SlideShare a Scribd company logo
1 of 2
Download to read offline
This document provides simple safeguards to protect your
patient’s data from the risk of being compromised. Take
reasonable and appropriate security measures to mitigate the
losses from costly litigation and reputational damage.
The Impact Cost of Data Breaches
Ponemon Institute Research Report
The investment in a secure network far exceeds the
cost of not implementing a security safeguards.
Securing Your Mobile Devices
 Set strong passwords
 Encrypt
 Use automatic log off
 Require a unique user ID
 Enable remote wipe
 Lock the device
 Keep the device with you
 Use a screen shield
 Refrain from sharing the mobile device
 Register the mobile device
 Install firewall
 Use secure Wi-Fi connection
 Research mobile applications
Mobile Device Risks
 Lost mobile device
 Stolen mobile device
 Download virus or malware
 Shared mobile device
 Unsecured Wi-Fi Network
Mobile Security Safeguards
The Risks and Rewards of a Secure Network
The SMLR Group is a full service
cyber security/risk assessment-
consulting firm, specializing
in: Privacy Audits, Standardized
Vendor Compliance Audits
(SVCA), Privacy Policies, Written
Information Security Plans, and
Data Breach Defensible Response
Consultation.
SMLR Group, Inc.
http://www.smlrgroup.com
SOURCE
http://hhs.ogv/ocr/privacy
http://healthIT.gov/mobiledevices
To report a cyber incident:
https://forms.us-cert.gov/report/ or
(888) 282-0870
-20 -10 0 10 20 30
Strong Security Posture
Incident Response Plan
CISO Appointment
Consultants Engaged
Quick Notification
Lost or Stolen Devices
Third Party Error
HIPAA Privacy Rule
The HIPAA Privacy Rule is a set of federal standards to protect
the privacy of patients' medical records and other health
information maintained by covered entities: health plans, which
include many governmental health programs, such as the
Veterans Health Administration, Medicare and Medicaid; most
doctors, hospitals and many other health care providers; and
health care clearinghouses.
These standards provide patients with access to their medical
records and with significant control over how their personal health
information is used and disclosed.
The HIPAA Security Rule establishes national standards for the
security of electronic protected health information. HIPAA
specifies a series of administrative, technical, and physical
security procedures for covered entities to use to assure the
confidentiality of electronic protected health information. The
standards are delineated into either required or addressable
implementation specifications
Five Simple Steps To Secure Mobile Devices
One DECIDE whether mobile device use accesses, receives,
transmits, or stores patient’s health information or is used
as part of your organization’s internal networks or systems
(e.g. HER system).
Two ASSESS. Consider how your organization’s mobile
devices affect threats and vulnerabilities to patient’s health
information.
Three IDENTIFY your organization’s mobile device risk
management strategy, including privacy and security
safeguards.
Four DEVELOP, DOCUMENT AND IMPLEMENT the
organization’s mobile device policies and procedures to
safeguard health information.
Five TRAIN. Conduct mobile device privacy and security
awareness and training for providers and professionals.
The SMLR Group is a full service
cyber security/risk assessment-
consulting firm, specializing
in: Privacy Audits, Standardized
Vendor Compliance Audits
(SVCA), Privacy Policies, Written
Information Security Plans, and
Data Breach Defensible Response
Consultation.
SMLR Group, Inc.
http://www.smlrgroup.com
SOURCE
http://hhs.ogv/ocr/privacy
http://healthIT.gov/mobiledevices
To report a cyber incident:
https://forms.us-cert.gov/report/ or
(888) 282-0870
Mobile Security Safeguards
The Risks and Rewards of a Secure Network

More Related Content

What's hot

Network Security Policies
Network Security PoliciesNetwork Security Policies
Network Security PoliciesAamir Sohail
 
information security technology
information security technologyinformation security technology
information security technologygarimasagar
 
A Framework for Health Information Technology and Network Security
A Framework for Health Information Technology and Network Security A Framework for Health Information Technology and Network Security
A Framework for Health Information Technology and Network Security Jeff Horsager
 
Digital Generation: Security Infographic
Digital Generation: Security InfographicDigital Generation: Security Infographic
Digital Generation: Security InfographicUnisys Corporation
 
Security Risks Concerning Healthcare Apps 
Security Risks Concerning Healthcare Apps Security Risks Concerning Healthcare Apps 
Security Risks Concerning Healthcare Apps Centextech
 
Protecting the Healthcare Database
Protecting the Healthcare DatabaseProtecting the Healthcare Database
Protecting the Healthcare DatabaseSteve Dunn
 
Externally Hosted Web 2.0 Services
Externally Hosted Web 2.0 ServicesExternally Hosted Web 2.0 Services
Externally Hosted Web 2.0 Servicesmarkvanharmelen
 
EHR meaningful use security risk assessment sample document
EHR meaningful use security risk assessment sample documentEHR meaningful use security risk assessment sample document
EHR meaningful use security risk assessment sample documentdata brackets
 
Information Security Management
Information Security ManagementInformation Security Management
Information Security ManagementEC-Council
 
Information Technology Security A Brief Overview 2001
Information Technology Security A Brief Overview 2001Information Technology Security A Brief Overview 2001
Information Technology Security A Brief Overview 2001Donald E. Hester
 
CyberSecurity Medical Devices
CyberSecurity Medical DevicesCyberSecurity Medical Devices
CyberSecurity Medical DevicesSuresh Mandava
 
Importance Of A Security Policy
Importance Of A Security PolicyImportance Of A Security Policy
Importance Of A Security Policycharlesgarrett
 
Equilibrium Security Methodology 030414 Final v2
Equilibrium Security Methodology 030414 Final v2Equilibrium Security Methodology 030414 Final v2
Equilibrium Security Methodology 030414 Final v2marchharvey
 
Cybersecurity in medical devices
Cybersecurity in medical devicesCybersecurity in medical devices
Cybersecurity in medical devicesSafisSolutions
 
HIPAA Security Risk Analysis for Business Associates
HIPAA Security Risk Analysis for Business AssociatesHIPAA Security Risk Analysis for Business Associates
HIPAA Security Risk Analysis for Business AssociatesRedspin, Inc.
 
Symantec 2011 Encryption Flash Poll Global Results
Symantec 2011 Encryption Flash Poll Global ResultsSymantec 2011 Encryption Flash Poll Global Results
Symantec 2011 Encryption Flash Poll Global ResultsSymantec
 
HIPAA Workloads on AWS - Pop-up Loft Tel Aviv
HIPAA Workloads on AWS - Pop-up Loft Tel AvivHIPAA Workloads on AWS - Pop-up Loft Tel Aviv
HIPAA Workloads on AWS - Pop-up Loft Tel AvivAmazon Web Services
 
How to protect yourself from a cyber event in 10 minutes
How to protect yourself from a cyber event in 10 minutesHow to protect yourself from a cyber event in 10 minutes
How to protect yourself from a cyber event in 10 minutesCareMIT Pty Ltd
 
Mha 690 wk 1 dis 3
Mha 690 wk 1 dis 3Mha 690 wk 1 dis 3
Mha 690 wk 1 dis 3akudan
 

What's hot (20)

Cyber security
Cyber securityCyber security
Cyber security
 
Network Security Policies
Network Security PoliciesNetwork Security Policies
Network Security Policies
 
information security technology
information security technologyinformation security technology
information security technology
 
A Framework for Health Information Technology and Network Security
A Framework for Health Information Technology and Network Security A Framework for Health Information Technology and Network Security
A Framework for Health Information Technology and Network Security
 
Digital Generation: Security Infographic
Digital Generation: Security InfographicDigital Generation: Security Infographic
Digital Generation: Security Infographic
 
Security Risks Concerning Healthcare Apps 
Security Risks Concerning Healthcare Apps Security Risks Concerning Healthcare Apps 
Security Risks Concerning Healthcare Apps 
 
Protecting the Healthcare Database
Protecting the Healthcare DatabaseProtecting the Healthcare Database
Protecting the Healthcare Database
 
Externally Hosted Web 2.0 Services
Externally Hosted Web 2.0 ServicesExternally Hosted Web 2.0 Services
Externally Hosted Web 2.0 Services
 
EHR meaningful use security risk assessment sample document
EHR meaningful use security risk assessment sample documentEHR meaningful use security risk assessment sample document
EHR meaningful use security risk assessment sample document
 
Information Security Management
Information Security ManagementInformation Security Management
Information Security Management
 
Information Technology Security A Brief Overview 2001
Information Technology Security A Brief Overview 2001Information Technology Security A Brief Overview 2001
Information Technology Security A Brief Overview 2001
 
CyberSecurity Medical Devices
CyberSecurity Medical DevicesCyberSecurity Medical Devices
CyberSecurity Medical Devices
 
Importance Of A Security Policy
Importance Of A Security PolicyImportance Of A Security Policy
Importance Of A Security Policy
 
Equilibrium Security Methodology 030414 Final v2
Equilibrium Security Methodology 030414 Final v2Equilibrium Security Methodology 030414 Final v2
Equilibrium Security Methodology 030414 Final v2
 
Cybersecurity in medical devices
Cybersecurity in medical devicesCybersecurity in medical devices
Cybersecurity in medical devices
 
HIPAA Security Risk Analysis for Business Associates
HIPAA Security Risk Analysis for Business AssociatesHIPAA Security Risk Analysis for Business Associates
HIPAA Security Risk Analysis for Business Associates
 
Symantec 2011 Encryption Flash Poll Global Results
Symantec 2011 Encryption Flash Poll Global ResultsSymantec 2011 Encryption Flash Poll Global Results
Symantec 2011 Encryption Flash Poll Global Results
 
HIPAA Workloads on AWS - Pop-up Loft Tel Aviv
HIPAA Workloads on AWS - Pop-up Loft Tel AvivHIPAA Workloads on AWS - Pop-up Loft Tel Aviv
HIPAA Workloads on AWS - Pop-up Loft Tel Aviv
 
How to protect yourself from a cyber event in 10 minutes
How to protect yourself from a cyber event in 10 minutesHow to protect yourself from a cyber event in 10 minutes
How to protect yourself from a cyber event in 10 minutes
 
Mha 690 wk 1 dis 3
Mha 690 wk 1 dis 3Mha 690 wk 1 dis 3
Mha 690 wk 1 dis 3
 

Viewers also liked (9)

Simple Safe Steps to Cyber Security
Simple Safe Steps to Cyber SecuritySimple Safe Steps to Cyber Security
Simple Safe Steps to Cyber Security
 
IABC Porfolio Rebuilding Together
IABC Porfolio Rebuilding Together IABC Porfolio Rebuilding Together
IABC Porfolio Rebuilding Together
 
Content Marketing
Content Marketing Content Marketing
Content Marketing
 
Guide to content marketing
Guide to content marketingGuide to content marketing
Guide to content marketing
 
Social mediamarketing hvpr
Social mediamarketing hvprSocial mediamarketing hvpr
Social mediamarketing hvpr
 
Branding Your Business
Branding Your BusinessBranding Your Business
Branding Your Business
 
Stakeholder Assessment ByteBack NGO
Stakeholder Assessment ByteBack NGO Stakeholder Assessment ByteBack NGO
Stakeholder Assessment ByteBack NGO
 
Colloque "La disparition des abeilles"
Colloque "La disparition des abeilles" Colloque "La disparition des abeilles"
Colloque "La disparition des abeilles"
 
Creating an Actionable Roadmap for Company Growth
Creating an Actionable Roadmap for Company Growth Creating an Actionable Roadmap for Company Growth
Creating an Actionable Roadmap for Company Growth
 

Similar to MobileSecurity WhitePaper

Securing Mobile Healthcare Application
Securing Mobile Healthcare ApplicationSecuring Mobile Healthcare Application
Securing Mobile Healthcare ApplicationCitiusTech
 
Legal and Ethical Considerations in Nursing Informatics
Legal and Ethical Considerations in Nursing InformaticsLegal and Ethical Considerations in Nursing Informatics
Legal and Ethical Considerations in Nursing InformaticsKimarie Brown
 
Guide Preview: Ensuring your enterprise image-viewer if fully secure
Guide Preview: Ensuring your enterprise image-viewer if fully secureGuide Preview: Ensuring your enterprise image-viewer if fully secure
Guide Preview: Ensuring your enterprise image-viewer if fully secureCalgary Scientific Inc.
 
mHealth Security: Stats and Solutions
mHealth Security: Stats and SolutionsmHealth Security: Stats and Solutions
mHealth Security: Stats and SolutionsESET North America
 
mHealth Security: Stats and Solutions
mHealth Security: Stats and SolutionsmHealth Security: Stats and Solutions
mHealth Security: Stats and SolutionsKristie Allison
 
How to Secure Your Medical Devices
How to Secure Your Medical DevicesHow to Secure Your Medical Devices
How to Secure Your Medical DevicesSecurityMetrics
 
Cybersecurity Measures and Privacy Protection.pdf
Cybersecurity Measures and Privacy Protection.pdfCybersecurity Measures and Privacy Protection.pdf
Cybersecurity Measures and Privacy Protection.pdfLarisaAlbanians
 
Health Informatics- Module 5-Chapter 1.pptx
Health Informatics- Module 5-Chapter 1.pptxHealth Informatics- Module 5-Chapter 1.pptx
Health Informatics- Module 5-Chapter 1.pptxArti Parab Academics
 
The FDA - Mobile, and Fixed Medical Devices Cybersecurity Guidance
The FDA - Mobile, and Fixed Medical Devices Cybersecurity GuidanceThe FDA - Mobile, and Fixed Medical Devices Cybersecurity Guidance
The FDA - Mobile, and Fixed Medical Devices Cybersecurity GuidanceValdez Ladd MBA, CISSP, CISA,
 
THE FDA and Medical Device Cybersecurity Guidance
THE FDA and Medical Device Cybersecurity GuidanceTHE FDA and Medical Device Cybersecurity Guidance
THE FDA and Medical Device Cybersecurity GuidancePam Gilmore
 
Cybersecurity Interview Questions and Answers.pdf
Cybersecurity Interview Questions and Answers.pdfCybersecurity Interview Questions and Answers.pdf
Cybersecurity Interview Questions and Answers.pdfJazmine Brown
 
Safeguarding Your Business: Understanding, Preventing, and Responding to Data...
Safeguarding Your Business: Understanding, Preventing, and Responding to Data...Safeguarding Your Business: Understanding, Preventing, and Responding to Data...
Safeguarding Your Business: Understanding, Preventing, and Responding to Data...cyberprosocial
 
Secure Texting Best Practices: Communicate Your Policies
Secure Texting Best Practices: Communicate Your PoliciesSecure Texting Best Practices: Communicate Your Policies
Secure Texting Best Practices: Communicate Your PoliciesqliqSoft
 
Problem Statement The subject is a cybersecurity solution fo.pdf
Problem Statement The subject is a cybersecurity solution fo.pdfProblem Statement The subject is a cybersecurity solution fo.pdf
Problem Statement The subject is a cybersecurity solution fo.pdfSUNIL64154
 
Best_practices-_Access_controls_for_medical_devices (1).pdf
Best_practices-_Access_controls_for_medical_devices (1).pdfBest_practices-_Access_controls_for_medical_devices (1).pdf
Best_practices-_Access_controls_for_medical_devices (1).pdfJacob Li
 
A sneak peek into the top 5 network security solutions.docx
A sneak peek into the top 5 network security solutions.docxA sneak peek into the top 5 network security solutions.docx
A sneak peek into the top 5 network security solutions.docxNeilStark1
 
A sneak peek into the top 5 network security solutions.pdf
A sneak peek into the top 5 network security solutions.pdfA sneak peek into the top 5 network security solutions.pdf
A sneak peek into the top 5 network security solutions.pdfNeilStark1
 
Ais Romney 2006 Slides 08 Is Control2
Ais Romney 2006 Slides 08 Is Control2Ais Romney 2006 Slides 08 Is Control2
Ais Romney 2006 Slides 08 Is Control2sharing notes123
 

Similar to MobileSecurity WhitePaper (20)

Securing Mobile Healthcare Application
Securing Mobile Healthcare ApplicationSecuring Mobile Healthcare Application
Securing Mobile Healthcare Application
 
Legal and Ethical Considerations in Nursing Informatics
Legal and Ethical Considerations in Nursing InformaticsLegal and Ethical Considerations in Nursing Informatics
Legal and Ethical Considerations in Nursing Informatics
 
Guide Preview: Ensuring your enterprise image-viewer if fully secure
Guide Preview: Ensuring your enterprise image-viewer if fully secureGuide Preview: Ensuring your enterprise image-viewer if fully secure
Guide Preview: Ensuring your enterprise image-viewer if fully secure
 
mHealth Security: Stats and Solutions
mHealth Security: Stats and SolutionsmHealth Security: Stats and Solutions
mHealth Security: Stats and Solutions
 
mHealth Security: Stats and Solutions
mHealth Security: Stats and SolutionsmHealth Security: Stats and Solutions
mHealth Security: Stats and Solutions
 
How to Secure Your Medical Devices
How to Secure Your Medical DevicesHow to Secure Your Medical Devices
How to Secure Your Medical Devices
 
Cybersecurity Measures and Privacy Protection.pdf
Cybersecurity Measures and Privacy Protection.pdfCybersecurity Measures and Privacy Protection.pdf
Cybersecurity Measures and Privacy Protection.pdf
 
10 Things That Compromise Patient Data
10 Things That Compromise Patient Data10 Things That Compromise Patient Data
10 Things That Compromise Patient Data
 
Health Informatics- Module 5-Chapter 1.pptx
Health Informatics- Module 5-Chapter 1.pptxHealth Informatics- Module 5-Chapter 1.pptx
Health Informatics- Module 5-Chapter 1.pptx
 
The FDA - Mobile, and Fixed Medical Devices Cybersecurity Guidance
The FDA - Mobile, and Fixed Medical Devices Cybersecurity GuidanceThe FDA - Mobile, and Fixed Medical Devices Cybersecurity Guidance
The FDA - Mobile, and Fixed Medical Devices Cybersecurity Guidance
 
THE FDA and Medical Device Cybersecurity Guidance
THE FDA and Medical Device Cybersecurity GuidanceTHE FDA and Medical Device Cybersecurity Guidance
THE FDA and Medical Device Cybersecurity Guidance
 
Cybersecurity Interview Questions and Answers.pdf
Cybersecurity Interview Questions and Answers.pdfCybersecurity Interview Questions and Answers.pdf
Cybersecurity Interview Questions and Answers.pdf
 
Safeguarding Your Business: Understanding, Preventing, and Responding to Data...
Safeguarding Your Business: Understanding, Preventing, and Responding to Data...Safeguarding Your Business: Understanding, Preventing, and Responding to Data...
Safeguarding Your Business: Understanding, Preventing, and Responding to Data...
 
Secure Texting Best Practices: Communicate Your Policies
Secure Texting Best Practices: Communicate Your PoliciesSecure Texting Best Practices: Communicate Your Policies
Secure Texting Best Practices: Communicate Your Policies
 
Problem Statement The subject is a cybersecurity solution fo.pdf
Problem Statement The subject is a cybersecurity solution fo.pdfProblem Statement The subject is a cybersecurity solution fo.pdf
Problem Statement The subject is a cybersecurity solution fo.pdf
 
Best_practices-_Access_controls_for_medical_devices (1).pdf
Best_practices-_Access_controls_for_medical_devices (1).pdfBest_practices-_Access_controls_for_medical_devices (1).pdf
Best_practices-_Access_controls_for_medical_devices (1).pdf
 
A sneak peek into the top 5 network security solutions.docx
A sneak peek into the top 5 network security solutions.docxA sneak peek into the top 5 network security solutions.docx
A sneak peek into the top 5 network security solutions.docx
 
A sneak peek into the top 5 network security solutions.pdf
A sneak peek into the top 5 network security solutions.pdfA sneak peek into the top 5 network security solutions.pdf
A sneak peek into the top 5 network security solutions.pdf
 
Ais Romney 2006 Slides 08 Is Control2
Ais Romney 2006 Slides 08 Is Control2Ais Romney 2006 Slides 08 Is Control2
Ais Romney 2006 Slides 08 Is Control2
 
Ais Romney 2006 Slides 08 Is Control2
Ais Romney 2006 Slides 08 Is Control2Ais Romney 2006 Slides 08 Is Control2
Ais Romney 2006 Slides 08 Is Control2
 

More from Hudson Valley Public Relations

More from Hudson Valley Public Relations (19)

Register Herald, Pine Plains NY September 2, 2004
Register Herald, Pine Plains NY September 2, 2004Register Herald, Pine Plains NY September 2, 2004
Register Herald, Pine Plains NY September 2, 2004
 
Us Role in Israeli Conflict White Paper
Us Role in Israeli Conflict White PaperUs Role in Israeli Conflict White Paper
Us Role in Israeli Conflict White Paper
 
Interpretive turmoil and enduring values
Interpretive turmoil and enduring valuesInterpretive turmoil and enduring values
Interpretive turmoil and enduring values
 
White paper blurring boundaries
White paper blurring boundariesWhite paper blurring boundaries
White paper blurring boundaries
 
Content graphics
Content graphicsContent graphics
Content graphics
 
Freedoms forsaken
Freedoms forsakenFreedoms forsaken
Freedoms forsaken
 
Is Negative Campaigning Effective?
Is Negative Campaigning Effective?Is Negative Campaigning Effective?
Is Negative Campaigning Effective?
 
White paper blurring boundaries
White paper blurring boundariesWhite paper blurring boundaries
White paper blurring boundaries
 
RTDC Media Advisory Charity Event
RTDC Media Advisory Charity EventRTDC Media Advisory Charity Event
RTDC Media Advisory Charity Event
 
Level the Competition
Level the CompetitionLevel the Competition
Level the Competition
 
Resident magazine
Resident magazineResident magazine
Resident magazine
 
Visit the Berkshires Blog Page
Visit the Berkshires Blog PageVisit the Berkshires Blog Page
Visit the Berkshires Blog Page
 
Hilltop House Brochure
Hilltop House BrochureHilltop House Brochure
Hilltop House Brochure
 
Pg2 approved golf brochure
Pg2 approved golf brochurePg2 approved golf brochure
Pg2 approved golf brochure
 
Pg1 Rebuilding Together Golf Brochure
Pg1 Rebuilding Together Golf BrochurePg1 Rebuilding Together Golf Brochure
Pg1 Rebuilding Together Golf Brochure
 
Hilltop House Press Release
Hilltop House Press ReleaseHilltop House Press Release
Hilltop House Press Release
 
Tulip post card
Tulip post cardTulip post card
Tulip post card
 
Innovation
InnovationInnovation
Innovation
 
E marketing webdesign seo socialmedia
E marketing webdesign  seo socialmediaE marketing webdesign  seo socialmedia
E marketing webdesign seo socialmedia
 

MobileSecurity WhitePaper

  • 1. This document provides simple safeguards to protect your patient’s data from the risk of being compromised. Take reasonable and appropriate security measures to mitigate the losses from costly litigation and reputational damage. The Impact Cost of Data Breaches Ponemon Institute Research Report The investment in a secure network far exceeds the cost of not implementing a security safeguards. Securing Your Mobile Devices  Set strong passwords  Encrypt  Use automatic log off  Require a unique user ID  Enable remote wipe  Lock the device  Keep the device with you  Use a screen shield  Refrain from sharing the mobile device  Register the mobile device  Install firewall  Use secure Wi-Fi connection  Research mobile applications Mobile Device Risks  Lost mobile device  Stolen mobile device  Download virus or malware  Shared mobile device  Unsecured Wi-Fi Network Mobile Security Safeguards The Risks and Rewards of a Secure Network The SMLR Group is a full service cyber security/risk assessment- consulting firm, specializing in: Privacy Audits, Standardized Vendor Compliance Audits (SVCA), Privacy Policies, Written Information Security Plans, and Data Breach Defensible Response Consultation. SMLR Group, Inc. http://www.smlrgroup.com SOURCE http://hhs.ogv/ocr/privacy http://healthIT.gov/mobiledevices To report a cyber incident: https://forms.us-cert.gov/report/ or (888) 282-0870 -20 -10 0 10 20 30 Strong Security Posture Incident Response Plan CISO Appointment Consultants Engaged Quick Notification Lost or Stolen Devices Third Party Error
  • 2. HIPAA Privacy Rule The HIPAA Privacy Rule is a set of federal standards to protect the privacy of patients' medical records and other health information maintained by covered entities: health plans, which include many governmental health programs, such as the Veterans Health Administration, Medicare and Medicaid; most doctors, hospitals and many other health care providers; and health care clearinghouses. These standards provide patients with access to their medical records and with significant control over how their personal health information is used and disclosed. The HIPAA Security Rule establishes national standards for the security of electronic protected health information. HIPAA specifies a series of administrative, technical, and physical security procedures for covered entities to use to assure the confidentiality of electronic protected health information. The standards are delineated into either required or addressable implementation specifications Five Simple Steps To Secure Mobile Devices One DECIDE whether mobile device use accesses, receives, transmits, or stores patient’s health information or is used as part of your organization’s internal networks or systems (e.g. HER system). Two ASSESS. Consider how your organization’s mobile devices affect threats and vulnerabilities to patient’s health information. Three IDENTIFY your organization’s mobile device risk management strategy, including privacy and security safeguards. Four DEVELOP, DOCUMENT AND IMPLEMENT the organization’s mobile device policies and procedures to safeguard health information. Five TRAIN. Conduct mobile device privacy and security awareness and training for providers and professionals. The SMLR Group is a full service cyber security/risk assessment- consulting firm, specializing in: Privacy Audits, Standardized Vendor Compliance Audits (SVCA), Privacy Policies, Written Information Security Plans, and Data Breach Defensible Response Consultation. SMLR Group, Inc. http://www.smlrgroup.com SOURCE http://hhs.ogv/ocr/privacy http://healthIT.gov/mobiledevices To report a cyber incident: https://forms.us-cert.gov/report/ or (888) 282-0870 Mobile Security Safeguards The Risks and Rewards of a Secure Network