Wednesday, November 28, 2012


As I travel the country, I find that CIOs everywhere are struggling with BYOD in particular but remote access more generally.   Who is responsible if

A personal unencrypted laptop with email containing personally identified/protected healthcare information is stolen?   The CIO of the institution providing email takes accountability and reports the theft to appropriate  government regulators.

An employee prints a web page on their home computer and patient data is discovered blowing around in a nearby dump?  The CIO of the institution hosting the patient data is responsible.

An employee with a malware infected but encrypted smartphone accesses a web application and a keystroke logger sends the username/password to hackers in Asia who use it to send spam.   The CIO is responsible for all the consequences.

Policy against using personal laptops, home desktops, and smartphones for processing of healthcare data is not sufficient.  CIOs must use technology controls to mitigate risk of data loss.

For example, BIDMC has already used AciveSync to enforce encryption of every smartphone accessing our network and to deny access to those smartphones that do not support encryption.

Personal laptops and home desktops are much harder to control.  Purchasing institutionally supported laptop/desktop devices for every user needing remote access would be cost prohibitive.  

Rather than try to manage the home clients that have multiple varieties of hardware, operating systems, and third party apps, it's more practical to impose restrictions on who can access resources remotely, where they can access resources from, and what they can do (block downloads and printing).   Solutions I've heard from industry experts include

1.  ActiveSync as the only means of smartphone email access with a configuration to require encryption of client devices.  Use Outlook Web Access as the only laptop email access method and close all other types of remote email access - WebDav, Web Exchange Services, and RPC over HTTPS, IMAP, POP
2.  SSLVPN for all remote access to all applications (including web portals) with configuration settings to prevent remote downloads and printing
3.  Citrix or Virtual Desktop Infrastructure, which typically does not persist data on local clients.

I've described security as a continuous improvement process - the journey is never done. I'm curious what you are doing to restrict remote access in a world of malware, BYOD, and enhanced regulatory enforcement.   Comments are welcome!

Related Posts:

  • Our Cancer Journey Week 29Kathy completes radiation therapy on July 31.   On that date she moves from cancer patient to cancer survivor.    I have only two more posts to write about this segment of our journey - Week 30 and Week 31.At t… Read More
  • The Return on Investment of Administrative SimplificationSince 1997, the New England Healthcare Exchange Network (NEHEN), a non-profit run by stakeholder board members, has provided community-wide collaborative payer-provider administrative transaction exchange for a fixed subscrip… Read More
  • Hospital Disaster PlanningIn my role as CIO and a Professor of Medicine, I'm asked many questions about the policies, processes, and procedures of healthcare.   Here's one I was recently asked about Hospital Disaster planning. Meg Femino, BIDMC D… Read More
  • Cool Technology of the WeekToday's post is not about current cool technologies, but those that were cool.   I feel nostalgic for my IBM XT with a 5 megabyte hard drive, my Motorola brick phone, my 5 1/4 floppy collection, my Atari console and my E… Read More
  • Creative Uses of Active RFIDBIDMC implemented enterprise-wide Active RFID asset tracking over 5 years ago. Initially this was done to reduce theft of wheelchairs, optimize the use of high inventory multi-departmental equipment such as ventilators/ekg ma… Read More

0 comments:

Post a Comment

Powered by Blogger.

Popular Posts

Blog Archive