“The Dr.’s Tablet Will See You Now”

“The Dr.’s Tablet Will See You Now”

Health care is as much about Information Management as it is about patient diagnostics. Whenever a patient interacts with a health care professional, there is a record made of the encounter.

This benefits the patient, because his course of treatment is tracked and monitored, helping to ensure that no steps are missed or forgotten. The same benefit reaches to the Health Care professional as well, enabling them to more efficiently do their job and treat more patients.

Electronic computers have become more than labor saving devices, they are an indispensable tool of everyday life which have practically replaced the work that has traditionally been done using paper and pencil. In many ways the tablet computer is latest step in the evolution of portable computing. On the surface they would appear to be a natural fit for medical professionals.

Doctors, COWs, and Tablets

Not everything is quite as it appears, however. Tablet computing has not been as universally accepted in the hospital environment as would be expected. Dr.s can and do make use of computers to record their notes of patient examinations, for example. Over the last decade or so the most common interface has been with “computers on wheels” or COWs, or some sort of laptop application.

COWs and laptops are subject to the obvious limitations of full sized (or nearly full sized) Windows based computers; they are somewhat slow in addition to their physical size. However, they are thought to be very secure. In fact, compliance with the Health Insurance Portability and Accountability Act (HIPAA) is based on full sized computers.

Portability And Accountability

HIPAA is primarily designed to protect patient confidentiality and privacy. Medical facilities which break privacy protocols can find themselves subject to fines. Until recently, the most popular of the tablet computers, the Apple iPad, was considered to not be HIPAA compliant.

Medical IT professionals site the statistic that 40% of all HIPAA Privacy breaches are the result of mobile device usage. However, closer examination reveals that the greatest portion of these breaches are from unencrypted lost or stolen laptops.

As it turns out, thanks to native security features of the iPad, the tablet is more than HIPAA compliant, and Android based tablets have the potential to be even more secure in the medical environment.

As Electronic Health Record Systems (EHRS) come on line, less and less patient data is actually stored locally. In many cases, patient data is being handled by a Cloud based system, usually incorporating a Software as a Service (SaaS) application handling not only record management, but security as well.

By Pete Knight

Sorry, comments are closed for this post.

Do Not Rely On Passwords To Protect Your Online Information

Do Not Rely On Passwords To Protect Your Online Information

Password Challenges  Simple passwords are no longer safe to use online. John Barco, vice president of Global Product Marketing at ForgeRock, explains why it’s time the industry embraced more advanced identity-centric solutions that improve the customer experience while also providing stronger security. Since the beginning of logins, consumers have used a simple username and password to…

How The CFAA Ruling Affects Individuals And Password-Sharing

How The CFAA Ruling Affects Individuals And Password-Sharing

Individuals and Password-Sharing With the 1980s came the explosion of computing. In 1980, the Commodore ushered in the advent of home computing. Time magazine declared 1982 was “The Year of the Computer.” By 1983, there were an estimated 10 million personal computers in the United States alone. As soon as computers became popular, the federal government…

Three Challenges of Network Deployment in Hyperconverged Infrastructure for Private Cloud

Three Challenges of Network Deployment in Hyperconverged Infrastructure for Private Cloud

Hyperconverged Infrastructure In this article, we’ll explore three challenges that are associated with network deployment in a hyperconverged private cloud environment, and then we’ll consider several methods to overcome those challenges. The Main Challenge: Bring Your Own (Physical) Network Some of the main challenges of deploying a hyperconverged infrastructure software solution in a data center are the diverse physical…

Staying on Top of Your Infrastructure-as-a-Service Security Responsibilities

Staying on Top of Your Infrastructure-as-a-Service Security Responsibilities

Infrastructure-as-a-Service Security It’s no secret many organizations rely on popular cloud providers like Amazon and Microsoft for access to computing infrastructure. The many perks of cloud services, such as the ability to quickly scale resources without the upfront cost of buying physical servers, have helped build a multibillion-dollar cloud industry that continues to grow each…

Cloud-Based Services vs. On-Premises: It’s About More Than Just Dollars

Cloud-Based Services vs. On-Premises: It’s About More Than Just Dollars

Cloud-Based Services vs. On-Premises The surface costs might give you pause, but the cost of diminishing your differentiators is far greater. Will a shift to the cloud save you money? Potential savings are historically the main business driver cited when companies move to the cloud, but it shouldn’t be viewed as a cost-saving exercise. There…

Cloud Security Risks: The Top 8 According To ENISA

Cloud Security Risks: The Top 8 According To ENISA

Cloud Security Risks Does cloud security risks ever bother you? It would be weird if it didn’t. Cloud computing has a lot of benefits, but also a lot of risks if done in the wrong way. So what are the most important risks? The European Network Information Security Agency did extensive research on that, and…

Why Security Practitioners Need To Apply The 80-20 Rules To Data Security

Why Security Practitioners Need To Apply The 80-20 Rules To Data Security

The 80-20 Rule For Security Practitioners  Everyday we learn about yet another egregious data security breach, exposure of customer data or misuse of data. It begs the question why in this 21st century, as a security industry we cannot seem to secure our most valuable data assets when technology has surpassed our expectations in other regards.…

The Security Gap: What Is Your Core Strength?

The Security Gap: What Is Your Core Strength?

The Security Gap You’re out of your mind if you think blocking access to file sharing services is filling a security gap. You’re out of your mind if you think making people jump through hoops like Citrix and VPNs to get at content is secure. You’re out of your mind if you think putting your…