SlideShare a Scribd company logo
1 of 20
Managing Mobile Technology In
 An Acute Healthcare Setting


Interview Presentation For Post Of
  Deputy IT Operations Manager
           Chris Down
          17th April 2013
Going Mobile - mHealth
• mHealth = healthcare provision supported by
  mobile devices
  – mobile phones / tablets
     • Also PDA / phablet / netbooks / laptops
     • Est. > 70% medical professionals use smartphone or
       tablet at work
  – patient identity & monitoring devices
     • RFID tags & implants
     • Smart bracelets
     • Wireless sensors / telemetry
mHealth Application Areas
– Communication and training for healthcare staff
– Diagnostic and treatment support
– Education and awareness
– Helplines
– Quality monitoring
– Remote data collection
– Remote monitoring
– Location tracking of staff & equipment
Benefits
• Devices are small, light, portable
• Mobile data capture / monitoring / alerting
• Immediate / real-time access to patient or
  medical data
• Remote diagnosis / consultations
  – Capture / receive images to aid diagnosis
• Managed discharge & post acute support
• Right information - Right time - Right place
• Improved patient care
Effectiveness
• To be effective devices should leverage and
  optimise the collaborative exchange of
  information between all parties involved in
  the care process - patient, clinicians,
  consultants, nurses, pharmacists & family
• Simple use = SMS appointment reminders
• Advanced = remote monitoring of symptoms
Service Delivery Model
• The structure, functions & inter-relationships
  pertaining to mobile device management.
• Successful SDM should take account of:
  – Device Management & Support infrastructure
  – Security issues
  – Performance issues & Device connectivity
  – Systems integration / interconnectivity
  – Robust mobile device use policies
Device Management
– Physical management of devices
  • Deployment, tracking, maintenance & upgrades
– Device consistency
– Employ MDM software
– BYOD allowed?
– Roaming
– Lost / stolen devices
– Virus/malware threats
– Network impact monitoring
Support Infrastructure
– IT staff trained
   • Multiple brands, o/s variants
– User training
   • Device specific
   • Application specific
– Support staffing level
   • Increased demand
   • Revise support shift patterns & staffing
Physical Security
– Mobile Devices are
   • Portable & comparatively high value
   • Small & light
   • Used in multiple locations inside & outside hospital

      – Theft risk (generic)
      – Increased personal risk to staff ?
      – Risk of damage
      – Loss / misplacement
      – Risk of stored data being compromised
Information Security
– Mobile technology is developing faster than
  legislation and internal policies can cope with
– Capturing, storing and transmitting sensitive and
  confidential patient information
– Devices have no inherent security and/or
  encryption capabilities
– Risk of serious data breach
   • Assume those acquiring lost/stolen device WILL
     attempt to recover data
   • Impact on patient
   • Regulatory & financial consequences
Information Security
– Multiple data vulnerabilities
   • Confidentiality of data – stored / transmitted
   • Data integrity – mange deliberate or accidental changes
     to data being stored / transmitted
   • Accessibility
      – right time, anywhere
      – Trusted vs Untrusted networks
– Deploy Mobile Device Management systems
   • Enforce user / device policies on devices
Information Security
– User & device authentication
   • Secure 2 factor authentication
      – device password + access token software
      – Physical token may not be practical
   • Session timeout / remote logout
– Encryption
   • Strong encryption for
      – Device & removable media
      – Data/SMS transmissions
   • Secure VPN access
   • Remote secure wipe of lost / stolen devices
Information Security
– Untrusted content
   •   Malicious 3rd party apps / URLs / QR codes
   •   Educate users
   •   Prohibit 3rd party downloads
   •   Restrict system browser to organisation intranet
        – Use sandbox for external internet access
– Connecting device with other systems
   • Disable remote backup
   • Prohibit tethering
   • Restrict folder synchronisation
Connectivity
– Good quality, secure wireless required
   •   Seamless across clinical/support/admin areas
   •   Adequate capacity to handle increased traffic
   •   Potentially high cost to achieve
   •   Manage issues in shielded / high energy areas (xray)
   •   Ensure no interference with medical equipment
– Prevent / restrict carrier 3G wireless access for
  transmission of patient information
– Lock down and secure bluetooth
Systems Access
– Issues of multiple mobile operating systems
   •   Android
   •   Apples iOS
   •   Blackberry
   •   Linux
– Different versions of operating systems
– Manage the access of devices to multiple
  information systems, bespoke & OTS.
Policies & Procedures
– Mobile devices require a different approach
– Clear, comprehensive, robust polices for:
   • management and use of mobile devices
   • Security & transport
– Regularly reviewed and updated
– Users should agree before being permitted access
  to health systems
– End of device life procedures
BYOD?
– Utilise staff & clinicians personal devices to
  capture/send/receive/access patient data
– Demonstrable cost benefit to Trust
   • Who is responsible for faults / damage?
– Additional complications and security issues over
  and above Trust owned devices
   •   Policies and Procedures may restrict personal use
   •   Issues of 3rd party applications
   •   Possibility of malicious content on device
   •   Utilise MDMS to scan & lock down whilst connected
Infection Control
– Clinical staff move from patient to patient, ward to
  ward
– Risk of infection/contamination transferring to
  device
– Infection control procedures would need updating
– Employ alcohol based sprays / wipes
Summary
– Identify and manage high level threats and
  vulnerabilities to patient data
– Address & manage inherent insecurity of mobile
  devices
– Mange use of 3rd party apps & untrusted networks
– Manage use of / interaction with untrusted
  devices (inc. BYOD)
– Manage untrusted content and browsing
– Systems to manage data exchange with existing
  healthcare systems
Summary
– Ensure adequate support and training
   • End users and ICT support staff
– Ensure adequate infection control practices
– Manage/monitor/upgrade wireless provision
– Robust, up-to-date policies and procedures
– Rigid end-of-life practices

More Related Content

What's hot

Network Connected Medical Devices - A Case Study
Network Connected Medical Devices - A Case StudyNetwork Connected Medical Devices - A Case Study
Network Connected Medical Devices - A Case StudySophiaPalmira
 
Information security ist lecture
Information security ist lectureInformation security ist lecture
Information security ist lectureZara Nawaz
 
Six pillars of security and privacy in telemedicine
Six pillars of security and privacy in telemedicineSix pillars of security and privacy in telemedicine
Six pillars of security and privacy in telemedicineirvinbalagosa
 
connected Medical devices IoT Cybersecurity reference architecture Telemedicine
connected Medical devices IoT Cybersecurity reference architecture Telemedicineconnected Medical devices IoT Cybersecurity reference architecture Telemedicine
connected Medical devices IoT Cybersecurity reference architecture TelemedicineAlessandro Sappia
 
Security in electronic health records
Security in electronic health recordsSecurity in electronic health records
Security in electronic health recordssamuelerie
 
Essential Layers of IBM i Security: Physical Security
Essential Layers of IBM i Security: Physical SecurityEssential Layers of IBM i Security: Physical Security
Essential Layers of IBM i Security: Physical SecurityPrecisely
 
Chapter 1 introduction(web security)
Chapter 1 introduction(web security)Chapter 1 introduction(web security)
Chapter 1 introduction(web security)Kirti Ahirrao
 
Medical Records on the Run: Protecting Patient Data with Device Control and...
Medical Records on the Run: Protecting Patient Data with Device Control and...Medical Records on the Run: Protecting Patient Data with Device Control and...
Medical Records on the Run: Protecting Patient Data with Device Control and...Lumension
 
IoT devices in hc version 6.1 public
IoT devices in hc version 6.1 publicIoT devices in hc version 6.1 public
IoT devices in hc version 6.1 publicGregory Shevchenko
 
Information security and other issues
Information security and other issuesInformation security and other issues
Information security and other issuesHaseeb Ahmed Awan
 
Seguridad web -articulo completo- ingles
Seguridad web -articulo completo- inglesSeguridad web -articulo completo- ingles
Seguridad web -articulo completo- inglesisidro luna beltran
 
Killed by code - mobile medical devices
Killed by code - mobile medical devicesKilled by code - mobile medical devices
Killed by code - mobile medical devicesFlaskdata.io
 
How To Successfully Defend Against Irc Bots, Compromises, And Information Leaks
How To Successfully Defend Against Irc Bots, Compromises, And Information LeaksHow To Successfully Defend Against Irc Bots, Compromises, And Information Leaks
How To Successfully Defend Against Irc Bots, Compromises, And Information LeaksTammy Clark
 
Insider threats - Lessons from Snowden (ISF UK Chapter)
Insider threats - Lessons from Snowden (ISF UK Chapter)Insider threats - Lessons from Snowden (ISF UK Chapter)
Insider threats - Lessons from Snowden (ISF UK Chapter)Huntsman Security
 

What's hot (20)

Network Connected Medical Devices - A Case Study
Network Connected Medical Devices - A Case StudyNetwork Connected Medical Devices - A Case Study
Network Connected Medical Devices - A Case Study
 
Information security ist lecture
Information security ist lectureInformation security ist lecture
Information security ist lecture
 
Telemedicine: safety and security
Telemedicine: safety and securityTelemedicine: safety and security
Telemedicine: safety and security
 
Six pillars of security and privacy in telemedicine
Six pillars of security and privacy in telemedicineSix pillars of security and privacy in telemedicine
Six pillars of security and privacy in telemedicine
 
connected Medical devices IoT Cybersecurity reference architecture Telemedicine
connected Medical devices IoT Cybersecurity reference architecture Telemedicineconnected Medical devices IoT Cybersecurity reference architecture Telemedicine
connected Medical devices IoT Cybersecurity reference architecture Telemedicine
 
Security in electronic health records
Security in electronic health recordsSecurity in electronic health records
Security in electronic health records
 
Essential Layers of IBM i Security: Physical Security
Essential Layers of IBM i Security: Physical SecurityEssential Layers of IBM i Security: Physical Security
Essential Layers of IBM i Security: Physical Security
 
Chapter 1 introduction(web security)
Chapter 1 introduction(web security)Chapter 1 introduction(web security)
Chapter 1 introduction(web security)
 
Medical Records on the Run: Protecting Patient Data with Device Control and...
Medical Records on the Run: Protecting Patient Data with Device Control and...Medical Records on the Run: Protecting Patient Data with Device Control and...
Medical Records on the Run: Protecting Patient Data with Device Control and...
 
IoT devices in hc version 6.1 public
IoT devices in hc version 6.1 publicIoT devices in hc version 6.1 public
IoT devices in hc version 6.1 public
 
Access control
Access controlAccess control
Access control
 
Unit v
Unit vUnit v
Unit v
 
Information security and other issues
Information security and other issuesInformation security and other issues
Information security and other issues
 
Seguridad web -articulo completo- ingles
Seguridad web -articulo completo- inglesSeguridad web -articulo completo- ingles
Seguridad web -articulo completo- ingles
 
Transforming healthcare
Transforming healthcareTransforming healthcare
Transforming healthcare
 
Mis
MisMis
Mis
 
Killed by code - mobile medical devices
Killed by code - mobile medical devicesKilled by code - mobile medical devices
Killed by code - mobile medical devices
 
Policy and procedure
Policy and procedurePolicy and procedure
Policy and procedure
 
How To Successfully Defend Against Irc Bots, Compromises, And Information Leaks
How To Successfully Defend Against Irc Bots, Compromises, And Information LeaksHow To Successfully Defend Against Irc Bots, Compromises, And Information Leaks
How To Successfully Defend Against Irc Bots, Compromises, And Information Leaks
 
Insider threats - Lessons from Snowden (ISF UK Chapter)
Insider threats - Lessons from Snowden (ISF UK Chapter)Insider threats - Lessons from Snowden (ISF UK Chapter)
Insider threats - Lessons from Snowden (ISF UK Chapter)
 

Viewers also liked

EDUC5102G Session 4 Presentation
EDUC5102G Session 4 PresentationEDUC5102G Session 4 Presentation
EDUC5102G Session 4 PresentationRobert Power
 
EDUC5102G Session 3 Presentation
EDUC5102G Session 3 PresentationEDUC5102G Session 3 Presentation
EDUC5102G Session 3 PresentationRobert Power
 
EDUC5101G Second Adobe Connect Session Presentation (Jan 26, 2016)
EDUC5101G Second Adobe Connect Session Presentation (Jan 26, 2016)EDUC5101G Second Adobe Connect Session Presentation (Jan 26, 2016)
EDUC5101G Second Adobe Connect Session Presentation (Jan 26, 2016)Robert Power
 
Edde 806 presentation (r power, sept 25, 2014)
Edde 806 presentation (r power, sept 25, 2014)Edde 806 presentation (r power, sept 25, 2014)
Edde 806 presentation (r power, sept 25, 2014)Robert Power
 
EDUC 5103 Session 5 Presentation (March 3)
EDUC 5103 Session 5 Presentation (March 3)EDUC 5103 Session 5 Presentation (March 3)
EDUC 5103 Session 5 Presentation (March 3)Robert Power
 
EDUC5101 6th Adobe Connect Session Presentation (Mar 22, 2016)
EDUC5101 6th Adobe Connect Session Presentation (Mar 22, 2016)EDUC5101 6th Adobe Connect Session Presentation (Mar 22, 2016)
EDUC5101 6th Adobe Connect Session Presentation (Mar 22, 2016)Robert Power
 
Qr Cache Presentation
Qr Cache PresentationQr Cache Presentation
Qr Cache PresentationRobert Power
 
EDUC5102G Session 1 Presentation
EDUC5102G Session 1 PresentationEDUC5102G Session 1 Presentation
EDUC5102G Session 1 PresentationRobert Power
 
Exploring Tools for Promoting Teacher Efficacy with mLearning (mlearn 2014 Pr...
Exploring Tools for Promoting Teacher Efficacy with mLearning (mlearn 2014 Pr...Exploring Tools for Promoting Teacher Efficacy with mLearning (mlearn 2014 Pr...
Exploring Tools for Promoting Teacher Efficacy with mLearning (mlearn 2014 Pr...Robert Power
 
EDUC 5102 G Session 5 Presentation
EDUC 5102 G Session 5 PresentationEDUC 5102 G Session 5 Presentation
EDUC 5102 G Session 5 PresentationRobert Power
 
A Framework for Promoting Teacher Self-Efficacy with Mobile Reusable Learning...
A Framework for Promoting Teacher Self-Efficacy with Mobile Reusable Learning...A Framework for Promoting Teacher Self-Efficacy with Mobile Reusable Learning...
A Framework for Promoting Teacher Self-Efficacy with Mobile Reusable Learning...Robert Power
 
EDUC5199G Session 5 Presentation
EDUC5199G Session 5 PresentationEDUC5199G Session 5 Presentation
EDUC5199G Session 5 PresentationRobert Power
 
EDUC 5103 3rd Adobe Connect Session Presentation
EDUC 5103 3rd Adobe Connect Session PresentationEDUC 5103 3rd Adobe Connect Session Presentation
EDUC 5103 3rd Adobe Connect Session PresentationRobert Power
 
Seminar 1a tmall intro 2013 (vinitaly)
Seminar 1a tmall intro 2013 (vinitaly)Seminar 1a tmall intro 2013 (vinitaly)
Seminar 1a tmall intro 2013 (vinitaly)Vinitaly International
 

Viewers also liked (18)

EDUC5102G Session 4 Presentation
EDUC5102G Session 4 PresentationEDUC5102G Session 4 Presentation
EDUC5102G Session 4 Presentation
 
EDUC5102G Session 3 Presentation
EDUC5102G Session 3 PresentationEDUC5102G Session 3 Presentation
EDUC5102G Session 3 Presentation
 
EDUC5101G Second Adobe Connect Session Presentation (Jan 26, 2016)
EDUC5101G Second Adobe Connect Session Presentation (Jan 26, 2016)EDUC5101G Second Adobe Connect Session Presentation (Jan 26, 2016)
EDUC5101G Second Adobe Connect Session Presentation (Jan 26, 2016)
 
Powerpoint 1
Powerpoint 1Powerpoint 1
Powerpoint 1
 
Edde 806 presentation (r power, sept 25, 2014)
Edde 806 presentation (r power, sept 25, 2014)Edde 806 presentation (r power, sept 25, 2014)
Edde 806 presentation (r power, sept 25, 2014)
 
EDUC 5103 Session 5 Presentation (March 3)
EDUC 5103 Session 5 Presentation (March 3)EDUC 5103 Session 5 Presentation (March 3)
EDUC 5103 Session 5 Presentation (March 3)
 
EDUC5101 6th Adobe Connect Session Presentation (Mar 22, 2016)
EDUC5101 6th Adobe Connect Session Presentation (Mar 22, 2016)EDUC5101 6th Adobe Connect Session Presentation (Mar 22, 2016)
EDUC5101 6th Adobe Connect Session Presentation (Mar 22, 2016)
 
Qr Cache Presentation
Qr Cache PresentationQr Cache Presentation
Qr Cache Presentation
 
EDUC5102G Session 1 Presentation
EDUC5102G Session 1 PresentationEDUC5102G Session 1 Presentation
EDUC5102G Session 1 Presentation
 
Exploring Tools for Promoting Teacher Efficacy with mLearning (mlearn 2014 Pr...
Exploring Tools for Promoting Teacher Efficacy with mLearning (mlearn 2014 Pr...Exploring Tools for Promoting Teacher Efficacy with mLearning (mlearn 2014 Pr...
Exploring Tools for Promoting Teacher Efficacy with mLearning (mlearn 2014 Pr...
 
EDUC 5102 G Session 5 Presentation
EDUC 5102 G Session 5 PresentationEDUC 5102 G Session 5 Presentation
EDUC 5102 G Session 5 Presentation
 
A Framework for Promoting Teacher Self-Efficacy with Mobile Reusable Learning...
A Framework for Promoting Teacher Self-Efficacy with Mobile Reusable Learning...A Framework for Promoting Teacher Self-Efficacy with Mobile Reusable Learning...
A Framework for Promoting Teacher Self-Efficacy with Mobile Reusable Learning...
 
EDUC5199G Session 5 Presentation
EDUC5199G Session 5 PresentationEDUC5199G Session 5 Presentation
EDUC5199G Session 5 Presentation
 
Intro seminar b xuwei wang (vinitaly)
Intro seminar b xuwei wang (vinitaly)Intro seminar b xuwei wang (vinitaly)
Intro seminar b xuwei wang (vinitaly)
 
Seminar 2a cevola (vinitaly)
Seminar 2a cevola (vinitaly)Seminar 2a cevola (vinitaly)
Seminar 2a cevola (vinitaly)
 
EDUC 5103 3rd Adobe Connect Session Presentation
EDUC 5103 3rd Adobe Connect Session PresentationEDUC 5103 3rd Adobe Connect Session Presentation
EDUC 5103 3rd Adobe Connect Session Presentation
 
Seminar 1a tmall intro 2013 (vinitaly)
Seminar 1a tmall intro 2013 (vinitaly)Seminar 1a tmall intro 2013 (vinitaly)
Seminar 1a tmall intro 2013 (vinitaly)
 
Seminar 2c tencent group (vinitaly)
Seminar 2c tencent group (vinitaly)Seminar 2c tencent group (vinitaly)
Seminar 2c tencent group (vinitaly)
 

Similar to Deputy it operations manager chris down -interview presentation - final

How Medical Devices Risk Patient Safety and Security
How Medical Devices Risk Patient Safety and SecurityHow Medical Devices Risk Patient Safety and Security
How Medical Devices Risk Patient Safety and SecurityGreat Bay Software
 
Iotcloudandhealthcare nv-161130085731
Iotcloudandhealthcare nv-161130085731Iotcloudandhealthcare nv-161130085731
Iotcloudandhealthcare nv-161130085731Aravindharamanan S
 
Use of mobile device in health care setting
Use of mobile device in health care settingUse of mobile device in health care setting
Use of mobile device in health care settingDr. Samir Sawli
 
Information Security
Information SecurityInformation Security
Information Securitysonykhan3
 
Computer security concepts
Computer security conceptsComputer security concepts
Computer security conceptsG Prachi
 
security and system mainatance
security and system mainatancesecurity and system mainatance
security and system mainatanceKudzi Chikwatu
 
REMOTE MONITORING- A RECENT ADVANCE.pptx
REMOTE MONITORING- A RECENT ADVANCE.pptxREMOTE MONITORING- A RECENT ADVANCE.pptx
REMOTE MONITORING- A RECENT ADVANCE.pptxDr. Ravikiran H M Gowda
 
Ch15 power point
Ch15 power pointCh15 power point
Ch15 power pointbodo-con
 
Mobile Technology in Medical Informatic
Mobile Technology in Medical InformaticMobile Technology in Medical Informatic
Mobile Technology in Medical InformaticJAMES JACKY
 
Defending Healthcare Networks with NetFlow
Defending Healthcare Networks with NetFlowDefending Healthcare Networks with NetFlow
Defending Healthcare Networks with NetFlowLancope, Inc.
 
Clinical Data Standards and Data Portability
Clinical Data Standards and Data Portability Clinical Data Standards and Data Portability
Clinical Data Standards and Data Portability Nrip Nihalani
 
basic-security-concepts-what-is-security48.ppt
basic-security-concepts-what-is-security48.pptbasic-security-concepts-what-is-security48.ppt
basic-security-concepts-what-is-security48.pptPawachMetharattanara
 
Hospital Management
Hospital ManagementHospital Management
Hospital Managementzahid32
 
17 info sec_ma_imt_27_2_2012
17 info sec_ma_imt_27_2_201217 info sec_ma_imt_27_2_2012
17 info sec_ma_imt_27_2_2012RECIPA
 
SeaCat: SDN End-to-End Application Containment
SeaCat: SDN End-to-End Application ContainmentSeaCat: SDN End-to-End Application Containment
SeaCat: SDN End-to-End Application ContainmentUS-Ignite
 
Roadmap to Healthcare HIPAA Compliance and Mobile Security for BYOD
Roadmap to Healthcare HIPAA Compliance and Mobile Security for BYODRoadmap to Healthcare HIPAA Compliance and Mobile Security for BYOD
Roadmap to Healthcare HIPAA Compliance and Mobile Security for BYODSierraware
 

Similar to Deputy it operations manager chris down -interview presentation - final (20)

How Medical Devices Risk Patient Safety and Security
How Medical Devices Risk Patient Safety and SecurityHow Medical Devices Risk Patient Safety and Security
How Medical Devices Risk Patient Safety and Security
 
Iotcloudandhealthcare nv-161130085731
Iotcloudandhealthcare nv-161130085731Iotcloudandhealthcare nv-161130085731
Iotcloudandhealthcare nv-161130085731
 
Use of mobile device in health care setting
Use of mobile device in health care settingUse of mobile device in health care setting
Use of mobile device in health care setting
 
ISBB_Chapter6.pptx
ISBB_Chapter6.pptxISBB_Chapter6.pptx
ISBB_Chapter6.pptx
 
Information Security
Information SecurityInformation Security
Information Security
 
security in is.pptx
security in is.pptxsecurity in is.pptx
security in is.pptx
 
Computer security concepts
Computer security conceptsComputer security concepts
Computer security concepts
 
security and system mainatance
security and system mainatancesecurity and system mainatance
security and system mainatance
 
REMOTE MONITORING- A RECENT ADVANCE.pptx
REMOTE MONITORING- A RECENT ADVANCE.pptxREMOTE MONITORING- A RECENT ADVANCE.pptx
REMOTE MONITORING- A RECENT ADVANCE.pptx
 
Ch15 power point
Ch15 power pointCh15 power point
Ch15 power point
 
Mobile Technology in Medical Informatic
Mobile Technology in Medical InformaticMobile Technology in Medical Informatic
Mobile Technology in Medical Informatic
 
Defending Healthcare Networks with NetFlow
Defending Healthcare Networks with NetFlowDefending Healthcare Networks with NetFlow
Defending Healthcare Networks with NetFlow
 
Clinical Data Standards and Data Portability
Clinical Data Standards and Data Portability Clinical Data Standards and Data Portability
Clinical Data Standards and Data Portability
 
basic-security-concepts-what-is-security48.ppt
basic-security-concepts-what-is-security48.pptbasic-security-concepts-what-is-security48.ppt
basic-security-concepts-what-is-security48.ppt
 
Hospital Management
Hospital ManagementHospital Management
Hospital Management
 
rest motion.pptx
rest motion.pptxrest motion.pptx
rest motion.pptx
 
Group 10 - PDPA II.pptx
Group 10 - PDPA II.pptxGroup 10 - PDPA II.pptx
Group 10 - PDPA II.pptx
 
17 info sec_ma_imt_27_2_2012
17 info sec_ma_imt_27_2_201217 info sec_ma_imt_27_2_2012
17 info sec_ma_imt_27_2_2012
 
SeaCat: SDN End-to-End Application Containment
SeaCat: SDN End-to-End Application ContainmentSeaCat: SDN End-to-End Application Containment
SeaCat: SDN End-to-End Application Containment
 
Roadmap to Healthcare HIPAA Compliance and Mobile Security for BYOD
Roadmap to Healthcare HIPAA Compliance and Mobile Security for BYODRoadmap to Healthcare HIPAA Compliance and Mobile Security for BYOD
Roadmap to Healthcare HIPAA Compliance and Mobile Security for BYOD
 

Deputy it operations manager chris down -interview presentation - final

  • 1. Managing Mobile Technology In An Acute Healthcare Setting Interview Presentation For Post Of Deputy IT Operations Manager Chris Down 17th April 2013
  • 2. Going Mobile - mHealth • mHealth = healthcare provision supported by mobile devices – mobile phones / tablets • Also PDA / phablet / netbooks / laptops • Est. > 70% medical professionals use smartphone or tablet at work – patient identity & monitoring devices • RFID tags & implants • Smart bracelets • Wireless sensors / telemetry
  • 3. mHealth Application Areas – Communication and training for healthcare staff – Diagnostic and treatment support – Education and awareness – Helplines – Quality monitoring – Remote data collection – Remote monitoring – Location tracking of staff & equipment
  • 4. Benefits • Devices are small, light, portable • Mobile data capture / monitoring / alerting • Immediate / real-time access to patient or medical data • Remote diagnosis / consultations – Capture / receive images to aid diagnosis • Managed discharge & post acute support • Right information - Right time - Right place • Improved patient care
  • 5. Effectiveness • To be effective devices should leverage and optimise the collaborative exchange of information between all parties involved in the care process - patient, clinicians, consultants, nurses, pharmacists & family • Simple use = SMS appointment reminders • Advanced = remote monitoring of symptoms
  • 6. Service Delivery Model • The structure, functions & inter-relationships pertaining to mobile device management. • Successful SDM should take account of: – Device Management & Support infrastructure – Security issues – Performance issues & Device connectivity – Systems integration / interconnectivity – Robust mobile device use policies
  • 7. Device Management – Physical management of devices • Deployment, tracking, maintenance & upgrades – Device consistency – Employ MDM software – BYOD allowed? – Roaming – Lost / stolen devices – Virus/malware threats – Network impact monitoring
  • 8. Support Infrastructure – IT staff trained • Multiple brands, o/s variants – User training • Device specific • Application specific – Support staffing level • Increased demand • Revise support shift patterns & staffing
  • 9. Physical Security – Mobile Devices are • Portable & comparatively high value • Small & light • Used in multiple locations inside & outside hospital – Theft risk (generic) – Increased personal risk to staff ? – Risk of damage – Loss / misplacement – Risk of stored data being compromised
  • 10. Information Security – Mobile technology is developing faster than legislation and internal policies can cope with – Capturing, storing and transmitting sensitive and confidential patient information – Devices have no inherent security and/or encryption capabilities – Risk of serious data breach • Assume those acquiring lost/stolen device WILL attempt to recover data • Impact on patient • Regulatory & financial consequences
  • 11. Information Security – Multiple data vulnerabilities • Confidentiality of data – stored / transmitted • Data integrity – mange deliberate or accidental changes to data being stored / transmitted • Accessibility – right time, anywhere – Trusted vs Untrusted networks – Deploy Mobile Device Management systems • Enforce user / device policies on devices
  • 12. Information Security – User & device authentication • Secure 2 factor authentication – device password + access token software – Physical token may not be practical • Session timeout / remote logout – Encryption • Strong encryption for – Device & removable media – Data/SMS transmissions • Secure VPN access • Remote secure wipe of lost / stolen devices
  • 13. Information Security – Untrusted content • Malicious 3rd party apps / URLs / QR codes • Educate users • Prohibit 3rd party downloads • Restrict system browser to organisation intranet – Use sandbox for external internet access – Connecting device with other systems • Disable remote backup • Prohibit tethering • Restrict folder synchronisation
  • 14. Connectivity – Good quality, secure wireless required • Seamless across clinical/support/admin areas • Adequate capacity to handle increased traffic • Potentially high cost to achieve • Manage issues in shielded / high energy areas (xray) • Ensure no interference with medical equipment – Prevent / restrict carrier 3G wireless access for transmission of patient information – Lock down and secure bluetooth
  • 15. Systems Access – Issues of multiple mobile operating systems • Android • Apples iOS • Blackberry • Linux – Different versions of operating systems – Manage the access of devices to multiple information systems, bespoke & OTS.
  • 16. Policies & Procedures – Mobile devices require a different approach – Clear, comprehensive, robust polices for: • management and use of mobile devices • Security & transport – Regularly reviewed and updated – Users should agree before being permitted access to health systems – End of device life procedures
  • 17. BYOD? – Utilise staff & clinicians personal devices to capture/send/receive/access patient data – Demonstrable cost benefit to Trust • Who is responsible for faults / damage? – Additional complications and security issues over and above Trust owned devices • Policies and Procedures may restrict personal use • Issues of 3rd party applications • Possibility of malicious content on device • Utilise MDMS to scan & lock down whilst connected
  • 18. Infection Control – Clinical staff move from patient to patient, ward to ward – Risk of infection/contamination transferring to device – Infection control procedures would need updating – Employ alcohol based sprays / wipes
  • 19. Summary – Identify and manage high level threats and vulnerabilities to patient data – Address & manage inherent insecurity of mobile devices – Mange use of 3rd party apps & untrusted networks – Manage use of / interaction with untrusted devices (inc. BYOD) – Manage untrusted content and browsing – Systems to manage data exchange with existing healthcare systems
  • 20. Summary – Ensure adequate support and training • End users and ICT support staff – Ensure adequate infection control practices – Manage/monitor/upgrade wireless provision – Robust, up-to-date policies and procedures – Rigid end-of-life practices