Is it permissible to store phi on portable media

Click New. For the Campaign Type, select Portable Media Campaign. The Campaign Type for a specific campaign cannot be changed later. Enter the following information. These values can be changed at any time. Campaign Name - Enter a descriptive name for the campaign. Description - Optional.

Is it permissible to store phi on portable media. PHI Storage Best Practices. Depending on whether the PHI is physical or electronic, it will have to meet certain Technical, Administrative and Physical safeguards during storage and transmission in order to be HIPAA compliant. Both covered entities and business associates (cloud storage partners, etc) must implement these safeguards. 1.

Study with Quizlet and memorize flashcards containing terms like Tamara is behind on her work as an analyst and decides she needs to do some work at home tonight. She copies the files she has been working on (which contain PHI) to a flash drive and drops the flash drive in her purse for later use. When Tamara gets home, the flash drive is missing. Is this a security breach? No. Tamara doesnt ...

A set of frequently asked questions (FAQ) clarifies that physicians may disclose PHI to a patient’s loved ones, regardless of whether they are recognized as relatives under applicable law. For example, a patient’s unmarried partner is recognized as a relative with whom PHI can be shared. The FAQs make clear that the permissive disclosures ...Jun 8, 2020 · In the limited case where a covered entity is unable to e-mail the PHI as requested, such as in the case where diagnostic images are requested and e-mail cannot accommodate the file size of the images, the covered entity should offer the individual alternative means of receiving the PHI, such as on portable media that can be mailed to the ... device/removable media beyond the approval period. If my device/media is lost or stolen, I will immediately report the loss/theft to the IS department even if I believe that I have previously deleted all PHI from it. I will use the following portable devices to capture/use PHI: Laptop PDA Other: _____ (Specify) Section 3:It's imperative that you have the required permissions to release any or all of a patient’s dental record before duplicating and transferring records. This is critical to ensuring the confidentiality of the protected health information (PHI) that the document contains. Situations under which you might be asked to provide copies of the patient ...removable media device. Portable device that can be connected to an information system (IS), computer, or network to provide data storage. These devices interface with the IS through processing chips and may load driver software, presenting a greater security risk to the IS than non-device media, such as optical discs or flash memory cards ...The Mitsu media rack allows you to organize and store your media collection using a customizable approach. With its space saving design this unit is perfect for limited spaces. Atlantic Mitsu 130 CD/90 DVD/BluRay/Games 5-Tier Media Rack's geometric accents offer stylish approach to multimedia storage, and the Vertical design maximizes storage ...Question: It is permissible to store PHI on portable media such as a flash drive as long as the media doesn’t leave your work environment. Answer: False. Question: PHI can ONLY be given out after obtaining written authorization. Answer: False

Emailing Patients. In 2013, the HIPAA Omnibus Final Rule allowed healthcare providers to communicate Electronic Protected Health Information (ePHI) with patients through unencrypted email as long as the provider adhere to the following: The provider documents the patient's consent. The Rule did not address text messaging.Benefits of storing PHI in the cloud. Storing healthcare data in the cloud gives users the ability to access it across a variety of electronic devices while eliminating the costs and technical ...Protected Health Information (PHI) under HIPAA means any information that identifies an individual and relates to at least one of the following: The individual's past, present or future physical or mental health. The provision of health care to the individual. The past, present or future payment for health care.Employers also can implement policies that generally prohibit storage of unencrypted PHI on portable electronic media. Finally, employers should carefully vet the security procedures of printers and other service providers responsible for mailing EOBs and other communications containing plan participants' PHI.QuizletIn today’s digital age, where much of our personal information is stored and shared online, security has become a paramount concern. From social media platforms to online banking, ...There are more and more portable mobility scooters that are being used today by the differently-abled. They are used in malls, supermarkets, and other places where people use them ...

The following practices help prevent viruses and the downloading of malicious code except. Scan external files from only unverifiable sources before uploading to computer. Annual DoD Cyber Awareness Challenge Exam Learn with …Health care or health plan payment —PHI can be used for premium payment, billing, claims management, utilization review, coordination of benefits, eligibility and/or coverage determinations, and collection activities. Health care or health plan operations—. PHI can be used for quality assessment, case management, population-based activities ...Removable media devices—also known as portable storage devices—consist of a variety of compact devices that can connect to another device to transmit data from one system to another. The following are examples of removable media: USB portable storage devices ("Jump Drive", "Data Stick", "Thumb Drive", "Flash Drive", etc ...Background: Respecting patient privacy and confidentiality is critical for doctor-patient relationships and public trust in medical professionals. The frequency of potentially identifiable disclosures online during periods of active engagement is unknown. Objective: The objective of this study was to quantify potentially identifiable content shared on social media by physicians and other ...However, covered entities are not then permitted to require individuals to purchase a portable media device from the covered entity if the individual does not wish to do so. The individual may in such cases opt to receive an alternative form of the electronic copy of the PHI, such as through email.

3725 gate house lane st george.

The use of portable technology in delivering healthcare services affords tremendous benefit to healthcare providers, physicians, and allied healthcare professionals. For example, clinical patient information and Protected Health Information (PHI) can be communicated and exchanged on portable electronic devices with ease and speed.HIPAA permits the disclosure of PHI for healthcare operations and the provision of treatment. Health information can be used to help patients receive medical care, as well as for the evaluation of care provided to patients. It is necessary to use PHI to coordinate care between different healthcare providers, and PHI is needed for billing ...The HIPAA Security Rule encryption requirements are to "implement a mechanism to encrypt and decrypt ePHI" to allow access only to those persons or software programs that have been granted access rights ( 45 CFR §164.312 (a) (1) ), and to "implement a mechanism to encrypt ePHI whenever deemed appropriate" to guard against unauthorized ...The following and any future technologies used for accessing, transmitting, or receiving PHI electronically are covered by the HIPAA Security Rule: Media containing data at rest (storage) Personal computers with internal hard drives used at work, home, or traveling; External portable hard drives, including iPods and similar devices; Magnetic tapeLack of Encryption on Hard Drive Results in the Exposure of 9387 Patients’ PHI. Framingham, MA-based Charles River Medical Associates has discovered the danger of failing to use encryption to protect data stored on portable hard drives. In late November, the practice discovered one of its portable hard drives was missing.If possible, do not transmit PHI via e-mail unless using an IT-approved secure encryption procedure. If a secure e-mail server is not used, do not e-mail lab results. Limit the PHI contained in the e-mail to the minimum necessary to accomplish the purpose of the communication. E-mail PHI only to a known party (e.g., patient, health care provider).

Study with Quizlet and memorize flashcards containing terms like Which of the following would most likely be a permissible incidental disclosure of protected health information (PHI) under HIPAA?, In a nonemergency transport situation, with a stable patient who is alert and oriented, when is the best time to have the patient sign the acknowledgement that the patient received a copy of your EMS ...portable storage device. Portable device that can be connected to an information system (IS), computer, or network to provide data storage. These devices interface with the IS through processing chips and may load driver software, presenting a greater security risk to the IS than non-device media, such as optical discs or flash memory cards ...Department portable storage media such as, flash drives. c. It must not be stored on personally owned computing devices or personal portable storage devices. d. It is permissible to access Outlook Web Access (OWA) email from a personal computer. However, it is not permissible to store Department category 2, 3, or 4 data from OWA on your personalPhigolf has you covered! The portable golf simulator, provides you with an opportunity to improve your swing from anywhere in the world. Receive feedback on your swing in real time, or play friends and family remotely via the online platform. Phigolf's compatibility with the Topgolf WGT TruGolf E6 platforms offers instant access to over 80 ...Risks when using mobile devices to store or access ePHI . Many threats are posed to electronic PHI (ePHI) stored or accessed on mobile devices. Due to their small size and portability, mobile devices are at a greater risk of being lost or stolen. A lost or stolen mobile device containing unsecured ePHI can lead to a breach of that ePHI which could4.3 (12 reviews) The Health Insurance Portability and Accountability Act of 1996 (HIPAA), Public Law 104-191, was enacted on August 21, 1996. Sections 261 through 264 of HIPAA require the Secretary of HHS to publicize standards for the electronic exchange, privacy and security of health information.Created Date: 10/11/2019 3:54:23 PMAnyone working in the health care field who manages or works with protected health information can take away three important lessons from this incident. 1. Storing protected health information on mobile storage devices like thumb/flash drives is inherently risky. The capacity and portability of mobile storage drives makes them convenient tools.This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance". viewed_cookie_policy: 11 months: The cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.portable media/device • the cost of postage if the patient requested the PHI be mai led • those who do not want to go through the process of calculating actual or average allowable costs for requests for electronic copies of PHI maintained electronically may charge a flat fee, not to exceed $6.50.Jun 14, 2018 · A staff member at a large health facility saved the PHI of 600 patients on a flash drive for a diabetes management outreach project. A couple of weeks later, when she returned to the task, she could not find the flash drive. A thorough search of her office did not turn up the missing flash drive, and it was presumed lost.

practical, storage media such as a CD, DVD, or flash drive could be delivered by overnight courier; encryption could be used so that if the media is lost or misdelivered, the unin-tended recipient cannot access or retrieve the PHI. The key to decrypt the PHI should not be stored on the same device containing the encrypted data.

Terms in this set (16) Study with Quizlet and memorize flashcards containing terms like It is permissible to store PHI on portable media such as a flash drive as long as the media doesn't leave your work environment. True False, I have loaded the company software to my personal smartphone so that I am able to access my work email account from ...Individuals have a right to access this PHI for as long as the information is maintained by a covered entity, or by a business associate on behalf of a covered entity, regardless of the date the information was created; whether the information is maintained in paper or electronic systems onsite, remotely, or is archived; or where the PHI ...Supplies for creating the paper copy (e.g., paper, toner) or electronic media (e.g., CD or USB drive)if the individual requests that the electronic copy be provided on portable media. However, a covered entity may not require an individual to purchase portable media; individuals have the right to have their PHI e-mailed or mailed to them upon ...The Google Play Store is a great place to find apps and games for your Android device. The store has a wide variety of apps and games to choose from, as well as multiple search opt...B. Use and Disclosure of PHI Only as Permitted. DMH and its Workforce Members may use or disclose PHI only as permitted by this Handbook. C. Requesting, Creating, Using and Disclosing Only that Amount of PHI that is Necessary. When requesting, creating, using or disclosing PHI, Workforce Members must make reasonable efforts to limit the amount ofExternal Hard Drives. External hard drives can provide a simple and cost-effective way to store PHI. The data is stored locally on a physical device that can be encrypted and kept secure. Advantages of using external drives include: Low upfront costs compared to other storage solutions. Easy to setup and maintain.Do not place PHI in the subject line. Only include the minimum necessary of PHI in the e-mail message. If you send or receive PHI, you are responsible for the protection and proper disposal of the information transmitted or stored in e-mail. Double-check the addresses of all recipients before sending confidential e-mail.Study with Quizlet and memorize flashcards containing terms like Which of the following data storage sites meet the security standards established by HIPAA for safely storing PHI?, How long should your laptop be inactive before it automatically locks itself?, It is permissible to store unencrypted PHI on USB drives, laptops, or tablets if you keep the …In October 2017, the HHS released a series of tips to follow to protect PHI on a mobile device: Implement policies and procedures regarding the use of mobile devices at work - especially when used to create, receive, maintain, or transmit ePHI. Consider using Mobile Device Management (MDM) software to manage and secure mobile devices.Engineering. Computer Science. Computer Science questions and answers. It is never okay to buy and install my own software on a clinic computer.TrueFalseIt is permissible to give /PHI of an adult patient to a family member without a release from the patient.TrueFalse.

Lifeproof ashland valley.

Fareway centerville ia.

It's no surprise that you must store patient medical records for a set amount of time—often up to 10 years—depending on your state rules. And if you don't comply with this requirement, you could face fines up to $50,000 per violation. What you may not know, however, is that your responsibility doesn't end once you agree to store the ...occur. The disclosing hospital is responsible under HIPAA for disclosing the PHI to the receiving physician in a permitted and secure manner, which includes sending the PHI securely and taking reasonable steps to send it to the right address. Figure 1: Hospital and Treating Physician exchange information scenarioHIPAA Breach Analysis. Q. Was PHI involved? A. Yes. Q. Was the information on the compromised device encrypted, unusable, unreadable, or indecipherable? A. No. The …This fact sheet helps you safeguard Sensitive Personally Identifiable Information (PII) in paper and electronic form during your everyday work activities. DHS employees, contractors, consultants, interns, and detailees are required by law and DHS policy to properly collect, access, use, safeguard, share, and dispose of PII in order to protect ...As a result, portable media and transient electronic devices have become a grave security concern for organisations. According to the Honeywell Industrial USB Threat Report, the number of threats specifically targeting operational technology systems nearly doubled from 16 to 28%. Overview of Portable Media and Transient Assets.Jun 25, 2023 · Question: It is permissible to store PHI on portable media such as a flash drive as long as the media doesn’t leave your work environment. Answer: False Question: PHI can ONLY be given out after obtaining written authorization. In our fast-paced digital world, where entertainment is a constant companion, portable media players have emerged as versatile devices that redefine how we experience music, videos, and more. These compact gadgets have revolutionized how we consume content, offering a personalized and convenient approach. This in-depth guide will delve …HIPAA Rules for disposing of electronic devices cover all electronic devices capable of storing PHI, including desktop computers, laptops, servers, tablets, mobile phones, …May 4, 2015 · Anyone working in the health care field who manages or works with protected health information can take away three important lessons from this incident. 1. Storing protected health information on mobile storage devices like thumb/flash drives is inherently risky. The capacity and portability of mobile storage drives makes them convenient tools. Dual band scalar output. Pacemaker safe. Child proof. Features an on/off button. Comes with USB charging cable and lanyard. Charges via 1 AMP charger (not included) This product has a minimum quantity of 1. Experience on-the-go EMF protection with the Phi Series Portable φ1. Discover how this device can harmonize your environment and support ...A Virtual Private Network (VPN) is one way to create a secure connection even on a public unsecured network. A VPN provides security in an unsecured environment.HIPAA IT compliance requires that any PHI your organization stores on electronic devices must be disposed of following certain guidelines. If disposed of incorrectly, your organization and patients could be at risk. Healthcare providers can use the guidance and tips in this blog to help maintain the best HIPAA IT compliance practices when ... ….

Often, enhancing protection for portable media rises to the top as USB and removable media devices pose a large threat to critical networks. We have outlined below how organizations can get started. Define Acceptable Media and Content: Most industrial facilities do not allow their critical network and assets to connect to the broader internet ...Jun 8, 2020 · In the limited case where a covered entity is unable to e-mail the PHI as requested, such as in the case where diagnostic images are requested and e-mail cannot accommodate the file size of the images, the covered entity should offer the individual alternative means of receiving the PHI, such as on portable media that can be mailed to the ... The Security Rule defines EPHI as Protected Health Information that is stored or transmitted by electronic media. EPHI includes PHI that is stored on hard drives or portable memory media (disks and CDs) as well as PHI that is transmitted via email or the internet (including faxes and voicemail transmitted in this manner). The final regulation, the Security Rule, was published February 20, 2003. 2 The Rule specifies a series of administrative, technical, and physical security procedures for covered entities to use to assure the confidentiality, integrity, and availability of e-PHI. The text of the final regulation can be found at 45 CFR Part 160 and Part 164 ...Please email or. call. Health Information Management at 620-431-2500 if you have any further questions. Ashley Clinic - Health Information Management 505 S Plummer, Chanute, KS 66720 Attach Signed Form to E-Mail: [email protected] or Fax: 620-431-0914.To carry your full media library with you—and to store it when you're home—use the LaCie Fuel ($189.00 at Amazon). This 1TB portable hard drive acts as a full Wi-Fi router and media server.Infibeam Phi is the perfect device to download and watch videos and listen to songs. Reading digitized content like newspapers, books and magazines is possible with the Phi. Beautiful color images, crisp technology and options to read animated story books are among the other enticing features included in Infibeam Phi mobile media device.PHI. TO . T. HOSE . I. NVOLVED IN THE . C. ARE OF THE . P. ATIENT AND FOR . N. OTIFICATION . P. URPOSES. 1. PCC HCC departments may disclose a patient's PHI to: a) A family member, other relative, or a close personal friend of the patient or any other person identified by the patient, the PHI direc tly relevant to such person'sMay 4, 2015 · Anyone working in the health care field who manages or works with protected health information can take away three important lessons from this incident. 1. Storing protected health information on mobile storage devices like thumb/flash drives is inherently risky. The capacity and portability of mobile storage drives makes them convenient tools. Is it permissible to store phi on portable media, These days, you most likely rely on your smartphone, tablet or laptop for streaming music, but, if you the mood struck, you could still purchase an iPod Touch. While portable mp3 p..., Common PSDs include removable devices such as USB thumb drives or flash drives, rewritable CD/DVDs, memory cards and external hard drives and mobile devices with inbuilt storage such as tablets, laptops, and smartphones. PSDs are capable of storing extremely large amounts of data. 1 Due to their portable nature and attractiveness, PSDs are ..., HIPAA Rules for disposing of electronic devices cover all electronic devices capable of storing PHI, including desktop computers, laptops, servers, tablets, mobile phones, portable hard drives, zip drives, and other electronic storage devices such as CDs, DVDs, and backup tapes. Healthcare organizations also need to be careful …, The shift to digital healthcare has created many challenges around identifying protected health information (PHI) and and ensuring PHI is utilized in a compliant manner. Keeping up with changing regulations and technology can be difficult, but this post sheds light on the various aspects of PHI., Protected health information (PHI) is any demographic information that can be used to identify a patient. Common examples of PHI include a patient's name, address, phone number, email, Social Security number, any part of a patient's medical record, or full facial photo to name a few., Answer: The Security Rule does not expressly prohibit the use of email for sending e-PHI. However, the standards for access control (45 CFR § 164.312(a)), integrity (45 CFR § 164.312(c)(1)), and transmission security (45 CFR § 164.312(e)(1)) require covered entities to implement policies and procedures to restrict access to, protect the integrity of, and guard against unauthorized access to ..., Summary of Permitted PEDs. In general, PEDs that are permitted in SCIFs include cell phones, laptops, tablets, and other similar devices. All of these devices must be registered and approved by the facility's security officer, and must be equipped with encryption capabilities. Additionally, all devices must be regularly inspected and tested ..., When retiring electronic media used to store PHI, ensure the media is not cleansed. E. Dispose of PHI when it is no longer needed. F. When faxing or email PHI, use email and fax cover page. ... Cameras, tablets, cell phones or any electronic devices with photography capabilities are permitted in the Knack Premises. A. True. B. False. Correct ..., The principle of secure PHI disposal, however, applies both to electronic and paper media. Organizations usually shred PHI in paper form to dispose of it. To securely dispose of electronic PHI, the organization can: Securely destroy the storage media. When erasure is impractical, as in the case of a CD-ROM, the covered entity or business ..., This includes data in online patient records, applications, PDFs, emails, medical devices, flash drives, and any other electronic format. The standards for PHI and ePHi are the same — the only difference is the medium providers use to store and transmit the data. Digital tools make healthcare more convenient, but they're a double-edged sword., In the context of what is considered PHI under HIPAA for qualifying healthcare providers: “A broken leg” is health information. “Mr. Jones has a broken leg” is individually identifiable health information. If a covered entity records “Mr. Jones has a broken leg” the identifier (“Mr. Jones”) and the health information (“broken ... , HIPAA provides many pathways for permissibly exchanging PHI, which are commonly referred to as HIPAA Permitted Uses and Disclosures. Permitted Uses and Disclosures are situations in which a CE, is permitted, but not required, to use and disclose PHI, without first having to obtain a written authorization from the patient., For external drives to be considered HIPAA compliant, they must implement safeguards to protect patient health information (PHI) as required by the HIPAA Security Rule. The main requirements relate to encryption, access controls, and audit logging. Encryption is essential for securing PHI on external drives. The HIPAA Security Rule …, The Terminology of HIPAA and Medical Software Regulations What is Protected Health Information? The term Protected Health Information (often abbreviated to PHI, or ePHI when it is stored or transmitted electronically) is defined as any individually identifiable health information relating to an individual´s past, present, or future health, treatment, or payment for treatment that can be used ..., The HIPAA Security Rule (45 CFR §§ 164.302-164.318) does not mandate any particular technological solutions for the protection of ePHI, including ePHI contained on Mobile Devices. Rather, entities are required to maintain “reasonable and appropriate” administrative, technical, and physical safeguards for protecting ePHI., Study with Quizlet and memorize flashcards containing terms like Which of the following would most likely be a permissible incidental disclosure of protected health information (PHI) under HIPAA?, In a nonemergency transport situation, with a stable patient who is alert and oriented, when is the best time to have the patient sign the acknowledgement that the patient received a copy of your EMS ..., Study with Quizlet and memorize flashcards containing terms like Tamara is behind on her work as an analyst and decides she needs to do some work at home tonight. She copies the files she has been working on (which contain PHI) to a flash drive and drops the flash drive in her purse for later use. When Tamara gets home, the flash drive is missing. Is this a security breach? No. Tamara doesnt ... , HIPAA Rules for disposing of electronic devices cover all electronic devices capable of storing PHI, including desktop computers, laptops, servers, tablets, mobile phones, portable hard drives, zip drives, and other electronic storage devices such as CDs, DVDs, and backup tapes. Healthcare organizations also need to be careful when disposing of ..., Study with Quizlet and memorize flashcards containing terms like Tamara is behind on her work as an analyst and decides she needs to do some work at home tonight. She copies the files she has been working on (which contain PHI) to a flash drive and drops the flash drive in her purse for later use. When Tamara gets home, the flash drive is missing. Is this a security breach? No. Tamara doesnt ..., Praise be to Allah. Taking pictures with a digital camera is of two types: 1. When the picture is a photograph or still picture. This is not permissible unless the aim is to use the picture in a permissible manner, such as pictures that are needed in order to prove identity or for a passport or driver's license, or posting pictures of criminals so that they will be known, and other valid ..., When does Phi need to be disclosed without authorization? The Rule does allow providers to use and disclose PHI for specific purposes, however, without the patient’s authorization. The following are 6 circumstances where use and disclosure of an individual’s protected health information is considered permissible without authorization. a., When stored on portable or mobile computing devices (e.g. laptops, smartphones, tablets, etc.) or on removable electronic storage media (e.g. thumb drives, etc.), ePHI will be encrypted. Original (source), or the sole copy of, PHI will not be stored on portable computing devices., With limited exceptions, however, HIPAA restricts the use of PHI for non-treatment purposes without the patient's consent. Failure to comply may subject HIPAA covered entities, business associates, and third parties to significant civil, administrative, and criminal penalties. ( See, e.g., 42 U.S.C. § 1320d-6; 45 C.F.R. § 160.404)., These guidelines are especially critical given the rise in cloud computing and cloud storage for PHI and other sensitive data. The HHS provides specific guidance on cloud computing in the form of a Q&A that addresses many companies' concerns about storing PHI and ePHI remotely. It's possible to store PHI remotely in a HIPAA-compliant way., true. PHI includes all health information that is used/disclosed-except PHI in oral form. false; PHI includes all health or patient information in any form whether oral or recorded, on paper, or sent electronically. PHI is disclosed when it is shared, examined, applied or analyzed., Where interference with the aircraft systems or equipment is suspected from use of a device, crew members must: Instruct passenger(s) to terminate the use of device. Prohibit the use of suspected device. Recheck the aircraft systems and equipment. Photograph the suspected PED, if possible and submit with report., However, covered entities are not then permitted to require individuals to purchase a portable media device from the covered entity if the individual does not wish to do so. The individual may in such cases opt to receive an alternative form of the electronic copy of the PHI, such as through email., The final regulation, the Security Rule, was published February 20, 2003. 2 The Rule specifies a series of administrative, technical, and physical security procedures for covered entities to use to assure the confidentiality, integrity, and availability of e-PHI. The text of the final regulation can be found at 45 CFR Part 160 and Part 164 ..., A portable coffee maker is a travel must-have for those who want their coffee fix, wherever they are headed. Here are the best you can buy. We may be compensated when you click on ..., As a result, portable media and transient electronic devices have become a grave security concern for organisations. According to the Honeywell Industrial USB Threat Report, the number of threats specifically targeting operational technology systems nearly doubled from 16 to 28%. Overview of Portable Media and Transient Assets., The advantage of having access to cable TV content along with a Roku streaming media device is the mobility options that it provides the subscriber. Roku devices are portable and o..., PHI stored on portable media shall be protected in accordance with this. A. General . 2. If If at all not store ePHI on portable media. b., Similarly, cloud storage involves sending data over the internet to an offsite data center to store it on servers. Cloud computing offers many benefits because it: Is scalable and accessible from anywhere with an internet connection. Promotes business continuity because there are fewer operational issues. Requires less capital, since you don ...