We are sorry, This PDF is available in download format only

Premises-Aware Security Safeguards Protected Health Information

Wireless Credential Exchange-embedded RFID tag helps safeguard protected health information by enabling security policy enforcement based on device location.

Executive Overview
The Health Insurance Portability and Accountability Act (HIPAA) Security Rule requires healthcare organizations in the United States to prevent unauthorized access to their patients’ electronic protected health information (PHI). When PHI is compromised, these organizations can be fined millions of dollars, have their reputations damaged, and lose their patients’ trust. The primary causes of security breaches are lost or stolen devices and unauthorized access to PHI or applications that can compromise PHI.

To help mitigate the risk of security breaches in healthcare, Intel is exploring a premises-aware security capability that enables an organization’s IT department to monitor all devices, receive alerts if a device leaves a secure zone, and control access to data and applications using location-based security policies, including forced encryption or self-wipe.

Wireless Credential Exchange-embedded RFID tag helps safeguard protected health information by enabling security policy enforcement based on device location.

Executive Overview
The Health Insurance Portability and Accountability Act (HIPAA) Security Rule requires healthcare organizations in the United States to prevent unauthorized access to their patients’ electronic protected health information (PHI). When PHI is compromised, these organizations can be fined millions of dollars, have their reputations damaged, and lose their patients’ trust. The primary causes of security breaches are lost or stolen devices and unauthorized access to PHI or applications that can compromise PHI.

To help mitigate the risk of security breaches in healthcare, Intel is exploring a premises-aware security capability that enables an organization’s IT department to monitor all devices, receive alerts if a device leaves a secure zone, and control access to data and applications using location-based security policies, including forced encryption or self-wipe.

Related Videos