Academic Master

English

Week 7 Discussion Response

Post: 1

Individuals who use their personal phones for work should be forbidden from sharing their personal phones with family, friends, and coworkers. This measure of security can be reinforced using various approaches such as mobile device management (MDM) solution. Healthcare organizations which allow employee to use their cell phones for work can perform MDM and other tasks related to configuration for security purposes (Olalere, et al. 2015). Other measures for ensuring security of health information stored in mobile devices include enforcing use of password/PIN for accessing the cell phones or specific applications. Remote device lock and wipe of ether the institutional information or of all data on the device can help in eliminating intrusion of data stored in cell phones. Besides, restricting user and application access to the device hardware and detection of configuration change can be used for enforce security of data stored in employees cell phone (Bromwich & Bromwich, 2016).

Post 2:

The advancement in information technology has lead significant impact in healthcare. For instance, there is no more paper charts in hospitals and thus no need of a huge unit secretary to chart in patient information. All members of the healthcare team are using computers, tablets and cellphones to fill their documentation requirements (Wang, Wei, & Vangury, 2014). Although most healthcare facilities are providing the necessary hardware to such as computers, iPads, to the staff, there is an upcoming trend of allowing staff to BYOD (bring your own device) to use while working. However, allowing employees in healthcare to use their own devices while at work creates a big temptation to break patient’s confidentiality and trust. Another potential issue is the security of the information contained in employees’ devices unless these devices have restricted access to the stored data or applications (Fernandes et al. 2014). Unauthorized individuals can become inadvertently privy to information on the devices used in BYOD initiative.

References

Bromwich, M., & Bromwich, R. (2016). Privacy risks when using mobile devices in health care. Canadian Medical Association Journal, 188(12), 855-856.

Fernandes, D. A. et al. (2014). Security issues in cloud environments: a survey. International Journal of Information Security, 13(2), 113-170.

Olalere, M., Abdullah, M. T., Mahmod, R., & Abdullah, A. (2015). A review of bring your own device on security issues. Sage Open, 5(2), 2158244015580372.

Wang, Y., Wei, J., & Vangury, K. (2014, January). Bring your own device security issues and challenges. In Consumer Communications and Networking Conference (CCNC), 2014 IEEE 11th (pp. 80-85). IEEE.

SEARCH

Top-right-side-AD-min
WHY US?

Calculate Your Order




Standard price

$310

SAVE ON YOUR FIRST ORDER!

$263.5

YOU MAY ALSO LIKE

Pop-up Message