Skip to main content

WiFi Patient : Un Guide Complet pour les NHS Trusts et les Opérateurs Hospitaliers

Un guide technique et commercial définitif pour les NHS Trusts et les opérateurs hospitaliers sur le déploiement, la sécurisation et la monétisation du WiFi patient. Couvre la segmentation réseau, la conformité DSPT, le filtrage de contenu et l'exploitation des analyses pour améliorer les résultats pour les patients.

📖 4 min de lecture📝 859 mots🔧 2 exemples3 questions📚 8 termes clés

🎧 Écouter ce guide

Voir la transcription
Patient WiFi: A Complete Guide for NHS Trusts and Hospital Operators A Purple.ai Technical Briefing — Podcast Script Approximate runtime: 10 minutes --- [INTRO — 1 minute] Welcome to the Purple Technical Briefing series. I'm your host, and today we're covering something that sits right at the intersection of patient welfare, IT governance, and operational efficiency: patient WiFi in NHS Trusts and hospital environments. If you're an IT manager, a network architect, or a CTO at an NHS Trust or private hospital group, this one is directly relevant to your roadmap. We're going to cover the infrastructure decisions you need to make, the compliance obligations you cannot ignore, the content filtering policies that protect both patients and the organisation, and the pricing models that are reshaping how Trusts think about connectivity as a service. We'll also look at how WiFi, done properly, actually improves patient outcomes — not just satisfaction scores. And we'll close with some rapid-fire questions and a clear set of next steps. Let's get into it. --- [TECHNICAL DEEP-DIVE — 5 minutes] Let's start with the architecture, because this is where most deployments either succeed or fail before a single patient connects. The fundamental principle of hospital WiFi design is network segmentation. You are operating in an environment where a patient's smartphone sits within metres of life-critical clinical systems — infusion pumps, patient monitoring equipment, electronic health record terminals. These cannot share the same network segment. Full stop. The standard approach is VLAN-based segmentation. You'll typically deploy three distinct VLANs: one for patient WiFi, one for clinical staff and medical devices, and one for building management systems — CCTV, access control, HVAC. Each VLAN carries its own QoS policies, its own firewall rules, and its own internet breakout path. The patient VLAN is the one that hits the content filter and the captive portal. The clinical VLAN bypasses the captive portal entirely and routes through a dedicated, monitored path. On the access point side, you're looking at 802.11ax — Wi-Fi 6 — as the baseline for any new deployment. In a ward environment, you have high device density, lots of passive scanning from smartphones, and interference from medical equipment operating in the 2.4 GHz band. Wi-Fi 6 handles this significantly better than its predecessors, thanks to OFDMA and BSS Colouring. For new builds or major refurbishments, Wi-Fi 6E — which adds the 6 GHz band — is worth specifying, as it gives you a clean, uncongested spectrum for high-throughput applications. Now, the backhaul. This is where NHS Trusts often underinvest. A patient WiFi network serving a 500-bed hospital with average device density of two devices per patient, plus visitors, plus staff on the patient VLAN, can easily generate 800 megabits to 1.2 gigabits of concurrent demand during peak hours. Your uplink to the internet needs to be sized accordingly. A dedicated leased line — not a shared broadband circuit — is the right answer here. If you're not familiar with leased line connectivity, it's a dedicated, symmetrical, uncontended connection between your site and the internet exchange. It's the difference between a motorway and a country lane. Content filtering on the patient VLAN is both a safeguard and a compliance requirement. The NHS has published guidance recommending that patient WiFi deployments block access to categories including: adult content, illegal material, extremist content, and gambling. The implementation is typically a DNS-based or proxy-based filter sitting inline on the patient VLAN. Vendors like Cisco Umbrella, Zscaler, and Palo Alto all offer suitable solutions. The key is ensuring the filter is applied consistently, that it's updated in near-real-time against threat intelligence feeds, and that bypass attempts are logged. The captive portal — the login page patients see when they first connect — is your primary data collection and consent mechanism. Under GDPR, you must obtain explicit, informed consent before processing any personal data. That means your captive portal needs a clear privacy notice, an explicit opt-in for any marketing communications, and a record of consent that is stored and auditable. Platforms like Purple's Guest WiFi solution handle this natively, giving you a branded, GDPR-compliant portal with built-in consent management and analytics. Now let's talk about DSPT — the Data Security and Protection Toolkit. This is the NHS's annual self-assessment framework, and it is mandatory for all NHS organisations and their suppliers. From a WiFi perspective, the key assertions you need to evidence include: network segmentation between clinical and non-clinical systems, access controls on network infrastructure, audit logging of network access events, and a documented incident response procedure. If you're deploying patient WiFi and you haven't mapped your architecture against the DSPT assertions, you're carrying compliance risk that could affect your annual submission. On the question of free versus paid WiFi: the vast majority of NHS Trusts operate patient WiFi as a free service, funded either through the Trust's capital budget or through a managed service contract with a third-party operator. The commercial model that's emerged in some larger Trusts involves a concessionaire — a company that funds the infrastructure deployment in exchange for the right to serve advertising or premium content through the captive portal. This can work, but it requires careful governance to ensure the advertising content is appropriate for a clinical environment and that patient data is not monetised in ways that conflict with NHS values or GDPR obligations. --- [IMPLEMENTATION RECOMMENDATIONS AND PITFALLS — 2 minutes] Let me give you the three things that most commonly go wrong in patient WiFi deployments, and how to avoid them. First: insufficient site survey. A hospital is one of the most challenging RF environments you'll encounter. Thick concrete walls, metal-framed beds, medical equipment generating interference, and lift shafts that create dead zones. You need a professional predictive RF survey before you specify access point locations, and a post-installation validation survey before you go live. Don't skip either. Second: underestimating the compliance workload. DSPT compliance, GDPR consent management, content filtering policy documentation, penetration testing — these are not afterthoughts. Build them into your project plan from day one. Assign a named information governance lead who is accountable for the compliance deliverables. If you're using a managed service provider, make sure their contract includes explicit DSPT compliance obligations and evidence of their own Cyber Essentials Plus certification. Third: no ongoing monitoring. Patient WiFi is not a deploy-and-forget infrastructure. You need continuous monitoring of AP health, client association rates, throughput utilisation, and content filter effectiveness. A platform like Purple's WiFi Analytics gives you real-time visibility into network performance and user behaviour, which is invaluable both for operational management and for demonstrating value to Trust leadership. One recommendation I'd make to any Trust embarking on a patient WiFi project: start with a pilot ward. Pick a ward with a cooperative ward manager, deploy a contained segment of the network, run it for 90 days, gather patient feedback, and use that data to refine your deployment model before rolling out trust-wide. It de-risks the project and gives you a compelling internal case study. --- [RAPID-FIRE Q&A — 1 minute] Q: Should patient WiFi be on the same SSID as staff WiFi? A: Absolutely not. Separate SSIDs, separate VLANs, separate firewall policies. Q: Do we need WPA3? A: For new deployments, yes. WPA3 is the current standard and provides significantly stronger encryption than WPA2, particularly in open-network scenarios. Q: How long should we retain connection logs? A: A minimum of 12 months is the standard recommendation, aligned with NHS data retention guidance and the Investigatory Powers Act. Q: Can we use the captive portal to collect patient feedback? A: Yes, and you should. A post-session survey delivered through the captive portal is one of the most cost-effective ways to gather Friends and Family Test responses. Q: What's the typical cost per bed for a patient WiFi deployment? A: Highly variable, but a reasonable benchmark for a new deployment in a medium-sized acute Trust is between £200 and £400 per bed, all-in, including infrastructure, managed service, and first-year support. --- [SUMMARY AND NEXT STEPS — 1 minute] To summarise: patient WiFi in NHS Trusts is a complex, compliance-heavy deployment that requires careful architecture, robust content filtering, and a clear governance framework. Done well, it demonstrably improves patient satisfaction, supports digital health initiatives, and reduces the burden on ward staff who currently field connectivity complaints. Your next steps: commission a site survey if you haven't already. Map your current architecture against the DSPT assertions. Evaluate managed service providers against a clear scorecard that includes GDPR compliance, content filtering capability, analytics, and support SLAs. And if you want to see how Purple's platform maps to these requirements, visit purple.ai or speak to one of our healthcare specialists. We've deployed patient WiFi across NHS Trusts, private hospital groups, and care home networks — and we know where the bodies are buried, so to speak. Thanks for listening. Until next time. --- [END OF SCRIPT]

header_image.png

Résumé Exécutif

Fournir un WiFi patient robuste, sécurisé et conforme n'est plus un simple "plus" pour les NHS Trusts et les opérateurs d'hôpitaux privés, c'est une exigence d'infrastructure critique. Les patients s'attendent à une connectivité pour gérer leur vie, communiquer avec leur famille et accéder aux services de santé numériques pendant leur séjour. Cependant, offrir cette connectivité dans un environnement clinique introduit des défis techniques et de gouvernance significatifs.

Ce guide fournit un cadre complet aux responsables informatiques, architectes réseau et CTO pour concevoir, déployer et gérer des réseaux WiFi pour les patients. Nous explorons la nécessité d'une segmentation réseau stricte, les complexités de la conformité au Data Security and Protection Toolkit (DSPT), la mise en œuvre d'un filtrage de contenu rigoureux et les modèles commerciaux qui soutiennent ces déploiements. En traitant le WiFi patient comme un service de niveau entreprise plutôt qu'une surcouche de bande passante grand public, les Trusts peuvent atténuer les risques, assurer l'intégrité des systèmes cliniques et tirer parti de plateformes comme Guest WiFi pour obtenir des informations exploitables et améliorer la satisfaction des patients.

Approfondissement Technique : Architecture et Normes

La base de tout déploiement WiFi hospitalier est la ségrégation absolue entre le trafic des patients et les systèmes cliniques. Un hôpital est un environnement RF à haute densité et à forte interférence où des appareils vitaux fonctionnent à proximité de smartphones grand public.

Segmentation Réseau et Conception VLAN

Pour protéger l'intégrité clinique, le WiFi patient doit fonctionner sur un Réseau Local Virtuel (VLAN) dédié. L'architecture d'entreprise standard dicte un minimum de trois segments distincts :

  1. VLAN Patient/Invité : Acheminement via un Captive Portal, application d'un filtrage de contenu strict et fourniture d'un accès uniquement à Internet.
  2. VLAN Clinique : Dédié aux appareils du personnel et aux équipements médicaux (par exemple, pompes à perfusion, postes de travail mobiles). Contourne le Captive Portal et s'achemine via un chemin sécurisé et surveillé.
  3. VLAN de Gestion du Bâtiment : Prend en charge les appareils IoT, la vidéosurveillance et les contrôles environnementaux.

Le trafic sur le VLAN Patient doit être isolé au niveau du commutateur et restreint par des règles de pare-feu qui refusent explicitement le routage vers les sous-réseaux internes.

network_architecture_diagram.png

Densité des Points d'Accès et Planification RF

Le déploiement du WiFi dans un hôpital nécessite de surmonter des barrières physiques importantes : murs doublés de plomb, machines lourdes et béton dense. Se fier à une "couverture de couloir" est un mode de défaillance courant. Une étude RF prédictive, suivie d'une validation active post-installation, est obligatoire.

Pour les nouveaux déploiements, la norme de base est l'IEEE 802.11ax (Wi-Fi 6). Son implémentation de l'Orthogonal Frequency-Division Multiple Access (OFDMA) et du BSS Colouring est cruciale pour gérer la haute densité d'appareils typique des services hospitaliers modernes, réduisant la latence et atténuant les interférences des systèmes de télémétrie médicale fonctionnant dans la bande des 2,4 GHz.

Exigences de Raccordement et de Débit

Un piège courant est de provisionner des points d'accès de qualité entreprise mais de les sous-alimenter avec un raccordement insuffisant. Un hôpital de 500 lits peut facilement générer 1 Gbps de demande concurrente pendant les heures de pointe du soir. Les opérateurs doivent provisionner des lignes louées dédiées et non contraintes plutôt que des circuits haut débit partagés pour garantir le débit et éviter d'engorger le réseau central. Pour plus de contexte sur la connectivité dédiée, consultez Qu'est-ce qu'une ligne louée ? Internet d'entreprise dédié .

Guide d'Implémentation : Conformité et Filtrage

Le déploiement de l'infrastructure physique n'est que la moitié du défi ; la surcouche de gouvernance et de conformité est tout aussi critique.

Conformité DSPT

Pour les NHS Trusts, l'adhésion au Data Security and Protection Toolkit (DSPT) est non négociable. Les déploiements de WiFi patient doivent prouver :

  • Une segmentation réseau stricte.
  • Des contrôles d'accès robustes et une journalisation d'audit (journaux de connexion conservés pendant un minimum de 12 mois).
  • Des tests d'intrusion annuels par des tiers.

dspt_compliance_checklist.png

Filtrage de Contenu

Les directives du NHS exigent que le WiFi patient bloque l'accès aux contenus inappropriés ou nuisibles, y compris le matériel pour adultes, les sites extrémistes et les plateformes de jeux d'argent. Ceci est généralement réalisé via un filtrage basé sur DNS ou proxy appliqué directement au VLAN Patient. La solution de filtrage doit ingérer des flux d'informations sur les menaces en temps réel pour bloquer dynamiquement les domaines malveillants nouvellement identifiés.

Captive Portals et GDPR

Le Captive Portal est la passerelle vers le réseau et le mécanisme principal pour recueillir le consentement de l'utilisateur. En vertu du GDPR, les Trusts doivent obtenir un consentement explicite et éclairé avant de traiter des données personnelles (telles que les adresses MAC ou les adresses e-mail). Le portail doit présenter une politique de confidentialité claire et des opt-ins explicites. L'utilisation d'une plateforme robuste assure la conformité tout en permettant la collecte de données démographiques précieuses.

ROI et Impact Commercial : Modèles Gratuits vs. Payants

La stratégie commerciale derrière le WiFi patient définit sa durabilité à long terme.

Le Modèle WiFi Gratuit

La grande majorité des NHS Trusts offrent le WiFi patient gratuitement au point d'utilisation. Ce modèle est généralement financé par des dépenses d'investissement ou des budgets opérationnels. Le ROI est mesuré en satisfaction patient (souvent reflétée dans Friends et les scores des tests Amis et Famille) et la réduction de la charge administrative du personnel clinique, qui n'a plus besoin de gérer les plaintes de connectivité.

Le modèle de concessionnaire

Certains trusts plus importants emploient un modèle de concessionnaire, où un fournisseur de services gérés tiers (MSP) finance l'infrastructure en échange de droits de monétisation. Cela peut impliquer la diffusion de publicités ciblées via le Captive Portal ou l'offre d'un service à plusieurs niveaux (navigation de base gratuite, streaming premium payant). Si ce modèle est adopté, les trusts doivent s'assurer que le contenu publicitaire est strictement vérifié pour s'aligner sur les valeurs du NHS et que les pratiques de monétisation des données sont conformes au GDPR.

En intégrant WiFi Analytics , les trusts peuvent surveiller l'utilisation du réseau, suivre les temps de séjour des patients et déclencher des enquêtes de feedback automatisées après la connexion, transformant un centre de coûts en un atout stratégique pour l'amélioration opérationnelle. Cette approche axée sur les données reflète les déploiements réussis dans d'autres secteurs, tels que la Santé et le Commerce de détail .

Termes clés et définitions

VLAN (Virtual Local Area Network)

A logical subnetwork that groups a collection of devices from different physical LANs. Essential for isolating patient traffic from clinical systems.

Used by network architects to ensure that a compromised patient device cannot access sensitive medical equipment or electronic health records.

DSPT (Data Security and Protection Toolkit)

An online self-assessment tool that allows NHS organisations to measure their performance against the National Data Guardian's 10 data security standards.

Mandatory for all NHS Trusts; failure to properly segment patient WiFi or log access can result in a failed DSPT submission.

Captive Portal

A web page that a user of a public-access network is obliged to view and interact with before access is granted.

The primary interface for capturing user consent, presenting terms of use, and applying brand identity to the WiFi experience.

802.11ax (Wi-Fi 6)

The sixth generation of the Wi-Fi standard, designed specifically to improve performance in high-density environments.

Crucial for hospital wards where dozens of patients, visitors, and staff devices are competing for airtime simultaneously.

OFDMA (Orthogonal Frequency-Division Multiple Access)

A feature of Wi-Fi 6 that allows a single transmission to deliver data to multiple devices simultaneously.

Reduces latency and improves efficiency in crowded hospital environments, preventing the network from grinding to a halt during peak hours.

Content Filtering

The use of software or hardware to restrict the content that a reader is authorised to access over the network.

Required by NHS guidance to prevent access to illegal, extremist, or adult content on patient networks.

Leased Line

A dedicated, fixed-bandwidth, symmetric data connection connecting a business directly to the internet exchange.

Necessary for hospital WiFi backhaul to ensure guaranteed throughput, avoiding the contention issues of shared broadband.

MAC Address

A unique identifier assigned to a network interface controller (NIC) for use as a network address in communications.

Considered personal data under GDPR; its collection and storage by the WiFi analytics platform requires explicit user consent.

Études de cas

A 400-bed NHS Trust is experiencing severe network congestion on its legacy patient WiFi during the hours of 6 PM to 9 PM, leading to patient complaints and staff distraction. The current setup uses a shared 500 Mbps broadband connection and Wi-Fi 4 (802.11n) access points in the corridors.

  1. Upgrade backhaul to a dedicated 1 Gbps symmetrical leased line to guarantee peak-hour throughput. 2. Replace corridor-based Wi-Fi 4 APs with in-room Wi-Fi 6 (802.11ax) APs to improve RF penetration and handle high device density via OFDMA. 3. Implement traffic shaping on the firewall to cap individual user bandwidth at 5 Mbps, preventing single users from monopolising the connection with 4K streaming.
Notes de mise en œuvre : This approach addresses both the physical RF limitations and the logical bandwidth constraints. Moving APs into the rooms solves the attenuation issues caused by hospital walls, while Wi-Fi 6 handles the density. Traffic shaping ensures fair use, which is critical in a publicly funded, free-to-use network.

A private hospital group wants to deploy a new patient WiFi network but is concerned about the DSPT compliance implications of capturing patient data on the captive portal.

Deploy a GDPR-compliant captive portal solution (like Purple) that separates authentication data from clinical data. Configure the portal to require explicit opt-in for any data processing beyond the minimum required for network access. Ensure the Patient VLAN is strictly isolated from the Clinical VLAN via the core firewall. Implement DNS-based content filtering to block malicious and inappropriate categories.

Notes de mise en œuvre : The key here is isolation and explicit consent. By using a managed captive portal, the hospital offloads the complexity of consent management. Strict VLAN segregation satisfies the core DSPT requirement of protecting clinical systems from untrusted guest devices.

Analyse de scénario

Q1. An NHS Trust wants to implement a single SSID for both staff and patients to 'simplify the user experience'. They plan to use a captive portal to differentiate user types. Is this approach recommended?

💡 Astuce :Consider the DSPT requirements for network segmentation and the risk of a compromised patient device.

Afficher l'approche recommandée

No, this approach is highly discouraged and introduces significant security risks. Patient and clinical staff traffic must be segregated at the VLAN level with separate SSIDs. Relying solely on a captive portal for differentiation does not provide adequate Layer 2 isolation, putting clinical systems at risk from malware or lateral movement originating from untrusted patient devices.

Q2. A hospital is planning to upgrade its patient WiFi and wants to ensure adequate coverage. The IT manager suggests placing access points in the main corridors to cover the adjacent patient rooms and save on hardware costs. What is the flaw in this plan?

💡 Astuce :Think about the physical construction of hospital environments and RF attenuation.

Afficher l'approche recommandée

Corridor placement is a flawed strategy in hospitals. Hospital walls often contain lead lining (for X-ray rooms), heavy concrete, and dense infrastructure that severely attenuates RF signals. This results in poor in-room coverage, high latency, and dropped connections. Access points should be deployed inside patient rooms or wards based on a professional predictive RF survey.

Q3. A Trust has deployed patient WiFi but is receiving complaints about slow speeds during the evening. The APs are Wi-Fi 6, and the core switches are 10G capable. The internet connection is a 1 Gbps shared broadband line. What is the likely bottleneck?

💡 Astuce :Differentiate between local network capacity and WAN backhaul.

Afficher l'approche recommandée

The bottleneck is the shared broadband internet connection. Even with high-capacity local infrastructure (Wi-Fi 6 and 10G switches), a shared broadband line suffers from contention ratios, meaning the bandwidth is shared with other premises in the area. During evening peak hours, this contention severely degrades throughput. The Trust should upgrade to a dedicated, uncontended leased line.