There are 47 patient treatment rooms in the new emergency department of the Beth Israel Deaconess Medical Center in Boston, but there are only three laptops used for patient registration. That is not, however, a problem; it’s a plan. The three laptops move easily from bed to bed, using a wireless LAN to connect to the network, saving the hospital money and helping to knock a half hour off the time it takes for most patients to check in.In many businesses, using a wireless LAN is a no-brainer; but in a hospital, it is a major accomplishment. That’s because the wireless LAN standard 802.11b, which dictates the parameters for speed of data, access points and other technical specifications, is famous for its security holes, and hospitals are famous for their need for security. In fact, all U.S. hospitals are governed by the Health Insurance Portability and Accountability Act of 1996 (HIPAA), a federal law that strictly protects the privacy and confidentiality of patient records. SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe The technology people at CareGroup Healthcare System, which manages that hospital and five others, were well aware of the security risks when they set out to deploy laptops in Beth Israel Deaconess’s ER. They had done their homework and studied reports, such as the recent warning from Stamford, Conn.-based Gartner that by the end of 2001, 30 percent of enterprises would have serious security exposures stemming directly from wireless LAN deployments. “WEP [wired equivalent privacy], the standard security protocol for 802.11b, is not very secure,” admits John Halamka, CIO of CareGroup. “So we do three things to make it safe. First of all, we do use WEP, but we do encryption via HTTPs [adding a secure socket with an additional layer of encryption to each address], and then we register the unique address of every network card in the wireless receiver so that if you are walking by this building you can’t intercept our transmissions.” Phillip Redman, research director at Gartner, agrees that secure socket layer encryption should do the trick. “With Web-based technology, secure socket layer encryption is a very secure way of transferring information,” he says. At CareGroup, all network users must log in to get on the hospital’s system, and the IS group carefully monitors all traffic to weed out any lurkers. Because of those measures, Halamka considers his wireless LAN as safe as one can be with the current state of wireless technologies.Today, when patients are admitted, their information is logged in to a wireless laptop, and a summary of their record is instantly displayed on the ER’s whiteboard, an electronic screen that tracks every patient’s medical status, location, doctor, labs, EKGs and more. The same vital information is also available on all the computers in the ER, where it can help doctors administer the best treatment more quickly and reduce the likelihood of errors based on misinformation. Related content news CIO Announces the CIO 100 UK and shares Industry Recognition Awards in flagship evening celebrations By Romy Tuin Sep 28, 2023 4 mins CIO 100 IDG Events Events feature 12 ‘best practices’ IT should avoid at all costs From telling everyone they’re your customer to establishing SLAs, to stamping out ‘shadow IT,’ these ‘industry best practices’ are sure to sink your chances of IT success. By Bob Lewis Sep 28, 2023 9 mins CIO IT Strategy Careers interview Qualcomm’s Cisco Sanchez on structuring IT for business growth The SVP and CIO takes a business model first approach to establishing an IT strategy capable of fueling Qualcomm’s ambitious growth agenda. By Dan Roberts Sep 28, 2023 13 mins IT Strategy IT Leadership feature Gen AI success starts with an effective pilot strategy To harness the promise of generative AI, IT leaders must develop processes for identifying use cases, educate employees, and get the tech (safely) into their hands. By Bob Violino Sep 27, 2023 10 mins Generative AI Innovation Emerging Technology Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe