Business of Information Technology  >   Business Environment  >   Legal Environment  >   Laws  >   Federal Law  >  

HIPAA

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: HIPPA, Health Insurance Portability and Accountability Act of 1996
DEFINITION: HIPAA is the United States Health Insurance Portability and Accountability Act of 1996. There are two sections to the Act. HIPAA Title I deals with protecting health insurance coverage for people who lose or change jobs. HIPAA Title II includes an administrative simplification section which deals with the standardization of healthcare-related information systems. In the information technology industries,  … 
Definition continues below.
HIPAA White Papers (View All Report Types)
1 - 25 of 81 Matches Previous Page  |  Next Page
How to Secure Data Access Within the Healthcare Industry
sponsored by VASCO Data Security International
WHITE PAPER: Access this white paper to learn the changing role of technology within the health sector and why healthcare organizations continue to experience major data breaches. Discover best practices to help your organization integrate and adopt security without compromising the patient experience.
Posted: 22 Sep 2016 | Published: 31 Aug 2016

VASCO Data Security International

The Definitive Guide to Data Loss Prevention Healthcare Edition
sponsored by Digital Guardian
WHITE PAPER: This comprehensive guide provides what you need to understand, evaluate, and succeed with DLP in healthcare systems. It includes insights from DLP Experts, Forrester Research, Gartner, and Digital Guardian's security analysts.
Posted: 09 Aug 2016 | Published: 01 Jul 2016

Digital Guardian

Managing Cybersecurity Risk in a HIPAA-Compliant World: HIPAA and HITRUST
sponsored by Coalfire
WHITE PAPER: Should you assess your compliance and risk management posture against HIPAA, or HITRUST? Discover the answers to health IT security professionals' frequently asked questions on the two frameworks to help you identify the best approach to developing a solid security risk and management program for your organization.
Posted: 02 Jun 2016 | Published: 01 May 2016

Coalfire

10 Characteristics of a HIPAA-Compliant ePHI Application
sponsored by Coalfire
WHITE PAPER: The root cause of HIPAA-compliance gaps often lies in application software that is not HIPAA-compliant – the software simply lacks the required or implied security functionality. Uncover the 10 security requirements of a HIPAA-compliant ePHI app.
Posted: 19 May 2016 | Published: 19 May 2016

Coalfire

Why use data loss prevention for healthcare systems
sponsored by Digital Guardian
WHITE PAPER: Learn how to detect and prevent email containing PHI from being transmitted to the internet, detect and prevent network transmissions containing PHI from leaving your network and prevent PHI from being copied to a USB device.
Posted: 06 May 2016 | Published: 01 Apr 2016

Digital Guardian

4 Ways Data Loss Prevention Can Help Meet More Stringent HIPAA Enforcement
sponsored by Digital Guardian
WHITE PAPER: Implemented correctly, data loss prevention (DLP) can help your organization maintain HIPAA compliance. This white paper reviews 4 specific HIPAA statutes and how DLP helps your organization comply with each.
Posted: 04 May 2016 | Published: 01 Apr 2016

Digital Guardian

Protecting PHI: Evaluating Methods for Detection
sponsored by Digital Guardian
WHITE PAPER: Access this paper now to evaluate methods of detecting regulated data like personal health information, and the benefits and downfalls of each.
Posted: 04 May 2016 | Published: 01 Apr 2016

Digital Guardian

4 Steps to Implementing Data Protection in Healthcare
sponsored by Digital Guardian
WHITE PAPER: Discover how to implement data protection in your healthcare organization in 4 steps, keeping patient medical information secure and ensuring you remain in compliance with HIPAA.
Posted: 03 May 2016 | Published: 01 Apr 2016

Digital Guardian

Industry Spotlight: US Healthcare Security Budgets and Priorities
sponsored by Digital Guardian
WHITE PAPER: This Forrester report helps healthcare security professionals learn from their peers and provides best practices for addressing critical security risks as budgets slowly increase. Access now to learn how you can better protect private patient information and retain your organization's good reputation.
Posted: 03 May 2016 | Published: 01 Apr 2016

Digital Guardian

Best Practices for Protecting Patient Data in the Cloud
sponsored by Digital Guardian
WHITE PAPER: Now that many healthcare organizations are using cloud computing to store and share sensitive patient information, they must figure out how to extend data loss prevention (DLP) strategies to include cloud storage. Discover best practices for applying DLP to the cloud.
Posted: 29 Apr 2016 | Published: 01 Mar 2016

Digital Guardian

Enable Mobile Users and Stay Compliant: How Healthcare Organizations Manage Both
sponsored by BlackBerry
WHITE PAPER: Discover how to stay HIPAA compliant even when mobile devices come into play. Read on to uncover insight for securing your enterprise and BYOD to protect sensitive data, and learn about containerization, application-wrapping, and more.
Posted: 21 Apr 2016 | Published: 21 Apr 2016

BlackBerry

Avoid becoming the catch of the day: Four steps to combat phishing attacks
sponsored by Imprivata
WHITE PAPER: Phishing has emerged as the top security threat facing healthcare organizations. Access this white paper now for 4 steps you can take to better prepare for and defend against phishing attacks while maintaining a balance between security and clinical workflow efficiency.
Posted: 18 Apr 2016 | Published: 01 Mar 2016

Imprivata

How Hospitals Can Avoid the Biggest Healthcare Communications Mistake
sponsored by Imprivata
WHITE PAPER: Today, healthcare organizations suffer from poor communications practices due to outdated pager systems. Can secure messaging save your organization from these pitfalls and blunders? Take a look at this white paper to review the pros and cons of each approach.
Posted: 07 Apr 2016 | Published: 17 Feb 2016

Imprivata

Case Study: Protect Against Prescription Fraud with EPCS
sponsored by Imprivata
WHITE PAPER: The case study outlines Cambridge Health Alliance's drivers for implementing electronic prescribing of controlled substances (EPCS), and strategies and technologies for meeting DEA requirements. Gather best practice advice to help your healthcare organization achieve EPCS success.
Posted: 22 Mar 2016 | Published: 31 Dec 2015

Imprivata

Healthcare Organizations and Data Breach: How to Lower Risk and Reduce Liability
sponsored by Global Knowledge
WHITE PAPER: Access this guide to find detailed steps on lowering the risks of, and recovering quickly from, a healthcare data breach.
Posted: 25 Aug 2015 | Published: 25 Aug 2015

Global Knowledge

Case Study: Infirmary Health System Secures Endpoints
sponsored by IBM
WHITE PAPER: This case study examines how Infirmary Health Systems effectively and efficiently address the full range of endpoint and event management requirements to meet HIPAA and meaningful use regulations.
Posted: 30 Jul 2015 | Published: 08 Jul 2015

IBM

The C-Suite Battle Plan for Cyber Security Attacks in Healthcare
sponsored by Imprivata
WHITE PAPER: This white paper examines why passwords are the top vulnerability that healthcare hackers exploit . Uncover what techniques and tools your enemies are using and how to defend yourself by improving your key management strategy. Read on now to learn more.
Posted: 27 Apr 2015 | Published: 15 Apr 2015

Imprivata

HITRUST CSF Certification – Frequently Asked Questions
sponsored by Coalfire
WHITE PAPER: What do you know about the HITRUST Common Security Framework (CSF) Assurance Program? Access this resource now to obtain answers to 20 FAQs about HITRUST CSF – including its relationship with HIPAA – and bolster the security posture of your healthcare organization.
Posted: 28 Jun 2016 | Published: 28 Jun 2016

Coalfire

Security trends in the healthcare industry
sponsored by IBM
WHITE PAPER: This white paper gives you the latest statistics on healthcare-related security breaches and how you can avoid becoming a statistic yourself by falling victim to attack. Learn about the most common cyberattacks against healthcare organizations and how to patch vulnerabilities you may have in your network.
Posted: 15 Mar 2016 | Published: 31 Dec 2015

IBM

Five Steps to Meaningful Use with Workspace Virtualization
sponsored by RES Software
WHITE PAPER: Healthcare IT pros face 3 obstacles when trying to align with meaningful use standards: clinician experience, security and compliance, and legacy infrastructure management. In this expert guide, discover 5 key benefits healthcare organizations will realize when they deploy workspace virtualization.
Posted: 08 Oct 2014 | Published: 31 Dec 2013

RES Software

Managing the Healthcare Information Stream Effectively
sponsored by Commvault
WHITE PAPER: Check out this white paper to discover the looming challenge of managing the healthcare information stream.
Posted: 09 Sep 2014 | Published: 09 Sep 2014

Commvault

Voltage Success Story: Envision Pharmaceutical Services
sponsored by Voltage Security, Inc.
WHITE PAPER: This case study features Envision Pharmaceutical Services' experience with an easy-to-use, low-cost email platform that ensured secure data sharing and helped maintain HIPAA and PCI DSS compliance.
Posted: 18 Jun 2014 | Published: 18 Jun 2014

Voltage Security, Inc.

Personally Identifiable Information (PII) and Personal Health Information (PHI)
sponsored by Voltage Security, Inc.
WHITE PAPER: This white paper features an encrypted email solution that eliminates the need for paper-driven information sharing processes, and ensures secure, compliant transfers.
Posted: 16 Jun 2014 | Published: 16 Jun 2014

Voltage Security, Inc.

Simplify implementation of the HITRUST Common Security Framework
sponsored by Symantec Corporation
WHITE PAPER: Click through to explore the Health Information Trust Alliance (HITRUST) common security framework (CSF) which harmoniously combines compliance management controls for simplified, cost-effective HCO audit preparation.
Posted: 24 Apr 2014 | Published: 31 Mar 2013

Symantec Corporation

Industry Perspectives: The Impact of HIPAA and HITECH
sponsored by Symantec Corporation
WHITE PAPER: This white paper features a set of solutions that address not only compliance concerns, but the overarching risk potential in today's healthcare environments.
Posted: 24 Apr 2014 | Published: 30 Jun 2011

Symantec Corporation
1 - 25 of 81 Matches Previous Page    1 2 3 4    Next Page
 
HIPAA DEFINITION (continued): …  this section is what most people mean when they refer to HIPAA. HIPAA establishes mandatory regulations that require extensive changes to the way that health providers conduct business. FAQ: What is the impact of HIPAA on IT operations? HIPAA seeks to establish standardized mechanisms for electronic data interchange ( EDI ), security, and confidentiality of all healthcare-related data. The Act mandates: standardized formats for all patient health, administrative, and financial data; unique identifiers (ID numbers) for each healthcare entity, including individuals, employers, health plans and … 
HIPAA definition sponsored by SearchDataManagement.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement