Business of Information Technology  >   Business Environment  >   Legal Environment  >   Laws  >   Federal Law  >  

Health Insurance Portability and Accountability Act of 1996

RSS Feed    Add to Google    Add to My Yahoo!
Health Insurance Portability and Accountability Act of 1996 White Papers (View All Report Types)
 
4 Steps to Implementing Data Protection in Healthcare
sponsored by Digital Guardian
WHITE PAPER: Discover how to implement data protection in your healthcare organization in 4 steps, keeping patient medical information secure and ensuring you remain in compliance with HIPAA.
Posted: 03 May 2016 | Published: 01 Apr 2016

Digital Guardian

Avoid becoming the catch of the day: Four steps to combat phishing attacks
sponsored by Imprivata
WHITE PAPER: Phishing has emerged as the top security threat facing healthcare organizations. Access this white paper now for 4 steps you can take to better prepare for and defend against phishing attacks while maintaining a balance between security and clinical workflow efficiency.
Posted: 18 Apr 2016 | Published: 01 Mar 2016

Imprivata

Protecting PHI: Evaluating Methods for Detection
sponsored by Digital Guardian
WHITE PAPER: Access this paper now to evaluate methods of detecting regulated data like personal health information, and the benefits and downfalls of each.
Posted: 04 May 2016 | Published: 01 Apr 2016

Digital Guardian

How to select a KVM over IP system to assist with HIPAA compliance
sponsored by Avocent
WHITE PAPER: Effective security for health care information requires a multi-layered approach. Physical, logical and operational security are essential ingredients for successful compliance with HIPAA.
Posted: 08 Feb 2008 | Published: 01 Feb 2008

Avocent

Managing the Explosion of Medical Data
sponsored by HP & Intel®
WHITE PAPER: This timely white paper takes an in-depth look at the enormous growth of health care data and offers ways to overcome the challenges associated with it. Specifically, uncover how you can manage and secure the increasingly large data sets every organization is coping with.
Posted: 01 Aug 2013 | Published: 15 Nov 2012

HP & Intel®

Demonstrating HIPAA Security Rule Compliance
sponsored by Q1 Labs, an IBM Company
WHITE PAPER: View this paper to learn about the key elements of the HIPAA Security Rule including administrative, technical and, physical safeguards. In addition, explore how new advanced technology, QRadar, can help covered entities ease the burden of these rules and meet compliance.
Posted: 15 Aug 2011 | Published: 08 Aug 2011

Q1 Labs, an IBM Company

Selecting the right EHR for the Life of your Practice and Your Patients
sponsored by HP & Intel®
WHITE PAPER: If we are at or approaching a technological tipping point in the history of healthcare, then it has never been more important for physician practices to select the right electronic health record (EHR) – and there are tangible reasons to believe so. This white paper discusses criteria for selecting the right EHR solution.
Posted: 01 Aug 2013 | Published: 16 Sep 2011

HP & Intel®

Achieving HIPAA Compliance with Red Hat Enterprise Virtualization for Desktops
sponsored by Red Hat and JBoss
WHITE PAPER: This paper will illustrate how Red Hat Enterprise Virtualization for Desktops can help organizations comply with specific HIPAA mandates, while at the same time increasing their overall efficiency and agility.
Posted: 05 Oct 2009 | Published: 05 Oct 2009

Red Hat and JBoss

IDC White Paper: Imprivata’s Cortext HIPAA Compliant Texting for Clinicians
sponsored by Imprivata
WHITE PAPER: Access this white paper to explore a HIPAA compliant text messaging application that supports encrypted protected health information (PHI) to enable clinicians with rapid communications means, and explore best practices for implementation.
Posted: 06 Nov 2013 | Published: 31 Dec 2012

Imprivata

10 Characteristics of a HIPAA-Compliant ePHI Application
sponsored by Coalfire
WHITE PAPER: The root cause of HIPAA-compliance gaps often lies in application software that is not HIPAA-compliant – the software simply lacks the required or implied security functionality. Uncover the 10 security requirements of a HIPAA-compliant ePHI app.
Posted: 19 May 2016 | Published: 19 May 2016

Coalfire
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement