-
- Asim F Choudhri, Arindam R Chatterjee, Ramin Javan, Martin G Radvany, and George Shih.
- From the Departments of Radiology (A.F.C., A.R.C.), Ophthalmology (A.F.C.), and Neurosurgery (A.F.C.), University of Tennessee Health Science Center, Memphis, Tenn; Department of Radiology, Le Bonheur Neuroscience Institute, Le Bonheur Children's Hospital, Memphis, TN 38103 (A.F.C.); Department of Radiology, Duke University Medical Center, Durham, NC (R.J.); Departments of Radiology, Neurology, and Neurosurgery, Johns Hopkins University School of Medicine, Baltimore, Md (M.G.R.); and Department of Radiology, Weill Cornell Medical College, New York, NY (G.S.).
- Radiographics. 2015 Oct 1; 35 (6): 1814-24.
AbstractThe end-user of mobile device apps in the practice of clinical radiology should be aware of security measures that prevent unauthorized use of the device, including passcode policies, methods for dealing with failed login attempts, network manager-controllable passcode enforcement, and passcode enforcement for the protection of the mobile device itself. Protection of patient data must be in place that complies with the Health Insurance Portability and Accountability Act and U.S. Federal Information Processing Standards. Device security measures for data protection include methods for locally stored data encryption, hardware encryption, and the ability to locally and remotely clear data from the device. As these devices transfer information over both local wireless networks and public cell phone networks, wireless network security protocols, including wired equivalent privacy and Wi-Fi protected access, are important components in the chain of security. Specific virtual private network protocols, Secure Sockets Layer and related protocols (especially in the setting of hypertext transfer protocols), native apps, virtual desktops, and nonmedical commercial off-the-shelf apps require consideration in the transmission of medical data over both private and public networks. Enterprise security and management of both personal and enterprise mobile devices are discussed. Finally, specific standards for hardware and software platform security, including prevention of hardware tampering, protection from malicious software, and application authentication methods, are vital components in establishing a secure platform for the use of mobile devices in the medical field.© RSNA, 2015.
Notes
Knowledge, pearl, summary or comment to share?You can also include formatting, links, images and footnotes in your notes
- Simple formatting can be added to notes, such as
*italics*
,_underline_
or**bold**
. - Superscript can be denoted by
<sup>text</sup>
and subscript<sub>text</sub>
. - Numbered or bulleted lists can be created using either numbered lines
1. 2. 3.
, hyphens-
or asterisks*
. - Links can be included with:
[my link to pubmed](http://pubmed.com)
- Images can be included with:
![alt text](https://bestmedicaljournal.com/study_graph.jpg "Image Title Text")
- For footnotes use
[^1](This is a footnote.)
inline. - Or use an inline reference
[^1]
to refer to a longer footnote elseweher in the document[^1]: This is a long footnote.
.