Healthcare professionals have been using shared workstations and laptops for decades to boost clinician productivity, streamline workflows and lower costs. So it should come as no surprise that this highly mobile workforce is using shared tablets at the point of care as well. But to actually gain the same benefits, organizations need to provide clinicians with fast and easy access to shared tablets while minimizing the risks that they can pose.
Although there are risks similar to those involving shared workstations and laptops, there are also situations that are more likely to occur or that are exacerbated by the characteristics and capabilities of tablets. As a result, managing security controls becomes a key component in ensuring the information accessed on a shared tablet is secure.
Register or login for access to this item and much more
All Health Data Management content is archived after seven days.
Community members receive:
- All recent and archived articles
- Conference offers and updates
- A full menu of enewsletter options
- Web seminars, white papers, ebooks
Already have an account? Log In
Don't have an account? Register for Free Unlimited Access