by Roy Huggins | Sep 14, 2015
What?:Â When we connect to websites, our devices send information across the Internet. This information is normally visible to all and sundry who are in a position to observe the flow of your information. To deal with this, websites are able to offer a special kind of connection that encrypts your information while it is being sent across the Internet. If you are accessing Web pages that handle protected health information, you can see the value of this…
See Also:Â Digital Confidentiality Level I Syllabus
See Also: Is Gmail Encrypted?
To access this content please click here to
log in
by Roy Huggins | Sep 13, 2015
What?: Wi-Fi networks are near-ubiquitous and can also be a significant source of vulnerability for protected health information that is either on computers using the Wi-Fi network or uploaded and downloaded using the Wi-FI network. There is a way to make Wi-Fi more reliable, however, and it is essential that clinicians who use Wi-Fi with equipment that touches protected health information know which Wi-Fi networks they can safely use and which ones they can’t.
To access this content please click here to
log in
by Roy Huggins | Sep 10, 2015
What?: iPhones, iPads and Macintoshes all use a set of common apps such as for synchronizing your calendar, contact book, and many other useful things. By default, this synchronization happens through Apple’s iCloud service, which means that the information in those apps may get stored on Apple’s company computers. For clinicians, this could be a problem…
To access this content please click here to
log in