Health Care Compliance

RSS Feed    Add to Google    Add to My Yahoo!
Health Care Compliance White Papers (View All Report Types)
1 - 25 of 130 Matches Previous Page  |  Next Page
Data Loss Prevention Best Practices for Health Care
sponsored by Intel Security
WHITE PAPER: Employing sound data loss prevention practices helps ensure the safe handling of data and provides the flexible environment required by clinical staff. Learn how to properly classify data and utilize monitoring technology to continuously track data location and movement across your network.
Posted: 26 May 2016 | Published: 01 Apr 2016

Intel Security

Fortinet Secure Access Solutions for Flawless Wireless Performance
sponsored by Fortinet, Inc.
WHITE PAPER: Wireless healthcare operations means greater vulnerabilities to healthcare networks. With patient records such a hot commodity for cybercriminals, healthcare organizations must be airtight with their remote management. Learn how to deploy end-to-end cybersecurity to ensure uninterrupted care at any sized healthcare facility.
Posted: 25 May 2016 | Published: 01 Apr 2016

Fortinet, Inc.

Data Visibility, Secure Remote Connections, and Increased Compliance Policy Awareness
sponsored by Digital Guardian
WHITE PAPER: This organization was able to adopt an organization-wide solution that provided real time policy application based on network awareness, enforce connections through the organization's VPN and prompt users who might otherwise violate appropriate use.
Posted: 24 May 2016 | Published: 01 Apr 2016

Digital Guardian

Top 10 Security Priorities For US Healthcare Organizations
sponsored by Absolute
WHITE PAPER: This report by Gartner reveals the main security challenges the healthcare industry faces. Unveil the top 10 security priorities for US healthcare organizations so that you can address the industry's most difficult challenges.
Posted: 24 May 2016 | Published: 22 Oct 2015

Absolute

Protect Patient Data with Strong Desktop Security
sponsored by Aventura
WHITE PAPER: Learn how to build a security wall around PHI by addressing desktop security vulnerabilities. Unveil 7 ways to strengthen desktop security and access management in order to keep patient data safe.
Posted: 20 May 2016 | Published: 20 May 2016

Aventura

Use Your Own Data to Rewrite the Map
sponsored by Pyramid Analytics
WHITE PAPER: Learn how you can keep up with changes using data-driven insights. Using the healthcare landscape as an example, discover how you can leverage self-service reporting, dashboards, and analysis to cut costs, deliver higher-quality care, meet regulatory requirements, and more.
Posted: 20 May 2016 | Published: 20 May 2016

Pyramid Analytics

Conquering New Challenges with Business Intelligence
sponsored by Pyramid Analytics
WHITE PAPER: On average, hospitals lose $70.2 million annually by failing to fully use the clinical data they collect. Organizations in all industries are missing major opportunities like this. Exploring healthcare, this infographic looks at leveraging BI to improve operations, comply with regulations, and gain more visibility into your organization.
Posted: 19 May 2016 | Published: 19 May 2016

Pyramid Analytics

10 Characteristics of a HIPAA-Compliant ePHI Application
sponsored by Coalfire
WHITE PAPER: The root cause of HIPAA-compliance gaps often lies in application software that is not HIPAA-compliant – the software simply lacks the required or implied security functionality. Uncover the 10 security requirements of a HIPAA-compliant ePHI app.
Posted: 19 May 2016 | Published: 19 May 2016

Coalfire

Are You Prepared for a HIPAA Audit? 7 Steps to Security Readiness
sponsored by Aventura
WHITE PAPER: If you are one of the selected entities for an Office for Civil Rights (OCR) HIPAA audit, will you be ready? Uncover 7 steps to ensure you're fully prepared for a HIPAA audit.
Posted: 16 May 2016 | Published: 16 May 2016

Aventura

Achieve a New Level of Security in Healthcare
sponsored by Symantec Corporation
WHITE PAPER: Uncover the key features your security strategy should include, such as protection of patient information from advanced attacks, secure access to data and applications, reduced risk for regulatory compliance, and more.
Posted: 13 May 2016 | Published: 31 Dec 2015

Symantec Corporation

Cybersecurity in Healthcare: Why It’s Not Enough, Why It Can’t Wait
sponsored by Symantec Corporation
WHITE PAPER: Find out the hazards of not keeping cybersecurity up-to-date within your healthcare organization and uncover ways you can safeguard yourself against attack in this essential infographic.
Posted: 12 May 2016 | Published: 12 May 2016

Symantec Corporation

The Future of Information Security in Healthcare
sponsored by Symantec Corporation
WHITE PAPER: In this e-book chapter, follow the story of security and compliance in healthcare, focusing on security strategies you can adopt going forward to protect medical data. Look into the key principles of compliance and security as they relate to healthcare, including: governance, secure information access, and more.
Posted: 12 May 2016 | Published: 12 May 2016

Symantec Corporation

Healthcare Content Management: Achieving a New Vision of Interoperability and Patient-Centric Care
sponsored by Lexmark Healthcare
WHITE PAPER: In this white paper, find out how scattered patient information can be brought online and made readily accessible from within your EHR system using healthcare content management. Explore the growing problem of healthcare data, the components of a healthcare content management strategy, and how to implement your own strategy.
Posted: 06 May 2016 | Published: 31 Dec 2015

Lexmark Healthcare

Case Study: Enable Care Providers While Protecting Patient Data
sponsored by Digital Guardian
WHITE PAPER: Follow St. Charles Health System's path from risk assessment to remediation of their problems using a data loss prevention technique to monitor their entire network to ensure no important information was being mishandled.
Posted: 06 May 2016 | Published: 01 Apr 2016

Digital Guardian

Why use data loss prevention for healthcare systems
sponsored by Digital Guardian
WHITE PAPER: Learn how to detect and prevent email containing PHI from being transmitted to the internet, detect and prevent network transmissions containing PHI from leaving your network and prevent PHI from being copied to a USB device.
Posted: 06 May 2016 | Published: 01 Apr 2016

Digital Guardian

Vendor Neutral Archive: Control and Share Imaging Data Across the Organization
sponsored by Lexmark Healthcare
WHITE PAPER: Healthcare delivery demands are only escalating, and this is why many organizations are turning to vendor neutral archives (VNAs). In this white paper, learn how VNAs can enable you to support image exchange across affiliated hospitals, gain anywhere, anytime image access, deliver department control, and more.
Posted: 04 May 2016 | Published: 04 May 2016

Lexmark Healthcare

4 Ways Data Loss Prevention Can Help Meet More Stringent HIPAA Enforcement
sponsored by Digital Guardian
WHITE PAPER: Implemented correctly, data loss prevention (DLP) can help your organization maintain HIPAA compliance. This white paper reviews 4 specific HIPAA statutes and how DLP helps your organization comply with each.
Posted: 04 May 2016 | Published: 01 Apr 2016

Digital Guardian

Protecting PHI: Evaluating Methods for Detection
sponsored by Digital Guardian
WHITE PAPER: Access this paper now to evaluate methods of detecting regulated data like personal health information, and the benefits and downfalls of each.
Posted: 04 May 2016 | Published: 01 Apr 2016

Digital Guardian

4 Steps to Implementing Data Protection in Healthcare
sponsored by Digital Guardian
WHITE PAPER: Discover how to implement data protection in your healthcare organization in 4 steps, keeping patient medical information secure and ensuring you remain in compliance with HIPAA.
Posted: 03 May 2016 | Published: 01 Apr 2016

Digital Guardian

Forrester Report - Industry Spotlight: US Healthcare Security Budgets and Priorities
sponsored by Digital Guardian
WHITE PAPER: This Forrester report helps healthcare security professionals learn from their peers and provides best practices for addressing critical security risks as budgets slowly increase. Access now to learn how you can better protect private patient information and retain your organization's good reputation.
Posted: 03 May 2016 | Published: 01 Apr 2016

Digital Guardian

Best Practices for Protecting Patient Data in the Cloud
sponsored by Digital Guardian
WHITE PAPER: Now that many healthcare organizations are using cloud computing to store and share sensitive patient information, they must figure out how to extend data loss prevention (DLP) strategies to include cloud storage. Discover best practices for applying DLP to the cloud.
Posted: 29 Apr 2016 | Published: 01 Mar 2016

Digital Guardian

Risk or Reward? UC, IM, and Social Media in the Pharmaceutical Industry
sponsored by Actiance
WHITE PAPER: For pharmaceutical companies, the reward from social channels is high, but they must mitigate the risk in order to make it worth using. Learn how to capture and archive all content from social channels to stay in line with corporate governance and regulatory requirements.
Posted: 25 Apr 2016 | Published: 25 Apr 2016

Actiance

Compliance Beyond Email: Navigating the Complexities within Healthcare
sponsored by Actiance
WHITE PAPER: This white paper explores how you can provide doctors and patients diverse communications coupled with strong compliance and data protection. Uncover 5 ways to mitigate legal and security risks in your healthcare organization.
Posted: 25 Apr 2016 | Published: 25 Apr 2016

Actiance

Addressing HIPAA Requirements for Electronic Communications
sponsored by Actiance
WHITE PAPER: Access this white paper and learn how you can enable seamless electronic communication in healthcare while meeting stringent compliance requirements, such as HIPAA, with 3 best practices.
Posted: 22 Apr 2016 | Published: 22 Apr 2016

Actiance

How Healthcare Organizations Both Enable Mobile Users and Stay Compliant
sponsored by BlackBerry
WHITE PAPER: Discover how to stay HIPAA compliant even when mobile devices come into play. Read on to uncover insight for securing your enterprise and BYOD to protect sensitive data, and learn about containerization, application-wrapping, and more.
Posted: 21 Apr 2016 | Published: 21 Apr 2016

BlackBerry
1 - 25 of 130 Matches Previous Page    1 2 3 4    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement