SlideShare a Scribd company logo
1 of 2
Download to read offline
HIPAA, Security, and the Mobile Device
With the inclusion of Biometrics to the IPHONE 5, as seen in this article, http://secureidnews.com/news-
item/analysis-biometrics-and-the-iphone/, there are many pros and cons that will affect how to be hipaa
compliant.
Awesome that you can use your own identification to open you mobile device but it also comes with
organizations and individuals who think this is not such a great thing.
For many years putting sensitive information on your mobile device was a no no, it can be stolen and
access easily gained. That is evident in the rules the Government puts forward like the Health
Information Portability and Accountability Act, HIPAA. A HIPAA Risk assessment requires you to encrypt
and safeguard data at rest and in motion, and focus a lot on mobile devices. So you would think this
type of encryption and access would be welcome, well it is in and it isn’t.
People feel that big brother is at play and that Apple will share all of the fingerprints with the
Government, and other feel that there proven hacking ways to trick the finger scanner to gain access.
All maybe true but most likely not, the best solution to security is a combination biometric with
password. Not one or the other.
In My Humble Opinion, great start, still needs more tweaking till a security officer or organization can
hang their hat on this idea and feel confident the will pass a HIPAA risk Analysis.
Business Address:
The Compliancy Group LLC.
55 Broadway Unit 684
Greenlawn, NY 11740
Contact No:855 854 4722
Fax: 631.731.1643
Email:Info@compliancygroup.com
Web: http://www.compliancy-group.com
###

More Related Content

Featured

Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
Kurio // The Social Media Age(ncy)
 

Featured (20)

Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work
 
ChatGPT webinar slides
ChatGPT webinar slidesChatGPT webinar slides
ChatGPT webinar slides
 
More than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike RoutesMore than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike Routes
 
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
 

Hipaa, security, and the mobile device

  • 1. HIPAA, Security, and the Mobile Device With the inclusion of Biometrics to the IPHONE 5, as seen in this article, http://secureidnews.com/news- item/analysis-biometrics-and-the-iphone/, there are many pros and cons that will affect how to be hipaa compliant. Awesome that you can use your own identification to open you mobile device but it also comes with organizations and individuals who think this is not such a great thing. For many years putting sensitive information on your mobile device was a no no, it can be stolen and access easily gained. That is evident in the rules the Government puts forward like the Health Information Portability and Accountability Act, HIPAA. A HIPAA Risk assessment requires you to encrypt and safeguard data at rest and in motion, and focus a lot on mobile devices. So you would think this type of encryption and access would be welcome, well it is in and it isn’t. People feel that big brother is at play and that Apple will share all of the fingerprints with the Government, and other feel that there proven hacking ways to trick the finger scanner to gain access. All maybe true but most likely not, the best solution to security is a combination biometric with
  • 2. password. Not one or the other. In My Humble Opinion, great start, still needs more tweaking till a security officer or organization can hang their hat on this idea and feel confident the will pass a HIPAA risk Analysis. Business Address: The Compliancy Group LLC. 55 Broadway Unit 684 Greenlawn, NY 11740 Contact No:855 854 4722 Fax: 631.731.1643 Email:Info@compliancygroup.com Web: http://www.compliancy-group.com ###