Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

1

Share

Download to read offline

Privacy and Security of Healthcare Wearable Apps

Download to read offline

The privacy and security are essential to any piece of technology, and are worthy of investigation.
HTTPS is the current common method for securing any website. It has several distinct advantages:

Related Books

Free with a 30 day trial from Scribd

See all

Related Audiobooks

Free with a 30 day trial from Scribd

See all

Privacy and Security of Healthcare Wearable Apps

  1. 1. Privacy and Security of Healthcare Wearable Apps >‘. :<« iianiuic-: ii. ~w‘ii. r=. . i "L. 'a~‘i: «.. :i~ t: ... :l= f:l-'~
  2. 2. Non-App Encryption ‘ ill The privacy and security are essential to any piece of technology, and are worthy of investigation. 0 HTTPS is the current common method for securing any website. It has several distinct advantages: D Integrity ii HTTPS prevents hackers from interfering with communications between a user’s browser and your website; I3 Security -* HTTPS prevents passive eavesdropping; U Mixed Content -' HTTPS prevents secure content from being confused with insecure content (called “mixed content”) and authenticates a website for users. '13 : ::: i lCI):1'r. .i'-‘ K. "1 i: __: i : ‘.. _‘. :: 3:
  3. 3. App Encryption “ ill Apps are taking over how we run our lives everyday. Data security and encryption for apps is essential to protect both users and developers. Want to understand this in detail? email team@sdi. la 0 Google Authenticator is an excellent encryption tool. it requires a user to have a password AND a secure code to access a program (usually email). This is an available option for many, but not all apps. 0 Data stored on the app should be encoded with a cypher and stored (on the app user’s device! ) in either a volatile or a persistent memory state. Can also be stored on a removable hard drive. '17‘ : ::: i lCI}:1‘r. .i'-‘ K. "1 i: __: i : ‘.. _‘. :: :9:
  4. 4. Medical Apps ‘ ill As mentioned on the previous slide, confidentiality is important no matter the technology being used. That being said, wearable and non-wearable medical apps are especially of concern. Medical app developers need to be extra cautious when it comes to what information is being revealed and to whom. : ":i P‘-‘-’= .>= lii‘--¢! .I: =:-i-‘! o:i= ,.~ ‘lidlloll and >OC| diCd with ‘ 7 Apps at SDI are developed for doctors, patients, hospitals for iOS and Android. We have built competitive wearable tech apps for clients in 40+ countries. j: ::| iCiinil. .i= K. ». i: ,.: i : :._: ::i: i:
  5. 5. HIPAA Signed into law in 1996, the Health Insurance Portability and Accountability Act (or HIPAA) protects the sensitive medical information of patients from strangers. All industries or ventures in healthcare MUST follow the guidelines established by HIPAA: 0 Covered Entities (CE) El Vendors who treat patients (i. e. operations, drug regimen and diagnoses) and who handle payment; HIPAA Health Insurance Portability & Accountability Act 0 Business Associates (BA) Anyone who is working within the industry A - like App makers! ': 't‘. i:’. —,%§~i~‘§ __ O team@sdi. la +i.4o8.8o2.2885
  6. 6. HIPAA, C0nt’d ‘ 3“ In other words, if your application in anyway plans on sharing Protected Health Information (PHI) with CE (Covered Entity), you need to be HIPAA compliant. If not, you are in violation of U. S. Law. If you are building a health or wearable app that collects medical information, but does not plan on sharing that data with a CE, you are in the clear! *3 : ::: i lCI}:1:r. .i= K. ». i: ..: i:: ._: ::i: i:
  7. 7. HIPAA Compliance Checklist HIPAA has four major points you need to meet to be considered in compliance: «I» You are making efforts to protect patient information from outside breaches; «Z» PHI is limited in sharing and scope of use to what is the absolute minimum to complete tasks; I} You must create Business Associate Agreements which require other Associates performing your proffered functions to dispose of information correctly. BAAs also regulate how other BAs share and disclose PHI; and I} There are limitations on who is allowed to access PHI, and all staff is trained in procedures on how to properly handle such sensitive information. >3 : ::: i IC| ):1:r. .P= K. --_n i: ..: i : :.. ::: i:i: . ill
  8. 8. Thanks for Stopping By! ' ill We know you’ve got a lot on your plate right now, so we thank you for taking the time to read this presentation. We hope to have provided you with the guidance you were looking for. SDI is a tech company based in California that develops and designs software, websites and apps (wearables or otherwise). For more information and a private consultation with our healthcare and wearable tech experts, call us at 408.802.5882. You can also mail us at team@sdi. la or find us on Twitter or Linkedln. in ‘. ::: I lClL‘1:r. .h K. I. I2.. ZlZ‘. ._‘. ‘_‘2I2IZ
  • AnbarasanSivaramakri

    Feb. 15, 2016

The privacy and security are essential to any piece of technology, and are worthy of investigation. HTTPS is the current common method for securing any website. It has several distinct advantages:

Views

Total views

6,498

On Slideshare

0

From embeds

0

Number of embeds

58

Actions

Downloads

6

Shares

0

Comments

0

Likes

1

×