Mobile Devices, Healthcare, and HIPAA — Securing Mobile Patient Information Under HIPAA

Duration 90 Mins
Level Intermediate
Webinar ID IQW19G0713

  • NIST guidance on using mobile technology with EHR data is presented
  • Policies and procedures for managing and auditing the use of mobile devices are explained, including the use of insecure communications made at the request of patients
  • Regulatory requirements are explained, as well as, typical communication situations, and the appropriate means of communicating according to the regulations
  • The information security issues related to communications and the risks associated with insecure communications are presented, so you can know how to explain the risks of insecure communications to staff, and to patients who request insecure communications
  • There is explanation of technologies that can provide such encryption and security, to help you know when secure communications are required and what must be done to secure communications and devices
  • Learn about the training and education that must take place and be documented to ensure your staff uses portable health information properly and does not risk exposure of PHI

Overview of the webinar

This session will review the requirements and current issues pertaining to mobile devices and present ways for the attendees to consider how to communicate between professionals as well as meet patient desires and stay within the regulations, including processes for managing portable devices, policies needed for ensuring secure communications and storage where needed, and procedures for meeting and documenting patient requests. Recent guidance from the National Institute of Standards and Technology on the use of mobile technologies with EHR data will be discussed and practical ways of using mobile devices securely will be presented.
You will be able to understand what the different types of communication are and how they must be considered to meet HIPAA requirements for privacy and security. You will be able to evaluate how your office communications take place and what can be done to ensure that those communications do not take place insecurely whenever patient information is involved. You will have recommendations for policy content that is applicable for mobile devices, as well as relating to patient communications. You will know how to establish the processes that are necessary to ensure security and patient rights, and avoid compliance violations.
Once patient information is involved, the devices used by a provider or their staff must be properly secured through the use of good passcodes and encryption with remote wiping of data if lost or stolen, and if you allow staff to use their own devices for business work, what happens when they trade in their old phone when the new one comes out?
If you communicate with patients using portable devices, you need to consider the issues of privacy and security, as well as those of triaging incoming communications and documenting conversations. Just plain texting is not readily adaptable to the requirements of patient care and documentation, but secure, appropriate solutions are available.
Finally, we will discuss the enforcement of HIPAA rules and how they relate to mobile devices, the issues that can lead to enforcement, and the impacts of enforcement actions, including monetary settlements and corrective action plans.

Who should attend?

  • Compliance Manager
  • HIPAA Privacy Officer
  • HIPAA Security Officer
  • CEO
  • Office Manager
  • HR Director
  • Privacy Officer
  • CIO
  • Records Release Manager
  • HIM Manager
  • Counsel

Why should you attend?

The session will explain the HIPAA regulations that apply to the use of portable devices, both as tools for staff to use, and as a means of communication with patients. Proper use of portable devices requires consideration of a variety of purposes: for personal use, for business use not involving any identifiable patient information, for business use that does involve identifiable patient information, and for communications with patients. Each type of use requires careful consideration of the rules and the risks to the confidentiality, integrity, and availability of information.
For business uses with no patient information, the constraints are few, so long as you are sure there is no patient information involved with those uses. But if you include any patient information, you need to ensure the information is protected. Even so, patients are allowed to ask to communicate with you in any way you can reasonably handle. Just what is reasonable and what is allowed according to guidance from HHS is discussed.

Faculty - Mr. Jim Sheldon-Dean

Jim Sheldon-Dean is the founder and director of compliance services at Lewis Creek Systems, LLC, a Vermont-based consulting firm founded in 1982, providing information privacy and security regulatory compliance services to a wide variety of health care entities. He is a frequent speaker regarding HIPAA, including speaking engagements at numerous regional and national healthcare association conferences and conventions and the annual NIST/OCR HIPAA Security Conference. Sheldon-Dean has more than 16 years of experience specializing in HIPAA compliance, more than 34 years of experience in policy analysis and implementation, business process analysis, information systems and software development, and 8 years of experience doing hands-on medical work as a Vermont certified volunteer emergency medical technician. Sheldon-Dean received his B.S. degree, summa cum laude, from the University of Vermont and his master’s degree from the Massachusetts Institute of Technology.

For group or any booking support, contact: