Skip to main content
Best Practices

Remote Data Wiping and Lock Software: Critical to Compliance

Whether at home, at the office, or in the back seat of a taxi cab, we have all misplaced our phone at one point or another. Luckily, most of these types of incidents are harmless. But what happens in those circumstances when a phone goes missing for more than just a few hours or days? Fortunately, remote data wipe and mobile lock features built into secure mobile apps can protect the sensitive information on our phones from landing in the wrong hands.

2 min read
remote data wiping and mobile locking|byod security incidents risks and policy

It has happened to all of us. Whether at home, at the office, or in the back seat of a taxi cab, we have all misplaced our phone at one point or another. Luckily, most of these types of incidents are harmless. But what happens in those circumstances when a phone goes missing for more than just a few hours or days? Fortunately, remote data wipe and mobile lock features built into secure mobile apps can protect the sensitive information on our phones from landing in the wrong hands.

Benefits of Remote Data Wiping and Mobile Locking

Remote data wiping and mobile locking features allow a provider or healthcare administrator to protect locally stored data on a mobile device with a matter of a few keystrokes. In fact, it wasn’t until the iPhone and Android devices started building these features into the products that information security professionals began to take a serious look at bringing your own device policies. Of course, this makes perfect sense: the threat to an organization’s sensitive information by having it stored on personal user devices is lessened if an information security administrator still has the ability to protect said data remotely.

byod security incidents risks and policy

A New Type of Security Incident

Nonetheless, here’s the sobering news: under the new HIPAA Omnibus regulations, if you are a healthcare provider that stores patient PHI on your mobile phone, misplacing your phone for even a brief period qualifies as a “security incident” under the law and requires a documented breach analysis to show that a data breach did not occur. This is where remote data wipe and mobile lock features show their value. Once notified of the missing device, a compliance officer who quickly authorizes “bricking” the device provides the first piece of documentable evidence that the data on the phone was not breached. Going a step further, having a secure mobile app dedicated to transmitting sensitive PHI will also be able to notify the administrator if a third party accessed the app and its contents through the app’s access logs.

BYOD Healthcare Policy

Adopting a BYOD policy and complying with the more rigorous Omnibus regulations does not have to be a daunting task. Using the right combination of mobile policies and remote wipe and lock technologies will allow administrators to adequately prepare their facilities in a rapidly changing health IT world.

Frequently Asked Questions

Find answers to common questions about this topic.

Under HIPAA Omnibus regulations, misplacing a mobile phone that stores patient PHI for even a brief period qualifies as a security incident. This requires healthcare providers to conduct a documented breach analysis to demonstrate that no data breach occurred.

Remote data wiping provides documentable evidence that PHI stored on a lost device was not breached. When a compliance officer authorizes device bricking after being notified of a missing device, it creates the first piece of evidence for breach analysis requirements.

Yes, secure mobile apps dedicated to transmitting PHI can notify administrators if third parties accessed the app through access logs. This provides additional documentation for compliance officers during breach analysis procedures.

A healthcare BYOD policy should combine remote wipe and lock technologies with clear mobile device usage policies. This combination allows administrators to adequately prepare facilities for compliance with rigorous Omnibus regulations while enabling secure mobile access to PHI.

Healthcare providers should respond immediately upon notification of a missing device containing PHI. Quick authorization of remote data wiping by compliance officers is essential to provide the first piece of documentable evidence that prevents a reportable breach.

Krishna Kurapati

Written by

Krishna Kurapati

Founder & CEO

Founder & CEO of QliqSOFT with 20+ years of healthcare technology experience.

View all posts

Related Articles

2m left