Main factors to be concerned about the health care data being transmitted are:
• Privacy
• Confidentiality
Privacy and confidentiality is often mistaken or considered to have the same meaning. Privacy refers to the individual and their right to protect their details where confidentiality refers to the data of the user (personal information of the patient being stored …show more content…
• ENCRYPTION: If the data present in the hand held devices are not encrypted, it could lead to the ePHI data that can be accessible to anyone who comes in contact with the device.
• WIFI CONNECTION: Most of the hand help devices using the wifi connection provided by the hospitals or the public wifi (in case of patients) which raises high security risk as the data can be easily pulled. This risk can be minimized by ensuring that while accessing this data, the hand held device connects using VPN(Virtual Private Network) which encrypts the data and then transmits the data across the internet leading to a better security of the ePHI data.
Though HIPAA Security rule permits the ePHI data to be transmitted via email, there are three safeguard measures that must be ensured before transmitting these …show more content…
Below are a few measures to ensure that administrative safeguard is achieved: o Ensuring that the ePHI data is not altered or deleted by an unauthorized personnel. o Ensuring that the data is protected in hand held devices by ensuring proper encryption and breach protocols. o Technicians must be trained on the various process and standardized protocols in the field of medicine while using hand help devices and also the possible risks that could be encountered in breaching the protocols of HIPAA rules.
• PHYSICAL SAFEGUARD: In the period of September 2009 through May 2011, an Office for Civil Rights (OCR) reported ‘116 breaches of 500 data records. Below are few measures to ensure physical safeguard: o Installing RFIDs on device that is being used can help us to track them in case it is stolen. o Using remote shutdown technique on stolen or missing devices that ensure that there is no breach of data using that device.
• TECHNICAL SAFEGUARD: It is the automated process to ensure that the data is protected and there is a controlled access to rete rive the data. o Installing firewalls and encrypting the data that is being