ABSTRACT

This chapter provides an overview of the components of mHealth security and insight into solutions to secure products, protected health information (PHI) and the organization as a whole. It focuses on connected mobile devices, text-enabled cell phones, embedded applications, patient-wearable and implantable devices, smartphones and store-and-forward systems. Mobile security is a doctor’s top concern, and a barrier to adoption, stated a Price-waterhouse Coopers survey. The primary difference between cloud and client-server is that with the client-server model, the business that runs the application owns and controls the hardware. Systems required to provide PHI when the Internet is not available utilizes on-device storage. Hybrid devices are a combination of on-board and remote storage. Wireless devices that share data must incorporate a security strategy when transmitting data to and from the server. Device management is one of the biggest challenges in mHealth.