Introduction
To provide information and directives for nurses operating the electronic system, prevent the occurrence of cyber security threats, and protect patients’ private information.
Policy
Internet-connected devices, such as medical or personal mobile devices, present a significant vulnerability source in electronic systems (Stockwell, 2018). Nurses interact with many medical consumer-oriented devices and, therefore, should acknowledge their importance in protecting patients’ data (Nahm et al., 2019). The connection of personal mobile devices to the hospital network exposes electronic systems to cyber threats. In terms of importance, the security of portable devices takes second place after physical threats, such as leaving the workplace and electronic systems unprotected (Kamerer & McDermott, 2022). Nurses often prioritize patients’ outcomes and do not acknowledge the risks of cyber security threats (Zaman et al., 2021). Thus, nurses often connect their personal and wearable devices to the hospital network for both work-related and personal purposes (Argaw et al., 2020). Maintaining a regular inventory of all devices in the hospital network presents one of the prominent measures for mitigating the vulnerability of electronic systems. Thus, nurses who use their mobile devices for work-related activities following BYOD (bring your device) policy are required to submit the devices for monthly security checks to the IT department. In cases where nurses do not access the hospital network with their mobile devices, a monthly security check is not required.
Definitions
The personal mobile device is a portable electronic device capable of processing electronic data and accessing the Internet, such as smartphones, tablets, and smart wearable devices.
Conclusion
Before connecting their mobile device to the hospital network, nurses should refer to the IT department for the devices’ security check. After the initial inspection, nurses must submit their devices to a monthly security check to continue using the hospital network. Alternatively, in cases where nurses do not use their devices to access the hospital network, a security check is not needed.
References
Argaw, S.T., Troncoso-Pastoriza, J.R., Lacey, D., Florin, M., Calcavecchia, F., Anderson, D., Burleson, W., Vogel, J. M., O’Leary, C., Eshaya-Chauvin, B., & Flahault, A. (2020). Cybersecurity of hospitals: Discussing the challenges and working towards mitigating the risks. BMC Medical Informatics and Decision Making, 20, 1-10.
Kamerer, J. L, & McDermott, D. (2020). Cybersecurity: Nurses on the front line of prevention and education. Journal of Nursing Regulation, 10(4), 48–53.
Nahm, E. S., Poe, S., Lacey, D., Lardner, M., Van De Castle, B., & Powell, K. (2019). Cybersecurity essentials for nursing informaticists. CIN: Computers, Informatics, Nursing, 37(8), 389-393.
Stockwell, S. (2018). What nurses need to know about cybersecurity. AJN, American Journal of Nursing, 118(12), 17–18.
Zaman, N., Goldberg, D. M., Kelly, S., Russell, R. S., & Drye, S. L. (2021). The relationship between nurses’ training and perceptions of electronic documentation systems. Nursing Reports, 11(1), 12–27.