Business of Information Technology  >   Business Environment  >   Legal Environment  >   Laws  >   Regulatory Compliance  >  

HIPAA Compliance

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: Compliance to HIPAA regulations.
HIPAA Compliance Reports
1 - 25 of 148 Matches Previous Page  |  Next Page
How to guard secure data
sponsored by Optum
EGUIDE: IT staffers should consider using additional applications to track all relevant devices and applications that could pose a security risk. Learn how to best protect patient data with simple security updates and ensure HIPAA compliance to lessen vulnerabilities.
Posted: 14 Jul 2016 | Published: 01 Jun 2016

Optum

Protected Health Information Data Breach Report
sponsored by Verizon
RESEARCH CONTENT: Put PHI security under the microscope to help you identify threats and mitigate risks to your medical records, by accessing this exclusive "Protected Health Information Data Breach" report. Additionally, examine the top three threats that account for 73% of all healthcare data security incidents to protect your customer trust.
Posted: 08 Jul 2016 | Published: 31 Dec 2015

Verizon

HITRUST CSF Certification – Frequently Asked Questions
sponsored by Coalfire
WHITE PAPER: What do you know about the HITRUST Common Security Framework (CSF) Assurance Program? Access this resource now to obtain answers to 20 FAQs about HITRUST CSF – including its relationship with HIPAA – and bolster the security posture of your healthcare organization.
Posted: 28 Jun 2016 | Published: 28 Jun 2016

Coalfire

Jumpstart HITRUST CSF Certification with a Proven Methodology
sponsored by Coalfire
WEBCAST: Has your organization received a letter requiring you to be HITRUST CSF certified or is your organization considering HITRUST validation? This webinar educates you about the HITRUST CSF certification process and provides clarification for any questions you might have.
Posted: 09 Jun 2016 | Premiered: Sep 30, 2015

Coalfire

FAQ: ShareFile Cloud for Healthcare
sponsored by Citrix
WHITE PAPER: Answer your frequently asked questions regarding ShareFile Cloud, an enterprise file sync and sharing (EFSS) solution, and see its benefits for healthcare organizations. Access now to witness how your organization can manage patient files and meet HIPAA requirements with an EFSS service.
Posted: 16 May 2016 | Published: 31 Dec 2014

Citrix

How HIPAA Compliance is Impossible without Privileged Management
sponsored by One Identity
WHITE PAPER: Achieving compliance with data security standards requires you to mitigate the risk of privileged access – in healthcare and other industries. Access this white paper now to learn how you can implement proven strategies to achieve regulatory compliance while fighting against other risks.
Posted: 06 May 2016 | Published: 31 Dec 2015

One Identity

How Healthcare Organizations Both Enable Mobile Users and Stay Compliant
sponsored by BlackBerry
WHITE PAPER: Discover how to stay HIPAA compliant even when mobile devices come into play. Read on to uncover insight for securing your enterprise and BYOD to protect sensitive data, and learn about containerization, application-wrapping, and more.
Posted: 21 Apr 2016 | Published: 21 Apr 2016

BlackBerry

Avoid becoming the catch of the day: Four steps to combat phishing attacks
sponsored by Imprivata
WHITE PAPER: Phishing has emerged as the top security threat facing healthcare organizations. Access this white paper now for 4 steps you can take to better prepare for and defend against phishing attacks while maintaining a balance between security and clinical workflow efficiency.
Posted: 18 Apr 2016 | Published: 01 Mar 2016

Imprivata

The Major Steps in Creating a Secure Healthcare Network
sponsored by Optum
EGUIDE: Access this e-guide now to learn how to identify, quantify and prioritize risk to create a corrective action plan that can be used to prevent a data breach in your healthcare organization, and keep patient data protected.
Posted: 25 Mar 2016 | Published: 01 Feb 2016

Optum

Healthcare Data Security Threats – And How to Prevent Them
sponsored by Optum
EGUIDE: In this e-guide, gain ideas on how you can stay ahead of hackers and secure protected health information, while staying fully compliant with HIPAA requirements.
Posted: 25 Mar 2016 | Published: 23 Mar 2016

Optum

How HealthEast Care System Achieved EPCS Success
sponsored by Imprivata
VIDEO: In this short video, hear from key IT and clinical decision makers at HealthEast Care System as they describe how they achieved an efficient way to safely and securely electronically prescribe controlled substances.
Posted: 25 Mar 2016 | Premiered: 29 Feb 2016

Imprivata

Case Study: How CHWC Improves HCAHPS Scores and Patient Care
sponsored by Imprivata
CASE STUDY: Healthcare organizations are at risk of HIPAA breaches as employees use legacy pagers and personal devices to communicate. This case study examines how one health system replaced their outdated pager system and leveraged BYOD tech to improve patient care and mitigate device risks.
Posted: 22 Mar 2016 | Published: 24 Feb 2016

Imprivata

Protecting Patient Data in the Mobile Era
sponsored by SearchHealthIT.com
EZINE: The rapid adoption of EHRs, coupled with the widespread use of mobile devices among providers, has increased the endpoint security threat – and there are more risks ahead. Access this issue of Pulse to find out how providers are locking down access points to protect against data breaches and HIPAA violations.
Posted: 03 Mar 2016 | Published: 29 Feb 2016

SearchHealthIT.com

Healthcare Organizations and Data Breach: How to Lower Risk and Reduce Liability
sponsored by Global Knowledge
WHITE PAPER: Access this guide to find detailed steps on lowering the risks of, and recovering quickly from, a healthcare data breach.
Posted: 25 Aug 2015 | Published: 25 Aug 2015

Global Knowledge

Case Study: Infirmary Health System Secures Endpoints
sponsored by IBM
WHITE PAPER: This case study examines how Infirmary Health Systems, the largest non-government healthcare team in Alabama, effectively and efficiently address the full range of endpoint and event management requirements to meet HITECH regulations.
Posted: 30 Jul 2015 | Published: 08 Jul 2015

IBM

How to Prevent Healthcare Cybersecurity Attacks
sponsored by ServiceNow
EGUIDE: In this e-guide, we chat with the former CIO of Community Health Systems as he discusses how to prevent healthcare cyberattacks and lessons learned during his career. Uncover best practices on maintaining proper healthcare security.
Posted: 13 Jun 2016 | Published: 06 Jun 2016

ServiceNow

Why use data loss prevention for healthcare systems
sponsored by Digital Guardian
WHITE PAPER: Learn how to detect and prevent email containing PHI from being transmitted to the internet, detect and prevent network transmissions containing PHI from leaving your network and prevent PHI from being copied to a USB device.
Posted: 06 May 2016 | Published: 01 Apr 2016

Digital Guardian

4 Ways Data Loss Prevention Can Help Meet More Stringent HIPAA Enforcement
sponsored by Digital Guardian
WHITE PAPER: Implemented correctly, data loss prevention (DLP) can help your organization maintain HIPAA compliance. This white paper reviews 4 specific HIPAA statutes and how DLP helps your organization comply with each.
Posted: 04 May 2016 | Published: 01 Apr 2016

Digital Guardian

4 Steps to Implementing Data Protection in Healthcare
sponsored by Digital Guardian
WHITE PAPER: Discover how to implement data protection in your healthcare organization in 4 steps, keeping patient medical information secure and ensuring you remain in compliance with HIPAA.
Posted: 03 May 2016 | Published: 01 Apr 2016

Digital Guardian

Industry Spotlight: US Healthcare Security Budgets and Priorities
sponsored by Digital Guardian
WHITE PAPER: This Forrester report helps healthcare security professionals learn from their peers and provides best practices for addressing critical security risks as budgets slowly increase. Access now to learn how you can better protect private patient information and retain your organization's good reputation.
Posted: 03 May 2016 | Published: 01 Apr 2016

Digital Guardian

Best Practices for Protecting Patient Data in the Cloud
sponsored by Digital Guardian
WHITE PAPER: Now that many healthcare organizations are using cloud computing to store and share sensitive patient information, they must figure out how to extend data loss prevention (DLP) strategies to include cloud storage. Discover best practices for applying DLP to the cloud.
Posted: 29 Apr 2016 | Published: 01 Mar 2016

Digital Guardian

Learn the new definition of Revenue Cycle Management and what it means to you
sponsored by SearchHealthIT.com
EBOOK: Technology advancements and the ICD-10 transition have expanded the scope of revenue cycle management, challenging IT to keep up. Find tips on decreasing revenue risk, strengthening your revenue cycle strategy and more, in our expert handbook.
Posted: 30 Dec 2015 | Published: 22 Dec 2015

SearchHealthIT.com

Improving PHI Security Through Better HIPAA Compliance
sponsored by Bit9 + Carbon Black
EGUIDE: This white paper catches you up to speed with the latest HIPAA changes impacting security measures and offers practical steps to take to improve your security and compliance strategy.
Posted: 10 Apr 2015 | Published: 06 Nov 2014

Bit9 + Carbon Black

A Prescription for Privacy
sponsored by Symantec Website Security Solutions
WHITE PAPER: This white paper examines the challenges surrounding the emerging world of EHR technology, including the requirements that govern the protection of confidential patient data online; the measures that organizations need to take right now to prepare for these upcoming changes to the healthcare industry; and more.
Posted: 14 Jan 2015 | Published: 28 Feb 2014

Symantec Website Security Solutions

Addressing HIPAA privacy compliance on hospital wireless networks
sponsored by Absolute
EGUIDE: In this expert e-guide, discover how CIOs can cope with strict HIPAA compliance regulations, and access the 7 trends in mobile device security that helps keep health care data safe and secure.
Posted: 07 Oct 2014 | Published: 07 Oct 2014

Absolute
1 - 25 of 148 Matches Previous Page    1 2 3 4    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement