Business of Information Technology  >   Business Environment  >   Legal Environment  >   Laws  >   Federal Law  >  

HIPAA

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: HIPPA, Health Insurance Portability and Accountability Act of 1996
DEFINITION: HIPAA is the United States Health Insurance Portability and Accountability Act of 1996. There are two sections to the Act. HIPAA Title I deals with protecting health insurance coverage for people who lose or change jobs. HIPAA Title II includes an administrative simplification section which deals with the standardization of healthcare-related information systems. In the information technology industries,  … 
Definition continues below.
HIPAA Reports
1 - 25 of 176 Matches Previous Page  |  Next Page
Staying Ahead of Emerging Threats in Healthcare
sponsored by Symantec Corporation
VIDEO: To attain a strategic level of security in your healthcare organization, there are technology changes as well as cultural changes you must make. This video gives you expert insight from the latest study on healthcare IT security and risk management.
Posted: 24 May 2016 | Premiered: 24 May 2016

Symantec Corporation

Top 10 Security Priorities For US Healthcare Organizations
sponsored by Absolute
WHITE PAPER: This report by Gartner reveals the main security challenges the healthcare industry faces. Unveil the top 10 security priorities for US healthcare organizations so that you can address the industry's most difficult challenges.
Posted: 24 May 2016 | Published: 22 Oct 2015

Absolute

Addressing Cybersecurity in Healthcare Strategically
sponsored by Symantec Corporation
WEBCAST: What are the 3 major factors contributing to the increasing number of healthcare breaches? Find out what they are, and discover how you can best detect, respond and get ahead of threats as they are happening, and how you can best mitigate future attacks.
Posted: 23 May 2016 | Premiered: Apr 1, 2016

Symantec Corporation

Protect Patient Data with Strong Desktop Security
sponsored by Aventura
WHITE PAPER: Learn how to build a security wall around PHI by addressing desktop security vulnerabilities. Unveil 7 ways to strengthen desktop security and access management in order to keep patient data safe.
Posted: 20 May 2016 | Published: 20 May 2016

Aventura

10 Characteristics of a HIPAA-Compliant ePHI Application
sponsored by Coalfire
WHITE PAPER: The root cause of HIPAA-compliance gaps often lies in application software that is not HIPAA-compliant – the software simply lacks the required or implied security functionality. Uncover the 10 security requirements of a HIPAA-compliant ePHI app.
Posted: 19 May 2016 | Published: 19 May 2016

Coalfire

FAQ: ShareFile Cloud for Healthcare
sponsored by Citrix
WHITE PAPER: Answer your frequently asked questions regarding ShareFile Cloud, an enterprise file sync and sharing (EFSS) solution, and see its benefits for healthcare organizations. Access now to witness how your organization can manage patient files and meet HIPAA requirements with an EFSS service.
Posted: 16 May 2016 | Published: 31 Dec 2014

Citrix

Are You Prepared for a HIPAA Audit? 7 Steps to Security Readiness
sponsored by Aventura
WHITE PAPER: If you are one of the selected entities for an Office for Civil Rights (OCR) HIPAA audit, will you be ready? Uncover 7 steps to ensure you're fully prepared for a HIPAA audit.
Posted: 16 May 2016 | Published: 16 May 2016

Aventura

How HIPAA Compliance is Impossible without Privileged Management
sponsored by Dell Software
WHITE PAPER: Achieving compliance with data security standards requires you to mitigate the risk of privileged access – in healthcare and other industries. Access this white paper now to learn how you can implement proven strategies to achieve regulatory compliance while fighting against other risks.
Posted: 06 May 2016 | Published: 31 Dec 2015

Dell Software

Why use data loss prevention for healthcare systems
sponsored by Digital Guardian
WHITE PAPER: Learn how to detect and prevent email containing PHI from being transmitted to the internet, detect and prevent network transmissions containing PHI from leaving your network and prevent PHI from being copied to a USB device.
Posted: 06 May 2016 | Published: 01 Apr 2016

Digital Guardian

CIO: Interoperability and Health Data Analytics Intertwined
sponsored by Optum
VIDEO: Hear from Andrew Rosenberg, M.D., interim CIO at the University of Michigan Health System, as he shares his thoughts about interoperability, how it is closely linked to data analytics, and what's holding the industry back from successfully sharing data.
Posted: 05 May 2016 | Premiered: 02 Mar 2016

Optum

4 Ways Data Loss Prevention Can Help Meet More Stringent HIPAA Enforcement
sponsored by Digital Guardian
WHITE PAPER: Implemented correctly, data loss prevention (DLP) can help your organization maintain HIPAA compliance. This white paper reviews 4 specific HIPAA statutes and how DLP helps your organization comply with each.
Posted: 04 May 2016 | Published: 01 Apr 2016

Digital Guardian

Protecting PHI: Evaluating Methods for Detection
sponsored by Digital Guardian
WHITE PAPER: Access this paper now to evaluate methods of detecting regulated data like personal health information, and the benefits and downfalls of each.
Posted: 04 May 2016 | Published: 01 Apr 2016

Digital Guardian

4 Steps to Implementing Data Protection in Healthcare
sponsored by Digital Guardian
WHITE PAPER: Discover how to implement data protection in your healthcare organization in 4 steps, keeping patient medical information secure and ensuring you remain in compliance with HIPAA.
Posted: 03 May 2016 | Published: 01 Apr 2016

Digital Guardian

Forrester Report - Industry Spotlight: US Healthcare Security Budgets and Priorities
sponsored by Digital Guardian
WHITE PAPER: This Forrester report helps healthcare security professionals learn from their peers and provides best practices for addressing critical security risks as budgets slowly increase. Access now to learn how you can better protect private patient information and retain your organization's good reputation.
Posted: 03 May 2016 | Published: 01 Apr 2016

Digital Guardian

Best Practices for Protecting Patient Data in the Cloud
sponsored by Digital Guardian
WHITE PAPER: Now that many healthcare organizations are using cloud computing to store and share sensitive patient information, they must figure out how to extend data loss prevention (DLP) strategies to include cloud storage. Discover best practices for applying DLP to the cloud.
Posted: 29 Apr 2016 | Published: 01 Mar 2016

Digital Guardian

Risk or Reward? UC, IM, and Social Media in the Pharmaceutical Industry
sponsored by Actiance
WHITE PAPER: For pharmaceutical companies, the reward from social channels is high, but they must mitigate the risk in order to make it worth using. Learn how to capture and archive all content from social channels to stay in line with corporate governance and regulatory requirements.
Posted: 25 Apr 2016 | Published: 25 Apr 2016

Actiance

Compliance Beyond Email: Navigating the Complexities within Healthcare
sponsored by Actiance
WHITE PAPER: This white paper explores how you can provide doctors and patients diverse communications coupled with strong compliance and data protection. Uncover 5 ways to mitigate legal and security risks in your healthcare organization.
Posted: 25 Apr 2016 | Published: 25 Apr 2016

Actiance

Addressing HIPAA Requirements for Electronic Communications
sponsored by Actiance
WHITE PAPER: Access this white paper and learn how you can enable seamless electronic communication in healthcare while meeting stringent compliance requirements, such as HIPAA, with 3 best practices.
Posted: 22 Apr 2016 | Published: 22 Apr 2016

Actiance

How Healthcare Organizations Both Enable Mobile Users and Stay Compliant
sponsored by BlackBerry
WHITE PAPER: Discover how to stay HIPAA compliant even when mobile devices come into play. Read on to uncover insight for securing your enterprise and BYOD to protect sensitive data, and learn about containerization, application-wrapping, and more.
Posted: 21 Apr 2016 | Published: 21 Apr 2016

BlackBerry

Avoid becoming the catch of the day: Four steps to combat phishing attacks
sponsored by Imprivata
WHITE PAPER: Phishing has emerged as the top security threat facing healthcare organizations. Access this white paper now for 4 steps you can take to better prepare for and defend against phishing attacks while maintaining a balance between security and clinical workflow efficiency.
Posted: 18 Apr 2016 | Published: 01 Mar 2016

Imprivata

Tidelands Health: Dynamically Roaming Sessions, Accessing Critical Data from Any Computer
sponsored by Aventura
CASE STUDY: Clinicians at Tidelands Health were frustrated with their inefficient PC workflows causing delayed log on times and reducing caregiver collaboration. This case study reveals how they implemented a platform integrating both VDI and server-based computing technologies to improve workflows almost immediately, enabling better patient care.
Posted: 15 Apr 2016 | Published: 31 Dec 2015

Aventura

How Hospitals Can Avoid the Biggest Healthcare Communications Mistake
sponsored by Imprivata
WHITE PAPER: Today, healthcare organizations suffer from poor communications practices due to outdated pager systems. Can secure messaging save your organization from these pitfalls and blunders? Take a look at this white paper to review the pros and cons of each approach.
Posted: 07 Apr 2016 | Published: 17 Feb 2016

Imprivata

Healthcare Organization Uses IaaS, DRaaS, and DaaS Platforms for Contractor Desktops
sponsored by Cirrity
CASE STUDY: This case study reveals how one healthcare organization used a secure cloud service, with IaaS, DRaaS, and DaaS platforms, to support a virtual desktop environment to enable anytime, anywhere, access to systems for contractors all over the world.
Posted: 31 Mar 2016 | Published: 31 Mar 2016

Cirrity

The Major Steps in Creating a Secure Healthcare Network
sponsored by Optum
EGUIDE: Access this e-guide now to learn how to identify, quantify and prioritize risk to create a corrective action plan that can be used to prevent a data breach in your healthcare organization, and keep patient data protected.
Posted: 25 Mar 2016 | Published: 01 Feb 2016

Optum

Healthcare Data Security Threats – And How to Prevent Them
sponsored by Optum
EGUIDE: In this e-guide, gain ideas on how you can stay ahead of hackers and secure protected health information, while staying fully compliant with HIPAA requirements.
Posted: 25 Mar 2016 | Published: 23 Mar 2016

Optum
1 - 25 of 176 Matches Previous Page    1 2 3 4    Next Page
 
HIPAA DEFINITION (continued): …  this section is what most people mean when they refer to HIPAA. HIPAA establishes mandatory regulations that require extensive changes to the way that health providers conduct business. FAQ: What is the impact of HIPAA on IT operations? HIPAA seeks to establish standardized mechanisms for electronic data interchange ( EDI ), security, and confidentiality of all healthcare-related data. The Act mandates: standardized formats for all patient health, administrative, and financial data; unique identifiers (ID numbers) for each healthcare entity, including individuals, employers, health plans and … 
HIPAA definition sponsored by SearchDataManagement.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement