Adam H. Greene, JD, MPH, Partner, Davis, Wright and Tremaine, LLP Co-Chair of DWT\u2019s Health Information Practice Former OCR Senior Advisor on HIT and Privacy Description: While mobile computing platforms and devices have presented potentially lower costs and higher quality of service for healthcare businesses, the challenge still remains: 40 percent of security breaches occur today in relation to mobile devices....\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.otava.com\/blog\/protecting-health-information-in-the-era-of-mobile-devices-the-practicalities-problems-of-byod\/\" \/>\n<meta property=\"og:site_name\" content=\"OTAVA\" \/>\n<meta property=\"article:published_time\" content=\"2012-12-11T00:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/HIMSS-Virtual-Event-mHealth.png\" \/>\n<meta name=\"author\" content=\"Irma Brillantes\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Irma Brillantes\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.otava.com\/blog\/protecting-health-information-in-the-era-of-mobile-devices-the-practicalities-problems-of-byod\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.otava.com\/blog\/protecting-health-information-in-the-era-of-mobile-devices-the-practicalities-problems-of-byod\/\"},\"author\":{\"name\":\"Irma Brillantes\",\"@id\":\"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263\"},\"headline\":\"Protecting Health Information in the Era of Mobile Devices: The Practicalities &#038; Problems of BYOD\",\"datePublished\":\"2012-12-11T00:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.otava.com\/blog\/protecting-health-information-in-the-era-of-mobile-devices-the-practicalities-problems-of-byod\/\"},\"wordCount\":1605,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.otava.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.otava.com\/blog\/protecting-health-information-in-the-era-of-mobile-devices-the-practicalities-problems-of-byod\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/HIMSS-Virtual-Event-mHealth.png\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.otava.com\/blog\/protecting-health-information-in-the-era-of-mobile-devices-the-practicalities-problems-of-byod\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.otava.com\/blog\/protecting-health-information-in-the-era-of-mobile-devices-the-practicalities-problems-of-byod\/\",\"url\":\"https:\/\/www.otava.com\/blog\/protecting-health-information-in-the-era-of-mobile-devices-the-practicalities-problems-of-byod\/\",\"name\":\"Protecting Health Information in the Era of Mobile Devices: The Practicalities & Problems of BYOD | OTAVA\",\"isPartOf\":{\"@id\":\"https:\/\/www.otava.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.otava.com\/blog\/protecting-health-information-in-the-era-of-mobile-devices-the-practicalities-problems-of-byod\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.otava.com\/blog\/protecting-health-information-in-the-era-of-mobile-devices-the-practicalities-problems-of-byod\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/HIMSS-Virtual-Event-mHealth.png\",\"datePublished\":\"2012-12-11T00:00:00+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.otava.com\/blog\/protecting-health-information-in-the-era-of-mobile-devices-the-practicalities-problems-of-byod\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.otava.com\/blog\/protecting-health-information-in-the-era-of-mobile-devices-the-practicalities-problems-of-byod\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.otava.com\/blog\/protecting-health-information-in-the-era-of-mobile-devices-the-practicalities-problems-of-byod\/#primaryimage\",\"url\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/HIMSS-Virtual-Event-mHealth.png\",\"contentUrl\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/HIMSS-Virtual-Event-mHealth.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.otava.com\/blog\/protecting-health-information-in-the-era-of-mobile-devices-the-practicalities-problems-of-byod\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.otava.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Protecting Health Information in the Era of Mobile Devices: The Practicalities &#038; Problems of BYOD\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.otava.com\/#website\",\"url\":\"https:\/\/www.otava.com\/\",\"name\":\"OTAVA\u00ae\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.otava.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.otava.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.otava.com\/#organization\",\"name\":\"OTAVA\u00ae\",\"url\":\"https:\/\/www.otava.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.otava.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg\",\"contentUrl\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg\",\"caption\":\"OTAVA\u00ae\"},\"image\":{\"@id\":\"https:\/\/www.otava.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263\",\"name\":\"Irma Brillantes\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g\",\"caption\":\"Irma Brillantes\"},\"url\":\"https:\/\/www.otava.com\/blog\/author\/ibrillantesotava-com\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Protecting Health Information in the Era of Mobile Devices: The Practicalities & Problems of BYOD | OTAVA","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.otava.com\/blog\/protecting-health-information-in-the-era-of-mobile-devices-the-practicalities-problems-of-byod\/","og_locale":"en_US","og_type":"article","og_title":"Protecting Health Information in the Era of Mobile Devices: The Practicalities & Problems of BYOD","og_description":"I\u2019m attending the mHIMSS Virtual Briefing: Securing Protected Health Information held today from 12PM ET-3:15PM ET online at HIMSSVirtual.org. The event features several sessions on the best practices for mobile device use, BYOD (Bring Your Own Device) policy and practice; secure use of social media; and secure provider-patient communication. The virtual event focuses on the challenge of maintaining mobile security while taking advantage of new technology to more efficiently and cost-effectively track patient health, convert to EHRs, share patient information and more. Online Tech is an official Platinum Corporate Member of HIMSS, and we\u2019ll be exhibiting our HIPAA hosting solutions at HIMSS \u201813 in New Orleans from March 3-7. Check us out at Booth #1369! The first session is: Protecting Health Information in the Era of Mobile Devices: The Practicalities and Problems of BYOD 12 PM-12:30 PM ET Speaker: Adam H. Greene, JD, MPH, Partner, Davis, Wright and Tremaine, LLP Co-Chair of DWT\u2019s Health Information Practice Former OCR Senior Advisor on HIT and Privacy Description: While mobile computing platforms and devices have presented potentially lower costs and higher quality of service for healthcare businesses, the challenge still remains: 40 percent of security breaches occur today in relation to mobile devices....","og_url":"https:\/\/www.otava.com\/blog\/protecting-health-information-in-the-era-of-mobile-devices-the-practicalities-problems-of-byod\/","og_site_name":"OTAVA","article_published_time":"2012-12-11T00:00:00+00:00","og_image":[{"url":"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/HIMSS-Virtual-Event-mHealth.png","type":"","width":"","height":""}],"author":"Irma Brillantes","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Irma Brillantes","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.otava.com\/blog\/protecting-health-information-in-the-era-of-mobile-devices-the-practicalities-problems-of-byod\/#article","isPartOf":{"@id":"https:\/\/www.otava.com\/blog\/protecting-health-information-in-the-era-of-mobile-devices-the-practicalities-problems-of-byod\/"},"author":{"name":"Irma Brillantes","@id":"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263"},"headline":"Protecting Health Information in the Era of Mobile Devices: The Practicalities &#038; Problems of BYOD","datePublished":"2012-12-11T00:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.otava.com\/blog\/protecting-health-information-in-the-era-of-mobile-devices-the-practicalities-problems-of-byod\/"},"wordCount":1605,"commentCount":0,"publisher":{"@id":"https:\/\/www.otava.com\/#organization"},"image":{"@id":"https:\/\/www.otava.com\/blog\/protecting-health-information-in-the-era-of-mobile-devices-the-practicalities-problems-of-byod\/#primaryimage"},"thumbnailUrl":"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/HIMSS-Virtual-Event-mHealth.png","inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.otava.com\/blog\/protecting-health-information-in-the-era-of-mobile-devices-the-practicalities-problems-of-byod\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.otava.com\/blog\/protecting-health-information-in-the-era-of-mobile-devices-the-practicalities-problems-of-byod\/","url":"https:\/\/www.otava.com\/blog\/protecting-health-information-in-the-era-of-mobile-devices-the-practicalities-problems-of-byod\/","name":"Protecting Health Information in the Era of Mobile Devices: The Practicalities & Problems of BYOD | OTAVA","isPartOf":{"@id":"https:\/\/www.otava.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.otava.com\/blog\/protecting-health-information-in-the-era-of-mobile-devices-the-practicalities-problems-of-byod\/#primaryimage"},"image":{"@id":"https:\/\/www.otava.com\/blog\/protecting-health-information-in-the-era-of-mobile-devices-the-practicalities-problems-of-byod\/#primaryimage"},"thumbnailUrl":"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/HIMSS-Virtual-Event-mHealth.png","datePublished":"2012-12-11T00:00:00+00:00","breadcrumb":{"@id":"https:\/\/www.otava.com\/blog\/protecting-health-information-in-the-era-of-mobile-devices-the-practicalities-problems-of-byod\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.otava.com\/blog\/protecting-health-information-in-the-era-of-mobile-devices-the-practicalities-problems-of-byod\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.otava.com\/blog\/protecting-health-information-in-the-era-of-mobile-devices-the-practicalities-problems-of-byod\/#primaryimage","url":"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/HIMSS-Virtual-Event-mHealth.png","contentUrl":"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/HIMSS-Virtual-Event-mHealth.png"},{"@type":"BreadcrumbList","@id":"https:\/\/www.otava.com\/blog\/protecting-health-information-in-the-era-of-mobile-devices-the-practicalities-problems-of-byod\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.otava.com\/"},{"@type":"ListItem","position":2,"name":"Protecting Health Information in the Era of Mobile Devices: The Practicalities &#038; Problems of BYOD"}]},{"@type":"WebSite","@id":"https:\/\/www.otava.com\/#website","url":"https:\/\/www.otava.com\/","name":"OTAVA\u00ae","description":"","publisher":{"@id":"https:\/\/www.otava.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.otava.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.otava.com\/#organization","name":"OTAVA\u00ae","url":"https:\/\/www.otava.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.otava.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg","contentUrl":"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg","caption":"OTAVA\u00ae"},"image":{"@id":"https:\/\/www.otava.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263","name":"Irma Brillantes","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g","caption":"Irma Brillantes"},"url":"https:\/\/www.otava.com\/blog\/author\/ibrillantesotava-com\/"}]}},"_links":{"self":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/posts\/2170","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/comments?post=2170"}],"version-history":[{"count":0,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/posts\/2170\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/media?parent=2170"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/categories?post=2170"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/tags?post=2170"},{"taxonomy":"other_category","embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/other_category?post=2170"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}