{"id":14527,"date":"2021-02-26T05:20:10","date_gmt":"2021-02-26T10:20:10","guid":{"rendered":"https:\/\/www.m2sys.com\/blog\/?p=14527"},"modified":"2022-07-15T01:54:46","modified_gmt":"2022-07-15T05:54:46","slug":"byod-and-hipaa-compliance-a-fine-line-between-privacy-and-exposure","status":"publish","type":"post","link":"https:\/\/www.m2sys.com\/blog\/patient-identification\/byod-and-hipaa-compliance-a-fine-line-between-privacy-and-exposure\/","title":{"rendered":"BYOD and HIPAA Compliance &#8211; A fine line between privacy and exposure"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">We have all been hearing about BYOD (Bring Your Own Device) strategies and the importance of a mobile device management system without any clear solution in sight. More importantly, there is a fine line between BYOD strategies and <a href=\"https:\/\/www.cloudapper.com\/hipaa-compliance-requirements\/?utm_source=m2sys%20blog&amp;utm_medium=blog%20post&amp;utm_campaign=BYOD%20and%20HIPAA%20Compliance%20-%20A%20fine%20line%20between%20privacy%20and%20exposure\">HIPAA compliance<\/a>, where the potential risk of data breach significantly increases.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Nevertheless, the benefits of BYOD practices far outweigh the disadvantages. For all the advantages it offers, stopping the practice of BYOD is not a wise decision.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The COVID-19 pandemic has only ramped up the practice of BYOD in large numbers. More people have switched to work from home options to contain the virus and practice social distancing. Lending devices to each employee so that they can work from home is not a feasible option either. As a result, these employees had to use their personal devices, which they already have in their homes. Even though employees aren\u2019t bringing their devices to the workplace, the practice of using personal devices still falls under the definition of BYOD.<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">Defining BYOD<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">BYOD is the abbreviation for \u201cBring Your Own Device.\u201d It means employers allow their employees to use their personal devices, such as mobile phones, tablets, or laptops for official work purposes. The use of BYOD has grown steadily over the past few years. Starting from infrequent implementation, it gradually became the norm. However, there are a few implications too.<\/span><\/p>\n<p style=\"text-align: center;\"><style type=\"text\/css\">\r\n.ad-area1 { border-radius: 8px; overflow: hidden; padding: 20px 10px; box-shadow: 0 0px 15px #ddd; margin: 15px 8px; border-top: 5px solid #a81010; }\r\n.left-area, .right-area { width: 50%; float: left; }\r\n.left-area { padding-top: 12px; }\r\n.left-area img { max-width: 95%; }\r\n.right-area h2 { text-align: center; padding-bottom: 0; font-size: 26px; font-weight: 900; margin-top: 0; }\r\n.right-area h2 span { color: #a81010; }\r\n.right-area h3 { text-align: center; font-size: 16px; text-transform: capitalize; font-weight: 700; padding-top: 10px; padding-bottom: 10px; line-height: normal; }\r\n.ad-area-head { text-align: center; font-weight: 900; font-size: 14px; border-bottom: 1px dotted #ddd; width: 70%; margin: 0 auto; }\r\n.ad-area-desc { padding: 5px 0; }\r\n.right-area p { text-align: center; font-size: 12px; padding-bottom: 0; margin: 0; line-height: 2; }\r\n.ad-area-desc b { font-weight: 700; display: block; }\r\n.ad-area1-learn { display: table; margin: 0 auto; background: #a81010; color: #fff; padding: 6px 20px; border-radius: 50px; font-size: 14px; }\r\n.ad-area1-learn:hover { color: #fff; }\r\n\r\n@media (max-width:320px), (max-width:360px), (max-width:375px), (max-width:400px), (max-width:480px) {\r\n.left-area, .right-area { width: 100%; float: none; }\r\n}\r\n<\/style>\r\n<div class=\"ad-area1\">\r\n\t<div style=\"overflow: hidden;\">\r\n\t\t<div class=\"left-area\">\r\n\t\t\t<img decoding=\"async\" src=\"https:\/\/cloudapper.com\/wp-content\/uploads\/2020\/05\/HIPAA-Ready-Display-Ad-1.png\" alt=\"Bio-plugin-SDK\" width=\"\">\r\n\t\t<\/div>\r\n\t\t<div class=\"right-area\">\r\n\t\t\t<h2><span>HIPAA Ready<\/span><\/h2>\r\n\t\t\t<h3>HIPAA Compliance Software<\/h3>\r\n\t\t\t<div class=\"ad-area-head\">Benefits:<\/div>\r\n\t\t\t<div class=\"ad-area-desc\">\r\n\t\t\t\t<p>-Reduce Administrative Burden<\/p>\r\n\t\t\t\t<p>-See all the information in a centralized space<\/p>\r\n\t\t\t\t<p>-Keep your team updated with regular information<\/p>\r\n\t\t\t\t<p><\/p>\r\n\t\t\t<\/div>\r\n\t\t\t<a class=\"ad-area1-learn\" href=\"https:\/\/web.cloudapper.com\/login?templaterefid=d96a23f9-a14b-4368-8ded-7b31c9cdc696&amp;issignup=true\">Start Free Trial<\/a>\r\n\t\t<\/div>\r\n\t<\/div>\t\r\n<\/div><\/p>\n<h2><span style=\"font-weight: 400;\">BYOD and HIPAA Compliance<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">While BYOD provides staff with a flexible way of working, it also poses the risk of exposure to health data. The implications of BYOD can be severe if proper protection is not implemented. Naturally, personally owned devices will not have the same level of protection as company-owned devices.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The implications of BYOD in healthcare can be more severe because of HIPAA rules and regulations. What\u2019s more, the healthcare industry is a prime target for cybercriminals because patients\u2019 health records contain valuable information that cybercriminals use with malicious intent. These records include information about financial records, social security numbers, names, DOBs, passwords, etc. There is a heightened risk of these records being exposed when employees use their personal devices to access or use this information. Not to mention, the employee\u2019s own passwords and credentials get compromised too.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Moreover, <a href=\"https:\/\/www.lastwatchdog.com\/guest-essay-hipaas-new-safe-harbor-rules-promote-security-at-healthcare-firms-under-seige\/\">cyberattacks in the healthcare industry<\/a> have increased by 45% from November 2020 to January 2021. This is why in addition to comprehensive policies and procedures regarding the use of personal devices, a solid device management system must be in place.<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">Consolidate all your operations under one roof with CloudApper<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">Today, I am not going to talk about common safeguards like email protections and device encryptions. Today, I am going to talk about an ecosystem that can boost the use of BYOD and help you comply with HIPAA at the same time.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">There are many aspects of mobile device management. The mobile device management I am referring to is the use of CloudApper ecosystem services. Say, for instance, running a healthcare business will involve numerous processes. For example, patient identification process, financial process, medical assessment process, drug approval process, risk management,<a href=\"https:\/\/www.m2sys.com\/blog\/hipaa-compliance\/hipaa-privacy-act-training-set-assign-deliver\/?utm_source=m2sys%20blog&amp;utm_medium=blog%20post&amp;utm_campaign=BYOD%20and%20HIPAA%20Compliance%20-%20A%20fine%20line%20between%20privacy%20and%20exposure\"> employee training<\/a>, and so much more. You need different applications to streamline different processes.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">What if you could streamline all your separate processes under one ecosystem? That would be more viable, feasible, and security-friendly. You won\u2019t need to rely on IT infrastructure and other software to manage your business. With CloudApper, you can consolidate all your business tools under one roof and enable employees to access everything they need to be successful at their jobs.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">For example, for healthcare facilities management, you could utilize <a href=\"https:\/\/www.cloudapper.com\/facilities-management-app\/?utm_source=m2sys%20blog&amp;utm_medium=blog%20post&amp;utm_campaign=BYOD%20and%20HIPAA%20Compliance%20-%20A%20fine%20line%20between%20privacy%20and%20exposure\">CloudApper Facilities<\/a> or <a href=\"https:\/\/www.cloudapper.com\/cmms-computerized-maintenance-management-system\/?utm_source=m2sys%20blog&amp;utm_medium=blog%20post&amp;utm_campaign=BYOD%20and%20HIPAA%20Compliance%20-%20A%20fine%20line%20between%20privacy%20and%20exposure\">CMMS<\/a>. For visitor management, you can use <a href=\"https:\/\/www.cloudapper.com\/visitors-management-solution\/?utm_source=m2sys%20blog&amp;utm_medium=blog%20post&amp;utm_campaign=BYOD%20and%20HIPAA%20Compliance%20-%20A%20fine%20line%20between%20privacy%20and%20exposure\">CloudApper Visitors<\/a>. To manage your customers, you can use <a href=\"https:\/\/www.cloudapper.com\/crm-customer-relationship-management-application\/?utm_source=m2sys%20blog&amp;utm_medium=blog%20post&amp;utm_campaign=BYOD%20and%20HIPAA%20Compliance%20-%20A%20fine%20line%20between%20privacy%20and%20exposure\">CloudApper CRM<\/a>, and so on.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">CloudApper solutions are designed especially for optimizing mobile devices. Employees can work from anywhere they want and log information on the go. The CloudApper ecosystem makes sure you synergize the mobile workflow and goes hand in hand with BYOD practices.<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">Stay Compliant with HIPAA Ready<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">What\u2019s more, CloudApper has a dedicated app for HIPAA compliance management. <a href=\"https:\/\/www.cloudapper.com\/hipaa-ready-compliance-software\/?utm_source=m2sys%20blog&amp;utm_medium=blog%20post&amp;utm_campaign=BYOD%20and%20HIPAA%20Compliance%20-%20A%20fine%20line%20between%20privacy%20and%20exposure\">HIPAA Ready is a robust HIPAA compliance software<\/a> that allows you to streamline and manage all the activities, from training to audits to policy management, to ensure you are in line with the law.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This app benefits employers as well as employees who use their personal devices. If an employer wants to <a href=\"https:\/\/www.cloudapper.com\/hipaa-training-certification-get-yours-now\/?utm_source=m2sys%20blog&amp;utm_medium=blog%20post&amp;utm_campaign=BYOD%20and%20HIPAA%20Compliance%20-%20A%20fine%20line%20between%20privacy%20and%20exposure\">provide training<\/a> to their employees on cybersecurity and the use of personal devices, he or she can easily assign a trainee and schedule a training date for that particular employee. The employee will be able to access this information and respond accordingly from anywhere they want.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">To learn more about the CloudApper ecosystem and HIPAA Ready, leave a comment below or <a href=\"https:\/\/web.cloudapper.com\/login?templaterefid=445b4637-bb0c-411a-9c8d-bf8cab4b2ec8&amp;issignup=true\">try a free trial now<\/a>.\u00a0<\/span><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Want to write a guest article for us?<\/p>\n","protected":false},"author":414,"featured_media":14559,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_yoast_wpseo_focuskw":"byod and hipaa","_yoast_wpseo_title":"BYOD and HIPAA Compliance - A fine line between privacy and exposure","_yoast_wpseo_metadesc":"","_lmt_disableupdate":"no","_lmt_disable":"no","twitterCardType":"","cardImageID":0,"cardImage":"","cardTitle":"","cardDesc":"","cardImageAlt":"","cardPlayer":"","cardPlayerWidth":0,"cardPlayerHeight":0,"cardPlayerStream":"","cardPlayerCodec":"","footnotes":""},"categories":[197],"tags":[1339,1682,1667,1534,1673,1674,1687,1592,109,1591,1686,1684,1471,1683,1595,1675,1685,1615,1616,1668],"class_list":["post-14527","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-patient-identification","tag-bring-your-own-device","tag-byod-and-hipaa","tag-compliance-management","tag-cybersecurity","tag-data-breach","tag-data-security","tag-device-security","tag-health-insurance-portability-and-accountability-act","tag-healthcare","tag-hipaa-compliance-software","tag-hipaa-compliant","tag-hipaa-privacy","tag-hipaa-ready","tag-hipaa-security","tag-hipaa-training","tag-infosec","tag-it","tag-law","tag-regulations","tag-training-and-development"],"acf":{"_how_to_content":null,"_faq_content":null,"_structured_meta_data":null,"_tl_dr_content":null},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v19.6.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>BYOD and HIPAA Compliance - A fine line between privacy and exposure<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.m2sys.com\/blog\/patient-identification\/byod-and-hipaa-compliance-a-fine-line-between-privacy-and-exposure\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"BYOD and HIPAA Compliance - A fine line between privacy and exposure\" \/>\n<meta property=\"og:description\" content=\"Want to write a guest article for us?\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.m2sys.com\/blog\/patient-identification\/byod-and-hipaa-compliance-a-fine-line-between-privacy-and-exposure\/\" \/>\n<meta property=\"og:site_name\" content=\"Digital Transformation of Government Services\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/m2sys\" \/>\n<meta property=\"article:published_time\" content=\"2021-02-26T10:20:10+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-07-15T05:54:46+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2021\/02\/byod-and-hipaa-compliance-a-fine-line-between-privacy-and-exposure-hipaa-ready.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"445\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Ryan Stephens\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@m2sys\" \/>\n<meta name=\"twitter:site\" content=\"@m2sys\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Ryan Stephens\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/patient-identification\/byod-and-hipaa-compliance-a-fine-line-between-privacy-and-exposure\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/patient-identification\/byod-and-hipaa-compliance-a-fine-line-between-privacy-and-exposure\/\"},\"author\":{\"name\":\"Ryan Stephens\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/8e853a1f516db91fb2e4a2a2d50385f3\"},\"headline\":\"BYOD and HIPAA Compliance &#8211; A fine line between privacy and exposure\",\"datePublished\":\"2021-02-26T10:20:10+00:00\",\"dateModified\":\"2022-07-15T05:54:46+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/patient-identification\/byod-and-hipaa-compliance-a-fine-line-between-privacy-and-exposure\/\"},\"wordCount\":869,\"commentCount\":1,\"publisher\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#organization\"},\"keywords\":[\"Bring Your Own Device\",\"byod and hipaa\",\"compliance management\",\"cybersecurity\",\"data breach\",\"data security\",\"device security\",\"health insurance portability and accountability act\",\"healthcare\",\"hipaa compliance software\",\"hipaa compliant\",\"hipaa privacy\",\"HIPAA Ready\",\"hipaa security\",\"hipaa training\",\"infosec\",\"IT\",\"law\",\"regulations\",\"training and development\"],\"articleSection\":[\"Patient Identification\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.m2sys.com\/blog\/patient-identification\/byod-and-hipaa-compliance-a-fine-line-between-privacy-and-exposure\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/patient-identification\/byod-and-hipaa-compliance-a-fine-line-between-privacy-and-exposure\/\",\"url\":\"https:\/\/www.m2sys.com\/blog\/patient-identification\/byod-and-hipaa-compliance-a-fine-line-between-privacy-and-exposure\/\",\"name\":\"BYOD and HIPAA Compliance - A fine line between privacy and exposure\",\"isPartOf\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#website\"},\"datePublished\":\"2021-02-26T10:20:10+00:00\",\"dateModified\":\"2022-07-15T05:54:46+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/patient-identification\/byod-and-hipaa-compliance-a-fine-line-between-privacy-and-exposure\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.m2sys.com\/blog\/patient-identification\/byod-and-hipaa-compliance-a-fine-line-between-privacy-and-exposure\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/patient-identification\/byod-and-hipaa-compliance-a-fine-line-between-privacy-and-exposure\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"BYOD and HIPAA Compliance &#8211; A fine line between privacy and exposure\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#website\",\"url\":\"https:\/\/www.m2sys.com\/blog\/\",\"name\":\"Digital Transformation of Government Services\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.m2sys.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#organization\",\"name\":\"Digital Transformation of Government Services\",\"url\":\"https:\/\/www.m2sys.com\/blog\/\",\"sameAs\":[\"https:\/\/instagram.com\/m2sys\",\"https:\/\/www.linkedin.com\/company\/m2sys-technology\",\"https:\/\/www.pinterest.com\/m2sys\/\",\"https:\/\/www.youtube.com\/user\/M2SYS\",\"https:\/\/www.facebook.com\/m2sys\",\"https:\/\/twitter.com\/m2sys\"],\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png\",\"contentUrl\":\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png\",\"width\":287,\"height\":48,\"caption\":\"Digital Transformation of Government Services\"},\"image\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/8e853a1f516db91fb2e4a2a2d50385f3\",\"name\":\"Ryan Stephens\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/048de6baeffcbd2a710c65c45f6d13dc?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/048de6baeffcbd2a710c65c45f6d13dc?s=96&d=mm&r=g\",\"caption\":\"Ryan Stephens\"},\"url\":\"https:\/\/www.m2sys.com\/blog\/author\/riyan\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"BYOD and HIPAA Compliance - A fine line between privacy and exposure","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.m2sys.com\/blog\/patient-identification\/byod-and-hipaa-compliance-a-fine-line-between-privacy-and-exposure\/","og_locale":"en_US","og_type":"article","og_title":"BYOD and HIPAA Compliance - A fine line between privacy and exposure","og_description":"Want to write a guest article for us?","og_url":"https:\/\/www.m2sys.com\/blog\/patient-identification\/byod-and-hipaa-compliance-a-fine-line-between-privacy-and-exposure\/","og_site_name":"Digital Transformation of Government Services","article_publisher":"https:\/\/www.facebook.com\/m2sys","article_published_time":"2021-02-26T10:20:10+00:00","article_modified_time":"2022-07-15T05:54:46+00:00","og_image":[{"width":800,"height":445,"url":"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2021\/02\/byod-and-hipaa-compliance-a-fine-line-between-privacy-and-exposure-hipaa-ready.jpg","type":"image\/jpeg"}],"author":"Ryan Stephens","twitter_card":"summary_large_image","twitter_creator":"@m2sys","twitter_site":"@m2sys","twitter_misc":{"Written by":"Ryan Stephens","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.m2sys.com\/blog\/patient-identification\/byod-and-hipaa-compliance-a-fine-line-between-privacy-and-exposure\/#article","isPartOf":{"@id":"https:\/\/www.m2sys.com\/blog\/patient-identification\/byod-and-hipaa-compliance-a-fine-line-between-privacy-and-exposure\/"},"author":{"name":"Ryan Stephens","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/8e853a1f516db91fb2e4a2a2d50385f3"},"headline":"BYOD and HIPAA Compliance &#8211; A fine line between privacy and exposure","datePublished":"2021-02-26T10:20:10+00:00","dateModified":"2022-07-15T05:54:46+00:00","mainEntityOfPage":{"@id":"https:\/\/www.m2sys.com\/blog\/patient-identification\/byod-and-hipaa-compliance-a-fine-line-between-privacy-and-exposure\/"},"wordCount":869,"commentCount":1,"publisher":{"@id":"https:\/\/www.m2sys.com\/blog\/#organization"},"keywords":["Bring Your Own Device","byod and hipaa","compliance management","cybersecurity","data breach","data security","device security","health insurance portability and accountability act","healthcare","hipaa compliance software","hipaa compliant","hipaa privacy","HIPAA Ready","hipaa security","hipaa training","infosec","IT","law","regulations","training and development"],"articleSection":["Patient Identification"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.m2sys.com\/blog\/patient-identification\/byod-and-hipaa-compliance-a-fine-line-between-privacy-and-exposure\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.m2sys.com\/blog\/patient-identification\/byod-and-hipaa-compliance-a-fine-line-between-privacy-and-exposure\/","url":"https:\/\/www.m2sys.com\/blog\/patient-identification\/byod-and-hipaa-compliance-a-fine-line-between-privacy-and-exposure\/","name":"BYOD and HIPAA Compliance - A fine line between privacy and exposure","isPartOf":{"@id":"https:\/\/www.m2sys.com\/blog\/#website"},"datePublished":"2021-02-26T10:20:10+00:00","dateModified":"2022-07-15T05:54:46+00:00","breadcrumb":{"@id":"https:\/\/www.m2sys.com\/blog\/patient-identification\/byod-and-hipaa-compliance-a-fine-line-between-privacy-and-exposure\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.m2sys.com\/blog\/patient-identification\/byod-and-hipaa-compliance-a-fine-line-between-privacy-and-exposure\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.m2sys.com\/blog\/patient-identification\/byod-and-hipaa-compliance-a-fine-line-between-privacy-and-exposure\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"BYOD and HIPAA Compliance &#8211; A fine line between privacy and exposure"}]},{"@type":"WebSite","@id":"https:\/\/www.m2sys.com\/blog\/#website","url":"https:\/\/www.m2sys.com\/blog\/","name":"Digital Transformation of Government Services","description":"","publisher":{"@id":"https:\/\/www.m2sys.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.m2sys.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.m2sys.com\/blog\/#organization","name":"Digital Transformation of Government Services","url":"https:\/\/www.m2sys.com\/blog\/","sameAs":["https:\/\/instagram.com\/m2sys","https:\/\/www.linkedin.com\/company\/m2sys-technology","https:\/\/www.pinterest.com\/m2sys\/","https:\/\/www.youtube.com\/user\/M2SYS","https:\/\/www.facebook.com\/m2sys","https:\/\/twitter.com\/m2sys"],"logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png","contentUrl":"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png","width":287,"height":48,"caption":"Digital Transformation of Government Services"},"image":{"@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/8e853a1f516db91fb2e4a2a2d50385f3","name":"Ryan Stephens","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/048de6baeffcbd2a710c65c45f6d13dc?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/048de6baeffcbd2a710c65c45f6d13dc?s=96&d=mm&r=g","caption":"Ryan Stephens"},"url":"https:\/\/www.m2sys.com\/blog\/author\/riyan\/"}]}},"modified_by":"Abu Baker Siddique","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/posts\/14527"}],"collection":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/users\/414"}],"replies":[{"embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/comments?post=14527"}],"version-history":[{"count":5,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/posts\/14527\/revisions"}],"predecessor-version":[{"id":18205,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/posts\/14527\/revisions\/18205"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/media\/14559"}],"wp:attachment":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/media?parent=14527"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/categories?post=14527"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/tags?post=14527"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}