Events Calendar

Mon
Tue
Wed
Thu
Fri
Sat
Sun
M
T
W
T
F
S
S
30
5
6
7
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
1
2
Federles Master Tutorial On Abdominal Imaging
2020-06-29 - 2020-07-01    
All Day
The course is designed to provide the tools for participants to enhance abdominal imaging interpretation skills utilizing the latest imaging technologies. Time: 1:00 pm - [...]
IASTEM - 864th International Conference On Medical, Biological And Pharmaceutical Sciences ICMBPS
2020-07-01 - 2020-07-02    
All Day
IASTEM - 864th International Conference on Medical, Biological and Pharmaceutical Sciences ICMBPS will be held on 3rd - 4th July, 2020 at Hamburg, Germany . [...]
International Conference On Medical & Health Science
2020-07-02 - 2020-07-03    
All Day
ICMHS is being organized by Researchfora. The aim of the conference is to provide the platform for Students, Doctors, Researchers and Academicians to share the [...]
Mental Health, Addiction, And Legal Aspects Of End-Of-Life Care CME Cruise
2020-07-03 - 2020-07-10    
All Day
Mental Health, Addiction Medicine, and Legal Aspects of End-of-Life Care CME Cruise Conference. 7-Night Cruise to Alaska from Seattle, Washington on Celebrity Cruises Celebrity Solstice. [...]
ISER- 843rd International Conference On Science, Health And Medicine ICSHM
2020-07-03 - 2020-07-04    
All Day
ISER- 843rd International Conference on Science, Health and Medicine (ICSHM) is a prestigious event organized with a motivation to provide an excellent international platform for the academicians, [...]
04 Jul
2020-07-04    
12:00 am
ICRAMMHS is to bring together innovative academics and industrial experts in the field of Medical, Medicine and Health Sciences to a common forum. All the [...]
6th Annual Formulation And Drug Delivery Congress
2020-07-08 - 2020-07-09    
All Day
Meet and learn from experts in the pharmaceutical sciences community to address critical strategic developments and technical innovation in formulation, drug delivery and manufacturing of [...]
7th Global Conference On Pharma Industry And Medical Devices
2020-07-08 - 2020-07-09    
All Day
The Global Conference on Pharma Industry and Medical Devices GCPIMD is to bring together innovative academics and industrial experts in the field of Pharmacy and [...]
IASTEM - 868th International Conference On Medical, Biological And Pharmaceutical Sciences ICMBPS
2020-07-09 - 2020-07-10    
All Day
IASTEM - 868th International Conference on Medical, Biological and Pharmaceutical Sciences ICMBPS will be held on 9th - 10th July, 2020 at Amsterdam, Netherlands . [...]
2nd Annual Congress On Antibiotics, Bacterial Infections & Antimicrobial Resistance
2020-07-09 - 2020-07-10    
All Day
EURO ANTIBIOTICS 2020 invites all the participants from all over the world to attend 2nd Annual Congress Antibiotics, Bacterial infections & Antimicrobial Resistance to be [...]
Events on 2020-06-29
Events on 2020-07-02
Articles

EHR and mobile device auditing, security requires vigilance

If you need a few reasons to adapt to the latest security advancements, just look at the calendar for September and circle the “23”. That’s compliance day for the HIPAA Omnibus Rule, which modifies the privacy, security and enforcement rules. There are 659 more reasons – one for every large patient-information breach – on the Office for Civil Rights (OCR) Breach Notification Tool as of late August.

Security today, naturally, goes beyond the traditional “shred the paper” techniques and two of the biggest issues are related to EHRs and mobile devices. HealthITSecurity.com caught up with a security officer whose organization is paying close attention to those two aspects of the securing protected health information (PHI) game. Nancy Davis, MS, RHIA, CHPS, system director of privacy and security for Ministry Health Care in Milwaukee, offered some details about some of the latest advancements her organization has made and how it ensures security.

EHR access auditing

While the jury is still out on a final rule on accounting of disclosures and proposed EHR access reports, looking into auditing in EHRs is a must for organizations, Davis said. “Face it by now most organizations have the EHRs but are lagging in the auditing area either due to the constraints of the EHR application and/or the need to finance external auditing applications,” Davis maintained.

Ministry Health Care handles EHR access auditing through a combination of internal and external auditing applications. What’s a good first step if an organization is implementing this type of auditing? Have some type of tool – you have to have this.

“It doesn’t mean you have to purchase one, but there should be some way of verifying access,” Davis says. “Most applications have this; they just don’t function as well as external products.

Next, ensure your organization stays on top of the auditing when you choose to go down that route. “Take care not to create audit reports and let them stack up without reviewing,” Davis says. “There should be a policy and auditing plan in place.”

Without a solid auditing plan, organizations could have no way of knowing whether there was unauthorized access to a patient’s PHI. “You would not be able to defend an allegation of breach,” Davis says.

Mobile-device security

Davis’ organization uses an application she said has been great for mobile devices and addressing security. The end result is no information is retained on the device used.  Davis uses this on her iPad when traveling, loves it and uses it once or twice a week based on travel and only for e-mail, which may include very limited PHI. “I feel secure when working in this application,” Davis says.

End users must first apply internally to be approved for the device. Once it is approved, they download the application to their portable devices and then authenticate it through a unique user log-in and complex password which is subject to change every six months. “It also times out automatically if not used,” she said. “We can access our e-mail.”

Mobile-device use is limited to providers, exempt staff, and non-exempt staff with leadership approval. When selecting security applications for your mobile devices, organizations need to identify the rogue programs out there. “They may not be sanctioned,” Davis said, “and may not be secure.” Source