BreachExchange mailing list archives

Re: [Dataloss] Nurses turning to un-authorized smartphones to meet datademands


From: "Al Mac Wow" <macwheel99 () wowway com>
Date: Thu, 27 Dec 2012 01:03:24 -0600

I have found in my IT career that when an enterprise demands that a
particular category of workers collect data which is NOT for THEIR usage,
but for some OTHER category of workers, then we get a HIGH rate of error,
because the data entry workers do not see the point in supplying those
details.  The workers, for whom the data is being collected, may not have
any good way to check data veracity, so it becomes another category of
garbage in, garbage out.

For over a decade, technology has been available where a medical
professional can speak into a microphone, and what they say becomes text in
a computer.  This requires a high speed computer, and high priced software,
which medical institutions probably have not made available to the nurses.

In the medical profession particularly, there's all sorts of machinery
hooked up to patients, monitoring all sorts of things, so much of what the
nurses are asked to data entry, may already be available automatically,
without their involvement.

I have seen signs in hospitals banning the use of cell phones, on the theory
that they may interfere with medical hardware, due to the hardware being
inadequately shielded against signal interference, due to US standards,
against such interference, not being enforced.

Al Mac (WOW) = Alister William Macintyre
via WOW WAY.com ISP
day job = www.kewire.com Lawrenceville In via VPN/400 (our division dates
back to 1955)
-----Original Message-----
From: dataloss-bounces () datalossdb org
[mailto:dataloss-bounces () datalossdb org] On Behalf Of Erica Absetz
Sent: Wednesday, December 26, 2012 12:25 PM
To: dataloss () datalossdb org; dataloss-discuss () datalossdb org
Subject: [Dataloss] Nurses turning to un-authorized smartphones to meet
datademands

http://www.networkworld.com/news/2012/122112-nurses-smartphones-265330.html

Network World - A new study finds that more than two-thirds of nurses
are using their personal smartphones for clinical communications. Yet
95% of nurses in the sample say hospital IT departments don't support
that use for fear of security risks.

The report, "Healthcare without Bounds: Point of Care Computing for
Nursing 2012," bySpyglass Consulting Group, points to the collision of
healthcare information demands on nurses, and the limits of mobile and
wireless technology, at the point of care -- typically the patient's
bedside. Nurses in the survey decry the lack of IT support; and IT
staff are frustrated by the unsanctioned and often explicitly banned
use of personal devices for clinical communications.

The report is based on in-depth phone interviews with 100 nurses in a
variety of healthcare organizations in 33 states, focusing on the
information requirements of nursing and the use of mobile and wireless
technology to meet those requirements. About half of the respondents
were registered nurses with a Bachelor of Science in nursing; nearly
40% were registered nurses with a Master's degree in nursing
informatics.

The majority of nurses in the survey complain that hospital
administrators are pressuring nurses to document care ever more
thoroughly, to satisfy the growing number of government mandates,
maximize reimbursements from third-party payers, and protect the
hospital from lawsuits, according to Gregg Malkary, founder and
managing director for Spyglass. The complete market study, "Healthcare
without Bounds: Point of Care Computing for Nursing 2012," is
available from Spyglass for $2,495.

The rising healthcare information demands are creating resentment. For
example, a majority of nurses in the survey complained that they're
being reduced to mere data collectors to satisfy "meaningful use"
requirements, which are federal rules that healthcare providers must
meet to qualify for federal incentive funding under the American
Recovery and Reinvestment Act of 2009. Failure to do so can lead to
big cuts in Medicare and Medicaid reimbursements, according to
Malkary.

He found that a majority of nurses interviewed say the "meaningful
use" requirements are almost entirely physician-centered, ignoring
data needed by nurses. And they say they're becoming simply extensions
of the IT group's own requirement to achieve compliance with
meaningful use rules.

It's this information demand that drives 69% of nurses in the survey
to rely on their personal smartphones at work. "These solutions fill
in critical communications gaps BUT they are not sanctioned by
hospital IT," notes the Spyglass report.

In fact, such use is actively banned in many cases. One IT systems
analyst at an academic hospital told Malkary, "Nursing administration
has mandated that personal communications by nurses during normal work
hours is not acceptable. Nurses found to be using their personal
devices during work hours will be disciplined."

The widespread use of personal smartphones is due partly to the fact
they don't require extensive integration with IT infrastructures.
Tablets are more likely to require "significant integration,"
according to the report.

At the same time, these nurses are deeply dissatisfied with current
tablets, includingApple's iPad, which is spreading rapidly in the rest
of the enterprise market. Asked if the Apple iPad was "ready to
transform nursing care at the patient's bedside," nearly all of
respondents -- 96% -- said "no." They gave the iPad good grades
compared to traditional,Windows-based tablet PCs -- for being lighter,
more intuitive, and having a longer battery life. Yet the Apple
tablet, and its Android rivals, can't be properly cleaned and
disinfected, lacks durability, and is weakened by the dearth of native
clinical applications.

"Nurses interviewed believe that the Apple iPad would not be the ideal
device for a bedside nurse because the bedside nurse has more
extensive documentation requirements that require a fullsize screen,
keyboard and mouse," according to the report.

Malkary goes so far as to say that nurses have "rejected" tablets for
nursing workflows.

One in 4 of the survey respondents reported being dissatisfied with
the quality and reliability of their facility's wireless LAN.

Security concerns by hospital administrators and IT groups are
well-founded. Mobile devices can be lost or stolen, employees are
often resistant to the use of strong password protection and data
encryption, and can download personal apps that may be either insecure
or designed as malware.

Among the Spyglass recommendations:

much more proactive and vigorous efforts by IT to identify hospital
workers' requirements for mobile technology
define enforceable policies and procedures for personal devices on the
hospital network
expand help desk resources with skilled personnel dedicated to mobile
technology support

John Cox covers wireless networking and mobile computing for Network World.
Twitter: @johnwcoxnww
Email: john_cox () nww com
_______________________________________________
Dataloss Mailing List (dataloss () datalossdb org)
Archived at http://seclists.org/dataloss/
Unsubscribe at http://datalossdb.org/mailing_list

Supporters:

Risk Based Security (http://www.riskbasedsecurity.com/)
Risk Based Security equips organizations with security intelligence, risk
management services and on-demand security solutions to establish
customized risk-based programs to address information security and
compliance challenges. 
_______________________________________________
Dataloss-discuss Mailing List (dataloss-discuss () datalossdb org)
Archived at http://seclists.org/dataloss/
Unsubscribe at http://datalossdb.org/mailing_list

Supporters:

Risk Based Security (http://www.riskbasedsecurity.com/)
Risk Based Security equips organizations with security intelligence, risk
management services and on-demand security solutions to establish
customized risk-based programs to address information security and
compliance challenges. 

Tenable Network Security (http://www.tenable.com/)
Tenable Network Security provides a suite of solutions which unify real-time
vulnerability, event and compliance monitoring into a single, role-based, interface
for administrators, auditors and risk managers to evaluate, communicate and
report needed information for effective decision making and systems management.

Current thread: