Top Menu

HIPPA Mobile Device Security – 9 Part Series

HIPAA TIPS: Mobile Device Compliance Part 1

Use a password or other user authentication You can configure your mobile device to require a password, personal identification number (PIN), or passcode (a pattern you trace with your finger) to gain access to the device. Keep your password, PIN, or passcode a secret, and don’t store them on your mobile device. You can also […]

0 comments

HIPAA TIPS: Mobile Device Compliance Part 2

Install and enable encryption What is encryption? Encryption is the conversion of data into a form that cannot be read without the decryption key or password. It is important to encrypt data stored locally on your mobile device (data at rest) and data sent by your mobile device (data in motion) so that it is […]

0 comments

HIPAA TIPS: Mobile Device Compliance Part 3

Install and activate remote wiping and/or remote disabling What is remote wiping? Remote wiping is a security feature that enables you to remotely erase the data on the mobile device if the device is lost or stolen. When you enable remote wipe feature on your mobile device, you have the ability to permanently delete data […]

0 comments

HIPAA TIPS: Mobile Device Compliance Part 5

Install and enable a firewall What is a firewall? A personal firewall can protect against unauthorized connections by intercepting incoming and outgoing connection attempts and blocking or permitting them based on a set of rules. Why should you enable or install a firewall? When you enable or install a firewall, you increase the security for […]

0 comments

HIPAA TIPS: Mobile Device Compliance Part 6

Install and enable security software What is security software? Security software protects against malicious software such as viruses, spam and malware. A virus is a self-replicating program that runs and spreads by modifying other programs or files. Spam is the abuse of electronic messaging systems. It is electronic junk mail. Malware is a program that […]

0 comments

HIPAA TIPS: Mobile Device Compliance Part 7

Keep your security software up to date Why should you keep security software up to date? Security risks and threats are changing rapidly. By updating your security software you know that you have the latest tools to prevent unauthorized access to health information on your mobile device. How can you keep security software up to […]

0 comments

HIPAA TIPS: Mobile Device Compliance Part 8

Research mobile applications (apps) before downloading What is a mobile app? A mobile app is a software program for mobile devices. Some examples of mobile device apps are games, note taking programs, research programs, and health related tools, such as EHR software. Why should you research mobile apps before you download them to your mobile […]

0 comments

HIPAA TIPS: Mobile Device Compliance Part 9

Maintain physical control Mobile devices are easily lost or stolen due to their small size and portability. A mobile device that is accessible to unauthorized users poses a risk to the confidentiality, integrity, and availability of health information on the mobile device. If you physically secure your mobile device, you can limit the risk of […]

0 comments

HIPAA TIPS: Mobile Device Compliance Part 10

Use adequate security to send or receive health information over public Wi-Fi networks What is a public Wi-Fi network? Wi-Fi stands for Wireless Fidelity. It refers to wireless data networking technologies. Wireless data networking links computers, including mobile devices, without wires (such as an Internet cord). The risk of using a public Wi-Fi network (or […]

0 comments

HIPAA TIPS: Mobile Device Compliance Part 11

Delete all stored health information before discarding or reusing the mobile device Why should you delete all health information stored on a mobile device prior to discarding or reusing the device? By using software tools that thoroughly delete (or wipe) health information stored on a mobile device before discarding or reusing it, you can protect […]

0 comments