Mobile Devices Data Security

News & Analysis as of

Comment period extended for NIST Cybersecurity Practice Guide

The National Institute of Standards and Technology has announced that due to stakeholder feed-back, the period to submit comments for the draft guide, “Securing Electronic Health Records on Mobile Devices” has been extended...more

Recent Enforcement Shows the Importance of Encrypting Mobile Devices Containing Protected Health Information

With headlines every day announcing another release of Protected Health Information (PHI), providers are asking themselves – is there a way to protect against these breaches? Beyond improving the security of large...more

Internet of Things – What does it mean for business?

What is the Internet of Things? The 'Internet of Things' (IoT) is a catchphrase describing the increasing interconnectedness between smart devices and sensors facilitated through their connection to the internet. It's not a...more

[Webinar] Mobile Device Management for Health Care Organizations and Vendors - Sept. 10th, 10:00am PDT

In this webinar, we will demystify the HIPAA Security Rule and how to apply the administrative, physical, and technical safeguards in a mobile environment. We will discuss key takeaways from the recently released NIST Draft...more

NIST Standards Provides An Oasis Of Mobile Device Security In The EHR Desert

The healthcare industry has long awaited some certainty in the arena of mobile devices in light of the continued push for electronic health records (“EHR”) and coordinated care. The prevalence, convenience, and speed of such...more

Back to Basics: Low tech tips to alleviate high tech headaches

It’s easy to get lost in the abyss of technical jargon when discussing Electronically Stored Information (ESI). However, good information governance, which is one of the cornerstones of data privacy and security, doesn’t have...more

Data Security Issues in the Workplace: It’s 10:00 p.m. – Do You Know Where Your Company’s Data Is?

It seems that not a day goes by without another massive data breach incident providing fodder for the morning headlines or the evening news. That should come as no surprise. According to key studies, the average company...more

Mobile Health Devices and Cybersecurity: Federal Guidance for Management of Threats in Medical Devices

New Technology = New Threats - With new technology comes new security concerns. But when that new technology is in the medical field, the cybersecurity vulnerabilities can be particularly devastating. The...more

NIST Releases Draft Cybersecurity Practice Guide For Electronic Health Records

On July 22, the National Cybersecurity Center of Excellence (“NCCoE”), a U.S. government organization formed in 2012 within the National Institute of Standards and Technology (“NIST”), released a draft Cybersecurity Practice...more

New NIST Guide Advises Healthcare Companies on Securing Patient Health Information on Mobile Devices

In response to a growing demand for cybersecurity guidance in the health care industry, the National Institute of Standards and Technology (NIST), through its National Cybersecurity Center of Excellence, recently published a...more

Developing or Enhancing “Bring Your Own Device” Programs – Your First Five Questions . . .

This is the second blog post in Discovery Advocate’s new series, “Your First Five Questions,” in which we identify a question commonly (or sometimes not so commonly) seen in practice followed by the first five questions you...more

NIST Issues Draft Guidance for Mobile Health Data

With health care breaches constantly on the rise, increasing access to electronic health records (EHRs) from mobile devices, and more prevalent “shadow” cloud use, health care organizations are getting a bit of help from the...more

Q&A: James Pooley on Trade Secret Protection

In this Q&A, we talk with James Pooley about his new book, Secrets: Managing Information Assets in the Age of Cyberespionage. James has a wealth of experience in information security and intellectual property law. In 2009, he...more

NIST releases draft guide for use of mobile devices for medical providers

The National Institute of Standards and Technology (NIST) cybersecurity center released a draft guide last week for health IT professionals to use to bolster security for the use of mobile devices in the health care industry....more

Smartphones & Smart Employers: Device Policies Enable Businesses To Safely Embrace Technology

Employers who don’t think they need a bring-your-own-device policy should consider this: Nearly 70 percent of millennials and 31 percent of baby boomers surveyed last year by TrackVia admitted to using their own devices and...more

FTC's New Consumer Data Security Guidance Offers Businesses Practical Tips

The Federal Trade Commission has issued new guidance on data security for companies that collect, store and use consumer information, gleaned from the more than 50 enforcement actions brought by the agency over the past...more

Security bug found in Samsung® smartphones

Samsung recently announced that about more than 600 million Samsung mobile devices contained a factory installed third party software produced by SwiftKey that predicts the words you will types on your keyboards. The issue...more

The Internet of Things: EU vs US guidance

In its February 2015 Report on the Internet of Things (IoT), the FTC estimated that there are now 25 billion connected devices worldwide. Another more conservative report by Gartner estimates there will be 2.9 billion...more

18 Results
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.