10-29-13 | Blog Post
Join Attorney Tatiana Melnik and Senior Product Architect Steve Aiello as they discuss how to securely implement an effective BYOD (Bring Your Own Device) strategy in your workplace.
Title: To be BYOD or not to be BYOD: Is a “Bring Your Own Device” Policy Right for Your Organization?
Register: Sign up online
Who: Attorney Tatiana Melnik and Online Tech’s Senior Product Architect Steve Aiello
When: Nov 12, 2013; 2:00 PM – 3:00 PM (EST)
Description: Mobile devices are becoming ubiquitous in all companies, including those in the healthcare, finance, and information technology sectors. Companies are adopting Bring Your Own Device (BYOD) policies permitting employees to use mobile devices in a variety of work settings. Doctors, for example, are remotely accessing EHRs through iPads and smartphones, thereby improving their workflow and patient care. Patients are similarly using mobile technologies to access and monitor their health on the go.
This presentation will provide an overview of the legal and regulatory framework for mobile devices and will discuss drafting a BYOD policy, best technical practices for implementation, and enforcement.
Tatiana Melnik, Attorney
Tatiana Melnik is an attorney concentrating her practice on IT, data privacy and security, and regulatory compliance. Ms. Melnik regularly writes and speaks on IT legal issues, including HIPAA/HITECH, cloud computing, mobile device policies, telemedicine, and data breach reporting requirements, is a Managing Editor of the Nanotechnology Law and Business Journal, and a former council member of the Michigan Bar Information Technology Law Council. Ms. Melnik holds a JD from the University of Michigan Law School, a BS in Information Systems and a BBA in International Business, both from the University of North Florida.
Steven Aiello, Senior Product Architect, Online Tech
Steven Aiello is a Senior Product Architect with Online Tech, the Midwest’s premier managed data center operator. His certifications include CISSP (Certified Information System Security Professional), ISACA CISA, VMware VCP ( VMware Certified Professional), Cisco CCNA ( Cisco Certified Network Associate), Comptia Security+, and Certified Incident Responder (New Mexico Tech).
Find out how to handle mobile security in your workplace by reading our Mobile Security white paper. This white paper explores approaches to mobile security from risk assessment (what data are truly at risk), enterprise architecture (protect the data before the devices), policies and technologies, and concludes with an example of a mobile security architecture designed and implemented within a hospital environment in which both enabling caregivers and protecting privacy, integrity, and confidentiality are paramount.
Related Links:
2013 IT Spending Trends – Cloud Computing, Mobile and Big Data Projects
As 2012 comes to a close, we look with optimism to 2013 as Gartner predicts that worldwide IT spending will surpass $3.7 trillion dollars next year. According to Peter Sondergaard, senior VP at Gartner, we will see a new trend …Continue reading →
Protecting Health Information in the Era of Mobile Devices: The Practicalities & Problems of BYOD
I’m attending the mHIMSS Virtual Briefing: Securing Protected Health Information held today from 12PM ET-3:15PM ET online at HIMSSVirtual.org. The event features several sessions on the best practices for mobile device use, BYOD (Bring Your Own Device) policy and practice; … Continue reading →
2012 State of Mobile Health IT
The 2nd Annual HIMSS Mobile Technology Survey, sponsored by Qualcomm Life, found that over 90 percent of respondents reported physicians using mobile technology in their everyday operations. Eighty percent of physicians use mobile technology to provide patient care, and nearly … Continue reading →