INFO5306 Assignment 1: BYOD Discussion for USYD Healthcare Systems

Verified

Added on  2022/10/10

|12
|3378
|259
Report
AI Summary
This report provides a comprehensive discussion on the Bring Your Own Device (BYOD) policy within the context of the University of Sydney (USYD) healthcare system. It begins with an executive summary that outlines the core issues and the approach taken. The report analyzes the challenges associated with BYOD, including the effective deployment of applications, substantial network support, security concerns related to lost devices, the blurring of professional and personal boundaries, and penalties for data breaches. The report then proposes solutions to address these challenges, such as educating employees on security, enhancing network infrastructure, implementing robust security measures, and establishing clear policies. Furthermore, the report discusses the benefits and outcomes of implementing these solutions, including cost savings, increased efficiency, and a more open work environment. Finally, it assesses the resources required to achieve these outcomes, providing a complete overview of the BYOD implementation strategy within the USYD healthcare system, addressing the challenges, solutions, and potential benefits.
tabler-icon-diamond-filled.svg

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Running head: DISCUSSION ON BRING YOUR OWN DEVICES (BYOD)
Discussion on Bring Your Own Devices (BYOD)
Name of the student:
Name of the university:
Author Note
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
1DISCUSSION ON BRING YOUR OWN DEVICES (BYOD)
Executive summary
BYOD indicates to the organizational policy and authorizing employees for bringing the distinct
personal systems like mobiles, tablets and laptops. It helps in getting connected to the organization’s
business. In the resent case, for evaluating the innovation, the real-life situation of USYD healthcare
is taken into consideration. It refers to the health services within University of Sydney. Further, the
problems include the requirements to denote the suggestions solutions and issues to fulfil the
necessities. Besides, the results and benefits as the solution must be implemented here. At last, the
resources needed to achieve the outcomes are assessed here.
Document Page
2DISCUSSION ON BRING YOUR OWN DEVICES (BYOD)
Table of Contents
Introduction:..........................................................................................................................................3
Understanding the present challenges:..................................................................................................3
The requirements for addressing the aforementioned challenges:........................................................5
The suggested solution to fulfilling the requirements mentioned above:..............................................7
The benefits and outcomes as the solution are deployed:......................................................................8
Resources required to achieve the results:.............................................................................................8
Conclusion:............................................................................................................................................9
References:..........................................................................................................................................10
Document Page
3DISCUSSION ON BRING YOUR OWN DEVICES (BYOD)
Introduction:
BYOD refers to the organizational policy authorizing staffs to bring their individual personal
systems such as tablets, laptops and mobiles. This is to get connected with the network of the
business. To understand the technology, the real-life scenario of USYD healthcare is considered
here. This denotes to the health services under the University of Sydney. The wellbeing and health of
the people are their topmost priority. This is the reason they encourage to take benefits of their
convenient healthcare benefits at their campus. Irrespective of the fact that one requires any
treatment for health concern, illness and injury the University Health Service is always there to help.
Here, the challenges involving the necessities to denote to the issues and suggested solutions
fulfilling the requirements are demonstrated. Next, the benefits and outcomes as the solution is
deployed are discussed here. Lastly, the resources required to gain the results are analyzed here.
Understanding the present challenges:
Deploying Applications Effectively:
It is estimated by FDA that till 2015, there must be about 500 million individuals who would
be utilizing mobile phones throughout the world. They must have the healthcare apps installed in
them. Within 2018, about half of the 3.4 billion users of mobiles across the globe can have a
minimum of one medical or any app related to health downloaded (Keyes 2016). Here, USYD
healthcare is found to be utilizing the threat management software that is unified in nature. Besides,
they have been using firewalls for monitoring the application utilized on mobile systems. This is to
assure that they have been running securely and safely. The process helps the medical professionals
in remaining compliant with the HIPPA. This occurs as the system is found to be accessing the
application from the third party (Al Ayubi et al. 2016).
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
4DISCUSSION ON BRING YOUR OWN DEVICES (BYOD)
Delivering Substantial Network Support:
As per the journal of mobile technology in Medicine, it is seen that about 90% of the
professionals at healthcare has possessed the mobile. Here, 87% of them have used that while they
conduct clinical practices. This is the potential of high strain on the network of USYD healthcare’s
staffs and the use of mobile devices of visitors and patients (Dhingra 2016).
Security regarding the lost devices:
As the facility of the healthcare provides the staffs with mobiles, the department of IT bears
the liability to secure the information on the system as it gets lost. Next, it is found as the
replacement system for the employees. This model is altered since most of the people are found to be
bringing their individual mobile phones. This presents most of the security issues for the facility of
healthcare as any such system is lost (Olalere et al. 2015). Devices consisting of data secured
through HIPPA is to be secured. This is reason why it is vital for the department of IT of USYD
healthcare to seek the methods of balancing the strong measures to protect the systems despite
getting too much invasive.
The soft bar between the professionals and personals:
Various advantages are there for the medical employees to have their professional and
personal tasks centralized on their systems. This involves the way it is convenient, and this
originated from potential downfalls. This is same as the concept to develop the principle to install
the firewalls of security. Besides this can also be demonstrated as what is to be one as the device is
lost and USYD healthcare’s facility intends to create the limits for the mobile phone uses while their
hours of working goes on (Garba et al. 2015).
Document Page
5DISCUSSION ON BRING YOUR OWN DEVICES (BYOD)
Penalties for different data breaches:
Any sort of failure to suitably deploy the BYOD program for USYD healthcare is highly
expensive. The reason is that the HITECH Act has permitted HIPAA’s enforcement as strict
penalties and widened authority of officials who are enforced to the infractions at state and federal
levels (Kerr, Talaei-Khoei and Ghapanchi 2018).
The requirements for addressing the aforementioned challenges:
The issue with the first approach is that BYOD systems have never been equipped from the
very first with these protection levels to analyze and monitor the third-party applications. Having the
infinite quantity of applications for medical, download there are important concerns of security as
there are systems and never accessing the network of USYD healthcare’s facility. Further, policies
are to be implemented by USYD healthcare’s administration assuring that the staffs know those
concerns of security. This can be brought up to the pace of the educational elements for assuring that
they can avid the effective problems at every cost. For the next problem, the IT department of USYD
healthcare‘s facility is tasked with the issue of assuring that their network is able to withstand the
demand through the addition of numerous devices that are connected (Bello Garba, Armarego and
Murray 2015). The hospitals wireless LAN can handle the exchange of most of the sensitive data
and thus must stay consistent and available continuously for using and dependable to perform across
time. Here, federal laws need USYD healthcare to implement the network to control the bandwidth.
This can be developed by the mobile systems and securing every data passing through the wireless
LAN. Next, the employees must be educated suitable regarding the significance to secure the device
as this is used to process the sensitive company and patient data as an ongoing basis. Through
bringing every employee updated on how suitably they can secure the devices can move long way to
keep the sensitive data in intact way and the devices lost secured from getting hacked. Here, this
Document Page
6DISCUSSION ON BRING YOUR OWN DEVICES (BYOD)
type of awareness is helpful to assist USYD healthcare’s IT department to deploy the need security
measures on the personal mobiles of the employees having less resistance as they know the
significance to secure the devices. This is behalf of the patients and the organization (Welsh et al.
2018).
Furthermore, USYD healthcare must generate strong principles to outline the usage of
personal mobile devices utilized as the clinical practice is there for guaranteeing that they are never
comprising of detailed that are overlooked as he phone is lost and probably compromised. As the bar
is blurred between the personal and professional usage of the mobile, some boundaries can be drawn
as to be suitable for the employees to utilize the phone in making the communication in personal
way. Generating any cultural shift at USYD healthcare for encouraging transparency across the use
of the devices for understanding the effective conflicts better can arise because of the uses. They
should clearly define the applications to be utilized and the LAN network employees must connect
to that as they are in office and the tasks prohibited, the data is must sensitive for transmission and so
on. Here, every data of patients on the mobile devices are owned by USYD healthcare and the
employees must be treated with much careful manner for assuring the entire compliance with the
HIPAA (Alaskar and Shen 2016). Lastly, regarding the penalties for the data breaches, the issue for
the organization is to balance the HIPAA limitations having the risks of enforcements of BYOD
program. The goals that seemingly conflicting are never mutually exclusive in nature. The reason is
that USYD healthcare, approaching the implementation of the innovation of BOD and the
administration is strategic in nature, well-planned and thoughtful way becomes successful. This must
be in well-planned way to be quite successful as they consider time to perform things properly and
then avid the limitations of data breach and also related penalties (Gökçe and Dogerlioglu 2019).
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
7DISCUSSION ON BRING YOUR OWN DEVICES (BYOD)
The suggested solution to fulfilling the requirements mentioned above:
Through educating the employees regarding the effective harm of particular third party
applications to access the network of USYD healthcare their network, they can receive stronger buy-
in from the staffs handling their personal devices for getting equipped better with the suitable
software and proper security measurements. The application-layer firewall and the unified threat
managing is helpful to protect the BYO strategy at the facility. As the devices are suitably synced
with the current systems of security. They can make the security measures to be mandatory for the
staffs to take part in the system of BYOD for preventing the probable security breaches multitude in
nature. This put impact on the network of the USYD healthcare (Fani, Von Solms and Gerber 2016).
Lastly, there must be a delivery of substantial support of network. USYD healthcare’s IT
departments should be updating the current systems for assuring that they can scale with the constant
necessities from the staff members who practice the BYOD. They must be preparing their healthcare
facility at present through confirming that the networks are able to handle the rise of mobile at the
business or start to investigate the alternative solutions for the bandwidth needed. Further, there must
be security related to loss of devices and for this the policies are to be set ahead of rime for their
facilities. This must be done through BYOD strategy to save the cost, decrease the time spent soon
the technical way of troubles shooting for their IT area. Here, they must further protect the sensitive
data on the devices. They need the staffs to get synch with IT for setting the security wiping devices
lost or harmed for guaranteeing the security or the sensitive data (Lee Jr et al. 2017). Besides, they
must also nee staffs to turn on the systems as any security evaluation is one and need that they can
legally promise never for suing the USYD healthcare’s facility as personal data is present at any
devices as the course goes on. Regarding the blurred line present between the personal and
professional the issue is that mobile system and the advantages have turned to be the norm in the
Document Page
8DISCUSSION ON BRING YOUR OWN DEVICES (BYOD)
society’s real-time communication. As implemented to the space of healthcare, individual security
and privacy are seen to be vital as cost and convenience. Despite the fact that any strong policy
across that has been appropriate or not, the usage of the strategy of BYOD as USYD healthcare’s
facility has turned to be trouble that it has been intended (Li and Yang 2017). Lastly, regarding the
penalties for the data breaches, there must never be any specific formula that all kind of facility of
USYD healthcare as the BYOD is considered to avoid the breach in data. Here, USYD healthcare
must specifically cater the policies of BYOD to particular necessities and goals of business for
meeting the constant security in the data and risks of potential breach (Schönhofer et al. 2018).
The benefits and outcomes as the solution are deployed:
As USYD healthcare permit the staffs to bring their individual system to work, they can
generate a more relaxed, efficient and open scenario of the advantaged for both the parties here. The
benefits involve the saving of money, through eradicating the necessity to buy every staff specific
equipment and devices. Next, there is rise of satisfaction and happiness for the staffs and boost
productivity through permitting the staffs to utilize the systems that are comfortable or familiar with
(Chen et al. 2016). Besides, they can have upgraded technology as the staffs get the greatest and
latest systems. Above, as far as the outcomes are considered, BYD boosts USYD healthcare’s work
environment. The policy opens the door towards new exposures and risks. For avoiding the risks,
they must know what they have been entailing and the way they can deliver the additional protection
layers for securing the complex data (Byrom et al. 2016).
Resources required to achieve the results:
Firstly, USYD healthcare can use the BYOD FAQ for the employees. Then there can be
BYOD network, BYOD Wiki, BYOD rules and policies. Regarding the web based resources, there
Document Page
9DISCUSSION ON BRING YOUR OWN DEVICES (BYOD)
can be downloadable mobile devices providing an overview of BYOD for the staffs. This can
provide the data regarding various systems staffs might utilize and resource’s and programs useful at
the healthcare. Besides, Pinterest is an effective resource. This is a board of collection of links about
specific concern.
Conclusion:
It must be reminded by USYD healthcare that they must never deploy the BYOD policy until
they get totally prepared for handling that. Through BYOD the staffs of USYD healthcare are able to
access the corporate mails ad confidential applications and data through BYOD. Thus the staffs are
able to enjoy the familiarity and comfort with their own device. Through weighing the benefits and
drawbacks with the issues of compliances, USYD healthcare can level the written BYOD policy to
denote the issues of BYOD security comprehensively. Next, the policy must deliver clear password
specifications for the staffs of USYD healthcare. Next, USYD healthcare requires comprehensive
suite of mobile device management. Having the array of various versatile mobile devices, multiple
business processes, hybrid networks. This is never simple for then to manually monitor and then
manage all the devices under the networks. Prior rolling the program of BYOD, USYD healthcare
must finish the extensive risk analysis. This must serve various purposes. Here, the risk analysis at
the first place must reveal that the staffs can use their individual system for transmitting the health
and additional data that are related to work and thus can set up the extensive policies for suitable
usage of BYOD programs are vital. Here, the analysis of risk must reveal whether BYOD has been
financially and technically feasible for USYD healthcare. They must consider the potential expenses
of data breaches and the penalties of compliances.
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
10DISCUSSION ON BRING YOUR OWN DEVICES (BYOD)
References:
Al Ayubi, S.U., Pelletier, A., Sunthara, G., Gujral, N., Mittal, V. and Bourgeois, F.C., 2016. A
Mobile App Development Guideline for Hospital Settings: Maximizing the Use of and Minimizing
the Security Risks of" Bring Your Own Devices" Policies. JMIR mHealth and uHealth, 4(2), p.e50.
Alaskar, M. and Shen, K.N., 2016. Understanding bring your own device (BYOD) and employee
information security behaviors from a work-life domain perspective.
Bello Garba, A., Armarego, J. and Murray, D., 2015. Bring your own device organizational
information security and privacy. ARPN Journal of Engineering and Applied Sciences, 10(3),
pp.1279-1287.
Byrom, B., Lee, J., Dennis, K., Noble, M., McCarthy, M. and Muehlhausen, W., 2016. Bring your
own device for trial outcome assessment. Applied Clinical Trials, 25(6/7), p.18.
Chen, W., Tengda, X.U., Ruan, X. and Wang, Z., 2016. Application of bring your own device in
healthcare institutions. Chinese Journal of Hospital Administration, 32(8), pp.634-637.
Dhingra, M., 2016. Legal issues in secure implementation of bring your own device (BYOD).
Procedia Computer Science, 78, pp.179-184.
Fani, N., Von Solms, R. and Gerber, M., 2016, May. Governing information security within the
context of “bring your own device in SMMEs”. In 2016 IST-Africa Week Conference (pp. 1-11).
IEEE.
Garba, A.B., Armarego, J., Murray, D. and Kenworthy, W., 2015. Review of the information
security and privacy challenges in Bring Your Own Device (BYOD) environments. Journal of
Information privacy and security, 11(1), pp.38-54.
Document Page
11DISCUSSION ON BRING YOUR OWN DEVICES (BYOD)
Gökçe, K.G. and Dogerlioglu, O., 2019. “Bring your own device” policies: Perspectives of both
employees and organizations. Knowledge Management & E-Learning: An International Journal,
11(2), pp.233-246.
Kerr, D., Talaei-Khoei, A. and Ghapanchi, A.H., 2018. A paradigm shift for bring your own device
(BYOD).
Keyes, J., 2016. Bring your own devices (BYOD) survival guide. Auerbach Publications.
Lee Jr, J., Warkentin, M., Crossler, R.E. and Otondo, R.F., 2017. Implications of monitoring
mechanisms on bring your own device adoption. Journal of Computer Information Systems, 57(4),
pp.309-318.
Li, P. and Yang, L., 2017. Management strategies of Bring Your Own Device. In MATEC Web of
Conferences (Vol. 100, p. 02007). EDP Sciences.
Olalere, M., Abdullah, M.T., Mahmod, R. and Abdullah, A., 2015. A review of bring your own
device on security issues. Sage Open, 5(2), p.2158244015580372.
Schönhofer, A., Hubner, S., Rashed, P., Aigner, W., Judmaier, P. and Seidl, M., 2018, June.
ViennAR: User-Centered-Design of a Bring Your Own Device Mobile Application with Augmented
Reality. In International Conference on Augmented Reality, Virtual Reality and Computer Graphics
(pp. 275-291). Springer, Cham.
Welsh, K.E., Mauchline, A.L., France, D., Powell, V., Whalley, W.B. and Park, J., 2018. Would
Bring Your Own Device (BYOD) be welcomed by undergraduate students to support their learning
during fieldwork?. Journal of Geography in Higher Education, 42(3), pp.356-371.
chevron_up_icon
1 out of 12
circle_padding
hide_on_mobile
zoom_out_icon
logo.png

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]