Business of Information Technology  >   Business Environment  >   Legal Environment  >   Laws  >   Regulatory Compliance  >  

HIPAA Compliance

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: Compliance to HIPAA regulations.
HIPAA ComplianceReports
51 - 75 of 125 Matches Previous Page  | Next Page
Virtual Data Center: Health Care IT Edition, Sept. 2011
sponsored by SearchDataCenter.com
EZINE: Cloud computing holds a lot of promise for the healthcare industry, since infrastructure costs can hinder the adoption of EHR systems. However, many providers shy away from cloud services because of security concerns. Inside this e-zine, gain insight on how to utilize the cloud while still ensuring patient data security and HIPAA compliance.
Posted: 09 Sep 2011 | Published: 09 Sep 2011

SearchDataCenter.com

IBM InfoSphere Guardium Data Redaction
sponsored by IBM
WHITE PAPER: InfoSphere Guardium is a key part of the IBM InfoSphere portfolio. IBM InfoSphere software is an integrated platformfor defining, integrating, protecting and managing trusted information across your systems.
Posted: 13 Apr 2011 | Published: 13 Apr 2011

IBM

FAQ Guide: Regulatory Compliance Issues Drive Some IT Shops to Data Archive Appliances
sponsored by IBM
EGUIDE: Check out this SearchStorage.com FAQ guide to learn about the latest developments and the evolution of data archiving technology, the key characteristics of different appliances and more.
Posted: 13 Sep 2011 | Published: 13 Sep 2011

IBM

Storage Virtualization Strategies for Health Care
sponsored by SearchHealthIT.com und SearchStorage.com
EZINE: Using EHRs means that terabytes of patient records must be stored for decades at a time. Doing this without breaking the bank means deciding which storage approach is right for your healthcare facility. Inside this exclusive e-zine, learn about a variety of storage strategies, including tiered storage, thin provisioning and data replication.
Posted: 30 Aug 2011 | Published: 30 Aug 2011


Advantages of virtual desktop in a healthcare environment
sponsored by Dell, Inc.
EGUIDE: Many healthcare facilities in the midst of EHR deployment are facing the same question: What is the most effective solution to upgrading all existing desktops in an environment? This e-guide presents desktop virtualization as the answer to this question and discusses benefits including flexibility and data security for HIPAA compliance.
Posted: 30 Aug 2011 | Published: 30 Aug 2011

Dell, Inc.

InfoSphere Optim Data Growth Solution for Application Retirement
sponsored by IBM
WHITE PAPER: Data retention regulations, such as Sarbanes-Oxley, Basel II and HIPAA, require organizations to retain historical data in its original business context for specified periods of time. Non-compliance could result in costly penalties and fines. Learn about a data retention approach that archives critical business information.
Posted: 23 Aug 2011 | Published: 23 Aug 2011

IBM

Healthcare IT Channel E-Book: Ride the Health Care IT Modernization Wave: How To Enter the Health Care Technology Market or Grow Your Existing Healthcare IT Business
sponsored by Stratus Technologies
EBOOK: More than 75% of hospitals view electronic health records (EHRs) as the primary driver of IT spending and almost as many believe that EHR implementations will transform their IT environments. Inside this expert e-book, learn how healthcare facilities are preparing for network, storage and security changes in order to accommodate EHR implementation.
Posted: 19 Aug 2011 | Published: 19 Aug 2011

Stratus Technologies

IT in the Electronic Hospital
sponsored by SearchHealthIT.com
EGUIDE: The federal government’s push for electronic healthcare records has made compliance and data security even more pressing. This e-guide offers a look at where healthcare IT leaders should begin, and what they should watch out for as they move to embrace the HITECH Act, HIPAA and other initiatives.
Posted: 18 Aug 2011 | Published: 17 Aug 2009

SearchHealthIT.com

Essential Guide to HIPAA Compliance and Data Protection Strategies
sponsored by SearchHealthIT.com and SearchSecurity.com
EZINE: Effectively addressing the new HIPAA privacy and security rules introduced in the HITECH Act requires an assessment of your organization’s biggest vulnerabilities as well as the deployment of the right technology to reduce the risk of data loss. Inside this expert resource, gain insight on current healthcare security topics.
Posted: 17 Aug 2011 | Published: 17 Aug 2011

SearchHealthIT.com and SearchSecurity.com

Demonstrating HIPAA Security Rule Compliance
sponsored by Q1 Labs, an IBM Company
WHITE PAPER: View this paper to learn about the key elements of the HIPAA Security Rule including administrative, technical and, physical safeguards. In addition, explore how new advanced technology, QRadar, can help covered entities ease the burden of these rules and meet compliance.
Posted: 15 Aug 2011 | Published: 08 Aug 2011

Q1 Labs, an IBM Company

IBM Security Services: Achieving HIPAA Compliance
sponsored by IBM
DATA SHEET: This whitepaper discusses how IBM Security Services offer methodologies to help organizations achieve HIPAA compliance.
Posted: 01 Jul 2011 | Published: 01 Jul 2011

IBM

Getting the PACS archive and EHR systems to talk to each other
sponsored by Ciena
EGUIDE: Complying with the HITECH Act involves the exchange of data -- such as medical images -- across interoperable systems. Unfortunately, opening up proprietary images enterprise-wide to patients and their physicians can be complex. Inside this expert e-guide, learn how to plan ahead for this process with preparation and testing strategies.
Posted: 10 Jun 2011 | Published: 10 Jun 2011

Ciena

How Will the Transition to ICD-10 codes affect Health IT?
sponsored by Virtusa Corporation
EGUIDE: As of Oct. 1, 2015, U.S. health care providers must use ICD-10 codes when they submit medical claims. This FAQ e-guide addresses what the transition means, advantages of using ICD-10, as well as best practices on how providers can prepare and succeed in an ICD 10 conversion.
Posted: 31 Mar 2011 | Published: 29 Mar 2011

Virtusa Corporation

Data Breaches: A Growing Problem for the Healthcare Community
sponsored by Wave Systems Corp.
WHITE PAPER: While the pros of Electronic Medical Records (EMR) and online Healthcare Portals greatly outweigh the cons, their introduction comes at a price — an increased risk of both accidental and intentional data loss.
Posted: 17 Mar 2011 | Published: 17 Mar 2011

Wave Systems Corp.

E-Guide: FAQ: What is Health Data Archiving?
sponsored by BridgeHead Software
EGUIDE: Read this E-guide to learn more about the regulations involved in storing health data, how a SAN can improve data archiving and how to weigh the pro's and con's to achieve the most efficient data archiving strategy for your organization.
Posted: 12 Jan 2011 | Published: 05 Jan 2011

BridgeHead Software

Engineering the Wireless Hospital
sponsored by Aerohive Networks
EBOOK: Implementing a wireless network in a hospital allows physicians to use state-of-the-art equipment. However, there are security, infrastructure, and connectivity obstacles to overcome. Check out this e-book to learn more.
Posted: 15 Nov 2010 | Published: 15 Nov 2010

Aerohive Networks

Achieving ISO 27001 Compliance using Titus Solutions
sponsored by TITUS
WHITE PAPER: This paper provides IT professionals with a high level overview of ISO 27001 and 27002, along with their implications for security of email and digital documents.
Posted: 11 Nov 2010 | Published: 11 Nov 2010

TITUS

Presentation Transcript: Overcoming the Challenges with Configuration and Patch Mgmt
sponsored by BigFix
PRESENTATION TRANSCRIPT: In this presentation transcript, you’ll gain insight on how to improve your asset discovery processes, determine the patch level of the machines in your environment, and improve testing and deployment processes to keep pace with Patch Tuesday and quarterly Oracle and Adobe releases.
Posted: 02 Nov 2010 | Published: 01 Nov 2010

BigFix

E-Guide A Decision Maker’s Guide to Log Management
sponsored by ArcSight, an HP Company
EGUIDE: While often underappreciated by IT professionals, logs are an extremely useful source of data for IT shops. Often undervalued as a strategic weapon, log management tools can play a vital role in securing mission-critical data and assuring accountability. Learn what to consider when it’s time to get a handle on your logs.
Posted: 01 Nov 2010 | Published: 27 Oct 2010

ArcSight, an HP Company

E-Book: Encryption - What, Where and How
sponsored by SearchHealthIT.com
EBOOK: This e-book, brought to you by SearchHealthIT.com, discusses key issues health care IT pros are facing now, including: HIPAA, the HITECH Act and the new frontier for encryption, network and server encryption, using thin clients to keep data secure, and much more!
Posted: 27 Oct 2010 | Published: 26 Oct 2010

SearchHealthIT.com

E-Guide: Information Security Essential Guide to Compliance
sponsored by Information Security Magazine
ESSENTIAL GUIDE: Compliance with government regulations and industry standards shapes the formation of most information security programs. There’s no way around it; your organization must comply. This essential guide will help you sort out and prioritize your compliance responsibilities.
Posted: 06 Jul 2010 | Published: 06 Jul 2010

Information Security Magazine

Improving Clinician Workflows with One-Touch Desktop Roaming
sponsored by Imprivata
WHITE PAPER: The move from paper-based medical records systems to EMR is rightly viewed as a step toward improved patient care, increased clinician productivity, and lower costs. But striking a balance between access for clinicians and privacy for patients can be a difficult task. This paper presents a one-touch desktop roaming solution that benefits both.
Posted: 24 Jun 2010 | Published: 24 May 2010

Imprivata

E-Book: New Rules for HIPAA
sponsored by SearchSecurity.com & SearchCompliance.com
EBOOK: Organizations that had to comply with HIPAA were frustrated by the lack of enforcement and specifics. The HITECH Act is changing all of that. Read this e-book to learn how the HIPAA is getting new teeth, new ways the FTC is getting involved, and more.
Posted: 17 May 2010 | Published: 17 May 2010

SearchSecurity.com & SearchCompliance.com

IDC White Paper: Effective Information Security
sponsored by CA (India) Technologies Pvt. Ltd
ANALYST REPORT: Securing personally identifiable information (PII) and IP has become a high priority for enterprise management and IT. In this white paper, IDC provides an overview of information security and its impact on enterprises, discusses IT operation challenges, and describes CA's answer to helping enterprise IT organizations attain increased visibility...
Posted: 29 Apr 2010 | Published: 25 Sep 2009

CA (India) Technologies Pvt. Ltd

E-Book: DLP for Health Care - Strategies for Securing Electronic Health Information in the Age of HITECH
sponsored by SearchHealthIT.com
EBOOK: Data loss prevention (DLP) in health care—which mostly entails preventing patients’ protected health information (PHI) from falling into the wrong hands—requires well-conceived, well-enforced policies and the technology to back them up.
Posted: 16 Apr 2010 | Published: 15 Apr 2010

SearchHealthIT.com
51 - 75 of 125 Matches Previous Page    1 2 3 4 5    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement