
{"id":2173,"date":"2012-12-11T00:00:00","date_gmt":"2012-12-11T00:00:00","guid":{"rendered":"http:\/\/otava.test\/secure-use-of-social-media-ensuring-the-privacy-of-protected-health\/"},"modified":"2012-12-11T00:00:00","modified_gmt":"2012-12-11T00:00:00","slug":"secure-use-of-social-media-ensuring-the-privacy-of-protected-health","status":"publish","type":"post","link":"https:\/\/www.otava.com\/blog\/secure-use-of-social-media-ensuring-the-privacy-of-protected-health\/","title":{"rendered":"Secure Use of Social Media: Ensuring the Privacy of Protected Health"},"content":{"rendered":"<p>I\u2019m attending the mHIMSS Virtual Briefing: Securing Protected Health Information held today from 12PM ET-3:15PM ET online at HIMSSVirtual.org. The event features several sessions on the best practices for mobile device use, BYOD (Bring Your Own Device) policy and practice; secure use of social media; and secure provider-patient communication.<\/p>\n<p>The virtual event focuses on the challenge of maintaining mobile security while taking advantage of new technology to more efficiently and cost-effectively track patient health, convert to EHRs, share patient information and more.<\/p>\n<p>Online Tech is an official Platinum Corporate Member of HIMSS, and we\u2019ll be exhibiting our <a href=\"https:\/\/onlinetech.com\/compliant-hosting\/hipaa-compliant-hosting\/overview?ex=1&amp;utm_expid=14035071-0&amp;utm_referrer=http%3A%2F%2Fwww.onlinetech.com%2Fevents%2Fonline-tech-exhibits-hipaa-hosting-at-himss-13-in-new-orleans\">HIPAA hosting<\/a> solutions at <a href=\"https:\/\/otavawebsite.wpengine.com\/blog\/meet-health-it-experts-at-himss-13\/\">HIMSS \u201813<\/a> in New Orleans from March 3-7. Check us out at Booth #1369!<\/p>\n<p>The second session is (view the first, <em><a href=\"https:\/\/otavawebsite.wpengine.com\/blog\/protecting-health-information-in-the-era-of-mobile-devices-the-practicalities-problems-of-byod\/\">Protecting Health Information in the Era of Mobile Devices: The Practicalities &amp; Problems of BYOD<\/a><\/em>):<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\" alignleft\" title=\"Lisa Gallagher\" src=\"https:\/\/www.himssvirtual.org\/img\/speakers\/thb_GallagherLisa.jpg\" alt=\"Lisa Gallagher\" width=\"55\" height=\"55\" \/><\/p>\n<p><strong>Secure Use of Social Media: Ensuring the Privacy of Protected Health<br \/>\n<\/strong>12:45 PM-1:00 PM ET<strong><br \/>\nSpeaker: <\/strong>Lisa A. Gallagher, BSEE, CISM, CPHIMS<br \/>\nSenior Director, Privacy and Security, HIMSS<\/p>\n<p>Description: Hospitals have recognized the benefits of social media and are increasingly using it within their organizations for a variety of purposes &#8211; from professional collaboration and patient engagement to marketing and workforce recruitment. However social media presents several challenges within the organization, among these are the security and privacy risks associated with its use related to personal health information. In this session, these risks will be defined and effective, practical strategies to address them will be discussed.<\/p>\n<p>Learning Objectives:<\/p>\n<ul>\n<li dir=\"ltr\">Understand the importance of managing the privacy and security dimensions of social media.<\/li>\n<li dir=\"ltr\">Identify the major risks for information breaches in social media<\/li>\n<li dir=\"ltr\">Using best practices, design and adopt policies to address those risks and minimize exposure while taking full advantage of social media in communicating with patients.<\/li>\n<\/ul>\n<p>Social media offers an engaging way to interact with a population. Which social networks are U.S. hospitals using? See below:<\/p>\n<figure id=\"attachment_8882\" aria-describedby=\"caption-attachment-8882\" style=\"width: 464px\" class=\"wp-caption alignleft\"><a href=\"https:\/\/otavawebsite.wpengine.com\/blog\/secure-use-of-social-media-ensuring-the-privacy-of-protected-health\/us-hospitals-and-social-networks\/\" rel=\"attachment wp-att-8882\"><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-8882 \" title=\"US Hospitals and Social Networks\" src=\"\/wp-content\/uploads\/US-Hospitals-and-Social-Networks.png\" alt=\"US Hospitals and Social Networks\" width=\"464\" height=\"325\" \/><\/a><figcaption id=\"caption-attachment-8882\" class=\"wp-caption-text\">US Hospitals and Social Networks<\/figcaption><\/figure>\n<p>What is healthcare using social media for?<\/p>\n<ul>\n<li dir=\"ltr\">Managing conversation\/interaction<\/li>\n<li dir=\"ltr\">Marketing\/brand management<\/li>\n<li dir=\"ltr\">Manage Google rankings, web hits &#8211; more technical way to measure how your brand comes up in a Google search<\/li>\n<li dir=\"ltr\">Engage e-patients &#8211; patients are increasingly more tech-savvy and already on social networks.<\/li>\n<li dir=\"ltr\">Promote wellness &#8211; having awareness programs and using social media to promote them.<\/li>\n<li dir=\"ltr\">Care management\/care coordination &#8211; specific healthcare-related social media platforms allow clinicians to share information securely and even collaborate securely with patients<\/li>\n<li dir=\"ltr\">Professional collaboration<\/li>\n<li dir=\"ltr\">Consumer, patient, professional education &#8211; easy to deliver educational content.<\/li>\n<li dir=\"ltr\">Clinical trial recruitment<\/li>\n<li dir=\"ltr\">Workforce recruitment<\/li>\n<\/ul>\n<p><strong>Challenges<br \/>\n<\/strong><\/p>\n<ul>\n<li dir=\"ltr\">Liability<\/li>\n<li dir=\"ltr\">Ethical &#8211; employees may conduct themselves in a way not aligned with company\u2019s policies; personal use may be unrestricted<\/li>\n<li dir=\"ltr\">Security &#8211; an increasing number of security risks by hackers &#8211; online scams, password guessing, viruses and infected applications are examples. With data leakage, an employee can disclose patient identifiable information that shouldn\u2019t be on social media channels.<\/li>\n<li dir=\"ltr\">Ability to be responsive\/bandwidth &#8211; patient interaction and response time are important within a dynamic environment.<\/li>\n<li dir=\"ltr\">Control\/monitoring employee behavior<\/li>\n<li dir=\"ltr\">Invites negative comments\/feedback &#8211; whenever an open forum is involved, you are inviting negative comments, and it should be expected. A plan should be in place to deal with negativity to protect the brand.<\/li>\n<li dir=\"ltr\">Dominance of the loud and opinionated &#8211; certain users can be negative or dominate the conversation, so there should be ways to monitor, deal with and remove content.<\/li>\n<li dir=\"ltr\">Ownership of data &#8211; this issue is quite complicated. There is no hard and fast rule about who owns the data. Within the legal community, the consensus is that it is difficult to apply copyright and trademark policies to online data (sidenote: DMCAs may be helpful).<\/li>\n<\/ul>\n<p><strong>Policy: Professionalism in the Use of Social Media (Example from the AMA, American Medical Association)<br \/>\nEspecially relevant to the professional individual:<br \/>\n<\/strong><\/p>\n<ul>\n<li dir=\"ltr\">Be cognizant of standards of patient privacy and confidentiality<\/li>\n<li dir=\"ltr\">Use privacy settings to safeguard personal information and content to the extent possible<\/li>\n<li dir=\"ltr\">Monitor their own Internet presence to ensure that the personal and professional information on their own sites and, to the extent possible, content posted about them by others, is accurate and appropriate<\/li>\n<li dir=\"ltr\">Maintain appropriate boundaries of the patient-physician relationship in accordance with professional ethical guidelines<\/li>\n<li dir=\"ltr\">Consider separating personal and professional content online<\/li>\n<li dir=\"ltr\">If you see content posted by colleagues that appears unprofessional, he or she can be removed. If significantly violates professional norms and is not removed, report the matter to appropriate authorities<\/li>\n<li dir=\"ltr\">Recognize that actions online and content posted may negatively affect their reputations among patients and colleagues, may have consequences for their medical careers (particularly for physicians-in-training and medical students), and can undermine public trust in the medical profession<\/li>\n<\/ul>\n<p><strong>Do\u2019s &amp; Don\u2019ts<br \/>\n<em>DO: \u201cEngage and Educate\u201d<\/em><br \/>\n<\/strong><\/p>\n<ul>\n<li dir=\"ltr\">Have policies and procedures for your organization<\/li>\n<li dir=\"ltr\">Train your staff, monitor employee behavior<\/li>\n<li dir=\"ltr\">Know where social media is being used \u2013 Depts. and people. Do an inventory of current social media and what topics are being discussed.<\/li>\n<li dir=\"ltr\">Use social media to share information that promote quality health care and up-to-date medical information<\/li>\n<li dir=\"ltr\">Recognize that you represent your profession and\/or organization<\/li>\n<\/ul>\n<p><strong><em>DON\u2019T: \u201cDiagnose or Treat\u201d<\/em><br \/>\n<\/strong><\/p>\n<ul>\n<li dir=\"ltr\">Discuss individual patient\u2019s illnesses, medical conditions, or personal information online &#8211; can be a liability<\/li>\n<li dir=\"ltr\">Share confidential information about patients or the organization<\/li>\n<li dir=\"ltr\">Give clinical advice or diagnosis<\/li>\n<li dir=\"ltr\">Let questions, inquires, posts go unanswered &#8211; this can be very frustrating to users.<\/li>\n<li dir=\"ltr\">Let just anyone speak for your organization &#8211; designate certain users that can represent your organization.<\/li>\n<\/ul>\n<p><strong>Elements of a Social Media Policy &#8211; Employees<br \/>\n<\/strong><\/p>\n<ul>\n<li dir=\"ltr\">Allowable Activities<\/li>\n<li dir=\"ltr\">Creating\/registering accounts &#8211; professional, personal<\/li>\n<li dir=\"ltr\">Creating\/registering organizational social media activities<\/li>\n<li dir=\"ltr\">Appropriate behavior, other parameters<\/li>\n<li dir=\"ltr\">Non-allowable Activities<\/li>\n<li dir=\"ltr\">Organizational Confidential Information<\/li>\n<li dir=\"ltr\">Patient information<\/li>\n<li dir=\"ltr\">Legal Information<\/li>\n<li dir=\"ltr\">Materials that belong to someone else<\/li>\n<li dir=\"ltr\">Consequences for Violations<\/li>\n<\/ul>\n<p><strong>Social Media Considerations<br \/>\n<\/strong><\/p>\n<ul>\n<li dir=\"ltr\">Is your organization using social media?<\/li>\n<li dir=\"ltr\">For what purpose?<\/li>\n<li dir=\"ltr\">Are all uses sanctioned?<\/li>\n<li dir=\"ltr\">Does your organization have a formal policy?<\/li>\n<li dir=\"ltr\">What challenges is your organization having?<\/li>\n<li dir=\"ltr\">Does your organization monitor employees\u2019 social media activities?<\/li>\n<li dir=\"ltr\">What resources would you like to see?<\/li>\n<\/ul>\n<p><strong>Social Media Resources<br \/>\n<\/strong><\/p>\n<ul>\n<li dir=\"ltr\">AMA: Professionalism in the Use of Social Media: <a href=\"https:\/\/www.ama-assn.org\/ama\/pub\/meeting\/professionalism-social-media.shtml\">https:\/\/www.ama-assn.org\/ama\/pub\/meeting\/professionalism-social-media.shtml<\/a><\/li>\n<li dir=\"ltr\">Mayo Clinic for Social Media:\u00a0<a href=\"https:\/\/socialmedia.mayoclinic.org\/\">https:\/\/socialmedia.mayoclinic.org\/<\/a><\/li>\n<li dir=\"ltr\">CSC: Should Healthcare Organizations Use Social Media?: <a href=\"https:\/\/assets1.csc.com\/health_services\/downloads\/CSC_Should_Healthcare_Organizations_Use_Social_Media.pdf\">https:\/\/assets1.csc.com\/health_services\/downloads\/CSC_Should_Healthcare_Organizations_Use_Social_Media.pdf<\/a><\/li>\n<li dir=\"ltr\">HCCA: Social Media Survey: <a href=\"https:\/\/hcca-info.org\/staticcontent\/2011SocialMediaSurvey_report.pdf\">https:\/\/hcca-info.org\/staticcontent\/2011SocialMediaSurvey_report.pdf<\/a><\/li>\n<li dir=\"ltr\">Online Database of Social Media Policies: <a href=\"https:\/\/socialmediagovernance.com\/policies.php#axzz1je5ucH7k\">https:\/\/socialmediagovernance.com\/policies.php#axzz1je5ucH7k<\/a><\/li>\n<li dir=\"ltr\">Ed Bennett List of Social Media Use:\u00a0<a href=\"https:\/\/ebennett.org\/hsnl\/\">https:\/\/ebennett.org\/hsnl\/<\/a><\/li>\n<li dir=\"ltr\">Online Database of Healthcare Social Media Policies\u00a0<a href=\"https:\/\/socialmediagovernance.com\/policies.php?f=4\">https:\/\/socialmediagovernance.com\/policies.php?f=4<\/a><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>I\u2019m attending the mHIMSS Virtual Briefing: Securing Protected Health Information held today from 12PM ET-3:15PM ET online at HIMSSVirtual.org. The event features several sessions on the best practices for mobile device use, BYOD (Bring Your Own Device) policy and practice; secure use of social media; and secure provider-patient communication. The virtual event focuses on the challenge of maintaining mobile security while taking advantage of new technology to more efficiently and cost-effectively track patient health, convert to EHRs, share patient information and more. Online Tech is an official Platinum Corporate Member of HIMSS, and we\u2019ll be exhibiting our HIPAA hosting solutions at HIMSS \u201813 in New Orleans from March 3-7. Check us out at Booth #1369! The second session is (view the first, Protecting Health Information in the Era of Mobile Devices: The Practicalities &amp; Problems of BYOD): Secure Use of Social Media: Ensuring the Privacy of Protected Health 12:45 PM-1:00 PM ET Speaker: Lisa A. Gallagher, BSEE, CISM, CPHIMS Senior Director, Privacy and Security, HIMSS Description: Hospitals have recognized the benefits of social media and are increasingly using it within their organizations for a variety of purposes &#8211; from professional collaboration and patient engagement to marketing and workforce recruitment. However&#8230;<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1],"tags":[],"other_category":[],"class_list":["post-2173","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Secure Use of Social Media: Ensuring the Privacy of Protected Health | OTAVA<\/title>\n<meta name=\"description\" content=\"Social media presents several challenges, among these are the security and privacy risks associated with its use related to personal health information.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.otava.com\/blog\/secure-use-of-social-media-ensuring-the-privacy-of-protected-health\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Secure Use of Social Media: Ensuring the Privacy of Protected Health\" \/>\n<meta property=\"og:description\" content=\"Social media presents several challenges, among these are the security and privacy risks associated with its use related to personal health information.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.otava.com\/blog\/secure-use-of-social-media-ensuring-the-privacy-of-protected-health\/\" \/>\n<meta property=\"og:site_name\" content=\"OTAVA\" \/>\n<meta property=\"article:published_time\" content=\"2012-12-11T00:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.himssvirtual.org\/img\/speakers\/thb_GallagherLisa.jpg\" \/>\n<meta name=\"author\" content=\"Irma Brillantes\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Irma Brillantes\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.otava.com\/blog\/secure-use-of-social-media-ensuring-the-privacy-of-protected-health\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.otava.com\/blog\/secure-use-of-social-media-ensuring-the-privacy-of-protected-health\/\"},\"author\":{\"name\":\"Irma Brillantes\",\"@id\":\"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263\"},\"headline\":\"Secure Use of Social Media: Ensuring the Privacy of Protected Health\",\"datePublished\":\"2012-12-11T00:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.otava.com\/blog\/secure-use-of-social-media-ensuring-the-privacy-of-protected-health\/\"},\"wordCount\":1113,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.otava.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.otava.com\/blog\/secure-use-of-social-media-ensuring-the-privacy-of-protected-health\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.himssvirtual.org\/img\/speakers\/thb_GallagherLisa.jpg\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.otava.com\/blog\/secure-use-of-social-media-ensuring-the-privacy-of-protected-health\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.otava.com\/blog\/secure-use-of-social-media-ensuring-the-privacy-of-protected-health\/\",\"url\":\"https:\/\/www.otava.com\/blog\/secure-use-of-social-media-ensuring-the-privacy-of-protected-health\/\",\"name\":\"Secure Use of Social Media: Ensuring the Privacy of Protected Health | OTAVA\",\"isPartOf\":{\"@id\":\"https:\/\/www.otava.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.otava.com\/blog\/secure-use-of-social-media-ensuring-the-privacy-of-protected-health\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.otava.com\/blog\/secure-use-of-social-media-ensuring-the-privacy-of-protected-health\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.himssvirtual.org\/img\/speakers\/thb_GallagherLisa.jpg\",\"datePublished\":\"2012-12-11T00:00:00+00:00\",\"description\":\"Social media presents several challenges, among these are the security and privacy risks associated with its use related to personal health information.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.otava.com\/blog\/secure-use-of-social-media-ensuring-the-privacy-of-protected-health\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.otava.com\/blog\/secure-use-of-social-media-ensuring-the-privacy-of-protected-health\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.otava.com\/blog\/secure-use-of-social-media-ensuring-the-privacy-of-protected-health\/#primaryimage\",\"url\":\"https:\/\/www.himssvirtual.org\/img\/speakers\/thb_GallagherLisa.jpg\",\"contentUrl\":\"https:\/\/www.himssvirtual.org\/img\/speakers\/thb_GallagherLisa.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.otava.com\/blog\/secure-use-of-social-media-ensuring-the-privacy-of-protected-health\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.otava.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Secure Use of Social Media: Ensuring the Privacy of Protected Health\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.otava.com\/#website\",\"url\":\"https:\/\/www.otava.com\/\",\"name\":\"OTAVA\u00ae\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.otava.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.otava.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.otava.com\/#organization\",\"name\":\"OTAVA\u00ae\",\"url\":\"https:\/\/www.otava.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.otava.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg\",\"contentUrl\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg\",\"caption\":\"OTAVA\u00ae\"},\"image\":{\"@id\":\"https:\/\/www.otava.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263\",\"name\":\"Irma Brillantes\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g\",\"caption\":\"Irma Brillantes\"},\"url\":\"https:\/\/www.otava.com\/blog\/author\/ibrillantesotava-com\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Secure Use of Social Media: Ensuring the Privacy of Protected Health | OTAVA","description":"Social media presents several challenges, among these are the security and privacy risks associated with its use related to personal health information.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.otava.com\/blog\/secure-use-of-social-media-ensuring-the-privacy-of-protected-health\/","og_locale":"en_US","og_type":"article","og_title":"Secure Use of Social Media: Ensuring the Privacy of Protected Health","og_description":"Social media presents several challenges, among these are the security and privacy risks associated with its use related to personal health information.","og_url":"https:\/\/www.otava.com\/blog\/secure-use-of-social-media-ensuring-the-privacy-of-protected-health\/","og_site_name":"OTAVA","article_published_time":"2012-12-11T00:00:00+00:00","og_image":[{"url":"https:\/\/www.himssvirtual.org\/img\/speakers\/thb_GallagherLisa.jpg","type":"","width":"","height":""}],"author":"Irma Brillantes","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Irma Brillantes","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.otava.com\/blog\/secure-use-of-social-media-ensuring-the-privacy-of-protected-health\/#article","isPartOf":{"@id":"https:\/\/www.otava.com\/blog\/secure-use-of-social-media-ensuring-the-privacy-of-protected-health\/"},"author":{"name":"Irma Brillantes","@id":"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263"},"headline":"Secure Use of Social Media: Ensuring the Privacy of Protected Health","datePublished":"2012-12-11T00:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.otava.com\/blog\/secure-use-of-social-media-ensuring-the-privacy-of-protected-health\/"},"wordCount":1113,"commentCount":0,"publisher":{"@id":"https:\/\/www.otava.com\/#organization"},"image":{"@id":"https:\/\/www.otava.com\/blog\/secure-use-of-social-media-ensuring-the-privacy-of-protected-health\/#primaryimage"},"thumbnailUrl":"https:\/\/www.himssvirtual.org\/img\/speakers\/thb_GallagherLisa.jpg","inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.otava.com\/blog\/secure-use-of-social-media-ensuring-the-privacy-of-protected-health\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.otava.com\/blog\/secure-use-of-social-media-ensuring-the-privacy-of-protected-health\/","url":"https:\/\/www.otava.com\/blog\/secure-use-of-social-media-ensuring-the-privacy-of-protected-health\/","name":"Secure Use of Social Media: Ensuring the Privacy of Protected Health | OTAVA","isPartOf":{"@id":"https:\/\/www.otava.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.otava.com\/blog\/secure-use-of-social-media-ensuring-the-privacy-of-protected-health\/#primaryimage"},"image":{"@id":"https:\/\/www.otava.com\/blog\/secure-use-of-social-media-ensuring-the-privacy-of-protected-health\/#primaryimage"},"thumbnailUrl":"https:\/\/www.himssvirtual.org\/img\/speakers\/thb_GallagherLisa.jpg","datePublished":"2012-12-11T00:00:00+00:00","description":"Social media presents several challenges, among these are the security and privacy risks associated with its use related to personal health information.","breadcrumb":{"@id":"https:\/\/www.otava.com\/blog\/secure-use-of-social-media-ensuring-the-privacy-of-protected-health\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.otava.com\/blog\/secure-use-of-social-media-ensuring-the-privacy-of-protected-health\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.otava.com\/blog\/secure-use-of-social-media-ensuring-the-privacy-of-protected-health\/#primaryimage","url":"https:\/\/www.himssvirtual.org\/img\/speakers\/thb_GallagherLisa.jpg","contentUrl":"https:\/\/www.himssvirtual.org\/img\/speakers\/thb_GallagherLisa.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.otava.com\/blog\/secure-use-of-social-media-ensuring-the-privacy-of-protected-health\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.otava.com\/"},{"@type":"ListItem","position":2,"name":"Secure Use of Social Media: Ensuring the Privacy of Protected Health"}]},{"@type":"WebSite","@id":"https:\/\/www.otava.com\/#website","url":"https:\/\/www.otava.com\/","name":"OTAVA\u00ae","description":"","publisher":{"@id":"https:\/\/www.otava.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.otava.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.otava.com\/#organization","name":"OTAVA\u00ae","url":"https:\/\/www.otava.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.otava.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg","contentUrl":"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg","caption":"OTAVA\u00ae"},"image":{"@id":"https:\/\/www.otava.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263","name":"Irma Brillantes","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g","caption":"Irma Brillantes"},"url":"https:\/\/www.otava.com\/blog\/author\/ibrillantesotava-com\/"}]}},"_links":{"self":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/posts\/2173","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/comments?post=2173"}],"version-history":[{"count":0,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/posts\/2173\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/media?parent=2173"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/categories?post=2173"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/tags?post=2173"},{"taxonomy":"other_category","embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/other_category?post=2173"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}