Journal of Mobile Technology in Medicine

Journal of Mobile Technology in Medicine

Answer the following questions as an essay. Should be in APA format. Use in text citation. References should not be more than 5 years. 1.As healthcare professionals we are often using smartphones, iPads, and other mobile devices. How do you address safety when data can literally walk out of your setting? 2. Give an example of appropriate or inappropriate use of mobile technology in your hospital setting. Why was it appropriate or inappropriate? Refer to at least one article or outside source of information you use to support your thoughts. Cite the source using APA conventions. Journal of Mobile Technology in Medicine

How healthcare professionals address safety of data when using smartphones, iPads, and other mobile devices

Healthcare providers have embraced the mobile technology revolution and are permitting the utilization of smartphones, iPads, and other portable devices in clinics, hospitals, and other places of work. Nevertheless,   due to their portability and small size, mobile devices are at a higher risk of being lost or stolen compared to their fixed/ immobile counterparts. If mobile data security measures are not sufficient, the safety of electronic protected patient information (ePHI) can be at risk. Nurses can ensure safety through technical safeguards such as requiring user authentication. According to Smith et al.(2017),  user authentication refers to the process of verification of the user’s identity prior to accessing a mole device along with the information stored in it. The most common form of authentication is knowledge-based authentication which requires the user to enter a password or PIN to access the Smartphone or any other mobile device or data on the device before every use.  Journal of Mobile Technology in Medicine

ORDER A PLAGIARISM -FREE PAPER NOW

Safety of ePHI on mobile devices can be secured by enabling encryption. It is vital to purchase and install an encryption tool for mobile devices utilized to access ePHI.  According to Mastrian and McGonigle (2019), encryption ensures protection of ePHI and the integrity of the clinical system and it is usually achieved by utilization of a virtual private network.    In case the mobile device is stolen or lost, encryption makes it not possible to read the information in the device.

An example of inappropriate use of mobile technology in my hospital setting

Smartphone photography is an example of inappropriate use of mobile technology in my hospital setting. A nurse took a photo of a patient’s leg to capture the lesion on the leg and transferred the photograph to other providers.  This was inappropriate because the nurse did not consent from the patient. According to Vearrier et al. (2018), consent must be obtained when an image is being captured. Informed consent must entail elements such as the part of the body to be photographed, the planned use, and if the photography is to be transmitted to other providers.

References

Mastrian, K., & McGonigle, D. (2019). Informatics for Health Professionals. Jones & Bartlett Learning.

Smith, K.A., Zhou, L., Watzlaf, V. J., & Fahima, R. (2017). User Authentication in Smartphones for Telehealth.  International Journal of Telerehabilitation, 9(2), 3-12. doi: 10.5195/ijt.2017.6226

Vearrier, L., Rosenberger, K., & Weber, V. (2018). Use of Personal Devices in Healthcare: Guidelines From A Roundtable Discussion. Journal of Mobile Technology in Medicine, 7(2), 27-34. doi:10.7309/jmtm.7.2.4

Journal of Mobile Technology in Medicine