November 8, 2011 – Earlier this year, Janet Spangler got an object lesson in the tension between data access and security.

A new patient at Family Medical Associates of Raleigh (N.C.) toted his own laptop into the exam room, recalls Spangler, administrator at the five-physician group practice. When the physician arrived, the patient – a computer technician – turned his laptop around, revealing he had just gained access into the group's ostensibly secure wireless network, then admonishing the physician about the need to improve access controls.

Register or login for access to this item and much more

All Information Management content is archived after seven days.

Community members receive:
  • All recent and archived articles
  • Conference offers and updates
  • A full menu of enewsletter options
  • Web seminars, white papers, ebooks

Don't have an account? Register for Free Unlimited Access