Skip to main content
Best Practices

Carefully Considering the Risks of a BYOD Policy in Healthcare

Seemingly everyone in their organization wants to adopt a bring your device (BYOD) mobile policy. However, the benefits of empowering employees with greater access to data typically drown out the lingering data control concerns.If you find yourself considering a BYOD policy, first think about your risks. As any OCR/HHS or hospital CIO, who has suffered through a data breach, will tell you, security risk assessments are vital to a HIPAA compliance plan. So what are the unique risks of adopting a BYOD policy in the healthcare world?

3 min read
decorative image - risks of a byod policy in healthcare

“My friend’s company lets her use her phone at work,” a resident tells you. “Find a way to make it work,” mutters your facility administrator while keeping his eyes glued to his iPhone. Whether they like it or not, healthcare compliance officers and CIOs are facing a growing dilemma. Seemingly everyone in their organization wants to adopt a bring your device (BYOD) mobile policy. However, the benefits of empowering employees with greater access to data typically drown out the lingering data control concerns.If you find yourself considering a BYOD policy, first think about your risks. As any OCR/HHS or hospital CIO, who has suffered through a data breach, will tell you, security risk assessments are vital to a HIPAA compliance plan. So what are the unique risks of adopting a BYOD policy in the healthcare world?

Primary Concern of HIPAA Security Rule

A primary concern a CIO or CCO should consider is the transmission of PHI between providers via text message. Even if the purpose behind the communication is treatment related, the HIPAA Security Rule prohibits sending PHI through an unsecured channel, which is almost always the case with texting. With intermingled work and personal contact lists, the inadvertent sending of PHI to an individual outside of the organization is ever present.

Storage Risks

Another risk to consider is the storage of PHI in a mobile device’s native texting application. Coordinating patient care across a team through a series of text messages can yield great benefits. The transcript each user creates via a text dialogue presents enormous risks if not locally encrypted. A workforce member who loses his or her phone with unsecured data saved locally just caused his HIPAA Privacy Officer to disclose a breach to OCR.

Third-Party Risks

A third important risk to consider when rolling out a BYOD policy is to assess the third parties. THis includes any vendor associated with the phone applications with access to PHI. As the recent HIPAA Omnibus regulations made clear, cloud-based vendors that store PHI are considered business associates under the law. If a facility neglects to enter into business associate agreements with these data-storing providers, they'll face sanctions when a reportable security incident or HIPAA audit.

Careful Risk Assessment in Crucial

CIOs and CCOs need to carefully consider their risks before rolling out a full BYOD policy. Practically speaking, mobile device communication is probably already going on at your facility – BYOD policy or not. Identifying and mitigating risks associated with smartphones will save hospital  administrators major headaches should OCR comes knocking on the door.

Frequently Asked Questions

Find answers to common questions about this topic.

The main violations include transmitting PHI through unsecured text messages, storing unencrypted PHI on mobile devices, and failing to establish business associate agreements with third-party app vendors. These violations can result in OCR sanctions and mandatory breach notifications.

Organizations should implement mobile device management (MDM) solutions with local encryption, use HIPAA-compliant messaging applications instead of native texting, and establish comprehensive business associate agreements with all third-party vendors. Regular security risk assessments are also essential.

Yes, under HIPAA Omnibus regulations, any cloud-based vendor or app that stores or processes PHI is considered a business associate. Healthcare facilities must establish BAAs with these providers or face sanctions during audits or security incidents.

If the device contains unencrypted PHI, the healthcare organization must treat it as a reportable breach and notify OCR. This is why local encryption and remote wipe capabilities are crucial components of any healthcare BYOD policy.

Healthcare workers can communicate about patients via text only if using HIPAA-compliant messaging platforms with proper encryption. Standard SMS texting is prohibited under the HIPAA Security Rule as it's considered an unsecured transmission channel.

Krishna Kurapati

Written by

Krishna Kurapati

Founder & CEO

Founder & CEO of QliqSOFT with 20+ years of healthcare technology experience.

View all posts

Related Articles

common questions on secure texting|most effective form of communication in healthcare
Best Practices

Everyone Needs a Better Healthcare Communication Tool

Communication in a medical practice is essential to the patient care, patient satisfaction and productivity of the healthcare personnel. Within all healthcare environments, there should be an active communication between all personnel, not just between physicians. Communication starts at the front desk. Throughout the course of an average workday, the front office staff must schedule a wide array of appointments and medical procedures.

Krishna KurapatiKrishna Kurapati
4 min read
3m left