Do you think smart phone technology is an effective method of communication in the workplace?

Running head: SMART PHONE TECHNOLOGY IN HEALTHCARE 1 Doyou think smart phone technology is an effective method ofcommunication in the workplace? NameInstitution

Smartphone technology is not aneffective method of passing information in the workplace. This iscontrary HIPAA Security Rules that are meant to secure the electronicprotected information (ePHI), which is maintained, received orcreated by a covered institution (Hash, 2005). Using smartphonetechnology creates a risk of unauthorized disclosure of PHI becausesmartphones store data in the SIM card, in onboard memory or thememory chip (Boulos et al., 2011). This means that smartphones thatare used to pass ePHI, store a record of the transmitted data. Onaddition to this smartphones can fail to restrict data access throughsuch ways as authentication features or encryption software. Thiscreates an information security inherent risk in using smartphones topass or receive ePHI (Todd Fitzgerald, 2006).

Smartphones are vulnerable to theftor loss because of their portability and small size. Theft of mobiledevices is attributed to the most common form of the security threat.According to a survey of more than 600 physician hospital carried outrecently in the USA, 66% of data breaches reported in the last twoyears was caused by theft (Hoffman &amp Podgurski, 2007). There is ahigh likelihood of nurses and clinician using personal smartphone asopposed to secure employer-issued devices when exchanging oraccessing the ePHI. HIPAA Security Rule permits health care providersto make electronic communication with patients through such ways asemails but is supposed to be carried out with reasonable safeguardsto ensure integrity, confidentiality and security of the protectedelectronic health information (Karasz, Eiden &amp Bogan, 2013). Assuch, given the information integrity and security breaches inherentin the use of smartphone technology, it is ineffective way ofexchanging information especially, the ePHI in the place ofworkplace.


Boulos, M. N. K., Wheeler, S.,Tavares, C., &amp Jones, R. (2011). How smartphones are changing theface of mobile and participatory healthcare: an overview, withexample from eCAALYX.&nbspBiomedicalengineering online 10(1), 1.

Hash, J. (2005).&nbspAnintroductory resource guide for implementing the Health InsurancePortability and Accountability Act (HIPAA) security rule&nbsp(Doctoraldissertation, National Institute of Standards and Technology).

Hoffman, S., &amp Podgurski, A.(2007). Securing the HIPAA security rule.Journalof Internet Law, Spring,06-26.

Karasz, H. N., Eiden, A., &ampBogan, S. (2013). Text messaging to communicate with public healthaudiences: how the HIPAA Security Rule affects practice.&nbspAmericanjournal of public health,&nbsp103(4),617-622.

Todd Fitzgerald CISSP, C. I. S. A.(2006). The HIPAA final rule: what`s changed?.&nbspInformationSystems Security.