Most HIPAA violations on mobile are mundane — not a state actor, not a targeted
attack. A phone left at a coffee shop. A photo with PHI in the EXIF. A consumer
app that was supposed to be "for clinical use" sharing data with three SDK partners.
HardenedOS targets these specifically:
PHI in tracker SDKs
The free clinical-reference app a nurse installed pulls in three location-collecting SDKs. Now patient location ranges (where the visit happened), medication-dose timing, and clinician identity sit in a third-party data broker. Per-app network gating + sensor scopes shut these down without breaking the reference app.
Lost or stolen phone
Devices walk off in waiting rooms, ED bays, parking lots. Duress PIN wipes irrevocably. Auto-reboot on idle clears decryption keys. Hardware attestation means a swapped device can't impersonate the original on dispatch — your IT sees it red on the dashboard.
Phone-as-pivot ransomware
Mobile malware targeting clinical workflows is rare but real (BlackHat 2023, multiple proof-of-concepts). The required-app catalog locks the install set; sideloading is off; hardware attestation flags any tampered firmware. A compromised handset stops being a pivot point on next manifest sync.
Patient privacy in collective bargaining
Clinician unions watch for invasive monitoring. The surveillance ceiling — kernel-enforced, no tier can override — neutralizes the "we're recording your microphone" allegation. Auditable.
BYOD masquerading as clinical
Personal devices being used "just for one chart" because the issued tablet is in a charger somewhere. HardenedOS at Basic tier gives the user a clean phone they actually want to use; same fleet, same management; different policy bag.
Telehealth audio + video integrity
The video-call app needs camera + mic. But it shouldn't have access to the contact list, the file system, or the SMS log. Per-app permission scopes give it exactly what it needs — nothing more.