| Literature DB >> 27169345 |
Soleh U Al Ayubi1, Alexandra Pelletier, Gajen Sunthara, Nitin Gujral, Vandna Mittal, Fabienne C Bourgeois.
Abstract
BACKGROUND: Hospitals today are introducing new mobile apps to improve patient care and workflow processes. Mobile device adoption by hospitals fits with present day technology behavior; however, requires a deeper look into hospital device policies and the impact on patients, staff, and technology development. Should hospitals spend thousands to millions of dollars to equip all personnel with a mobile device that is only used in a hospital environment? Allowing health care professionals to use personal mobile devices at work, known as bring-your-own-device (BYOD), has the potential to support both the hospital and its employees to deliver effective and efficient care.Entities:
Keywords: BYOD; custom application; electronic medical records; guideline; hospital settings; mobile application; privacy; safeguard; security
Year: 2016 PMID: 27169345 PMCID: PMC4880739 DOI: 10.2196/mhealth.4424
Source DB: PubMed Journal: JMIR Mhealth Uhealth ISSN: 2291-5222 Impact factor: 4.773
Summary of BCH BYOD guideline to safeguard custom application in hospital settings.
| No. | Risks | Guidelines and Recommendations |
| 1 | Unauthorized access to app and decreased productivity | Adopt enterprise-standards but usable authentication |
| Implement RBACa | ||
| 2 | Unauthorized access to data | Implement at least three layers of security on data transmission (transport layer security, access control, and content security) |
| Allow apps to work on internal networks or VPNb only | ||
| 3 | Data transmission to unauthorized parties | Protect the mobile app’s notifications |
| 4 | Unauthorized access to apps and data | Prevent apps from working on jail-broken devices |
| Allow apps to only work on encrypted-devices or devices with pass-codes | ||
| 5 | Unauthorized access to data | Require apps to use minimal cache |
| 6 | Unauthorized access to the app | Enforce automatic logoff |
| 7 | Data transmission to unauthorized parties | Limit copy data and print screen functionalities |
| Limit backup on Cloud services | ||
| 8 | App distribution to unauthorized parties | Distributing the app: Implement internal over-the-air installation and app updates |
| 9 | Unauthorized access to app | Implement remote wipe out functionality |
| Implement ability to disconnect and block a user anytime |
arole-based access control.
bvirtual private networks.
Figure 1TaskList enterprise authentication and PIN.
Figure 2Tasklist runs on secured network only.
Figure 3Tasklist limited notifications.
Figure 4TaskList does not run on jail-broken devices.
Figure 5TaskList will be closed after 30-minute of inactivity.
Figure 6Boston Children's Hospital app store.