Barb Duffey-Rosenstein, Director, Nursing Informatics Oana Virvoreanu, Director, Operations Services e-Health 2013 Tuesday May 28 th.

Slides:



Advertisements
Similar presentations
Mobile Device Security and Control NSAA IT Conference and Workshop Fourth Session: 2:45pm – 4:00pm _____________________________________.
Advertisements

Rider Universitys BYOD Story. First two short films…… Dilbert Humorous skit about an employee, desperate to get his work done more efficiently tries to.
M OBILE D EVICE D EPLOYMENT ( I P ADS ) AND BYOD P OLICY Presented by Tyler Wallace.
BRING YOUR OWN DEVICE Presenter: Rachelle R. Green Duffy & Sweeney, Ltd.
Security for Mobile Devices
November 14, 2012 Securely Manage your devices, applications and data. Deploy your corporate policies on smart devices. Comply with Regulatory Laws. Detroit.
Bring Your Own Device (BYOD) Security By Josh Bennett & Travis Miller.
Copyright © 2012 AirWatch, LLC. All rights reserved. Proprietary & Confidential. Mobile Content Strategies and Deployment Best Practices.
INADEQUATE SECURITY POLICIES Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA standards.
1 1 March 20, 2014 A SIMPLE APPROACH TO BYOD. WHAT THEY DONT WANT IS: Company monitoring of their personal activities or restriction of the apps they.
Exposing the Data Risks and Offering the Recommendations for the Secure Consumerization of e-Health Jason Lin, Corporate Security Officer Tuesday, May.
Invasion of Smart Phones in Clinical Areas Chrissy Kyak Privacy Officer University of Maryland Upper Chesapeake Health.
Everything you want to know about managing mobile devices in the enterprise Ivan Hemmans hemmans.com From A to Z.
6218 Mobile Devices- Are They Secure Enough for our Patient's Data? Presented By Aaron Hendriks, CISSP Other: Employee of University Health Network, Toronto,
IPads Everywhere! Management Considerations for the Enterprise Bill Morrison Director of Technology, Rapides Parish School District
INFORMATION TECHNOLOGY FOR MINNESOTA GOVERNMENT Christopher P. Buse Assistant Commissioner and CISO State of Minnesota Mobile Device Management Assessing.
© 2012 Citrix | Confidential – Do Not Distribute BYOD Champion Presentation CIO How-To Kit: Bring-Your-Own Devices © 2014.
© 2010 AT&T Intellectual Property. All rights reserved. AT&T and the AT&T logo are trademarks of AT&T Intellectual Property. Emerging Risks in a Mobile.
LHHS – BYOD Pilot Project (DRAFT) April – June 2012.
Cisco Jabber Proof of Concept
SAM for Mobile Device Management Presenter Name. of employees spend at least some portion of their time working outside their office. Mobility is the.
1 MAIS & ITSS FY09 Priorities Joint UL Meeting October 27, 2008.
Accessibility at Mount Sinai Hospital The New Standards.
Ettalong Public School Parent Information Session
Managing BYOD Legal IT’s Next Great Challenge. Agenda  The BYOD Trend – benefits and risks  Best practices for managing mobile device usage  Overview.
The Implementation of Advanced Clinical Documentation for Bariatric Services at University Health Network: Lessons From the Field Vicky Ramirez,
1 ZIXCORP The Criticality of Security Dena Bauckman Director Product Management April 2015.
BRING YOUR OWN DEVICE. BYOD AND THE IMPACT ON IT SECURITY BYOD and pressure employees put on IT organization to supply or allow consumer mobility devices.
DISCOVER IT PEACE OF MIND Staying HIPAA-Compliant Revised: April 13, 2015.
 INADEQUATE SECURITY POLICIES ›Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA.
Extending Forefront beyond the limit TMG UAG ISA IAG Security Suite
BYOD- Bring Your Own Device Understanding the benefits and the risks. Phillys Yang Alex Verblen Aaron Chung Michael Lyons.
© 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker.
TUESDAY, 4:00 – 4:20PM WEDNESDAY, 4:00 – 4:20PM Douglas Hill, NHIN Implementation Lead (Contractor), Office of the National Coordinator for Health IT Vanessa.
Children’s Hospital Requirements for Remote Access.
Mobile Device Management Overview Information Security Office.
HIPAA PRACTICAL APPLICATION WORKSHOP Orientation Module 1B Anderson Health Information Systems, Inc.
Technology Trends and the Productivity Gains for Life Sciences Companies Randy Paroda, Director of Product Development September 17, 2013.
Cloud Market Readiness Report Finance, Media, and Legal Sectors March 2014 Trend Consulting 2013.
Toolooa SHS BYOD Parent Information Night. Why is BYOD (Bring Your Own Device)happening? The current hire devices were Federally funded and the funding.
Raya for Information Technology. About US  Raya IT, established in 1998, operates in the field of systems integration and IT business solutions.  A.
Sophos EndUser Protection Complete endpoint, mobile, web and data security licensed by the user – not the device.
User and Device Management
BYOD: An IT Security Perspective. What is BYOD? Bring your own device - refers to the policy of permitting employees to bring personally owned mobile.
ORNL Site Report ESCC July 15, 2013 Susan Hicks David Wantland.
Mobile Technology and Insurance Employee Benefit Programs By Scott Warner.
Šarūnas Končius Technology Strategist of Microsoft Microsoft Lithuania.
La Salle University – Fall 2013 INL 880 – Capstone Presentation Presented by: Loc Nguyen & Shweta Somalwar December 18, 2013.
Moving to BYOD Gary Audin 1.
BYOD at GHES Parent Information. Vision Statement Our Vision is to create an environment of student centered learning through collaboration, critical.
Managed IT Services JND Consulting Group LLC
Devices 10 billion Internet- connected devices by 2016 People 1 billion+ people use social media services today Cloud 30 % of data will live in or pass.
THE CONSUMERIZATION OF IT By Patricia Coonelly, Anthony Dipoalo, Tom Stagliano.
Total Enterprise Mobility Comprehensive Management and Security
Info-Tech Research Group1 Choose a Consumerization Strategy Find the right path for your organization.
REGISTRATION & ACCESS Frequently Asked Questions March 2016.
Mobile Operating Systems
Mobile Data Solutions Inc
Health Equity: Respecting Individuals and their Privacy
IWRITER 365 Offers Seamless, Easy-to-Use Solution for Using, Designing, Managing, and Sharing All Your Company Templates in Microsoft Office 365 OFFICE.
Network Access Control 101 Securing the Critical Edge of Your Network
Skyhigh Enables Enterprises to Use Productivity Tools of Microsoft Office 365 While Meeting Their Security, Compliance & Governance Requirements Partner.
[Conference Title] [Date]
A+ A+ CORPORATION PRESENTS: INFORMATION TECHNOLOGY DEPARTMENT
Innovative practices in transitions between hospital and home: Recommendations in support of advancing a Health Links approach A presentation to the Embracing.
1/2/2019 4:34 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS.
THE 13TH NATIONAL HIPAA SUMMIT HEALTH INFORMATION PRIVACY & SECURITY IN SHARED HEALTH RECORD SYSTEMS SEPTEMBER 26, 2006 Paul T. Smith, Esq. Partner,
Move this to online module slides 11-56
Personal Mobile Device Acceptable Use Policy Training Slideshow
Microsoft Virtual Academy
Presentation transcript:

Barb Duffey-Rosenstein, Director, Nursing Informatics Oana Virvoreanu, Director, Operations Services e-Health 2013 Tuesday May 28 th

Faculty/Presenter Disclosure Speaker: Barb Duffey-Rosenstein Relationships with commercial interests: -Grants/Research Support: None -Speakers Bureau/Honoraria: None –Consulting Fees: None –Other: None CFPC CoI Templates: Slide 1

MSH BYOD Steering Committee Barb Duffey-Rosenstein, Director, Nursing Informatics Oana Virvoreanu, Director, Operations Services George Georgiadis, Chief Information Officer Amanda Brennan, Corporate Privacy Officer & Freedom of Information Coordinator Andrew Nicholson, IT Manager Mirek Otremba, IT Physician Lead Justin Fiege, HP Services – Technical/Focal

Mount Sinai Hospital  Located in Toronto, Ontario  Academic, tertiary care centre affiliated with the University of Toronto  472-Bed Facility  Specialty areas:  Women’s and Infants Health  Surgical Subspecialties  Oncology and Internal Medicine  Samuel Lunenfeld Research Institute

BYOD Backgrounder  Leveraging personally-owned mobile devices (laptops, tablets, and smart phones) in the workplace to access privileged corporate information and applications  Timely, growing trend  Drivers:  End User Requests and Consumerization of IT  Potential Cost Savings  Virtualization and Cloud Technology

MSH BYOD Context  Increase in requests for access to MSH resources from a greater selection of mobile devices  BYOD pilot implementation (90-day with a cohort of 20 self- selected clinicians)  July to October 2012 using iOS devices (iPhone and iPad 3G) Goal: 1.Implement a robust BYOD solution that will enable extended connectivity to user-owned compute and communication devices and evaluate compliance with the BYOD policy framework 2.Evaluation of the BYOD deployment model 3.Determine the feasibility of a broader organization-wide implementation The new “Bring Your Own Device (BYOD) – Smart Phones” service was approved and launched in December 2012.

BYOD = Partnership Between IT and Employees “ I can do anything I want with my personal data and applications on my iPhone or iPad”. “ We reserve the right to stop access to corporate applications or information if your device is out of compliance” Please sign this end-user agreement!

Decisions, Decisions, Decisions  Which devices meet security standards?  Which applications will we allow?  Which users will be offered the service?  What mobile device managements solution/ do have the infrastructure?  What will the support model look like?  Will the service be offered free of charge?  Who approves the decision to adopt BYOD?

MSH BYOD Service Overview  Eligible Users: MSH-affiliated Physicians, Executives  Eligible Devices: iPhones and iPads 3G (iOS 5+)(TRA/PIA)  Available Functionality: / Calendar/ Contacts only  Self-serve device activation and registration  Air Watch™ MDM solution

BYOD Enabling Strategy: Combine Technology and Policy Technology  Select devices and minimum operating system requirements  Mobile Device Management (MDM) solution and best-practices  Self serve on-boarding and device registration  Password enforcement  Detection of troublesome activities or applications  Ability to wipe and lock rogue devices  Blocking certain features  Off-boarding and termination Policy  Acknowledgement of the associated MSH BYOD Policy  Acceptance of the End User Agreement  Complete BYOD training

MSH End User Agreement (EUA)  Established data security and privacy policies will govern BYOD  Service Plans and device upgrades or replacements are the responsibility of the users  MSH has the right to inspect the contents of any personal device used for work purposes and can audit them for compliance  MSH help desk will support issues related to accessing corporate resources only  Users agrees to MSH wiping the device under special circumstances (hacked, jail broke, lost)  Devices will have restrictions for using select features & apps (i.e. iCloud, Siri)  Users will need to set up an 8-character password for the device.  In the event that a BYOD device is lost or stolen, users will notify their manager/supervisor and the Corporate Privacy Officer immediately.  BYOD users who fail to comply with this policy may be subject to disciplinary actions/immediate loss or restriction of privileges  User may have to surrender device to employer under special circumstances (i.e. for a legal hold)

Outcomes, Challenges and Next Steps Overall, pilot participants were very satisfied with BYOD initiative Indicated BYOD improved responsiveness and productivity Support model and self-serve framework Cost savings not a driver and were not realized; considering stipends for management staff (taxable benefit) MSH devices not scaled back; majority of participants non- employees Limitations: restricted functionality and password length Constant change a reality of BYOD; new devices, new updates = risk, update Air Watch, NAC Next Steps: expand employees, device selection, MSH resources (i.e. Citrix, wireless, VoIP)

Questions ?