Synergy - January/February 2013 - 11

continuing education

prevalent in the industry . Failure to ensure
security and privacy under the Health
Insurance Portability and Accountability
Act of 1996 (HIPAA), along with similar
legislation, including those relating to
confidentiality, may very well result in
violations and penalties . A lesson may
be learned from the recent $1 .5 million
settlement reached between the U .S .
Department of Health and Human
Services Office for Civil Rights and a
Massachusetts specialty hospital and its
associated professional group resulting
from an investigation tied back to a theft
of a laptop computer .

HIPAA Security and
Privacy Rules
Unfettered use of mobile devices is
causing PHI and its security to become
a greater concern for providers . The
HIPAA Security Rule requires providers
to implement appropriate administrative,
physical and technical safeguards to
ensure the confidentiality, integrity and
security of PHI . In addition to the HIPAA
Security Rule, the HIPAA Privacy Rule
establishes standards for the protection of
PHI and other personal information . This
protection is done through appropriate
safeguards to limit disclosure of PHI .
With the ever-increasing use of personal
mobile devices for professional purposes,
more and more providers are taking
pictures, dictating or sharing information,
some of which constitutes PHI, through
these devices . In these instances, it is
possible to allow unauthorized access or
give someone inadvertent access to such
protected information .
Hospitals must have written policies in place
addressing the privacy of health information
and must ensure that unauthorized individuals
cannot gain access to patient records . Because
the security and privacy concerns emanate
from HIPAA, the implementation and
enforcement of the policies and procedures
should incorporate and further the HIPAA
policies and procedures in place .

How May Disclosure Occur
With a Mobile Device?
When a practitioner utilizes a mobile
device, it is not unusual that the last thing
11

/

SYNERGY January/Febr uary 2013

on their mind is the HIPAA implications
of such use . The following are common
instances where there may be an improper
disclosure of PHI as a result of using a
mobile device in developing, accessing or
retaining PHI:
•	 It is misplaced by the user or lost or
stolen where another may have access
to such information;
•	 The device is left unoccupied or
viewable where an unauthorized person
may have access to PHI;
•	 An unauthorized individual “hacks” into
the device’s database or through an
unsecured transmission line;
•	 Transferring or placing information on a
mobile device (or even flash drive) that
is not encrypted so that the provider
may have access to it on a trip or at
home; or
•	 The mobile device is traded in and the
memory is not completely deleted or
“scrubbed .”
It should be noted an unauthorized
disclosure does not need to occur to
implicate a violation of the HIPAA Security
and Privacy Rules . These rules allow for
there to be communications between
healthcare providers or with patients as
long they have established appropriate
administrative, physician and technical
safeguards from a security and privacy
standpoint to ensure the PHI remains
confidential with integrity and security .
Failure to do so is a violation itself .

How to Ensure Protection
When Utilizing Mobile
Devices
With the different issues surrounding
the use of mobile devices in the hospital
environment, medical staff policies and
procedures must be established to satisfy
the HIPAA Security and Privacy Rules
and related statutory and regulatory
requirements, to protect against security
breaches and unauthorized disclosure,
and to establish best practices in
recording and exchanging PHI . The
following are suggested areas for hospitals
to review and incorporate into their basic
operations, as well as their medical staff
policies or procedures:

•	 It is mandatory that any information
rising to the level of PHI be kept in a
secured environment meeting the
various requirements and safeguards
previously mentioned . If PHI is received
from another entity or person, there
must be policies and procedures in
place to establish how it must be
immediately designated as PHI and be
secured . It is essential that hospitals
conduct a thorough analysis of the risks
to PHI security and privacy and
continue such analysis on an ongoing
basis . Additionally, providers should
document the methodology chosen to
address such risks and update them as
necessary to keep up with
ever-changing technology .
•	 Any transmissions of PHI using mobile
devices must be through encrypted data
transmission . Because most personal
devices are not going to be as secure as
those of the facility or medical practice,
it is advisable to limit the use of
personal mobile devices .
•	 Access by any mobile device must be
restricted by password and sufficient
other safeguards so the PHI may not be
accessed by those who are not
authorized to access it . There should be
a requirement the passwords be
changed on a set time basis (e .g ., every
90 days) and be of a sufficient security
level to hinder attempts to obtain the
password (e .g ., require different types
of letters, numbers and symbols in the
passwords) . There should also be a
policy and procedure on restricting
access to passwords and how the
passwords are maintained .
•	 So as to limit the theft or loss of a
mobile device, require the mobile
device when not in use to be in a
locked area such as an office or
workstation or in a locked briefcase if
the person is off-site . One should not
leave a mobile device in an automobile
or in a location where the device or the
information may be viewable or easily
stolen . An inventory of mobile devices
maintained by the facility or medical
practice should be maintained .

Continued on page 12



Synergy - January/February 2013

Table of Contents for the Digital Edition of Synergy - January/February 2013

Synergy - January/February 2013
Contents
Editor’s Column
President’s Column
Mobile Devices and Their Use in Healthcare: Medical Staff Policies and Procedures to Avoid Pitfalls
Evaluating the Effectiveness of Medical Staff Meetings
Credentialing with the Lights Out
NAMSS PASS Is Now Available
Industry Partners Respond to NAMSS PASS
Member Experiences
NAMSS Dashboard 2012 Year in Review
NAMSS News
Happenings
Consultants Directory
Synergy - January/February 2013 - Intro
Synergy - January/February 2013 - Synergy - January/February 2013
Synergy - January/February 2013 - Cover2
Synergy - January/February 2013 - 1
Synergy - January/February 2013 - Contents
Synergy - January/February 2013 - 3
Synergy - January/February 2013 - 4
Synergy - January/February 2013 - 5
Synergy - January/February 2013 - Editor’s Column
Synergy - January/February 2013 - 7
Synergy - January/February 2013 - President’s Column
Synergy - January/February 2013 - 9
Synergy - January/February 2013 - Mobile Devices and Their Use in Healthcare: Medical Staff Policies and Procedures to Avoid Pitfalls
Synergy - January/February 2013 - 11
Synergy - January/February 2013 - 12
Synergy - January/February 2013 - 13
Synergy - January/February 2013 - Evaluating the Effectiveness of Medical Staff Meetings
Synergy - January/February 2013 - 15
Synergy - January/February 2013 - 16
Synergy - January/February 2013 - 17
Synergy - January/February 2013 - Credentialing with the Lights Out
Synergy - January/February 2013 - 19
Synergy - January/February 2013 - NAMSS PASS Is Now Available
Synergy - January/February 2013 - 21
Synergy - January/February 2013 - Industry Partners Respond to NAMSS PASS
Synergy - January/February 2013 - 23
Synergy - January/February 2013 - Member Experiences
Synergy - January/February 2013 - 25
Synergy - January/February 2013 - NAMSS Dashboard 2012 Year in Review
Synergy - January/February 2013 - 27
Synergy - January/February 2013 - NAMSS News
Synergy - January/February 2013 - 29
Synergy - January/February 2013 - 30
Synergy - January/February 2013 - Happenings
Synergy - January/February 2013 - Consultants Directory
Synergy - January/February 2013 - Cover3
Synergy - January/February 2013 - Cover4
https://www.nxtbook.com/nxtbooks/NAMSS/synergy_2020q4
https://www.nxtbook.com/nxtbooks/NAMSS/synergy_2020q3
https://www.nxtbook.com/nxtbooks/NAMSS/synergy_2020q2
https://www.nxtbook.com/nxtbooks/NAMSS/synergy_2020q1
https://www.nxtbook.com/nxtbooks/NAMSS/synergy_20191112
https://www.nxtbook.com/nxtbooks/NAMSS/synergy_20190910
https://www.nxtbook.com/nxtbooks/NAMSS/synergy_20190708
https://www.nxtbook.com/nxtbooks/NAMSS/synergy_20190506
https://www.nxtbook.com/nxtbooks/NAMSS/synergy_20190304
https://www.nxtbook.com/nxtbooks/NAMSS/synergy_20190102
https://www.nxtbook.com/nxtbooks/NAMSS/synergy_20181112
https://www.nxtbook.com/nxtbooks/NAMSS/synergy_20180910
https://www.nxtbook.com/nxtbooks/NAMSS/synergy_20180708
https://www.nxtbook.com/nxtbooks/NAMSS/synergy_20180506
https://www.nxtbook.com/nxtbooks/NAMSS/synergy_20180304
https://www.nxtbook.com/nxtbooks/NAMSS/synergy_20180102
https://www.nxtbook.com/nxtbooks/NAMSS/synergy_20171112
https://www.nxtbook.com/nxtbooks/NAMSS/synergy_20170910
https://www.nxtbook.com/nxtbooks/NAMSS/synergy_20170708
https://www.nxtbook.com/nxtbooks/NAMSS/synergy_20170506
https://www.nxtbook.com/nxtbooks/NAMSS/synergy_20170304
https://www.nxtbook.com/nxtbooks/NAMSS/synergy_20170102
https://www.nxtbook.com/nxtbooks/NAMSS/synergy_20161112
https://www.nxtbook.com/nxtbooks/NAMSS/synergy_20160910
https://www.nxtbook.com/nxtbooks/NAMSS/synergy_20160708
https://www.nxtbook.com/nxtbooks/NAMSS/synergy_20160506
https://www.nxtbook.com/nxtbooks/NAMSS/synergy_20160304
https://www.nxtbook.com/nxtbooks/NAMSS/synergy_20160102
https://www.nxtbook.com/nxtbooks/NAMSS/synergy_20151112
https://www.nxtbook.com/nxtbooks/NAMSS/synergy_20150910
https://www.nxtbook.com/nxtbooks/NAMSS/synergy_20150708
https://www.nxtbook.com/nxtbooks/NAMSS/synergy_20150506
https://www.nxtbook.com/nxtbooks/NAMSS/synergy_20150304
https://www.nxtbook.com/nxtbooks/NAMSS/synergy_20150102
https://www.nxtbook.com/nxtbooks/NAMSS/synergy_20141112
https://www.nxtbook.com/nxtbooks/NAMSS/synergy_20140910
https://www.nxtbook.com/nxtbooks/NAMSS/synergy_20140708
https://www.nxtbook.com/nxtbooks/NAMSS/synergy_20140506
https://www.nxtbook.com/nxtbooks/NAMSS/synergy_20140304
https://www.nxtbook.com/nxtbooks/NAMSS/synergy_20140102
https://www.nxtbook.com/nxtbooks/NAMSS/synergy_20131112
https://www.nxtbook.com/nxtbooks/NAMSS/synergy_20130910
https://www.nxtbook.com/nxtbooks/NAMSS/synergy_20130708
https://www.nxtbook.com/nxtbooks/NAMSS/synergy_20130506
https://www.nxtbook.com/nxtbooks/NAMSS/synergy_20130304
https://www.nxtbook.com/nxtbooks/NAMSS/synergy_20130102
https://www.nxtbook.com/nxtbooks/NAMSS/synergy_20121112
https://www.nxtbook.com/nxtbooks/NAMSS/synergy_20121011
https://www.nxtbookmedia.com