{"id":589,"date":"2023-12-20T09:34:38","date_gmt":"2023-12-20T14:34:38","guid":{"rendered":"https:\/\/eagleassociates.net\/news\/?p=589"},"modified":"2023-12-20T09:34:38","modified_gmt":"2023-12-20T14:34:38","slug":"securing-smartphones","status":"publish","type":"post","link":"https:\/\/eagleassociates.net\/news\/2023\/12\/securing-smartphones\/","title":{"rendered":"Securing Smartphones"},"content":{"rendered":"\n<p>Personal devices, especially smartphones, are often neglected when considering the ways that electronic protected health information (EPHI) is received, stored, and transmitted in healthcare settings. While most workforce members may be prohibited from using their personal devices or smartphones to receive, transmit or store EPHI, providers often cannot avoid it. Any text, email or voice message containing EPHI will necessitate appropriate security measures on the device in order to avoid a privacy breach in the event that the device lost or stolen.<\/p>\n\n\n\n<p>This article will outline the security measures recommended by the Office of the National Coordinator for Health Information Technology, as well as some guidance from other information technology (IT) providers. Not all smartphones or mobile devices will feature the security controls mentioned, however it is important to obtain or enable those that are available.<\/p>\n\n\n\n<p><strong>Delete all stored EPHI on a regular basis<\/strong><\/p>\n\n\n\n<p>It is often unnecessary to store EPHI on a mobile device once it has been used and\/or documented elsewhere, like in a patient\u2019s record. Regular removal of data minimizes risk.<\/p>\n\n\n\n<p><strong>Use a password or other authentication<\/strong><\/p>\n\n\n\n<p>Authentication is the process of verifying the identity of a user by requiring a password, personal identification number (PIN), or passcode to gain access to it. Enable the phone to activate a screen lock after a period of inactivity to prevent unauthorized access.<\/p>\n\n\n\n<p><strong>Install and enable encryption<\/strong><\/p>\n\n\n\n<p>Encryption is the conversion of data into a form that cannot be read without the decryption key or password. It is important to encrypt data that is stored on a smartphone as well as data that is sent from it, such as through text message or email. Some devices have built-in encryption capabilities, but it may be necessary to buy and install an encryption application (app) or use a secure messaging service. Ensure that mobile apps are from a trusted source prior to downloading them to your device.<\/p>\n\n\n\n<p><strong>Activate remote wiping and\/or remote disabling<\/strong><\/p>\n\n\n\n<p>Remote wiping is a security feature that enables the user to remotely erase data on a device or smartphone if it is lost or stolen. Note that using a cloud-based system to back up data on your mobile device will ensure that it is available to you even if the device has to be erased. Remote disabling enables you to lock a device remotely if it is lost or stolen, and to unlock it if the device is recovered.<\/p>\n\n\n\n<p><strong>Keep your security software up to date<\/strong><\/p>\n\n\n\n<p>Enable automatic updates whenever possible to ensure that your smartphone or device has the latest tools to prevent unauthorized access to EPHI. Ensure that both application updates and operating system (OS) updates are installed promptly.<\/p>\n\n\n\n<p><strong>Enable (or install) a firewall<\/strong><\/p>\n\n\n\n<p>A personal firewall on a mobile device can protect against unauthorized connections. Firewalls intercept incoming and outgoing connection attempts and block or permit them based on a set of rules defined by the user. Ensure that the firewall is enabled on your device or install a firewall app.<\/p>\n\n\n\n<p><strong>Avoid using public Wi-Fi networks or hot spots<\/strong><\/p>\n\n\n\n<p>Information could be intercepted between your device and the Wi-Fi system connection. Ensure that data is encrypted or otherwise secured if using a public Wi-Fi connection.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Personal devices, especially smartphones, are often neglected when considering the ways that electronic protected health information (EPHI) is received, stored, and transmitted in healthcare settings. While most workforce members may be prohibited from using their personal devices or smartphones to receive, transmit or store EPHI, providers often cannot avoid it. Any text, email or voice&#8230; <span class=\"more\"><a class=\"more-link\" href=\"https:\/\/eagleassociates.net\/news\/2023\/12\/securing-smartphones\/\">Continue reading <span class=\"meta-nav\">&#8594;<\/span><\/a><\/span><\/p>\n","protected":false},"author":4,"featured_media":591,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[35],"tags":[],"class_list":["post-589","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-eagle-staff"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Securing Smartphones | Eagle Associates News<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/eagleassociates.net\/news\/2023\/12\/securing-smartphones\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Securing Smartphones | Eagle Associates News\" \/>\n<meta property=\"og:description\" content=\"Personal devices, especially smartphones, are often neglected when considering the ways that electronic protected health information (EPHI) is received, stored, and transmitted in healthcare settings. While most workforce members may be prohibited from using their personal devices or smartphones to receive, transmit or store EPHI, providers often cannot avoid it. Any text, email or voice... Continue reading &#8594;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/eagleassociates.net\/news\/2023\/12\/securing-smartphones\/\" \/>\n<meta property=\"og:site_name\" content=\"Eagle Associates News\" \/>\n<meta property=\"article:published_time\" content=\"2023-12-20T14:34:38+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/eagleassociates.net\/news\/wp-content\/uploads\/2023\/12\/AdobeStock_317995562-scaled.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1707\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"jennifer@eagleassociates.net\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"jennifer@eagleassociates.net\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/eagleassociates.net\\\/news\\\/2023\\\/12\\\/securing-smartphones\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/eagleassociates.net\\\/news\\\/2023\\\/12\\\/securing-smartphones\\\/\"},\"author\":{\"name\":\"jennifer@eagleassociates.net\",\"@id\":\"https:\\\/\\\/eagleassociates.net\\\/news\\\/#\\\/schema\\\/person\\\/6da6ff9a5209cf0349930d046406825d\"},\"headline\":\"Securing Smartphones\",\"datePublished\":\"2023-12-20T14:34:38+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/eagleassociates.net\\\/news\\\/2023\\\/12\\\/securing-smartphones\\\/\"},\"wordCount\":534,\"image\":{\"@id\":\"https:\\\/\\\/eagleassociates.net\\\/news\\\/2023\\\/12\\\/securing-smartphones\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/eagleassociates.net\\\/news\\\/wp-content\\\/uploads\\\/2023\\\/12\\\/AdobeStock_317995562-scaled.jpeg\",\"articleSection\":[\"eagle associates staff\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/eagleassociates.net\\\/news\\\/2023\\\/12\\\/securing-smartphones\\\/\",\"url\":\"https:\\\/\\\/eagleassociates.net\\\/news\\\/2023\\\/12\\\/securing-smartphones\\\/\",\"name\":\"Securing Smartphones | Eagle Associates News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/eagleassociates.net\\\/news\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/eagleassociates.net\\\/news\\\/2023\\\/12\\\/securing-smartphones\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/eagleassociates.net\\\/news\\\/2023\\\/12\\\/securing-smartphones\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/eagleassociates.net\\\/news\\\/wp-content\\\/uploads\\\/2023\\\/12\\\/AdobeStock_317995562-scaled.jpeg\",\"datePublished\":\"2023-12-20T14:34:38+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/eagleassociates.net\\\/news\\\/#\\\/schema\\\/person\\\/6da6ff9a5209cf0349930d046406825d\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/eagleassociates.net\\\/news\\\/2023\\\/12\\\/securing-smartphones\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/eagleassociates.net\\\/news\\\/2023\\\/12\\\/securing-smartphones\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/eagleassociates.net\\\/news\\\/2023\\\/12\\\/securing-smartphones\\\/#primaryimage\",\"url\":\"https:\\\/\\\/eagleassociates.net\\\/news\\\/wp-content\\\/uploads\\\/2023\\\/12\\\/AdobeStock_317995562-scaled.jpeg\",\"contentUrl\":\"https:\\\/\\\/eagleassociates.net\\\/news\\\/wp-content\\\/uploads\\\/2023\\\/12\\\/AdobeStock_317995562-scaled.jpeg\",\"width\":2560,\"height\":1707,\"caption\":\"Shot of pretty female doctor using her mobile phone while standing in medical consultation.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/eagleassociates.net\\\/news\\\/2023\\\/12\\\/securing-smartphones\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/eagleassociates.net\\\/news\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Securing Smartphones\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/eagleassociates.net\\\/news\\\/#website\",\"url\":\"https:\\\/\\\/eagleassociates.net\\\/news\\\/\",\"name\":\"Eagle Associates News\",\"description\":\"News and More from Eagle Associates, Inc.\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/eagleassociates.net\\\/news\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/eagleassociates.net\\\/news\\\/#\\\/schema\\\/person\\\/6da6ff9a5209cf0349930d046406825d\",\"name\":\"jennifer@eagleassociates.net\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/c6939a8aee6cb39ce286feabd945c1f791069839e62b53d9605db4cbb3cb7da1?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/c6939a8aee6cb39ce286feabd945c1f791069839e62b53d9605db4cbb3cb7da1?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/c6939a8aee6cb39ce286feabd945c1f791069839e62b53d9605db4cbb3cb7da1?s=96&d=mm&r=g\",\"caption\":\"jennifer@eagleassociates.net\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Securing Smartphones | Eagle Associates News","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/eagleassociates.net\/news\/2023\/12\/securing-smartphones\/","og_locale":"en_US","og_type":"article","og_title":"Securing Smartphones | Eagle Associates News","og_description":"Personal devices, especially smartphones, are often neglected when considering the ways that electronic protected health information (EPHI) is received, stored, and transmitted in healthcare settings. While most workforce members may be prohibited from using their personal devices or smartphones to receive, transmit or store EPHI, providers often cannot avoid it. Any text, email or voice... Continue reading &#8594;","og_url":"https:\/\/eagleassociates.net\/news\/2023\/12\/securing-smartphones\/","og_site_name":"Eagle Associates News","article_published_time":"2023-12-20T14:34:38+00:00","og_image":[{"width":2560,"height":1707,"url":"https:\/\/eagleassociates.net\/news\/wp-content\/uploads\/2023\/12\/AdobeStock_317995562-scaled.jpeg","type":"image\/jpeg"}],"author":"jennifer@eagleassociates.net","twitter_card":"summary_large_image","twitter_misc":{"Written by":"jennifer@eagleassociates.net","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/eagleassociates.net\/news\/2023\/12\/securing-smartphones\/#article","isPartOf":{"@id":"https:\/\/eagleassociates.net\/news\/2023\/12\/securing-smartphones\/"},"author":{"name":"jennifer@eagleassociates.net","@id":"https:\/\/eagleassociates.net\/news\/#\/schema\/person\/6da6ff9a5209cf0349930d046406825d"},"headline":"Securing Smartphones","datePublished":"2023-12-20T14:34:38+00:00","mainEntityOfPage":{"@id":"https:\/\/eagleassociates.net\/news\/2023\/12\/securing-smartphones\/"},"wordCount":534,"image":{"@id":"https:\/\/eagleassociates.net\/news\/2023\/12\/securing-smartphones\/#primaryimage"},"thumbnailUrl":"https:\/\/eagleassociates.net\/news\/wp-content\/uploads\/2023\/12\/AdobeStock_317995562-scaled.jpeg","articleSection":["eagle associates staff"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/eagleassociates.net\/news\/2023\/12\/securing-smartphones\/","url":"https:\/\/eagleassociates.net\/news\/2023\/12\/securing-smartphones\/","name":"Securing Smartphones | Eagle Associates News","isPartOf":{"@id":"https:\/\/eagleassociates.net\/news\/#website"},"primaryImageOfPage":{"@id":"https:\/\/eagleassociates.net\/news\/2023\/12\/securing-smartphones\/#primaryimage"},"image":{"@id":"https:\/\/eagleassociates.net\/news\/2023\/12\/securing-smartphones\/#primaryimage"},"thumbnailUrl":"https:\/\/eagleassociates.net\/news\/wp-content\/uploads\/2023\/12\/AdobeStock_317995562-scaled.jpeg","datePublished":"2023-12-20T14:34:38+00:00","author":{"@id":"https:\/\/eagleassociates.net\/news\/#\/schema\/person\/6da6ff9a5209cf0349930d046406825d"},"breadcrumb":{"@id":"https:\/\/eagleassociates.net\/news\/2023\/12\/securing-smartphones\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/eagleassociates.net\/news\/2023\/12\/securing-smartphones\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/eagleassociates.net\/news\/2023\/12\/securing-smartphones\/#primaryimage","url":"https:\/\/eagleassociates.net\/news\/wp-content\/uploads\/2023\/12\/AdobeStock_317995562-scaled.jpeg","contentUrl":"https:\/\/eagleassociates.net\/news\/wp-content\/uploads\/2023\/12\/AdobeStock_317995562-scaled.jpeg","width":2560,"height":1707,"caption":"Shot of pretty female doctor using her mobile phone while standing in medical consultation."},{"@type":"BreadcrumbList","@id":"https:\/\/eagleassociates.net\/news\/2023\/12\/securing-smartphones\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/eagleassociates.net\/news\/"},{"@type":"ListItem","position":2,"name":"Securing Smartphones"}]},{"@type":"WebSite","@id":"https:\/\/eagleassociates.net\/news\/#website","url":"https:\/\/eagleassociates.net\/news\/","name":"Eagle Associates News","description":"News and More from Eagle Associates, Inc.","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/eagleassociates.net\/news\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/eagleassociates.net\/news\/#\/schema\/person\/6da6ff9a5209cf0349930d046406825d","name":"jennifer@eagleassociates.net","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/c6939a8aee6cb39ce286feabd945c1f791069839e62b53d9605db4cbb3cb7da1?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/c6939a8aee6cb39ce286feabd945c1f791069839e62b53d9605db4cbb3cb7da1?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c6939a8aee6cb39ce286feabd945c1f791069839e62b53d9605db4cbb3cb7da1?s=96&d=mm&r=g","caption":"jennifer@eagleassociates.net"}}]}},"_links":{"self":[{"href":"https:\/\/eagleassociates.net\/news\/wp-json\/wp\/v2\/posts\/589","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/eagleassociates.net\/news\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/eagleassociates.net\/news\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/eagleassociates.net\/news\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/eagleassociates.net\/news\/wp-json\/wp\/v2\/comments?post=589"}],"version-history":[{"count":1,"href":"https:\/\/eagleassociates.net\/news\/wp-json\/wp\/v2\/posts\/589\/revisions"}],"predecessor-version":[{"id":590,"href":"https:\/\/eagleassociates.net\/news\/wp-json\/wp\/v2\/posts\/589\/revisions\/590"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/eagleassociates.net\/news\/wp-json\/wp\/v2\/media\/591"}],"wp:attachment":[{"href":"https:\/\/eagleassociates.net\/news\/wp-json\/wp\/v2\/media?parent=589"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/eagleassociates.net\/news\/wp-json\/wp\/v2\/categories?post=589"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/eagleassociates.net\/news\/wp-json\/wp\/v2\/tags?post=589"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}