Business of Information Technology  >   Business Environment  >   Legal Environment  >   Laws  >   Regulatory Compliance  >  

HIPAA Compliance

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: Compliance to HIPAA regulations.
HIPAA ComplianceWhite Papers (View All Report Types)
26 - 50 of 59 Matches Previous Page  | Next Page
Deliver Effective Governance for Identity and Access Management
sponsored by IBM
WHITE PAPER: Organizations should consider a thorough approach to IAM governance that meets the requirements of discovering, documenting and analyzing user access; establishing a process for user access governance; ensuring that constraints help manage business conflict; enforcing policies; and continuous monitoring.
Posted: 27 Oct 2009 | Published: 11 Jun 2009

IBM

Reduce the Cost to Achieving HIPAA Security Compliance with Lumension® Solutions
sponsored by Lumension
WHITE PAPER: Healthcare organizations face a host of HIPAA Security Rule compliance challenges with the move to put patient medical records online. Lumension helps organizations address these compliance challenges by providing the proactive IT risk management and the required audit readiness to meet many aspects of the HIPAA Security Rule.
Posted: 19 Oct 2009 | Published: 19 Oct 2009

Lumension

Achieving HIPAA Compliance with Red Hat Enterprise Virtualization for Desktops
sponsored by Red Hat and JBoss
WHITE PAPER: This paper will illustrate how Red Hat Enterprise Virtualization for Desktops can help organizations comply with specific HIPAA mandates, while at the same time increasing their overall efficiency and agility.
Posted: 05 Oct 2009 | Published: 05 Oct 2009

Red Hat and JBoss

Healthcare Data Loss Assessment: Measure sensitive patient data loss on your network
sponsored by Code Green Networks, Inc.
WHITE PAPER: Loss of patient data is a top concern for any healthcare organization. They handle some of the most sensitive and personal data on the individuals they treat. Patients trust healthcare organizations to safeguard sensitive data. Read this whitepaper to find more about how a data loss prevention (DLP) solution can protect patient data.
Posted: 09 Sep 2009 | Published: 09 Sep 2009

Code Green Networks, Inc.

Protecting Healthcare Organizations from Patient Data Loss
sponsored by Code Green Networks, Inc.
WHITE PAPER: Negative publicity from a data breach can have lasting consequences, undermining patient confidence and damaging an organization's reputation. This paper covers potential data breaches within healthcare organizations and strategies for preventing them. Read on to learn more about the steps you can take to protect patients' sensitive information.
Posted: 08 Sep 2009 | Published: 08 Sep 2009

Code Green Networks, Inc.

The Information Governance Imperative
sponsored by RSD
WHITE PAPER: Read this paper to learn how information governance is becoming more important in today's business world and learn why your organization needs to implement an information governance strategy today and how to go about implementing one.
Posted: 04 Aug 2009 | Published: 04 Aug 2009

RSD

The Critical Need for Encrypted Email and Secure File Transfer Solutions
sponsored by Proofpoint, Inc.
WHITE PAPER: This free email encryption whitepaper from Osterman Research discusses key issues around the encryption of both email and file transfer systems, some of the leading statutes that require sensitive content to be encrypted, and suggestions for moving forward with encryption.
Posted: 04 Aug 2009 | Published: 01 Jul 2009

Proofpoint, Inc.

The New Age of Compliance: Preparing Your Organization for a New Era of Increased Accountability and Enforcement
sponsored by Mimosa Systems
WHITE PAPER: This white paper examines the current state of regulatory compliance and the impact of non-compliance. It also addresses the current political environment and the shift in the compliance landscape and compliance enforcement for which organizations need to be prepared. Finally, it discusses some best practices that can be applied to streamline..
Posted: 06 Jul 2009 | Published: 10 Jun 2009

Mimosa Systems

SAP® Support of the Healthecare Supply Chain's Ongoing Effort to Ensure Patient Safety and Drive Business Value
sponsored by SAP AG
WHITE PAPER: The Center for Healthcare Supply Chain Research (formerly the HDMA Research & Education Foundation) recently published an important study concerning data management and data sharing in the healthcare supply chain. This whitepaper discusses the key conclusions of their study.
Posted: 05 Jun 2009 | Published: 02 Jun 2009

SAP AG

Web Application Security Trends Report Q3-Q4, 2008
sponsored by Cenzic
WHITE PAPER: Read this white paper to learn how to protect web applications through application security assessment and penetration testing managed services (SaaS) that identify vulnerabilities and allow organizations to stay ahead of hackers.
Posted: 20 May 2009 | Published: 20 May 2009

Cenzic

Addressing Compliance Initiatives with Center for Internet Security Benchmarks
sponsored by Tripwire, Inc.
WHITE PAPER: This whitepaper details the background you need to build an effective compliance program by understanding benchmarks, the basic building blocks of compliance initiatives. You'll learn about the benchmarks specified by the Center for Internet Security (CIS), which are often used as a starting point for creating a compliance initiative.
Posted: 30 Mar 2009 | Published: 01 Jan 2009

Tripwire, Inc.

Profiting from PCI Compliance
sponsored by IBM
WHITE PAPER: This paper explores the efficiency gains of building a strategy designed around PCI compliance and discusses the value of obtaining outside support in your compliance efforts; it also examines potential vendor qualifications.
Posted: 13 Mar 2009 | Published: 01 Sep 2007

IBM

4 Key Steps to Automate IT Security Compliance: A Unified Approach for IT, Audit and Operation Teams
sponsored by Qualys, Inc.
WHITE PAPER: This paper discusses the challenges faced by organizations of all sizes - across all industries - and presents a security as a service (SaaS) approach to simplify and automate the convergence of security and compliance to define policies, ongoing assessments, mitigate risks and eliminate threats, and monitor compliance.
Posted: 06 Mar 2009 | Published: 06 Mar 2009

Qualys, Inc.

Laws, regulations and compliance: Top tips for keeping your data under your control
sponsored by Sophos, Inc.
WHITE PAPER: This paper outlines the rules, looks at the main threats to security compliance and highlights how a well-defined strategy, backed up by powerful technology, can provide the solution.
Posted: 22 Dec 2008 | Published: 22 Dec 2008

Sophos, Inc.

The Path to Securing Enterprise Desktops: From Personal Computers to Personalized Computing
sponsored by VMware, Inc.
WHITE PAPER: This IDC white paper considers desktop virtualization, specifically as made available by VMware's VDI and ACE; it also considers the benefits and limitations of these technologies and best use cases, exemplified through user case studies.
Posted: 07 Oct 2008 | Published: 01 Jul 2007

VMware, Inc.

Achieving Compliance in a Virtualized Environment
sponsored by Tripwire, Inc.
WHITE PAPER: The goal of this paper is to present the unique considerations that virtualization presents to regulatory and standards compliance, and then prescriptively describe how to mitigate risks.
Posted: 25 Sep 2008 | Published: 19 Sep 2008

Tripwire, Inc.

Forrester Research: Improving Application Deployments - How an Application Delivery Architecture Can Help Businesses Overcome Deployment Challenges
sponsored by F5 Networks
WHITE PAPER: Today's businesses must operate in a drastically changing environment. Forrester found most companies are not well equipped to reorient IT as a critical driver of top line success. This report showcases the results of an April 2007 Forrester survey.
Posted: 28 Apr 2008 | Published: 01 Aug 2007

F5 Networks

How to select a KVM over IP system to assist with HIPAA compliance
sponsored by Avocent
WHITE PAPER: Effective security for health care information requires a multi-layered approach. Physical, logical and operational security are essential ingredients for successful compliance with HIPAA.
Posted: 08 Feb 2008 | Published: 01 Feb 2008

Avocent

Identity Management: The Foundation for PCI, SOX, and HIPAA Compliance
sponsored by Watson SCS, Inc.
WHITE PAPER: This paper discusses the inner-workings of an identity management solution and how it relates to SOX, PCI and HIPAA compliance.
Posted: 01 Dec 2007 | Published: 01 Nov 2007

Watson SCS, Inc.

Methods, Motivations, and Mitigation of Insider Threats
sponsored by VeriSign, Inc
WHITE PAPER: This white paper takes a closer look at the real impact of insider threats. From the motives and means, to types of insider attacks and best practices, learn more about how this complicated criminal behavior is impacting enterprise today.
Posted: 28 Nov 2007 | Published: 13 Feb 2007

VeriSign, Inc

Hybrid Security Solutions: A New Approach to Meeting the Secure Content Management Challenge
sponsored by St. Bernard Software
WHITE PAPER: Learn new content management best practices and how to combat increasing threats and meet complex regulations. This white paper details how neither appliances nor managed services alone are enough to secure vital company content and communications.
Posted: 20 Nov 2007 | Published: 01 Nov 2007

St. Bernard Software

A Guide to Evaluating Email Security Solutions
sponsored by SonicWALL
WHITE PAPER: E-mail threats evolve daily. Read this guide to learn the challenges of implementing an email security solution and administrative considerations to make when evaluating potential email security solutions.
Posted: 15 Nov 2007 | Published: 01 Jan 2005

SonicWALL

Using Classification to Manage Email Policy for the Enterprise
sponsored by TITUS
WHITE PAPER: Email has historically been a weak link in organizational security. Classification and policy based strategies enable email to be managed more securely and effectively. Email classification is a technique for adding metadata and visual labels to email.
Posted: 09 Nov 2007 | Published: 01 Jan 2006

TITUS

Revitalizing Healthcare Delivery with Mobile Communications: Making the Case for BlackBerry Adoption
sponsored by BlackBerry
WHITE PAPER: This paper is the fourth in a four-part series that addresses mobile communications in the healthcare industry. Part Four zeroes in on the features and capabilities that make BlackBerry smartphones an ideal match for healthcare industry requirements.
Posted: 08 Nov 2007 | Published: 08 Nov 2007

BlackBerry

Practical Guide to Database Security & Compliance
sponsored by Sentrigo Inc.
WHITE PAPER: This white paper reviews the effect of various regulatory compliance requirements on database security, and provides you with 5 practical steps for achieving database security and compliance.
Posted: 05 Nov 2007 | Published: 01 Nov 2007

Sentrigo Inc.
26 - 50 of 59 Matches Previous Page    1 2 3    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement