Gather all your devices that you utilize to conduct any AWC business (i.e. access your AWC email account, the electronic health record system, to communicate with clients etc.,) and that handle or contain any protected health information/client info. For each device, complete a copy of the Allied Wellness Collective BYOD Registration Form.
Click on your device below for a list of action items to do. Typically, each action item will have an instructional video showing how to complete it! Fill out the BYOD registration form as you complete each step.
The behavioral security requirements of the BYOD policy are not listed on the device registration form, but they are very important to keeping client information secure. Following are some helpful instructions and tutorials for how to make small changes to your behavior that will support the security of clients and your practice.
WiFi is everywhere, but it’s a bit shocking just how unsecure most WiFi is.
Very importantly: avoiding untrusted WiFi isn’t just important when you are accessing practice systems or working with client information. Using untrusted WiFi can easily cause your device to get infected or cloned (that’s where a bad guy makes a virtual copy of your phone, essentially.)
Devices that contact client information need to be protected from these harmful situations. So they should never be connected to WiFi that you can’t trust. For that reason, BYOD devices should only be connected to approved WiFi at practice facilities, and to home WiFi where you have set up a secured branch of your WiFi that is not shared with anyone else, including guests.
In cases where you do not have access to trusted WiFi and you need to access the Internet, the best solution is to use your phone’s data plan. If you need to use a computer, your phone can usually be set up to act as its own private WiFi hotspot. That is a very reliable way to make sure you always have trustworthy WiFi for your BYOD devices.
We know it is tempting to leave devices in the car while you run into the store, but that is one of the most common ways that devices get stolen and data breaches occur. Even when we put computing devices in the car’s trunk, historical data shows us that they get stolen frequently enough that a car trunk isn’t quite safe enough for the needs of mental health professionals.
So when traveling with BYOD devices, always carry them with you.
This graphic form will help you make sure you didn’t miss any devices that need to be configured and registered!
Now, submit your BYOD Registration Form(s) below. One form will need to be completed for each personal device.
If you have PHI on your device you’ll want to make sure it’s securely deleted. These videos and articles below will walk you through it no matter what device type you have.
If you’re going to be ceasing to use a BYOD device for IPA business, this guide will help you document its termination. Complete the termination form linked below, and follow the guides on securely deleting (factory resetting) your device.
Click on your device type below for a video walking you through the process of securely deleting its contents.
To securely delete your Macintosh computer, just open the link below and follow the instructions in the video also below.
To securely delete your Windows computer, just open the link below and follow the instructions in the video also below. The first link is a guide, and the second will tell you how to find out which version of Windows you have.
To securely delete your iPhone just open the link below and follow the instructions in the video also below.
To securely delete your iPad just open the link below and follow the instructions in the video also below.
To securely delete your Android Phone just open the link below and follow the instructions in the video also below. Included are also links for common Android phone manufacturers.
To securely delete your Chromebook just open the link below and follow the instructions in the video also below.