Table 1.
Summary of BCH BYOD guideline to safeguard custom application in hospital settings.
| No. | Risks | Guidelines and Recommendations |
| 1 | Unauthorized access to app and decreased productivity | Adopt enterprise-standards but usable authentication |
| Implement RBACa | ||
| 2 | Unauthorized access to data | Implement at least three layers of security on data transmission (transport layer security, access control, and content security) |
| Allow apps to work on internal networks or VPNb only | ||
| 3 | Data transmission to unauthorized parties | Protect the mobile app’s notifications |
| 4 | Unauthorized access to apps and data | Prevent apps from working on jail-broken devices |
| Allow apps to only work on encrypted-devices or devices with pass-codes | ||
| 5 | Unauthorized access to data | Require apps to use minimal cache |
| 6 | Unauthorized access to the app | Enforce automatic logoff |
| 7 | Data transmission to unauthorized parties | Limit copy data and print screen functionalities |
| Limit backup on Cloud services | ||
| 8 | App distribution to unauthorized parties | Distributing the app: Implement internal over-the-air installation and app updates |
| 9 | Unauthorized access to app | Implement remote wipe out functionality |
| Implement ability to disconnect and block a user anytime |
arole-based access control.
bvirtual private networks.