SlideShare una empresa de Scribd logo
1 de 13
MOBILE DATA PRIVACY
KEY POINTS FROM
SHEREE MARTIN, J.D., LL.M., PH.D.
JANUARY 27, 2012

Cumberland School of Law, Data Privacy Day
My overview considers:
How Mobile Data Impacts PHI Privacy
Davanti Digital Media--




 YouTube: http://youtu.be/SmB_lzXcgVE
PHI Privacy Can Be Compromised By
How?
Kaiser Permanente Launches….
                    Mobile apps for
                     electronic medical
                     records
                    9 million patients in the
                     system
HIPAA & Data Breaches
   HHS database on security breaches involving EHR:
   “in the past two years, … 116 data breaches of
    500 records or more were the direct result of the
    loss or theft of a mobile device and led to the
    exposure of the personal health information of 1.9
    million patients.”
       Keep in mind that “mobile devices” included laptops, not just
        smartphones, tablets

Source: Article on govhealthit.com (July 20, 2011) interview with Health IT Security
   professionals.
HIPAA Applies To:
   Healthcare Providers
     Doctors,
             Hospitals & Similar Providers
     Pharmacies

   Medical Insurance Companies & Similar Third-Party
    Payors
   Ancillary Administrative Service Providers
     Outsourced   Coding, Transcription, Billing, Accounting, IT
      providers
HIPAA & Mobile Apps
   If user is healthcare provider or other covered
    party, then HIPPA will apply.
   If app is developed for consumer use, then HIPPA
    doesn’t apply.



See: http://mobihealthnews.com/11261/when-hipaa-applies-to-
  mobile-applications/
Consumers & Mobile Privacy
   Scenarios
     Consumer  downloads a mobile app that mines personal
      health data
     Smartphone stolen from consumer who has activated
      mobile access to PHI with healthcare or health
      insurance provider
         Remote wipe not enabled
     Data  mining by non-health apps of data logged when
      using health apps
Contact Me
   tmartin@samford.edu
   http://www.benfranklinfollies.com
   LinkedIn: http://www.linkedin.com/in/shereem

Más contenido relacionado

La actualidad más candente

MBM Achieving HIPAA Compliance Whitepaper
MBM Achieving HIPAA Compliance WhitepaperMBM Achieving HIPAA Compliance Whitepaper
MBM Achieving HIPAA Compliance WhitepaperMBMeHealthCareSolutions
 
Protecting Patient Information - Feds Find Security Lapses in State and Local...
Protecting Patient Information - Feds Find Security Lapses in State and Local...Protecting Patient Information - Feds Find Security Lapses in State and Local...
Protecting Patient Information - Feds Find Security Lapses in State and Local...Patton Boggs LLP
 
Mha690 wk 1 fletcher
Mha690 wk 1   fletcherMha690 wk 1   fletcher
Mha690 wk 1 fletcherEmed32
 
HIPAA and Privacy for Researchers
HIPAA and Privacy for ResearchersHIPAA and Privacy for Researchers
HIPAA and Privacy for ResearchersJason Karn
 
Hippa Powerpoint
Hippa PowerpointHippa Powerpoint
Hippa Powerpointkvanrandall
 
Patient confidentilty
Patient confidentiltyPatient confidentilty
Patient confidentiltySheena705
 
Hipaa and him security brunelle
Hipaa and him security brunelleHipaa and him security brunelle
Hipaa and him security brunellesjbusnpa
 
Group presentation hippa ppt
Group presentation hippa pptGroup presentation hippa ppt
Group presentation hippa pptMari Mina
 
Hippa slide show
Hippa slide showHippa slide show
Hippa slide showheathercool
 
AI in the Singapore Health and Public Sector
AI in the Singapore Health and Public SectorAI in the Singapore Health and Public Sector
AI in the Singapore Health and Public SectorAshley Khor
 
Hipaa checklist for healthcare software
Hipaa checklist for healthcare softwareHipaa checklist for healthcare software
Hipaa checklist for healthcare softwareConcetto Labs
 
Confidentiality and you
Confidentiality and youConfidentiality and you
Confidentiality and youyola121
 
An Overview of the Major Compliance Requirements
An Overview of the Major Compliance RequirementsAn Overview of the Major Compliance Requirements
An Overview of the Major Compliance RequirementsDoubleHorn
 
Mha 690 presentation hippa
Mha 690 presentation hippaMha 690 presentation hippa
Mha 690 presentation hippabelle0508
 
eBusinessinHealthcare_Final
eBusinessinHealthcare_FinaleBusinessinHealthcare_Final
eBusinessinHealthcare_FinalHeather Tomlin
 
HIPAA Email Compliance & Privacy
HIPAA Email Compliance & PrivacyHIPAA Email Compliance & Privacy
HIPAA Email Compliance & Privacyappriver
 
Understanding HIPAA
Understanding HIPAAUnderstanding HIPAA
Understanding HIPAAManas Deep
 

La actualidad más candente (20)

MBM Achieving HIPAA Compliance Whitepaper
MBM Achieving HIPAA Compliance WhitepaperMBM Achieving HIPAA Compliance Whitepaper
MBM Achieving HIPAA Compliance Whitepaper
 
ONR Blog 1
ONR Blog 1ONR Blog 1
ONR Blog 1
 
Protecting Patient Information - Feds Find Security Lapses in State and Local...
Protecting Patient Information - Feds Find Security Lapses in State and Local...Protecting Patient Information - Feds Find Security Lapses in State and Local...
Protecting Patient Information - Feds Find Security Lapses in State and Local...
 
Threatsploit Adversary Report January 2019
Threatsploit Adversary Report January  2019Threatsploit Adversary Report January  2019
Threatsploit Adversary Report January 2019
 
Mha690 wk 1 fletcher
Mha690 wk 1   fletcherMha690 wk 1   fletcher
Mha690 wk 1 fletcher
 
HIPAA and Privacy for Researchers
HIPAA and Privacy for ResearchersHIPAA and Privacy for Researchers
HIPAA and Privacy for Researchers
 
Hippa Powerpoint
Hippa PowerpointHippa Powerpoint
Hippa Powerpoint
 
Patient confidentilty
Patient confidentiltyPatient confidentilty
Patient confidentilty
 
Hipaa and him security brunelle
Hipaa and him security brunelleHipaa and him security brunelle
Hipaa and him security brunelle
 
Group presentation hippa ppt
Group presentation hippa pptGroup presentation hippa ppt
Group presentation hippa ppt
 
Hippa slide show
Hippa slide showHippa slide show
Hippa slide show
 
AI in the Singapore Health and Public Sector
AI in the Singapore Health and Public SectorAI in the Singapore Health and Public Sector
AI in the Singapore Health and Public Sector
 
Hipaa checklist for healthcare software
Hipaa checklist for healthcare softwareHipaa checklist for healthcare software
Hipaa checklist for healthcare software
 
Confidentiality and you
Confidentiality and youConfidentiality and you
Confidentiality and you
 
An Overview of the Major Compliance Requirements
An Overview of the Major Compliance RequirementsAn Overview of the Major Compliance Requirements
An Overview of the Major Compliance Requirements
 
Mha 690 presentation hippa
Mha 690 presentation hippaMha 690 presentation hippa
Mha 690 presentation hippa
 
eBusinessinHealthcare_Final
eBusinessinHealthcare_FinaleBusinessinHealthcare_Final
eBusinessinHealthcare_Final
 
HIPAA Email Compliance & Privacy
HIPAA Email Compliance & PrivacyHIPAA Email Compliance & Privacy
HIPAA Email Compliance & Privacy
 
Patient privacy
Patient privacyPatient privacy
Patient privacy
 
Understanding HIPAA
Understanding HIPAAUnderstanding HIPAA
Understanding HIPAA
 

Similar a Mobile Privacy & Personal Health Information

Sarah Kim HIPAA for Small Providers
Sarah Kim HIPAA for Small ProvidersSarah Kim HIPAA for Small Providers
Sarah Kim HIPAA for Small ProvidersSarah Kim
 
Running head Information security threats 1Information secur.docx
Running head Information security threats 1Information secur.docxRunning head Information security threats 1Information secur.docx
Running head Information security threats 1Information secur.docxwlynn1
 
Protecting Patient Health Information in the HITECH Era
Protecting Patient Health Information in the HITECH EraProtecting Patient Health Information in the HITECH Era
Protecting Patient Health Information in the HITECH EraRapid7
 
Protecting Privacy, Security and Patient Safety in mHealth
Protecting Privacy, Security and Patient Safety in mHealthProtecting Privacy, Security and Patient Safety in mHealth
Protecting Privacy, Security and Patient Safety in mHealthTAOklahoma
 
Safety of protected health information (phi)
Safety of protected health information (phi)Safety of protected health information (phi)
Safety of protected health information (phi)Josette Pribilla
 
Meeting the Challenges of HIPAA Compliance, Phishing Attacks, and Mobile Secu...
Meeting the Challenges of HIPAA Compliance, Phishing Attacks, and Mobile Secu...Meeting the Challenges of HIPAA Compliance, Phishing Attacks, and Mobile Secu...
Meeting the Challenges of HIPAA Compliance, Phishing Attacks, and Mobile Secu...Envision Technology Advisors
 
How to Build a HIPAA-Compliant Software Application
How to Build a HIPAA-Compliant Software ApplicationHow to Build a HIPAA-Compliant Software Application
How to Build a HIPAA-Compliant Software ApplicationXDuce Corporation
 
GIST 698 Research Paper
GIST 698 Research PaperGIST 698 Research Paper
GIST 698 Research PaperRyan Flanagan
 
1Anthem Inc. HIPAA ViolationJune 21, 2021
1Anthem Inc. HIPAA ViolationJune 21, 20211Anthem Inc. HIPAA ViolationJune 21, 2021
1Anthem Inc. HIPAA ViolationJune 21, 2021EttaBenton28
 
HIPAA-Compliant Healthcare App.pdf
HIPAA-Compliant Healthcare App.pdfHIPAA-Compliant Healthcare App.pdf
HIPAA-Compliant Healthcare App.pdfphilipthomas428223
 
Patient Privacy Patient Privacy Issu.docx
Patient Privacy         Patient Privacy Issu.docxPatient Privacy         Patient Privacy Issu.docx
Patient Privacy Patient Privacy Issu.docxherbertwilson5999
 
Cost of Data Breah in Healthcare_Quinlan, Courtney
Cost of Data Breah in Healthcare_Quinlan, CourtneyCost of Data Breah in Healthcare_Quinlan, Courtney
Cost of Data Breah in Healthcare_Quinlan, Courtneycourtneyquinlan
 
Page 9 of 15Capstone ProjectYaima OrtizIDS-4934.docx
Page 9 of 15Capstone ProjectYaima OrtizIDS-4934.docxPage 9 of 15Capstone ProjectYaima OrtizIDS-4934.docx
Page 9 of 15Capstone ProjectYaima OrtizIDS-4934.docxkarlhennesey
 
Page 9 of 15Capstone ProjectYaima OrtizIDS-4934.docx
Page 9 of 15Capstone ProjectYaima OrtizIDS-4934.docxPage 9 of 15Capstone ProjectYaima OrtizIDS-4934.docx
Page 9 of 15Capstone ProjectYaima OrtizIDS-4934.docxhoney690131
 
Presentation hippa
Presentation hippaPresentation hippa
Presentation hippamaggie_Platt
 
Protecting Data in the Healthcare Industry - Storage Made Easy - Osterman Res...
Protecting Data in the Healthcare Industry - Storage Made Easy - Osterman Res...Protecting Data in the Healthcare Industry - Storage Made Easy - Osterman Res...
Protecting Data in the Healthcare Industry - Storage Made Easy - Osterman Res...Hybrid Cloud
 

Similar a Mobile Privacy & Personal Health Information (20)

Sarah Kim HIPAA for Small Providers
Sarah Kim HIPAA for Small ProvidersSarah Kim HIPAA for Small Providers
Sarah Kim HIPAA for Small Providers
 
Running head Information security threats 1Information secur.docx
Running head Information security threats 1Information secur.docxRunning head Information security threats 1Information secur.docx
Running head Information security threats 1Information secur.docx
 
Saúde 2.0
Saúde 2.0Saúde 2.0
Saúde 2.0
 
Protecting Patient Health Information in the HITECH Era
Protecting Patient Health Information in the HITECH EraProtecting Patient Health Information in the HITECH Era
Protecting Patient Health Information in the HITECH Era
 
Protecting Privacy, Security and Patient Safety in mHealth
Protecting Privacy, Security and Patient Safety in mHealthProtecting Privacy, Security and Patient Safety in mHealth
Protecting Privacy, Security and Patient Safety in mHealth
 
Safety of protected health information (phi)
Safety of protected health information (phi)Safety of protected health information (phi)
Safety of protected health information (phi)
 
Digital Health Data
Digital Health DataDigital Health Data
Digital Health Data
 
Meeting the Challenges of HIPAA Compliance, Phishing Attacks, and Mobile Secu...
Meeting the Challenges of HIPAA Compliance, Phishing Attacks, and Mobile Secu...Meeting the Challenges of HIPAA Compliance, Phishing Attacks, and Mobile Secu...
Meeting the Challenges of HIPAA Compliance, Phishing Attacks, and Mobile Secu...
 
How to Build a HIPAA-Compliant Software Application
How to Build a HIPAA-Compliant Software ApplicationHow to Build a HIPAA-Compliant Software Application
How to Build a HIPAA-Compliant Software Application
 
HIPAA
HIPAAHIPAA
HIPAA
 
GIST 698 Research Paper
GIST 698 Research PaperGIST 698 Research Paper
GIST 698 Research Paper
 
1Anthem Inc. HIPAA ViolationJune 21, 2021
1Anthem Inc. HIPAA ViolationJune 21, 20211Anthem Inc. HIPAA ViolationJune 21, 2021
1Anthem Inc. HIPAA ViolationJune 21, 2021
 
HIPAA-Compliant Healthcare App.pdf
HIPAA-Compliant Healthcare App.pdfHIPAA-Compliant Healthcare App.pdf
HIPAA-Compliant Healthcare App.pdf
 
Patient Privacy Patient Privacy Issu.docx
Patient Privacy         Patient Privacy Issu.docxPatient Privacy         Patient Privacy Issu.docx
Patient Privacy Patient Privacy Issu.docx
 
Hippa breaches
Hippa breachesHippa breaches
Hippa breaches
 
Cost of Data Breah in Healthcare_Quinlan, Courtney
Cost of Data Breah in Healthcare_Quinlan, CourtneyCost of Data Breah in Healthcare_Quinlan, Courtney
Cost of Data Breah in Healthcare_Quinlan, Courtney
 
Page 9 of 15Capstone ProjectYaima OrtizIDS-4934.docx
Page 9 of 15Capstone ProjectYaima OrtizIDS-4934.docxPage 9 of 15Capstone ProjectYaima OrtizIDS-4934.docx
Page 9 of 15Capstone ProjectYaima OrtizIDS-4934.docx
 
Page 9 of 15Capstone ProjectYaima OrtizIDS-4934.docx
Page 9 of 15Capstone ProjectYaima OrtizIDS-4934.docxPage 9 of 15Capstone ProjectYaima OrtizIDS-4934.docx
Page 9 of 15Capstone ProjectYaima OrtizIDS-4934.docx
 
Presentation hippa
Presentation hippaPresentation hippa
Presentation hippa
 
Protecting Data in the Healthcare Industry - Storage Made Easy - Osterman Res...
Protecting Data in the Healthcare Industry - Storage Made Easy - Osterman Res...Protecting Data in the Healthcare Industry - Storage Made Easy - Osterman Res...
Protecting Data in the Healthcare Industry - Storage Made Easy - Osterman Res...
 

Más de Sheree Martin

Your On-Demand Audio Strategist for Inbound Marketing - Sheree Martin
Your On-Demand Audio Strategist for Inbound Marketing - Sheree MartinYour On-Demand Audio Strategist for Inbound Marketing - Sheree Martin
Your On-Demand Audio Strategist for Inbound Marketing - Sheree MartinSheree Martin
 
Sheree-Martin-Traditional-CV-December-2015
Sheree-Martin-Traditional-CV-December-2015Sheree-Martin-Traditional-CV-December-2015
Sheree-Martin-Traditional-CV-December-2015Sheree Martin
 
2000-December-MEN-Coopetition-ASolutionToSkilledLaborShortage?-BW
2000-December-MEN-Coopetition-ASolutionToSkilledLaborShortage?-BW2000-December-MEN-Coopetition-ASolutionToSkilledLaborShortage?-BW
2000-December-MEN-Coopetition-ASolutionToSkilledLaborShortage?-BWSheree Martin
 
FreelanceWriting-Sept2015-List
FreelanceWriting-Sept2015-ListFreelanceWriting-Sept2015-List
FreelanceWriting-Sept2015-ListSheree Martin
 
Syllabus for Social Media Practices
Syllabus for Social Media PracticesSyllabus for Social Media Practices
Syllabus for Social Media PracticesSheree Martin
 
Teaching Social Media
Teaching Social Media Teaching Social Media
Teaching Social Media Sheree Martin
 
Twitter for Business
Twitter for BusinessTwitter for Business
Twitter for BusinessSheree Martin
 
Teaching Social Business: My Faculty Shoptalk
Teaching Social Business: My Faculty ShoptalkTeaching Social Business: My Faculty Shoptalk
Teaching Social Business: My Faculty ShoptalkSheree Martin
 
Teaching Social Media: A Case Study
Teaching Social Media: A Case StudyTeaching Social Media: A Case Study
Teaching Social Media: A Case StudySheree Martin
 
Messaging in Today's Media (for small nonprofits): Alabama Water Rally
Messaging in Today's Media (for small nonprofits): Alabama Water Rally Messaging in Today's Media (for small nonprofits): Alabama Water Rally
Messaging in Today's Media (for small nonprofits): Alabama Water Rally Sheree Martin
 
Marketing Your Farm Through Social Media: Build A Strong Network
Marketing Your Farm Through Social Media: Build A Strong NetworkMarketing Your Farm Through Social Media: Build A Strong Network
Marketing Your Farm Through Social Media: Build A Strong NetworkSheree Martin
 
Teaching through food
Teaching through foodTeaching through food
Teaching through foodSheree Martin
 
The Megachurch Tweets: AEJMC
The Megachurch Tweets: AEJMC The Megachurch Tweets: AEJMC
The Megachurch Tweets: AEJMC Sheree Martin
 
The Writer & the Law: Talking Points
The Writer & the Law: Talking PointsThe Writer & the Law: Talking Points
The Writer & the Law: Talking PointsSheree Martin
 
Social Media Basics for Nonprofits
Social Media Basics for NonprofitsSocial Media Basics for Nonprofits
Social Media Basics for NonprofitsSheree Martin
 

Más de Sheree Martin (15)

Your On-Demand Audio Strategist for Inbound Marketing - Sheree Martin
Your On-Demand Audio Strategist for Inbound Marketing - Sheree MartinYour On-Demand Audio Strategist for Inbound Marketing - Sheree Martin
Your On-Demand Audio Strategist for Inbound Marketing - Sheree Martin
 
Sheree-Martin-Traditional-CV-December-2015
Sheree-Martin-Traditional-CV-December-2015Sheree-Martin-Traditional-CV-December-2015
Sheree-Martin-Traditional-CV-December-2015
 
2000-December-MEN-Coopetition-ASolutionToSkilledLaborShortage?-BW
2000-December-MEN-Coopetition-ASolutionToSkilledLaborShortage?-BW2000-December-MEN-Coopetition-ASolutionToSkilledLaborShortage?-BW
2000-December-MEN-Coopetition-ASolutionToSkilledLaborShortage?-BW
 
FreelanceWriting-Sept2015-List
FreelanceWriting-Sept2015-ListFreelanceWriting-Sept2015-List
FreelanceWriting-Sept2015-List
 
Syllabus for Social Media Practices
Syllabus for Social Media PracticesSyllabus for Social Media Practices
Syllabus for Social Media Practices
 
Teaching Social Media
Teaching Social Media Teaching Social Media
Teaching Social Media
 
Twitter for Business
Twitter for BusinessTwitter for Business
Twitter for Business
 
Teaching Social Business: My Faculty Shoptalk
Teaching Social Business: My Faculty ShoptalkTeaching Social Business: My Faculty Shoptalk
Teaching Social Business: My Faculty Shoptalk
 
Teaching Social Media: A Case Study
Teaching Social Media: A Case StudyTeaching Social Media: A Case Study
Teaching Social Media: A Case Study
 
Messaging in Today's Media (for small nonprofits): Alabama Water Rally
Messaging in Today's Media (for small nonprofits): Alabama Water Rally Messaging in Today's Media (for small nonprofits): Alabama Water Rally
Messaging in Today's Media (for small nonprofits): Alabama Water Rally
 
Marketing Your Farm Through Social Media: Build A Strong Network
Marketing Your Farm Through Social Media: Build A Strong NetworkMarketing Your Farm Through Social Media: Build A Strong Network
Marketing Your Farm Through Social Media: Build A Strong Network
 
Teaching through food
Teaching through foodTeaching through food
Teaching through food
 
The Megachurch Tweets: AEJMC
The Megachurch Tweets: AEJMC The Megachurch Tweets: AEJMC
The Megachurch Tweets: AEJMC
 
The Writer & the Law: Talking Points
The Writer & the Law: Talking PointsThe Writer & the Law: Talking Points
The Writer & the Law: Talking Points
 
Social Media Basics for Nonprofits
Social Media Basics for NonprofitsSocial Media Basics for Nonprofits
Social Media Basics for Nonprofits
 

Último

Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 

Último (20)

Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 

Mobile Privacy & Personal Health Information

  • 1. MOBILE DATA PRIVACY KEY POINTS FROM SHEREE MARTIN, J.D., LL.M., PH.D. JANUARY 27, 2012 Cumberland School of Law, Data Privacy Day
  • 3. How Mobile Data Impacts PHI Privacy
  • 4. Davanti Digital Media-- YouTube: http://youtu.be/SmB_lzXcgVE
  • 5.
  • 6. PHI Privacy Can Be Compromised By
  • 8. Kaiser Permanente Launches….  Mobile apps for electronic medical records  9 million patients in the system
  • 9. HIPAA & Data Breaches  HHS database on security breaches involving EHR:  “in the past two years, … 116 data breaches of 500 records or more were the direct result of the loss or theft of a mobile device and led to the exposure of the personal health information of 1.9 million patients.”  Keep in mind that “mobile devices” included laptops, not just smartphones, tablets Source: Article on govhealthit.com (July 20, 2011) interview with Health IT Security professionals.
  • 10. HIPAA Applies To:  Healthcare Providers  Doctors, Hospitals & Similar Providers  Pharmacies  Medical Insurance Companies & Similar Third-Party Payors  Ancillary Administrative Service Providers  Outsourced Coding, Transcription, Billing, Accounting, IT providers
  • 11. HIPAA & Mobile Apps  If user is healthcare provider or other covered party, then HIPPA will apply.  If app is developed for consumer use, then HIPPA doesn’t apply. See: http://mobihealthnews.com/11261/when-hipaa-applies-to- mobile-applications/
  • 12. Consumers & Mobile Privacy  Scenarios  Consumer downloads a mobile app that mines personal health data  Smartphone stolen from consumer who has activated mobile access to PHI with healthcare or health insurance provider  Remote wipe not enabled  Data mining by non-health apps of data logged when using health apps
  • 13. Contact Me  tmartin@samford.edu  http://www.benfranklinfollies.com  LinkedIn: http://www.linkedin.com/in/shereem