Top Menu

HIPPA Mobile Device Security – 9 Part Series

HIPAA TIPS: Mobile Device Compliance Part 1

Use a password or other user authentication You can configure your mobile device to require a password, personal identification number (PIN), or passcode (a pattern you trace with your finger) to gain access to the device. Keep your password, PIN, or passcode a secret, and don’t store them on your mobile device. You can also […]

0 comments

HIPAA TIPS: Mobile Device Compliance Part 2

Install and enable encryption What is encryption? Encryption is the conversion of data into a form that cannot be read without the decryption key or password. It is important to encrypt data stored locally on your mobile device (data at rest) and data sent by your mobile device (data in motion) so that it is […]

0 comments

HIPAA TIPS: Mobile Device Compliance Part 3

Install and activate remote wiping and/or remote disabling What is remote wiping? Remote wiping is a security feature that enables you to remotely erase the data on the mobile device if the device is lost or stolen. When you enable remote wipe feature on your mobile device, you have the ability to permanently delete data […]

0 comments

HIPAA TIPS: Mobile Device Compliance Part 5

Install and enable a firewall What is a firewall? A personal firewall can protect against unauthorized connections by intercepting incoming and outgoing connection attempts and blocking or permitting them based on a set of rules. Why should you enable or install a firewall? When you enable or install a firewall, you increase the security for […]

0 comments

HIPAA TIPS: Mobile Device Compliance Part 6

Install and enable security software What is security software? Security software protects against malicious software such as viruses, spam and malware. A virus is a self-replicating program that runs and spreads by modifying other programs or files. Spam is the abuse of electronic messaging systems. It is electronic junk mail. Malware is a program that […]

0 comments

HIPAA TIPS: Mobile Device Compliance Part 7

Keep your security software up to date Why should you keep security software up to date? Security risks and threats are changing rapidly. By updating your security software you know that you have the latest tools to prevent unauthorized access to health information on your mobile device. How can you keep security software up to […]

0 comments