Using Mobile Devices While Protecting and Securing Health Information

Updated: Jul 20


Using Mobile Devices While Protecting and Securing Health Information means that you will:

1. Authenticate Mobile Devices: Use masked (……..) passwords, personal identification numbers (PINs), or passcodes to access mobile devices.

2. Encrypt Mobile Devices: Use mobile devices built-in encryption capabilities, or buy and install an encryption application.

3. Remote wipe/or remote disable: Enable the remote wipe feature to remotely erase data stored on a lost or stolen device, permanently.

Or, enable the remote disabling feature to lock or completely erase data stored on a lost or stolen device.

4. Do not use file sharing applications: Disable or do not use file sharing applications to reduce the risk of unauthorized users to access data on your mobile device without your knowledge.


Using Mobile Devices While Protecting and Securing Health Information means practicing network security:

5. Use firewalls: Firewalls protect against unauthorized connections.

6. Use security software: Install and enable security software.

7. Regularly update your security software: Stay up-to-date with your security software.

8. Download only trusted mobile applications (apps): Research, and get trusted reviews before downloading mobile applications, approve and verify the functions to be performed, after downloading.

9. Physically secure your mobile device at all times:Maintaining physical control of your mobile device, at all times.

10. Use private Wi-Fi networks, and with secure and encrypted connections: Do not use public Wi-Fi networkswith unsecure and unencrypted connections. Public Wi-Fi networks may be okay to use only with secure and encrypted connections.


Using Mobile Devices While Protecting and Securing Health Information means proper disposal:

11. Remove all health information and sensitive data stored on your mobile device before discarding or re-using it: Software tools are available to thoroughly delete (or wipe) stored data on your mobile device, as well as guidelines for media sanitization. https://www.healthit.gov/topic/privacy-security-and-hipaa/how-can-you-protect-and-secure-health-information-when-using-mobile-device


Recent Posts

See All

HIPAA, HIM, RCM Processes, and Project Management

©2020 by Myson L. Joseph, MHA/INF, RHIA, CSSWB, PMEC. MLJCONSULTANCY LLC, all rights reserved.