Network Synergy Blog

Network Synergy has been serving the Trumbull area since 1988, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

HIPAA and Wearables May Clash in the Near Future

HIPAA and Wearables May Clash in the Near Future

Today, perhaps now more than ever before, technology is making strides toward making its users consider ways to stay healthier. Wearables are one of the primary examples of how technology is aiming to make users both more active and more interested about their own health. At 2018’s Consumer Electronics Show in Las Vegas, Nevada, this technology was front and center, showcasing how far it has come in just a year’s time.

The latest and greatest health technology takes advantage of monitoring and other types of machinery to ensure users are connected to their vitals in never before seen ways. Healthcare professionals are using these technologies to diagnose and predict potential health issues in patients, allowing them to take a preventative approach to their wellness. Devices like watches, pacemakers, phones, and even jewelry are all collecting data that can be used by patients and doctors to improve the way that personal health is approached.

Consumer technology is one of the strongest places to start implementing health-based functionality, according to several industry professionals, including Samsung’s chief medical officer and head of healthcare and fitness, Dr. David Rhew. Yet, these changes in the way that technologies take advantage of health information tend to blur the lines between what’s acceptable and what’s not.

Take, for example, the Health Insurance Portability and Accountability Act, which ensures that medical data or similar records are kept safe and secure from prying eyes. There are various regulations that need to be kept by any organization collecting this information for any reason--even if it’s just a device that’s collecting information about a user’s vitals. How are these devices affected by HIPAA, or vice versa?

The near future might be filled with devices that can examine heart rate, detect abnormalities in blood pressure, track sleeping patterns, and monitor body temperature, but these devices will need to be closely monitored and regulated in an effort to preserve the privacy of their patients or users. The question for the future, however, will be whether or not these wearables should be held to the same regulations as HIPAA compliant devices are.

Here are some of the more interesting smart wearables that can be used by consumers to learn more about the inner workings of their bodies:

  • L’Oréal introduced a tiny ultraviolet sensor smaller than a thumbnail that can be used to minimize exposure to too much sunlight and reduce chances of skin cancer.
  • Philips has created the SmartSleep, which is headgear that can improve the quality of the user’s deep sleep and monitor patterns in sleep.
  • Oska Wellness has introduced a wearable that connects an electromagnetic pulse to an application, all to track and resolve muscle pain.

What are some of your anticipated uses for wearable technology in the coming year? Let us know in the comments, and subscribe for more information on the latest and greatest technology.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, 22 May 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab

QR-Code dieser Seite

Sign Up

  • First Name *
  • Last Name *

      Blog Categories

      Access Control Malware Connectivity Deep Learning CCTV Twitter Data Recovery Private Cloud Security Motherboard Intranet Word Current Events Business Technology Spam Technology Laws Business Owner Modem Superfish IT service Robot Data Loss LiFi Mobile Device Digital Payment Print Server Network Management Gmail Apple Networking Hacker Apps Star Wars Battery Techology Windows 8.1 Update Halloween CIO Legal Bluetooth Tip of the Week Secruity Outsourced IT Cleaning Migration Gadget Mobile Security Business Management Applications Save Money PDF 5G Utility Computing Backups Webinar Two-factor Authentication Alerts Google Maps Safety Downtime Inbound Marketing Smartphones Browser Cryptocurrency Software IBM Chatbots Encryption Identity Network Security Managed Service Provider User Error Macro Computing Infrastructure Computer Accessories Artificial Intelligence Mail Merge Content Filtering Fun Computer Care Mouse Solid State Drive Memory Computers Paperless Office Assessment Social Networking Display Documents IT budget Regulations Microsoft Hosted Solutions Troubleshooting Wearable Technology Office 365 Mobile Data Managed IT Bitcoin Statistics Motion sickness Distributed Denial of Service BYOD Bring Your Own Device Value eWaste Virus Mobile Device Management Software as a Service Drones Politics Law Firm IT Social Engineering Congratulations Gaming Console Operating System Cortana Hard Drives Social Trainging Tutorials Travel Identity Theft Quick Tips SaaS Cybersecurity Tip of the Work Crowdsourcing Email Cost Management Tracking Tech Support Unified Threat Management IT Support Emoji Productivity Server Management Programming Hacking Data Security Data Backup Google Calendar Microsoft Office IT Management BDR User Tips Remote Support Virtual Desktop Comparison Router Recovery Personal Information Telephony Remote Computing YouTube IT Support Running Cable Cloud Going Green Dark Web Text Messaging How To Machine Learning Hardware Digital Signature Domains Mobile Devices PowerPoint Heating/Cooling Big Data Budget Scheduling Innovation Outlook Start Menu Small Business Staffing Alert Monitors Cache History Windows 10 Risk Management Nanotechnology Proactive IT Skype Vendor Management Cloud Computing Break Fix Knowledge Mirgation Meetings Supercomputer Mobile Computing Wi-Fi Education Hard Disk Drive Food HIPAA Identities Virtualization Sports Blockchain VoIP Saving Money Electronic Medical Records Taxes Phone System IT Consulting Storage Operations Vulnerability Password Project Management Automobile eBay 3D Printing Hosted Solution Permissions Employer-Employee Relationship Streaming Media Upgrades PC Care Telephone Systems Chrome Unified Threat Management Debate Smartphone Cyber Monday Workplace Tips Antivirus Experience Help Desk Facebook The Internet of Things Maintenance Printing Uninterrupted Power Supply Analyitcs Servers Health Wireless People Chromebook Crowdfunding Cybercrime Office Tips Firefox USB Mobile Technology Internet Exlporer Data storage Samsung Consumers Flexibility Automation Save Time Scam Customer Service Google Analytics Office Hard Drive Company Culture Wireless Technology Network Congestion Phishing Windows 8 Scary Stories Humor Managed IT services Leadership Mobile Office User Software Tips Licensing Trending Money Administrator Google Wallet iPhone Computing Time Management Specifications WiFi IT Services Best Practices CrashOverride Healthcare Managed IT Services Technology Tips Files Cooperation Settings Avoiding Downtime Business Intelligence Administration Video Surveillance Information Technology Tablet Customer Relationship Management Marketing IP Address Unsupported Software Fraud Lithium-ion Battery Retail Data Warehousing Laptop File Sharing Service-based Business End of Support GPS Smart Tech Alt Codes Application Web Server Logs Network Shortcut Computer Repair Data Breach Tech Term Work Station Business Government Point of Sale G Suite Fax Server Screen Reader Holiday Mobility Buisness Law Enforcement Data Staff Virtual Private Network Public Cloud Refrigeration Microsoft Excel Websites Competition Black Friday Legislation Saving Time Best Practice Infrastructure Cabling Business Computing Gadgets Document Management Bandwidth Hotspot Google Docs Presentation LinkedIn Typing Language Unified Communications Best Available Computer Business Continuity communications Managed IT Service Net Neutrality Server Disaster Resistance Piracy Error Passwords Cookies Writing Training IT Technicians Botnet Physical Security Internet of Things VPN Touchscreen Disaster Android Business Growth Cameras SharePoint Privacy Hacks Tip of the week App Co-managed IT Online Currency Social Media Efficiency Google Drive Compliance Backup Address Upgrade Notifications Entrepreneur Redundancy Multi-Factor Security Recycling Excel Relocation Sync Printer Users Hiring/Firing Firewall Hackers Downloads Public Speaking Productivity IoT IT Solutions Conferencing Webcam Digital Disaster Recovery Website Internet Search Google Undo Augmented Reality IT Consultant Spyware Ransomware Technology Patch Management Thank You Charger Collaboration Data Management Processors Consultation Communication Windows Environment Lenovo Black Market Smart Technology Remote Monitoring Windows 10 Work/Life Balance Virtual Reality Corporate Profile Miscellaneous 3D

      Latest Blogs

      Artificial intelligence is perhaps most commonly known as a malevolent force, thanks to popular culture. HAL 9000, Ultron, and many others have reinforced that A.I. will be the dow...

      Latest News

      Our Site Has Launched!

      flag

      Welcome to Our New Site!
      We are proud to announce the unveiling of our new website at Network Synergy!

      Read more ...

      Contact Us

      Learn more about what Network Synergy can do for your business.

      callphone

      Call us today    203.261.2201

      Fax Number :    203-261-2935

      126 Monroe Turnpike
      Trumbull, Connecticut 06611

      facebook twitter linkedin #youtube