Running head: SMART PHONE TECHNOLOGY IN HEALTHCARE 1 Doyou think smart phone technology is an effective method ofcommunication in the workplace? NameInstitution
Smartphone technology is not aneffective method of passing information in the workplace. This iscontrary HIPAA Security Rules that are meant to secure the electronicprotected information (ePHI), which is maintained, received orcreated by a covered institution (Hash, 2005). Using smartphonetechnology creates a risk of unauthorized disclosure of PHI becausesmartphones store data in the SIM card, in onboard memory or thememory chip (Boulos et al., 2011). This means that smartphones thatare used to pass ePHI, store a record of the transmitted data. Onaddition to this smartphones can fail to restrict data access throughsuch ways as authentication features or encryption software. Thiscreates an information security inherent risk in using smartphones topass or receive ePHI (Todd Fitzgerald, 2006).
Smartphones are vulnerable to theftor loss because of their portability and small size. Theft of mobiledevices is attributed to the most common form of the security threat.According to a survey of more than 600 physician hospital carried outrecently in the USA, 66% of data breaches reported in the last twoyears was caused by theft (Hoffman & Podgurski, 2007). There is ahigh likelihood of nurses and clinician using personal smartphone asopposed to secure employer-issued devices when exchanging oraccessing the ePHI. HIPAA Security Rule permits health care providersto make electronic communication with patients through such ways asemails but is supposed to be carried out with reasonable safeguardsto ensure integrity, confidentiality and security of the protectedelectronic health information (Karasz, Eiden & Bogan, 2013). Assuch, given the information integrity and security breaches inherentin the use of smartphone technology, it is ineffective way ofexchanging information especially, the ePHI in the place ofworkplace.
Boulos, M. N. K., Wheeler, S.,Tavares, C., & Jones, R. (2011). How smartphones are changing theface of mobile and participatory healthcare: an overview, withexample from eCAALYX. Biomedicalengineering online 10(1), 1.
Hash, J. (2005). Anintroductory resource guide for implementing the Health InsurancePortability and Accountability Act (HIPAA) security rule (Doctoraldissertation, National Institute of Standards and Technology).
Hoffman, S., & Podgurski, A.(2007). Securing the HIPAA security rule.Journalof Internet Law, Spring,06-26.
Karasz, H. N., Eiden, A., &Bogan, S. (2013). Text messaging to communicate with public healthaudiences: how the HIPAA Security Rule affects practice. Americanjournal of public health, 103(4),617-622.
Todd Fitzgerald CISSP, C. I. S. A.(2006). The HIPAA final rule: what`s changed?. InformationSystems Security.