“The Dr.’s Tablet Will See You Now”

“The Dr.’s Tablet Will See You Now”

Health care is as much about Information Management as it is about patient diagnostics. Whenever a patient interacts with a health care professional, there is a record made of the encounter.

This benefits the patient, because his course of treatment is tracked and monitored, helping to ensure that no steps are missed or forgotten. The same benefit reaches to the Health Care professional as well, enabling them to more efficiently do their job and treat more patients.

Electronic computers have become more than labor saving devices, they are an indispensable tool of everyday life which have practically replaced the work that has traditionally been done using paper and pencil. In many ways the tablet computer is latest step in the evolution of portable computing. On the surface they would appear to be a natural fit for medical professionals.

Doctors, COWs, and Tablets

Not everything is quite as it appears, however. Tablet computing has not been as universally accepted in the hospital environment as would be expected. Dr.s can and do make use of computers to record their notes of patient examinations, for example. Over the last decade or so the most common interface has been with “computers on wheels” or COWs, or some sort of laptop application.

COWs and laptops are subject to the obvious limitations of full sized (or nearly full sized) Windows based computers; they are somewhat slow in addition to their physical size. However, they are thought to be very secure. In fact, compliance with the Health Insurance Portability and Accountability Act (HIPAA) is based on full sized computers.

Portability And Accountability

HIPAA is primarily designed to protect patient confidentiality and privacy. Medical facilities which break privacy protocols can find themselves subject to fines. Until recently, the most popular of the tablet computers, the Apple iPad, was considered to not be HIPAA compliant.

Medical IT professionals site the statistic that 40% of all HIPAA Privacy breaches are the result of mobile device usage. However, closer examination reveals that the greatest portion of these breaches are from unencrypted lost or stolen laptops.

As it turns out, thanks to native security features of the iPad, the tablet is more than HIPAA compliant, and Android based tablets have the potential to be even more secure in the medical environment.

As Electronic Health Record Systems (EHRS) come on line, less and less patient data is actually stored locally. In many cases, patient data is being handled by a Cloud based system, usually incorporating a Software as a Service (SaaS) application handling not only record management, but security as well.

By Pete Knight

FacebookTwitterLinkedInGoogle+Share

Sorry, comments are closed for this post.

Join Our Newsletter

Receive updates each week on news, tips, events, comics and much more...

Advertising Programs

Click To Find Out!

Sponsored Posts

Sponsored Posts

CloudTweaks has enjoyed a great relationship with many businesses, influencers and readers over the years, and it is one that we are interested in continuing. When we meet up with prospective clients, our intent is to establish a more solid relationship in which our clients invest in a campaign that consists of a number of

Popular

Top Viral Impact

Cloud Infographic – Monetizing Internet Of Things

Cloud Infographic – Monetizing Internet Of Things

Cloud Infographic – Monetizing Internet Of Things There are many interesting ways in which companies are looking to connect devices to the cloud. From the vehicles to kitchen appliances the internet of things is already a $1.9 trillion dollar market based on research estimates from IDC. Included is a fascinating infographic provided by AriaSystems which shows us some

Cloud Computing Offers Key Benefits For Small, Medium Businesses

Cloud Computing Offers Key Benefits For Small, Medium Businesses

A growing number of small and medium businesses in the United States rely on as a means of deploying mission-critical software products. Prior to the advent of cloud-based products — software solutions delivered over the Internet – companies were often forced to invest in servers and other products to run software and store data. The

Are Cloud Servers The Right Choice For Your Business?

Are Cloud Servers The Right Choice For Your Business?

Cloud servers offer power, flexibility, reliability, and client friendly hosting for small and medium businesses that have outgrown shared hosting. New business hosting clients are bombarded with an incredible diversity of different choices for their site’s hosting. It can be a challenge to negotiate the range of platforms and the marketing hype that many hosting

Can I Contribute To CloudTweaks?

Yes, much of our focus in 2015 will be on working with other influencers in a collaborative manner. If you're a technology influencer looking to collaborate long term with CloudTweaks – a globally recognized leader in cloud computing information – drop us an email with “tech influencer” in the subject line.

Please review the guidelines before applying.

Whitepapers

Top Research Assets

HP OpenStack® Technology Breaking the Enterprise Barrier

HP OpenStack® Technology Breaking the Enterprise Barrier

Explore how cloud computing is a solution to the problems facing data centers today and highlights the cutting-edge technology (including OpenStack cloud computing) that HP is bringing to the current stage. If you are a CTO, data center administrator, systems architect, or an IT professional looking for an enterprise-grade, hybrid delivery cloud computing solution that’s open,

Public Cloud Flexibility, Private Cloud Security

Public Cloud Flexibility, Private Cloud Security

Public Cloud Flexibility, Private Cloud Security Cloud applications are a priority for every business – the technology is flexible, easy-to-use, and offers compelling economic benefits to the enterprise. The challenge is that cloud applications increase the potential for corporate data to leak, raising compliance and security concerns for IT. A primary security concern facing organizations moving