Site icon

What Does the HIPAA Security Rule Say About Mobile Computing?

With modern computing increasingly moving into a mobile paradigm of remote workers, laptops, and smart devices, the threat to security in various industries is only increasing. This is no more true than in healthcare, where HIPAA breaches related to mobile devices are becoming more common. 

This article will discuss the HIPAA security rule, how it governs mobile devices in regulated settings, and how to minimize your attack surface and liability. 

 

What Is the HIPAA Security Rule?

The HIPAA Security Rule is a security framework established in 1996 to protect the confidentiality, integrity, and availability of electronic protected health information (ePHI). The rule applies to covered entities and business associates to protect their data from unauthorized disclosure to parties outside of a healthcare relationship.

The Security Rule establishes a framework of administrative, physical, and technical safeguards that organizations must implement to ensure the security of ePHI:

 

What Does the Security Rule Say About Securing Mobile Devices?

The HIPAA Security Rule doesn’t explicitly mention mobile computing devices, but the above-listed rules will apply nonetheless. Additionally, because these devices come with unique vulnerabilities, different aspects of the Security Rule will apply differently. 

Some of the relevant security measures that play a role in securing mobile devices under HIPAA include:

 

How Big a Problem Can Unsecured Devices Be?

There have been instances where covered entities were fined for HIPAA non-compliance due to the failure to secure a laptop or mobile device. In fact, there is a growing concern that with the move towards mobile computing, these problems will only grow without proper attention from covered entities. 

Some examples of these breaches include:

 

What Can I Do to Secure Mobile Workstations for HIPAA Compliance?

Covered entities can take several steps to secure mobile workstations and remain HIPAA compliant. These measures should address the administrative, physical, and technical safeguards outlined in the HIPAA Security Rule. Some steps include:

By implementing these steps, covered entities can strengthen the security of their mobile workstations and better protect ePHI, ultimately helping them remain compliant with HIPAA regulations.

 

Stay On Top of HIPAA Security with Continuum GRC

Continuum GRC is a cloud platform that can take something as routine and necessary as regular vulnerability scanning and reporting under FedRAMP and make it an easy and timely part of business in the public sector. We provide risk management and compliance support for every major regulation and compliance framework on the market, including:

And more. We are the only FedRAMP and StateRAMP Authorized compliance and risk management solution worldwide.

Continuum GRC is a proactive cyber security® and the only FedRAMP and StateRAMP Authorized cybersecurity audit platform worldwide. Call 1-888-896-6207 to discuss your organization’s cybersecurity needs and find out how we can help your organization protect its systems and ensure compliance.

[wpforms id= “43885”]

Exit mobile version