" text messaging Archives - LuxSci FYI Blog: Learn about HIPAA email encryption, secure email encryption, and more
LUXSCI

Posts Tagged ‘text messaging’

Secure Text Message Marketing: Step By Step

Friday, March 31st, 2017

Many marketers are engaged in a mad scramble to make the most of social media platforms. Unfortunately, these channels have some major drawbacks. Unlike email and text messaging, social media communications generally lack the security and oversight controls required in regulated industries like health care. Secure text message marketing is an excellent addition to boost your marketing results even if you have to operate under heavy regulations.

Text Messaging

Read the rest of this post »

To Text or Not To Text: Texting under HIPAA

Monday, February 29th, 2016

Sending text messages under HIPAA

Sometimes, technology just sneaks up on you. Patients want to speak with you – stat – about lab results or to schedule, be reminded of, and confirm an appointment without an interminable wait in the phone queue. Patients want text messaging — which has quickly become the new normal for everyday communication — to be used routinely for their healthcare needs, as well. You hesitate, concerned not only about the appropriateness of text messaging, but the legal ramifications. These are legitimate concerns.

HIPAA unambiguously states that sending health information in a text message is a straight up violation, unless it is to a patient and a proper consent form has been signed (as discussed below). This provision applies to messages as simple as appointment reminders. If you engage in such a practice and do not document context, consideration, and patient consent, you will be in willful neglect and quite possibly assessed up to $50,000 for each text message.

Why is text messaging such a hot-button issue to HIPAA enforcers? Under what conditions can health information be sent by way of regular text messages? The good news is that you can secure text messages rather simply and not jeopardize your patients’ privacy or your healthcare practice. Please read on.

Read the rest of this post »

Unsecured Text Messaging = Willful Neglect

Monday, March 30th, 2015

We have come across this scenario a number of times:

  1. Hospital knows that doctors are texting ePHI
  2. Hospital makes and informs of policies against it
  3. People are doing it anyway and Hospital management / IT staff know it
  4. Since a policy is in place, the infractions to the policy are ignored

This is willful neglect, folks.  This is the kind of thing that will come back to bite you and leave a serious wound.  Just having a policy does not protect your organization from infractions of that policy.  If you know (or even suspect) that infractions may be occurring, you are required to take action.

In a 2014 survey on Physician’s At-work texting habits (in Telemedicine and e-Health), researchers found:

Read the rest of this post »

Email and Text Messaging Security in the Wired and Wireless Worlds

Thursday, August 1st, 2002

International Lecture by Dr. Erik Kangas

"Internet email, Internet instant messaging, and mobile short text messaging are related in that they enable communications by pushing messages from sender to recipient over generally insecure networks. The security issues and vulnerabilities inherent in all three modes of communication are also very similar. This talk will review standard security threats associated with electronic messaging in general, and their common remedies including symmetric and asymmetric key encryption, digital signatures, and message authentication codes. Next, a detailed exposition of the security vulnerabilities inherent in all phases of Internet email delivery will be examined and solutions such as S/MIME, Authentication, and Transport Layer Security (TLS) will be discussed. After a brief look of the serious issues involved with public Instant Messaging services such as AOL Instant Messenger, Yahoo! Messenger, and ICQ, the Short Messaging System (SMS) over the Global System for Mobile Communications (GSM) will be examined. We will review the current security protocols used by GSM and identify the vulnerabilities to SMS. Finally, several ways that GSM or SMS could be extended or modified to ensure the security and privacy of SMS messages, even in a multi-vendor mobile environment, will be proposed."

Read the rest of this post »

LUXSCI