secure texting best practices: communicate your policies

16
5 Best Practices for Successful Secure Texting #3: Communicate Your Policies

Upload: qliqsoft

Post on 07-Aug-2015

98 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Secure Texting Best Practices: Communicate Your Policies

S

5 Best Practices for Successful Secure

Texting

#3: Communicate Your Policies

Page 2: Secure Texting Best Practices: Communicate Your Policies

S

Once you have established the goals and gotten the

organization on board with the plans…

Page 3: Secure Texting Best Practices: Communicate Your Policies

S

… it is important to

communicate the policies

for secure texting.

Page 4: Secure Texting Best Practices: Communicate Your Policies

S

Every organization is different, but your secure texting policy

should cover things like…

Page 5: Secure Texting Best Practices: Communicate Your Policies

Secure Texting Policies

All messaging needs to be secure. Text messages, images, videos, and files need to be transmitted over a

secure platform.

No SMS texting for organizational use.

Page 6: Secure Texting Best Practices: Communicate Your Policies

Secure Texting Policies

Clarify the types of messages that are allowed and not allowed over the

secure platform. For example, medical orders can be texted, but

must be verified verbally as well.

Page 7: Secure Texting Best Practices: Communicate Your Policies

Secure Texting Policies

All messages on the secure platform are the property of the organization and as such can be accessed, read, deleted or otherwise used by the

organization.

Page 8: Secure Texting Best Practices: Communicate Your Policies

Secure Texting Policies

Define your BYOD policy. Does your organization allows the use of personal

devices (“bring your own device” or BYOD) or will it supply devices to those who need it?

Page 9: Secure Texting Best Practices: Communicate Your Policies

Secure Texting Policies

If BYOD is allowed, what devices are approved or excluded?

Is any operating system or additional security downloads required?

Page 10: Secure Texting Best Practices: Communicate Your Policies

Secure Texting Policies

When and how to report a lost or stolen device so that remote lock &

wipe can be activated.

Page 11: Secure Texting Best Practices: Communicate Your Policies

Secure Texting Policies

Describe details around message expiration and retention.

Determine how long messages will be retained on devices and in the archive, and how to retrieve an

older message if needed.

Page 12: Secure Texting Best Practices: Communicate Your Policies

S

Why are these types of policies important?

Page 13: Secure Texting Best Practices: Communicate Your Policies

S

Smartphones are ubiquitous in healthcare and are used to

share patient information.

A study conducted by the Health Research Institute has revealed that more than 80% of

healthcare workers now use portable mobile devices to communicate information

to colleagues about their patients or to access stored patient health information.

Page 14: Secure Texting Best Practices: Communicate Your Policies

S

Smartphones used inappropriately can lead to

security breaches.

The Center for Democracy and Technology showed that 66 % of potential patient data

security breaches over the past two years were attributable to portable mobile

devices being either stolen or lost.

Page 15: Secure Texting Best Practices: Communicate Your Policies

S

Security risks can be greatly diminished.

Establishing these secure texting policies helps to diminish the risk of patient health information

being compromised during the sending or receiving of sensitive data, or while it is stored on

a mobile device.

Page 16: Secure Texting Best Practices: Communicate Your Policies

S

Roll out your secure texting initiative today.

Learn more at

www.qliqsoft.com