How Can You Protect and Secure Health Information When Using a Mobile Device? – Office of the National Coordinator for Health Information Technology – HealthIT.gov – March 2014

Posted on March 24, 2014. Filed under: Health Informatics | Tags: , , |

How Can You Protect and Secure Health Information When Using a Mobile Device? – Office of the National Coordinator for Health Information Technology – HealthIT.gov – March 2014

“Take Steps to Protect and Secure Information When Using a Mobile Device” Fact Sheet

Advertisements
Read Full Post | Make a Comment ( Comments Off on How Can You Protect and Secure Health Information When Using a Mobile Device? – Office of the National Coordinator for Health Information Technology – HealthIT.gov – March 2014 )

Mobile Medical Applications: Guidance for Industry and Food and Drug Administration Staff – FDA – 25 September 2013

Posted on September 25, 2013. Filed under: Health Informatics | Tags: , , , |

Mobile Medical Applications: Guidance for Industry and Food and Drug Administration Staff – FDA – 25 September 2013

Extract from the introduction:

“The Food and Drug Administration (FDA) recognizes the extensive variety of actual and potential functions of mobile apps, the rapid pace of innovation in mobile apps, and the potential benefits and risks to public health represented by these apps. The FDA is issuing this guidance document to inform manufacturers, distributors, and other entities about how the FDA intends to apply its regulatory authorities to select software applications intended for use on mobile platforms (mobile applications or “mobile apps”). Given the rapid expansion and broad applicability of mobile apps, the FDA is issuing this guidance document to clarify the subset of mobile apps to which the FDA intends to apply its authority.

Many mobile apps are not medical devices (meaning such mobile apps do not meet the definition of a device under section 201(h) of the Federal Food, Drug, and Cosmetic Act (FD&C Act)), and FDA does not regulate them. Some mobile apps may meet the definition of a medical device but because they pose a lower risk to the public, FDA intends to exercise enforcement discretion over these devices (meaning it will not enforce requirements under the FD&C Act). The majority of mobile apps on the market at this time fit into these two categories.

Consistent with the FDA’s existing oversight approach that considers functionality rather than platform, the FDA intends to apply its regulatory oversight to only those mobile apps that are medical devices and whose functionality could pose a risk to a patient’s safety if the mobile app were to not function as intended. This subset of mobile apps the FDA refers to as mobile medical apps.

FDA is issuing this guidance to provide clarity and predictability for manufacturers of mobile medical apps.”

… continues

Commentary on this:

FDA outlines rules for medical apps on phones, tablets – The Hill – 23 September 2013

FDA Updates Guidance on Mobile-Software Apps – The Wall Street Journal – 23 September 2013

Read Full Post | Make a Comment ( Comments Off on Mobile Medical Applications: Guidance for Industry and Food and Drug Administration Staff – FDA – 25 September 2013 )

National Mobile Health Worker Project: Final report – NHS – 16 January 2013

Posted on February 5, 2013. Filed under: Health Informatics, Workforce | Tags: |

National Mobile Health Worker Project: Final report – NHS – 16 January 2013

“The benefits of mobile technology for health staff and patients are outlined today in the final report of the mobile health worker project, a study on introducing mobile devices at 11 NHS pilot sites.

The aims of the study were to understand the requirements of mobile working, and to demonstrate whether increased productivity and efficiency can be achieved by making changes to working processes.

The findings include:”

… continues

Read Full Post | Make a Comment ( Comments Off on National Mobile Health Worker Project: Final report – NHS – 16 January 2013 )

Your Mobile Device and Health Information Privacy and Security – HealthIT.gov – 2012

Posted on January 3, 2013. Filed under: Health Informatics | Tags: , |

Your Mobile Device and Health Information Privacy and Security 

“Physicians, health care providers and other health care professionals are using smartphones, laptops and tablets in their work. The U.S. Department of Health and Human Services has gathered these tips and information to help you protect and secure health information patients entrust to you when using mobile devices.”

Read Full Post | Make a Comment ( Comments Off on Your Mobile Device and Health Information Privacy and Security – HealthIT.gov – 2012 )

Key Issues in Mobile Health and Implications for New Zealand – Health Care and Informatics Review Online – December 2012

Posted on December 4, 2012. Filed under: Health Informatics | Tags: , |

Key Issues in Mobile Health and Implications for New Zealand – Health Care and Informatics Review Online – December 2012

by Robyn Whittaker

Abstract

“mHealth or mobile health describes the use of mobile communications devices for health-related purposes. There is much interest in mHealth internationally at this time; including interest in interventions developed in New Zealand/by New Zealanders. A recent research project examined the key issues in the implementation of mHealth and the current opportunities to address those issues in the U.S. The key mHealth issues are outlined here under the themes of policy and regulation, the wireless environment, the health system, current mHealth initiatives in practice and research. This paper examines how these issues may apply in New Zealand and the current opportunities to address them. This information may be useful to those embarking on mHealth developments in New Zealand and may help to inform the inclusion of mobile capabilities within the NZ Health IT infrastructure.”

Read Full Post | Make a Comment ( Comments Off on Key Issues in Mobile Health and Implications for New Zealand – Health Care and Informatics Review Online – December 2012 )

Guidelines on Hardware-Rooted Security in Mobile Devices – NIST – 31 October 2012

Posted on November 20, 2012. Filed under: Health Informatics | Tags: , , |

Guidelines on Hardware-Rooted Security in Mobile Devices – NIST – 31 October 2012

“NIST Provides Draft Guidelines to Secure Mobile Devices

The National Institute of Standards and Technology (NIST) has published draft guidelines that outline the baseline security technologies mobile devices should include to protect the information they handle. Smart phones, tablets and other mobile devices, whether personal or “organization-issued,” are increasingly used in business and government. NIST’s goal in issuing the new guidelines is to accelerate industry efforts to implement these technologies for more cyber-secure mobile devices.

Securing these tools, especially employee-owned products, is becoming increasingly important for companies and government agencies with the growing popularity—and capability—of the devices. Many organizations allow employees to use their own smart phones and tablets, even though their use increases cybersecurity risks to the organization’s networks, data and resources.

Guidelines on Hardware-Rooted Security in Mobile Devices defines the fundamental security components and capabilities needed to enable more secure use of products.”

… continues

Read Full Post | Make a Comment ( Comments Off on Guidelines on Hardware-Rooted Security in Mobile Devices – NIST – 31 October 2012 )

Guidelines on Hardware-Rooted Security in Mobile Devices – Draft – National Institute of Standards and Technology (NIST) – 31 October 2012

Posted on November 2, 2012. Filed under: Health Informatics | Tags: , , |

Guidelines on Hardware-Rooted Security in Mobile Devices – Draft – National Institute of Standards and Technology (NIST) – 31 October 2012

“The National Institute of Standards and Technology (NIST) has published draft guidelines that outline the baseline security technologies mobile devices should include to protect the information they handle. Smart phones, tablets and other mobile devices, whether personal or “organization-issued,” are increasingly used in business and government. NIST’s goal in issuing the new guidelines is to accelerate industry efforts to implement these technologies for more cyber-secure mobile devices.

Securing these tools, especially employee-owned products, is becoming increasingly important for companies and government agencies with the growing popularity—and capability—of the devices. Many organizations allow employees to use their own smart phones and tablets, even though their use increases cybersecurity risks to the organization’s networks, data and resources.”

… continues

Read Full Post | Make a Comment ( Comments Off on Guidelines on Hardware-Rooted Security in Mobile Devices – Draft – National Institute of Standards and Technology (NIST) – 31 October 2012 )

Bring your own device: a toolkit to support Federal agencies implements BYOD programs – CIO Council – August 2012

Posted on August 28, 2012. Filed under: Health Informatics | Tags: , , , , |

Bring your own device: a toolkit to support Federal agencies implements Bring Your Own Device (BYOD) programs – CIO Council – August 2012

Product of the Digital Services Advisory Group and Federal Chief Information Officers Council [US]

 

Read Full Post | Make a Comment ( Comments Off on Bring your own device: a toolkit to support Federal agencies implements BYOD programs – CIO Council – August 2012 )

Guidelines for Managing and Guidelines for Managing and Securing Mobile Devices in the Enterprise (Draft) – National Institute of Standards and Technology (NIST) – July 2012

Posted on July 19, 2012. Filed under: Health Informatics | Tags: , , , |

Guidelines for Managing and Guidelines for Managing and Securing Mobile Devices in the Enterprise (Draft) – National Institute of Standards and Technology (NIST) – July 2012

“Abstract

Mobile devices, such as smart phones and tablets, typically need to support multiple security objectives: confidentiality, integrity, and availability. To achieve these objectives, mobile devices should be secured against a variety of threats. The purpose of this publication is to help organizations centrally manage and secure mobile devices. Laptops are out of the scope of this publication, as are mobile devices with minimal computing capability, such as basic cell phones. This publication provides recommendations for selecting, implementing, and using centralized management technologies, and it explains the security concerns inherent in mobile device use and provides recommendations for securing mobile devices throughout their life cycles. The scope of this publication includes securing both organization-provided and personally-owned (bring your own device) mobile devices.”

Read Full Post | Make a Comment ( Comments Off on Guidelines for Managing and Guidelines for Managing and Securing Mobile Devices in the Enterprise (Draft) – National Institute of Standards and Technology (NIST) – July 2012 )

Selecting a Mobile App: Evaluating the Usability of Medical Applications – mHIMSS App Usability Work Group – July 2012

Posted on July 18, 2012. Filed under: Health Informatics | Tags: , , |

Selecting a Mobile App: Evaluating the Usability of Medical Applications – mHIMSS App Usability Work Group – July 2012

Healthcare Information and Management Systems Society (HIMSS)

“Purpose of this Document
This document has been prepared as an aid to the healthcare provider or IT staff member who is engaged in the selection of mobile apps for his/her practice or  hospital organization. While formal, professionally conducted, usability evaluations can provide in-depth product comparisons they may not be a practical  consideration for small- to medium-sized practices. This guide outlines some basic steps, to include in a mobile app selection process, to assist practices evaluate mobile app usability, based on current usability recommendations and best practices. While the target audience of this guide is for the provider and smaller  practices, the steps outlined in this document can also be used by large practices and healthcare institutions.”

Read Full Post | Make a Comment ( Comments Off on Selecting a Mobile App: Evaluating the Usability of Medical Applications – mHIMSS App Usability Work Group – July 2012 )

Managing Health Information in Mobile Devices – Journal of AHIMA – July 2012

Posted on July 16, 2012. Filed under: Health Informatics | Tags: |

Managing Health Information in Mobile Devices – Journal of AHIMA – July 2012

Washington, Lydia. “Managing Health Information in Mobile Devices.” Journal of AHIMA 83, no.7 (July 2012): 58-60.

“While the jury is still out on whether mobile devices will eventually replace laptops and PCs, many observers are predicting that their use will continue to explode in the next few years. There are currently at least 10,000 health-related apps that could be downloaded to a mobile electronic device like the iPad, iPhone, and Android—smart phones and tablet computers that are increasingly being used by consumers and healthcare providers to manage various aspects of health maintenance and healthcare.

Combined with government initiatives like the meaningful use EHR incentive program, designed to increase consumer engagement in personal healthcare, mobile health can only be expected to accelerate in the coming years. Mobile health technology can be used by consumers to download health information from provider portals, or by healthcare providers to collect, record, and report health information either manually or via interfaces with biomedical devices.

Because of this growing trend, HIM professionals should review the latest mobile health regulations and best practices, and develop internal policies aimed at protecting the integrity and privacy of patient records.”

… continues on the site

Read Full Post | Make a Comment ( Comments Off on Managing Health Information in Mobile Devices – Journal of AHIMA – July 2012 )

Medicine’s mobile mania raises the threat level, DHS warns [US] – Government Computer News – 16 May 2012

Posted on May 21, 2012. Filed under: Health Informatics | Tags: , |

Medicine’s mobile mania raises the threat level, DHS warns [US] – Government Computer News – 16 May 2012

By Kevin McCaney

“Health care facilities are increasingly going wireless, employing smart phones, tablets and other mobile devices to diagnose and treat patients and make medical records easy to get to. It’s a trend that’s not going to slow down, either.

In fact, Federal Communications Commission Chairman Julius Genachowski is expected May 17 to call for freeing up wireless spectrum to boost another wireless tool, “mobile body area networks,” which allow doctors to remotely monitor patients through the use of sensors and wireless transmissions.

But all that mobile connectivity, along with an array of network-connected devices, comes with risks, particularly since the medical industry isn’t known to be strong on security, as a recent report from the Homeland Security Department points out.

The report, “Attack Surface: Healthcare and Public Health Sector,” from DHS’ National Cybersecurity and Communications Integration Center notes that mobile and network-attached devices are in many ways optimal tools for health care, but that they also introduce a host or potential threats.”

… continues on the site

Read Full Post | Make a Comment ( Comments Off on Medicine’s mobile mania raises the threat level, DHS warns [US] – Government Computer News – 16 May 2012 )

Diagnosis Danger: Governance and Security Issues Cause IT Concerns About iPad in Healthcare Setting – Panasonic Solutions Company – 2011

Posted on February 8, 2012. Filed under: Health Informatics | Tags: |

Diagnosis Danger: Governance and Security Issues Cause IT Concerns About iPad in Healthcare Setting – Panasonic Solutions Company – 2011

Reported in InformationWeek Healthcare 3 February 2012

Read Full Post | Make a Comment ( Comments Off on Diagnosis Danger: Governance and Security Issues Cause IT Concerns About iPad in Healthcare Setting – Panasonic Solutions Company – 2011 )

Liked it here?
Why not try sites on the blogroll...