SlideShare uma empresa Scribd logo
1 de 13
MOBILE DATA PRIVACY
KEY POINTS FROM
SHEREE MARTIN, J.D., LL.M., PH.D.
JANUARY 27, 2012

Cumberland School of Law, Data Privacy Day
My overview considers:
How Mobile Data Impacts PHI Privacy
Davanti Digital Media--




 YouTube: http://youtu.be/SmB_lzXcgVE
PHI Privacy Can Be Compromised By
How?
Kaiser Permanente Launches….
                    Mobile apps for
                     electronic medical
                     records
                    9 million patients in the
                     system
HIPAA & Data Breaches
   HHS database on security breaches involving EHR:
   “in the past two years, … 116 data breaches of
    500 records or more were the direct result of the
    loss or theft of a mobile device and led to the
    exposure of the personal health information of 1.9
    million patients.”
       Keep in mind that “mobile devices” included laptops, not just
        smartphones, tablets

Source: Article on govhealthit.com (July 20, 2011) interview with Health IT Security
   professionals.
HIPAA Applies To:
   Healthcare Providers
     Doctors,
             Hospitals & Similar Providers
     Pharmacies

   Medical Insurance Companies & Similar Third-Party
    Payors
   Ancillary Administrative Service Providers
     Outsourced   Coding, Transcription, Billing, Accounting, IT
      providers
HIPAA & Mobile Apps
   If user is healthcare provider or other covered
    party, then HIPPA will apply.
   If app is developed for consumer use, then HIPPA
    doesn’t apply.



See: http://mobihealthnews.com/11261/when-hipaa-applies-to-
  mobile-applications/
Consumers & Mobile Privacy
   Scenarios
     Consumer  downloads a mobile app that mines personal
      health data
     Smartphone stolen from consumer who has activated
      mobile access to PHI with healthcare or health
      insurance provider
         Remote wipe not enabled
     Data  mining by non-health apps of data logged when
      using health apps
Contact Me
   tmartin@samford.edu
   http://www.benfranklinfollies.com
   LinkedIn: http://www.linkedin.com/in/shereem

Mais conteúdo relacionado

Mais procurados

MBM Achieving HIPAA Compliance Whitepaper
MBM Achieving HIPAA Compliance WhitepaperMBM Achieving HIPAA Compliance Whitepaper
MBM Achieving HIPAA Compliance Whitepaper
MBMeHealthCareSolutions
 
Protecting Patient Information - Feds Find Security Lapses in State and Local...
Protecting Patient Information - Feds Find Security Lapses in State and Local...Protecting Patient Information - Feds Find Security Lapses in State and Local...
Protecting Patient Information - Feds Find Security Lapses in State and Local...
Patton Boggs LLP
 
Mha690 wk 1 fletcher
Mha690 wk 1   fletcherMha690 wk 1   fletcher
Mha690 wk 1 fletcher
Emed32
 
Hippa Powerpoint
Hippa PowerpointHippa Powerpoint
Hippa Powerpoint
kvanrandall
 
Patient confidentilty
Patient confidentiltyPatient confidentilty
Patient confidentilty
Sheena705
 
Hipaa and him security brunelle
Hipaa and him security brunelleHipaa and him security brunelle
Hipaa and him security brunelle
sjbusnpa
 
Group presentation hippa ppt
Group presentation hippa pptGroup presentation hippa ppt
Group presentation hippa ppt
Mari Mina
 
Hippa slide show
Hippa slide showHippa slide show
Hippa slide show
heathercool
 
eBusinessinHealthcare_Final
eBusinessinHealthcare_FinaleBusinessinHealthcare_Final
eBusinessinHealthcare_Final
Heather Tomlin
 

Mais procurados (20)

MBM Achieving HIPAA Compliance Whitepaper
MBM Achieving HIPAA Compliance WhitepaperMBM Achieving HIPAA Compliance Whitepaper
MBM Achieving HIPAA Compliance Whitepaper
 
ONR Blog 1
ONR Blog 1ONR Blog 1
ONR Blog 1
 
Protecting Patient Information - Feds Find Security Lapses in State and Local...
Protecting Patient Information - Feds Find Security Lapses in State and Local...Protecting Patient Information - Feds Find Security Lapses in State and Local...
Protecting Patient Information - Feds Find Security Lapses in State and Local...
 
Threatsploit Adversary Report January 2019
Threatsploit Adversary Report January  2019Threatsploit Adversary Report January  2019
Threatsploit Adversary Report January 2019
 
Mha690 wk 1 fletcher
Mha690 wk 1   fletcherMha690 wk 1   fletcher
Mha690 wk 1 fletcher
 
HIPAA and Privacy for Researchers
HIPAA and Privacy for ResearchersHIPAA and Privacy for Researchers
HIPAA and Privacy for Researchers
 
Hippa Powerpoint
Hippa PowerpointHippa Powerpoint
Hippa Powerpoint
 
Patient confidentilty
Patient confidentiltyPatient confidentilty
Patient confidentilty
 
Hipaa and him security brunelle
Hipaa and him security brunelleHipaa and him security brunelle
Hipaa and him security brunelle
 
Group presentation hippa ppt
Group presentation hippa pptGroup presentation hippa ppt
Group presentation hippa ppt
 
Hippa slide show
Hippa slide showHippa slide show
Hippa slide show
 
AI in the Singapore Health and Public Sector
AI in the Singapore Health and Public SectorAI in the Singapore Health and Public Sector
AI in the Singapore Health and Public Sector
 
Hipaa checklist for healthcare software
Hipaa checklist for healthcare softwareHipaa checklist for healthcare software
Hipaa checklist for healthcare software
 
Confidentiality and you
Confidentiality and youConfidentiality and you
Confidentiality and you
 
An Overview of the Major Compliance Requirements
An Overview of the Major Compliance RequirementsAn Overview of the Major Compliance Requirements
An Overview of the Major Compliance Requirements
 
Mha 690 presentation hippa
Mha 690 presentation hippaMha 690 presentation hippa
Mha 690 presentation hippa
 
eBusinessinHealthcare_Final
eBusinessinHealthcare_FinaleBusinessinHealthcare_Final
eBusinessinHealthcare_Final
 
HIPAA Email Compliance & Privacy
HIPAA Email Compliance & PrivacyHIPAA Email Compliance & Privacy
HIPAA Email Compliance & Privacy
 
Patient privacy
Patient privacyPatient privacy
Patient privacy
 
Understanding HIPAA
Understanding HIPAAUnderstanding HIPAA
Understanding HIPAA
 

Semelhante a Mobile Privacy & Personal Health Information

Sarah Kim HIPAA for Small Providers
Sarah Kim HIPAA for Small ProvidersSarah Kim HIPAA for Small Providers
Sarah Kim HIPAA for Small Providers
Sarah Kim
 
Running head Information security threats 1Information secur.docx
Running head Information security threats 1Information secur.docxRunning head Information security threats 1Information secur.docx
Running head Information security threats 1Information secur.docx
wlynn1
 
GIST 698 Research Paper
GIST 698 Research PaperGIST 698 Research Paper
GIST 698 Research Paper
Ryan Flanagan
 
1Anthem Inc. HIPAA ViolationJune 21, 2021
1Anthem Inc. HIPAA ViolationJune 21, 20211Anthem Inc. HIPAA ViolationJune 21, 2021
1Anthem Inc. HIPAA ViolationJune 21, 2021
EttaBenton28
 
Patient Privacy Patient Privacy Issu.docx
Patient Privacy         Patient Privacy Issu.docxPatient Privacy         Patient Privacy Issu.docx
Patient Privacy Patient Privacy Issu.docx
herbertwilson5999
 
Cost of Data Breah in Healthcare_Quinlan, Courtney
Cost of Data Breah in Healthcare_Quinlan, CourtneyCost of Data Breah in Healthcare_Quinlan, Courtney
Cost of Data Breah in Healthcare_Quinlan, Courtney
courtneyquinlan
 
Page 9 of 15Capstone ProjectYaima OrtizIDS-4934.docx
Page 9 of 15Capstone ProjectYaima OrtizIDS-4934.docxPage 9 of 15Capstone ProjectYaima OrtizIDS-4934.docx
Page 9 of 15Capstone ProjectYaima OrtizIDS-4934.docx
karlhennesey
 
Page 9 of 15Capstone ProjectYaima OrtizIDS-4934.docx
Page 9 of 15Capstone ProjectYaima OrtizIDS-4934.docxPage 9 of 15Capstone ProjectYaima OrtizIDS-4934.docx
Page 9 of 15Capstone ProjectYaima OrtizIDS-4934.docx
honey690131
 

Semelhante a Mobile Privacy & Personal Health Information (20)

Sarah Kim HIPAA for Small Providers
Sarah Kim HIPAA for Small ProvidersSarah Kim HIPAA for Small Providers
Sarah Kim HIPAA for Small Providers
 
Running head Information security threats 1Information secur.docx
Running head Information security threats 1Information secur.docxRunning head Information security threats 1Information secur.docx
Running head Information security threats 1Information secur.docx
 
Saúde 2.0
Saúde 2.0Saúde 2.0
Saúde 2.0
 
Protecting Patient Health Information in the HITECH Era
Protecting Patient Health Information in the HITECH EraProtecting Patient Health Information in the HITECH Era
Protecting Patient Health Information in the HITECH Era
 
Protecting Privacy, Security and Patient Safety in mHealth
Protecting Privacy, Security and Patient Safety in mHealthProtecting Privacy, Security and Patient Safety in mHealth
Protecting Privacy, Security and Patient Safety in mHealth
 
Safety of protected health information (phi)
Safety of protected health information (phi)Safety of protected health information (phi)
Safety of protected health information (phi)
 
Digital Health Data
Digital Health DataDigital Health Data
Digital Health Data
 
Meeting the Challenges of HIPAA Compliance, Phishing Attacks, and Mobile Secu...
Meeting the Challenges of HIPAA Compliance, Phishing Attacks, and Mobile Secu...Meeting the Challenges of HIPAA Compliance, Phishing Attacks, and Mobile Secu...
Meeting the Challenges of HIPAA Compliance, Phishing Attacks, and Mobile Secu...
 
How to Build a HIPAA-Compliant Software Application
How to Build a HIPAA-Compliant Software ApplicationHow to Build a HIPAA-Compliant Software Application
How to Build a HIPAA-Compliant Software Application
 
HIPAA
HIPAAHIPAA
HIPAA
 
GIST 698 Research Paper
GIST 698 Research PaperGIST 698 Research Paper
GIST 698 Research Paper
 
1Anthem Inc. HIPAA ViolationJune 21, 2021
1Anthem Inc. HIPAA ViolationJune 21, 20211Anthem Inc. HIPAA ViolationJune 21, 2021
1Anthem Inc. HIPAA ViolationJune 21, 2021
 
HIPAA-Compliant Healthcare App.pdf
HIPAA-Compliant Healthcare App.pdfHIPAA-Compliant Healthcare App.pdf
HIPAA-Compliant Healthcare App.pdf
 
Patient Privacy Patient Privacy Issu.docx
Patient Privacy         Patient Privacy Issu.docxPatient Privacy         Patient Privacy Issu.docx
Patient Privacy Patient Privacy Issu.docx
 
Hippa breaches
Hippa breachesHippa breaches
Hippa breaches
 
Cost of Data Breah in Healthcare_Quinlan, Courtney
Cost of Data Breah in Healthcare_Quinlan, CourtneyCost of Data Breah in Healthcare_Quinlan, Courtney
Cost of Data Breah in Healthcare_Quinlan, Courtney
 
Page 9 of 15Capstone ProjectYaima OrtizIDS-4934.docx
Page 9 of 15Capstone ProjectYaima OrtizIDS-4934.docxPage 9 of 15Capstone ProjectYaima OrtizIDS-4934.docx
Page 9 of 15Capstone ProjectYaima OrtizIDS-4934.docx
 
Page 9 of 15Capstone ProjectYaima OrtizIDS-4934.docx
Page 9 of 15Capstone ProjectYaima OrtizIDS-4934.docxPage 9 of 15Capstone ProjectYaima OrtizIDS-4934.docx
Page 9 of 15Capstone ProjectYaima OrtizIDS-4934.docx
 
Presentation hippa
Presentation hippaPresentation hippa
Presentation hippa
 
Protecting Data in the Healthcare Industry - Storage Made Easy - Osterman Res...
Protecting Data in the Healthcare Industry - Storage Made Easy - Osterman Res...Protecting Data in the Healthcare Industry - Storage Made Easy - Osterman Res...
Protecting Data in the Healthcare Industry - Storage Made Easy - Osterman Res...
 

Mais de Sheree Martin

2000-December-MEN-Coopetition-ASolutionToSkilledLaborShortage?-BW
2000-December-MEN-Coopetition-ASolutionToSkilledLaborShortage?-BW2000-December-MEN-Coopetition-ASolutionToSkilledLaborShortage?-BW
2000-December-MEN-Coopetition-ASolutionToSkilledLaborShortage?-BW
Sheree Martin
 
FreelanceWriting-Sept2015-List
FreelanceWriting-Sept2015-ListFreelanceWriting-Sept2015-List
FreelanceWriting-Sept2015-List
Sheree Martin
 
The Megachurch Tweets: AEJMC
The Megachurch Tweets: AEJMC The Megachurch Tweets: AEJMC
The Megachurch Tweets: AEJMC
Sheree Martin
 

Mais de Sheree Martin (15)

Your On-Demand Audio Strategist for Inbound Marketing - Sheree Martin
Your On-Demand Audio Strategist for Inbound Marketing - Sheree MartinYour On-Demand Audio Strategist for Inbound Marketing - Sheree Martin
Your On-Demand Audio Strategist for Inbound Marketing - Sheree Martin
 
Sheree-Martin-Traditional-CV-December-2015
Sheree-Martin-Traditional-CV-December-2015Sheree-Martin-Traditional-CV-December-2015
Sheree-Martin-Traditional-CV-December-2015
 
2000-December-MEN-Coopetition-ASolutionToSkilledLaborShortage?-BW
2000-December-MEN-Coopetition-ASolutionToSkilledLaborShortage?-BW2000-December-MEN-Coopetition-ASolutionToSkilledLaborShortage?-BW
2000-December-MEN-Coopetition-ASolutionToSkilledLaborShortage?-BW
 
FreelanceWriting-Sept2015-List
FreelanceWriting-Sept2015-ListFreelanceWriting-Sept2015-List
FreelanceWriting-Sept2015-List
 
Syllabus for Social Media Practices
Syllabus for Social Media PracticesSyllabus for Social Media Practices
Syllabus for Social Media Practices
 
Teaching Social Media
Teaching Social Media Teaching Social Media
Teaching Social Media
 
Twitter for Business
Twitter for BusinessTwitter for Business
Twitter for Business
 
Teaching Social Business: My Faculty Shoptalk
Teaching Social Business: My Faculty ShoptalkTeaching Social Business: My Faculty Shoptalk
Teaching Social Business: My Faculty Shoptalk
 
Teaching Social Media: A Case Study
Teaching Social Media: A Case StudyTeaching Social Media: A Case Study
Teaching Social Media: A Case Study
 
Messaging in Today's Media (for small nonprofits): Alabama Water Rally
Messaging in Today's Media (for small nonprofits): Alabama Water Rally Messaging in Today's Media (for small nonprofits): Alabama Water Rally
Messaging in Today's Media (for small nonprofits): Alabama Water Rally
 
Marketing Your Farm Through Social Media: Build A Strong Network
Marketing Your Farm Through Social Media: Build A Strong NetworkMarketing Your Farm Through Social Media: Build A Strong Network
Marketing Your Farm Through Social Media: Build A Strong Network
 
Teaching through food
Teaching through foodTeaching through food
Teaching through food
 
The Megachurch Tweets: AEJMC
The Megachurch Tweets: AEJMC The Megachurch Tweets: AEJMC
The Megachurch Tweets: AEJMC
 
The Writer & the Law: Talking Points
The Writer & the Law: Talking PointsThe Writer & the Law: Talking Points
The Writer & the Law: Talking Points
 
Social Media Basics for Nonprofits
Social Media Basics for NonprofitsSocial Media Basics for Nonprofits
Social Media Basics for Nonprofits
 

Último

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Último (20)

Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdf
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 

Mobile Privacy & Personal Health Information

  • 1. MOBILE DATA PRIVACY KEY POINTS FROM SHEREE MARTIN, J.D., LL.M., PH.D. JANUARY 27, 2012 Cumberland School of Law, Data Privacy Day
  • 3. How Mobile Data Impacts PHI Privacy
  • 4. Davanti Digital Media-- YouTube: http://youtu.be/SmB_lzXcgVE
  • 5.
  • 6. PHI Privacy Can Be Compromised By
  • 8. Kaiser Permanente Launches….  Mobile apps for electronic medical records  9 million patients in the system
  • 9. HIPAA & Data Breaches  HHS database on security breaches involving EHR:  “in the past two years, … 116 data breaches of 500 records or more were the direct result of the loss or theft of a mobile device and led to the exposure of the personal health information of 1.9 million patients.”  Keep in mind that “mobile devices” included laptops, not just smartphones, tablets Source: Article on govhealthit.com (July 20, 2011) interview with Health IT Security professionals.
  • 10. HIPAA Applies To:  Healthcare Providers  Doctors, Hospitals & Similar Providers  Pharmacies  Medical Insurance Companies & Similar Third-Party Payors  Ancillary Administrative Service Providers  Outsourced Coding, Transcription, Billing, Accounting, IT providers
  • 11. HIPAA & Mobile Apps  If user is healthcare provider or other covered party, then HIPPA will apply.  If app is developed for consumer use, then HIPPA doesn’t apply. See: http://mobihealthnews.com/11261/when-hipaa-applies-to- mobile-applications/
  • 12. Consumers & Mobile Privacy  Scenarios  Consumer downloads a mobile app that mines personal health data  Smartphone stolen from consumer who has activated mobile access to PHI with healthcare or health insurance provider  Remote wipe not enabled  Data mining by non-health apps of data logged when using health apps
  • 13. Contact Me  tmartin@samford.edu  http://www.benfranklinfollies.com  LinkedIn: http://www.linkedin.com/in/shereem