Top Five Information Risk, Security, and Privacy Considerations for BYOD

March 6, 2013, 2:45 PM - 3:15 PM | This session will examine the top five privacy and security considerations for Bring Your Own Device (BYOD) solutions in healthcare that both the user and the organization need to consider.

Speaker(s):
  • John Pironti
Level:IntroductoryObjectives:
  • Learn the risks and benefits of a BYOD strategy in healthcare environments
  • Understand the key privacy and security considerations that a healthcare organization needs to evaluate when leveraging BYOD
  • Identify when BYOD makes sense and when it does not based on risk, privacy, and security considerations in a healthcare environment
  • Recognize the unique information risk, security, and privacy challenges associated with BYOD for both the user and the organization in healthcare environments
  • Discover techniques they can use to securely incorporate BYOD into their IT strategy in healthcare environments

 

Around the web

The American College of Cardiology has shared its perspective on new CMS payment policies, highlighting revenue concerns while providing key details for cardiologists and other cardiology professionals. 

As debate simmers over how best to regulate AI, experts continue to offer guidance on where to start, how to proceed and what to emphasize. A new resource models its recommendations on what its authors call the “SETO Loop.”

FDA Commissioner Robert Califf, MD, said the clinical community needs to combat health misinformation at a grassroots level. He warned that patients are immersed in a "sea of misinformation without a compass."

Trimed Popup
Trimed Popup