Business of Information Technology  >   Business Environment  >   Legal Environment  >   Laws  >   Federal Law  >  

HIPPA

RSS Feed    Add to Google    Add to My Yahoo!
HIPPA White Papers (View All Report Types)
 
HIPAA Violations Incur Multi-Million Dollar Penalties
sponsored by Absolute Software
WHITE PAPER: In this resource, read about some recent HIPAA breaches that cost the violating parties significant penalties and learn about the measures that can be put in place to help maintain compliance.
Posted: 21 Jan 2014 | Published: 15 Jan 2013

Absolute Software

In the Interest of the Patient
sponsored by IBM Line of Business
WHITE PAPER: This paper explores how by collaborating and sharing data, the two industries can realize the full value of the information they collect--and improve patient treatments.
Posted: 22 Feb 2008 | Published: 01 Jan 2006

IBM Line of Business

Network Faxing and HIPAA: Security and Privacy in the Health Care Industry
sponsored by Castelle
WHITE PAPER: The Health Insurance Portability and Accountability Act (HIPAA) prescribes new health care industry rules and recommendations for the handling and transmission of patient health information.
Posted: 26 Feb 2008 | Published: 01 Jan 2007

TOPICS:  HIPAA | Sales | Security
Castelle

Information-Centric Security and Data Erasure
sponsored by EMC Corporation
WHITE PAPER: Most data security spending today goes to protecting devices and infrastructure, while little goes to protecting the stored data itself. In this white paper ESG analysts discuss the particulars of information security and data erasure.
Posted: 26 Sep 2006 | Published: 01 Jul 2006

EMC Corporation

IDC White Paper: Imprivata’s Cortext HIPAA Compliant Texting for Clinicians
sponsored by Imprivata
WHITE PAPER: Access this white paper to explore a HIPAA compliant text messaging application that supports encrypted protected health information (PHI) to enable clinicians with rapid communications means, and explore best practices for implementation.
Posted: 06 Nov 2013 | Published: 31 Dec 2012

Imprivata

Safe, Realistic Test Data: The Case for RowGen
sponsored by Innovative Routines International, Inc.
WHITE PAPER: RowGen provides a cost-effective alternative to the practice of production data replication. This is accomplished by providing data content that requires no additional security measures.
Posted: 29 Feb 2008 | Published: 01 Mar 2008

Innovative Routines International, Inc.

How to select a KVM over IP system to assist with HIPAA compliance
sponsored by Avocent
WHITE PAPER: Effective security for health care information requires a multi-layered approach. Physical, logical and operational security are essential ingredients for successful compliance with HIPAA.
Posted: 08 Feb 2008 | Published: 01 Feb 2008

Avocent

Personally Identifiable Information (PII) and Personal Health Information (PHI)
sponsored by Voltage Security, Inc.
WHITE PAPER: This white paper features an encrypted email solution that eliminates the need for paper-driven information sharing processes, and ensures secure, compliant transfers.
Posted: 16 Jun 2014 | Published: 16 Jun 2014

Voltage Security, Inc.

Forrester Research: Improving Application Deployments - How an Application Delivery Architecture Can Help Businesses Overcome Deployment Challenges
sponsored by F5 Networks
WHITE PAPER: Today's businesses must operate in a drastically changing environment. Forrester found most companies are not well equipped to reorient IT as a critical driver of top line success. This report showcases the results of an April 2007 Forrester survey.
Posted: 28 Apr 2008 | Published: 01 Aug 2007

F5 Networks

Aligning Business and IT through Connected Requirements: Unifying the Development Process
sponsored by IBM
WHITE PAPER: Check out this white paper to learn how the connected-requirements approach serves as the framework for the use of products and technologies that are designed to allow you to optimize team performance, align the development process with your organization's business goals and meet auditing and regulatory compliance requirements.
Posted: 20 Feb 2009 | Published: 01 Oct 2008

IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement