Business of Information Technology  >   Business Environment  >   Legal Environment  >   Laws  >   Federal Law  >  


RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: HIPPA, Health Insurance Portability and Accountability Act of 1996
DEFINITION: HIPAA is the United States Health Insurance Portability and Accountability Act of 1996. There are two sections to the Act. HIPAA Title I deals with protecting health insurance coverage for people who lose or change jobs. HIPAA Title II includes an administrative simplification section which deals with the standardization of healthcare-related information systems. In the information technology industries,  … 
Definition continues below.
HIPAA Reports
1 - 25 of 156 Matches Previous Page  |  Next Page
Mobility Case Study: Franciscan Missionaries of Our Lady Health System
sponsored by Citrix
CASE STUDY: In this case study, discover how Franciscan Missionaries of Our Lady Health System – the largest health system in Louisiana – maximized their efficiency by building a clinician-centric, mobile-focused infrastructure for their organization. Learn how to mobilize your healthcare organization and address the proliferation of BYOD.
Posted: 13 Nov 2015 | Published: 31 Jul 2015


Solutions for Healthcare and HIPAA Compliance
sponsored by Citrix
WHITE PAPER: This guide reviews how new mobile technologies can help improve care using modern applications.
Posted: 11 Nov 2015 | Published: 31 Dec 2014


Mobile Healthcare Workspaces Infographic
sponsored by Citrix
RESOURCE: View this infographic to learn about top initiatives impacting healthcare organizations and how to meet these challenges with flexible IT solutions that improve operational efficiency and provide clinicians greater mobility with secure access to healthcare applications and patient data.
Posted: 11 Nov 2015 | Published: 11 Nov 2015


Medical Device Cybersafety - Separating Hype from Substance
sponsored by Symantec & Intuitive
WEBCAST: In this webcast, distinguished healthcare architect Axel Wirth reviews the difference between healthcare data compliance vs. security and the risks medical devices introduce to healthcare organizations. View now to learn medical device security priorities and best practices in order to avoid compliance failure and data loss.
Posted: 10 Nov 2015 | Premiered: Oct 20, 2015

Symantec & Intuitive

Compliance 101: Basics for Security Professionals
sponsored by Bit9 + Carbon Black
WHITE PAPER: Access this paper for a basic look at the most important compliance considerations all security professionals must be aware of.
Posted: 05 Nov 2015 | Published: 05 Nov 2015

Bit9 + Carbon Black

Meeting the Challenges of HIPAA Compliance, Phishing Attacks, and Mobile Security
sponsored by Proofpoint, Inc.
WHITE PAPER: This white paper examines three top healthcare security challenges—stricter regulations, inbound threats, and mobile IT. Read on to protect PHI and other confidential data from inbound security threats while embracing mobile computing technologies and security as a service (SaaS).
Posted: 05 Nov 2015 | Published: 31 Dec 2013

Proofpoint, Inc.

Risk Management for Medical Devices
sponsored by Symantec & Intuitive
WHITE PAPER: This white paper reviews the regulations and challenges surrounding medical device and data security and how to take control of risk management.
Posted: 29 Oct 2015 | Published: 07 Oct 2015

Symantec & Intuitive

Case Study: Protecting PHI without Slowing Patient Care
sponsored by Identity Finder, LLC
WHITE PAPER: This paper describes the challenges of managing PHI and presents an in-depth case study of a healthcare organization that overcame these challenges.
Posted: 12 Oct 2015 | Published: 12 Oct 2015

Identity Finder, LLC

Enhanced Access Control for the Healthcare Industry
sponsored by Imprivata
WHITE PAPER: This report takes a look at security designed for healthcare, discussing what single sign-on, virtual desktop access and more looks like when it complies with healthcare needs.
Posted: 25 Sep 2015 | Published: 31 Mar 2015


How to Maintain HIPAA-HITECH Compliance for Office 365
sponsored by Vaultive
WHITE PAPER: Regulations mandating protection for PHI – principally but not only HIPAA/HITECH – can stand in the way of healthcare organizations adopting cloud-based services. In this helpful white paper, you will learn 4 best practices for migrating email to Office 365 and how to minimize the risk of a data breach.
Posted: 21 Sep 2015 | Published: 20 Apr 2015


Redefines Clinical Workflows on Mobile to Improve Patient Care
sponsored by VMware, Inc.
CASE STUDY: This resource follows Adventist Health System as they work to redefine clinical workflows to allow healthcare providers to leverage mobile devices to improve patient care. View now to learn how their 7000 employees are able to securely access email and clinical information on their iOS and Android devices.
Posted: 11 Sep 2015 | Published: 11 Sep 2015

VMware, Inc.

Case Study: Infirmary Health System Secures Endpoints
sponsored by IBM
WHITE PAPER: This case study examines how Infirmary Health Systems, the largest non-government healthcare team in Alabama, effectively and efficiently address the full range of endpoint and event management requirements to meet HITECH regulations.
Posted: 30 Jul 2015 | Published: 08 Jul 2015


Managing Mobile Apps and Devices Under HIPAA and HITECH
sponsored by IBM
WHITE PAPER: This white paper explains how to incorporate a mobile device management (MDM) solution in healthcare. Learn how one MDM strategy allows you to eliminate the healthcare compliance headaches.
Posted: 28 Apr 2015 | Published: 26 Dec 2014


The C-Suite Battle Plan for Cyber Security Attacks in Healthcare
sponsored by Imprivata
WHITE PAPER: This white paper examines why passwords are the top vulnerability that healthcare hackers exploit . Uncover what techniques and tools your enemies are using and how to defend yourself by improving your key management strategy. Read on now to learn more.
Posted: 27 Apr 2015 | Published: 15 Apr 2015


Could HIPAA Make Criminals Out of People You Know?
sponsored by 8x8, Inc.
WHITE PAPER: This white paper teaches you how to evaluate telecom providers for storing important data such as faxes, voicemail, and other PHI. View now to learn when to trust an organization as an associate and when to realize red flags are being raised.
Posted: 17 Apr 2015 | Published: 18 Aug 2014

8x8, Inc.

Enabling Mobile Users and Staying Compliant
sponsored by BlackBerry
WHITE PAPER: Healthcare providers find it difficult enable collaboration and efficient workflows while complying with regulations, because of the sensitive information on staff's mobile devices. Find out how a containerization, application-wrapping, and secure connectivity option can bring healthcare organizations a higher level of control and security.
Posted: 15 Apr 2015 | Published: 31 Dec 2014


Why Healthcare Providers Seek Out New Ways To Manage and Utilize Big Data
sponsored by CyrusOne
WHITE PAPER: This white paper provides suggestions for how to manage healthcare data in ways that comply with HIPAA and HITECH, particularly how to manage big data volumes.
Posted: 18 Mar 2015 | Published: 01 Jan 2015


Email Security Checklist: Eight Steps for Success
sponsored by Mimecast
WHITE PAPER: This white paper explains how you can embrace email as a core communication tool while still adhering to guidelines.
Posted: 18 Dec 2014 | Published: 18 Dec 2014


Healthcare Email Management: Balancing Security, Compliance, and Cost
sponsored by Mimecast
WHITE PAPER: This white paper discusses a number of email management challenges facing healthcare CIOs, including HITECH and HIPAA compliance, budget constraints, cloud-based email and collaboration technologies, and data security.
Posted: 17 Dec 2014 | Published: 17 Dec 2014


Managing the Healthcare Information Stream Effectively
sponsored by Commvault
WHITE PAPER: Check out this white paper to discover the looming challenge of managing the healthcare information stream.
Posted: 09 Sep 2014 | Published: 09 Sep 2014


The HIPAA Omnibus Effect on Data Security, Business Associates
sponsored by
EBOOK: Under the HIPAA omnibus rule, business associates and healthcare providers face increased liability over data security -- requiring changes to health IT operations.
Posted: 23 Jul 2014 | Published: 28 Jul 2014

Improving PHI Security Through Better HIPAA Compliance
sponsored by Bit9 + Carbon Black
EGUIDE: This white paper catches you up to speed with the latest HIPAA changes impacting security measures and offers practical steps to take to improve your security and compliance strategy.
Posted: 10 Apr 2015 | Published: 06 Nov 2014

Bit9 + Carbon Black

Pulse E-zine: Vol. 3, No. 2
sponsored by
EZINE: While the health IT spotlight shifts to the release of stage 3 meaningful use guidelines, many providers are still struggling with stage 2 reporting. In this issue of Pulse, learn what's next for meaningful use, how it has affected EHRs, and how to align an analytics plan with the needs of your organization.
Posted: 23 Mar 2015 | Published: 19 Mar 2015

Five Steps to Meaningful Use with Workspace Virtualization
sponsored by RES Software
WHITE PAPER: Healthcare IT pros face 3 obstacles when trying to align with meaningful use standards: clinician experience, security and compliance, and legacy infrastructure management. In this expert guide, discover 5 key benefits healthcare organizations will realize when they deploy workspace virtualization.
Posted: 08 Oct 2014 | Published: 31 Dec 2013

RES Software

Addressing HIPAA privacy compliance on hospital wireless networks
sponsored by Absolute
EGUIDE: In this expert e-guide, discover how CIOs can cope with strict HIPAA compliance regulations, and access the 7 trends in mobile device security that helps keep health care data safe and secure.
Posted: 07 Oct 2014 | Published: 07 Oct 2014

1 - 25 of 156 Matches Previous Page    1 2 3 4    Next Page
HIPAA DEFINITION (continued): …  this section is what most people mean when they refer to HIPAA. HIPAA establishes mandatory regulations that require extensive changes to the way that health providers conduct business. FAQ: What is the impact of HIPAA on IT operations? HIPAA seeks to establish standardized mechanisms for electronic data interchange ( EDI ), security, and confidentiality of all healthcare-related data. The Act mandates: standardized formats for all patient health, administrative, and financial data; unique identifiers (ID numbers) for each healthcare entity, including individuals, employers, health plans and … 
HIPAA definition sponsored by, powered by an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement