“The Dr.’s Tablet Will See You Now”

“The Dr.’s Tablet Will See You Now”

Health care is as much about Information Management as it is about patient diagnostics. Whenever a patient interacts with a health care professional, there is a record made of the encounter.

This benefits the patient, because his course of treatment is tracked and monitored, helping to ensure that no steps are missed or forgotten. The same benefit reaches to the Health Care professional as well, enabling them to more efficiently do their job and treat more patients.

Electronic computers have become more than labor saving devices, they are an indispensable tool of everyday life which have practically replaced the work that has traditionally been done using paper and pencil. In many ways the tablet computer is latest step in the evolution of portable computing. On the surface they would appear to be a natural fit for medical professionals.

Doctors, COWs, and Tablets

Not everything is quite as it appears, however. Tablet computing has not been as universally accepted in the hospital environment as would be expected. Dr.s can and do make use of computers to record their notes of patient examinations, for example. Over the last decade or so the most common interface has been with “computers on wheels” or COWs, or some sort of laptop application.

COWs and laptops are subject to the obvious limitations of full sized (or nearly full sized) Windows based computers; they are somewhat slow in addition to their physical size. However, they are thought to be very secure. In fact, compliance with the Health Insurance Portability and Accountability Act (HIPAA) is based on full sized computers.

Portability And Accountability

HIPAA is primarily designed to protect patient confidentiality and privacy. Medical facilities which break privacy protocols can find themselves subject to fines. Until recently, the most popular of the tablet computers, the Apple iPad, was considered to not be HIPAA compliant.

Medical IT professionals site the statistic that 40% of all HIPAA Privacy breaches are the result of mobile device usage. However, closer examination reveals that the greatest portion of these breaches are from unencrypted lost or stolen laptops.

As it turns out, thanks to native security features of the iPad, the tablet is more than HIPAA compliant, and Android based tablets have the potential to be even more secure in the medical environment.

As Electronic Health Record Systems (EHRS) come on line, less and less patient data is actually stored locally. In many cases, patient data is being handled by a Cloud based system, usually incorporating a Software as a Service (SaaS) application handling not only record management, but security as well.

By Pete Knight

Sorry, comments are closed for this post.

Why Hybrid Cloud Delivers Better Business Agility

Why Hybrid Cloud Delivers Better Business Agility

Why Hybrid Cloud Delivers Better Business Agility A CIO friend of mine once told me that a hybrid cloud model enables him to “own the base, rent the spike” when it comes to unplanned events. Let’s face it – maintaining unused infrastructure for rare or random IT events is expensive and unnecessary in a cloud…

Insider Threats and Sensitive Data in the Cloud

Insider Threats and Sensitive Data in the Cloud

The Age of Sensitive Data in the Cloud A recent survey report conducted by the Cloud Security Alliance (CSA) revealed that cloud security had reached a tipping point: 64.9% of respondents (which included IT security professionals from enterprises across all industries and regions) believed that the cloud was as secure or more secure than their…

What The FITARA Scorecard Tells Us About Government Cyber Security Preparedness

What The FITARA Scorecard Tells Us About Government Cyber Security Preparedness

Government Cyber Security Preparedness Last year’s massive data breach of Office of Personnel Management, as well as other recent cyber security incidents affecting federal agencies, underscored the urgency of bringing the federal government’s security infrastructure up to date. Although many agencies have made strides toward hardening their cyber security, outdated IT infrastructure and architecture is…

Your Biggest Data Security Threat Could Be….

Your Biggest Data Security Threat Could Be….

Paying Attention To Data Security Your biggest data security threat could be sitting next to you… Data security is a big concern for businesses. The repercussions of a data security breach ranges from embarrassment, to costly lawsuits and clean-up jobs – particularly when confidential client information is involved. But although more and more businesses are…

Did The FBI Make A Mistake In Publicly Fighting Apple?

Did The FBI Make A Mistake In Publicly Fighting Apple?

Dropping The Gloves: The FBI vs Apple Unless you live in a completely disconnected bubble, you’ve heard all about the recent battle between Apple and the FBI. You’ve heard the arguments from different sides —you’ve probably even debated on one side or the other. Some argued that Apple was right because nothing should come above…

New Smartphones From Apple, Samsung and HTC Promise To Light Up 2016

New Smartphones From Apple, Samsung and HTC Promise To Light Up 2016

New Smartphones from Apple, Samsung and HTC (Sponsored post courtesy of Verizon Wireless) The launch of the Galaxy S7 Edge at the Mobile World Congress in Barcelona during February was the first shot in a vintage year for mobile phones. The S7 is an incredible piece of hardware, but launches from HTC and Apple later in the…

Featured Sponsored Articles
How Successful Businesses Ensure Quality Team Communication

How Successful Businesses Ensure Quality Team Communication

Quality Team Communication  (Sponsored post courtesy of Hubgets) Successful team communication and collaboration are as vital to project and overall business success as the quality of products and services an organization develops. We rely on a host of business tools to ensure appropriate customer interactions, sound product manufacturing, and smooth back-end operations. However, the interpersonal relationships…

Featured Sponsored Articles
How To Develop A Business Continuity Plan Using Internet Performance Management

How To Develop A Business Continuity Plan Using Internet Performance Management

Internet Performance Management Planning CDN Performance Series Provided By Dyn In our previous post, we laid out the problems of business continuity and Internet Performance Management in today’s online environment.  In this article, we will take a look at some of the ways you can use traffic steering capabilities to execute business continuity planning and…

Featured Sponsored Articles

CloudTweaks is recognized as one of the leading influencers in cloud computing, infosec, big data and the internet of things (IoT) information. Our goal is to continue to build our growing information portal by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more.

Sponsor