Business of Information Technology  >   Business Environment  >   Legal Environment  >   Laws  >   Federal Law  >  

HIPAA

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: HIPPA, Health Insurance Portability and Accountability Act of 1996
DEFINITION: HIPAA is the United States Health Insurance Portability and Accountability Act of 1996. There are two sections to the Act. HIPAA Title I deals with protecting health insurance coverage for people who lose or change jobs. HIPAA Title II includes an administrative simplification section which deals with the standardization of healthcare-related information systems. In the information technology industries,  … 
Definition continues below.
HIPAAReports
101 - 125 of 135 Matches Previous Page  | Next Page
Addressing Compliance Initiatives with Center for Internet Security Benchmarks
sponsored by Tripwire, Inc.
WHITE PAPER: This whitepaper details the background you need to build an effective compliance program by understanding benchmarks, the basic building blocks of compliance initiatives. You'll learn about the benchmarks specified by the Center for Internet Security (CIS), which are often used as a starting point for creating a compliance initiative.
Posted: 30 Mar 2009 | Published: 01 Jan 2009

Tripwire, Inc.

Aligning Business and IT through Connected Requirements: Unifying the Development Process
sponsored by IBM
WHITE PAPER: Check out this white paper to learn how the connected-requirements approach serves as the framework for the use of products and technologies that are designed to allow you to optimize team performance, align the development process with your organization's business goals and meet auditing and regulatory compliance requirements.
Posted: 20 Feb 2009 | Published: 01 Oct 2008

IBM

Presentation Transcript: Data Masking Essentials for SAP Software
sponsored by IBM
PRESENTATION TRANSCRIPT: In this paper Sandeep S. Desai and Cynthia Babb explain about the IBM and Enterprise data management, how to protect privacy, what's at stake and data privacy in a sap environment.
Posted: 11 Feb 2009 | Published: 11 Feb 2009

IBM

Email Management in Today's Regulatory Environment
sponsored by Ontrack® PowerControls™ by Kroll Ontrack
WHITE PAPER: Many businesses use the Exchange email server because of its full feature set and integration with Microsoft Office via the Outlook email client. But Exchange has one glaring drawback - it is very difficult to restore messages, mailboxes, and other data. Ontrack® PowerControls™ for Microsoft® Exchange Server solves the problem..
Posted: 10 Feb 2009 | Published: 10 Feb 2009

Ontrack® PowerControls™ by Kroll Ontrack

Outbound Email and Data Loss Prevention in Today's Enterprise
sponsored by Proofpoint, Inc.
WHITE PAPER: This white paper overviews a survey completed by Proofpoint and Forrester Consulting that analyzes the legal, financial, and regulatory risks associated with outbound email in large enterprises.
Posted: 05 Feb 2009 | Published: 01 May 2008

Proofpoint, Inc.

IT Governance in an IBM Lotus Software Environment
sponsored by Sherpa Software
IT BRIEFING: This document describes concepts and definitions for governance, elements of governance, distinguishing myth from reality, approaches that go beyond "just good enough", control frameworks etc.
Posted: 16 Jan 2009 | Published: 16 Jan 2009

Sherpa Software

Laws, regulations and compliance: Top tips for keeping your data under your control
sponsored by Sophos, Inc.
WHITE PAPER: This paper outlines the rules, looks at the main threats to security compliance and highlights how a well-defined strategy, backed up by powerful technology, can provide the solution.
Posted: 22 Dec 2008 | Published: 22 Dec 2008

Sophos, Inc.

Enabling Sustainable Compliance Management
sponsored by IBM
WHITE PAPER: Read this white paper to see how adopting a sustainable security compliance strategy minimizes risk, while making proper use of people, process and technology. Also learn how you can cost-effectively comply with regulations, while maintaining business flexibility to achieve mission goals.
Posted: 22 Dec 2008 | Published: 19 Dec 2008

IBM

eBook: Understanding GRC(Governance, Risk Management, and Compliance): Frameworks, Tools and Strategies
sponsored by SearchSecurity.com
EBOOK: Check out this expert eBook to learn about the benefits of implementing a GRC program and get best practices for integrating these strategies into your company's infrastructure. This eBook is sponsored by Application Security, Inc, Beyond Trust, Lumension Security, MessageLabs, Thawte, Varonis and Websense.
Posted: 10 Dec 2008 | Published: 10 Dec 2008

SearchSecurity.com

Cisco Storage Media Encryption: Meeting the Security Challenge
sponsored by Cisco Systems, Inc.
BROCHURE: This white paper is an introduction to Cisco Storage Media Encryption (SME), a heterogeneous, standards-based encryption solution for data at rest with comprehensive built-in key-management features.
Posted: 04 Nov 2008 | Published: 04 Nov 2008

Cisco Systems, Inc.

Document Solutions IP Faxing versus Conventional Faxing: A Critical Analysis
sponsored by Premiere Global Services
WHITE PAPER: This white paper uses examples in three industries with the heaviest fax usage - finance, healthcare, and insurance - to demonstrate costs and risks that are shared across all industries.
Posted: 10 Oct 2008 | Published: 10 Oct 2008

Premiere Global Services

Turning the Compliance Challenge into a Business Advantage
sponsored by SAP America, Inc.
WHITE PAPER: New rules have spawned an army of consultants, vendors and solutions to address the "compliance" problem. Read this paper to learn how to turn the compliance challenge into a business advantage.
Posted: 26 Sep 2008 | Published: 18 Sep 2008

SAP America, Inc.

Achieving Compliance in a Virtualized Environment
sponsored by Tripwire, Inc.
WHITE PAPER: The goal of this paper is to present the unique considerations that virtualization presents to regulatory and standards compliance, and then prescriptively describe how to mitigate risks.
Posted: 25 Sep 2008 | Published: 19 Sep 2008

Tripwire, Inc.

Protecting Vital Business Interests with a Simplified Storage Solution
sponsored by Dell | EMC
PRODUCT LITERATURE: Effective storage systems have become a critical element of enterprise operations. This paper explains how Dell Services enables organizations to maximize business continuity and mitigate the risk of disaster or litigation.
Posted: 08 Aug 2008 | Published: 01 Nov 2007

Dell | EMC

Global Best Practices in Email Security, Privacy and Compliance
sponsored by Proofpoint, Inc.
WHITE PAPER: A new generation of email security solutions is needed to meet the challenges of growing message traffic, rapidly-evolving security threats and increasingly complex data protection and privacy regulations. This paper examines such a solution.
Posted: 06 Aug 2008 | Published: 06 Aug 2008

Proofpoint, Inc.

Oracle Database Vault
sponsored by Oracle Corporation
WHITE PAPER: Oracle Database Vault is the industry's leading database security solution for addressing regulatory compliance and concerns over the insider threat.
Posted: 15 Jul 2008 | Published: 01 Jun 2007

Oracle Corporation

How a Leading Psychiatric Hospital Safeguards Key Healthcare Data
sponsored by Cisco Systems, Inc.
CASE STUDY: The Cisco Security MARS solution has given The Menninger Clinic unprecedented visibility into its network operations and eased HIPAA compliance.
Posted: 10 Jul 2008 | Published: 01 Aug 2006

Cisco Systems, Inc.

Unauthorized Applications: Taking Back Control
sponsored by Sophos, Inc.
WHITE PAPER: This paper explains why it is important for businesses to control unauthorized applications such as instant Messaging, VoIP, games and peer-to-peer file-sharing and how malware protection is the simplest and most cost-effective solution.
Posted: 01 Jul 2008 | Published: 01 Dec 2007

Sophos, Inc.

The Role of Password Management in Achieving Compliance
sponsored by PistolStar, Inc.
WHITE PAPER: This paper will look at the dramatic impact password management solutions have had on organizations.
Posted: 13 Jun 2008 | Published: 01 Jan 2006

PistolStar, Inc.

Forrester Research: Improving Application Deployments - How an Application Delivery Architecture Can Help Businesses Overcome Deployment Challenges
sponsored by F5 Networks
WHITE PAPER: Today's businesses must operate in a drastically changing environment. Forrester found most companies are not well equipped to reorient IT as a critical driver of top line success. This report showcases the results of an April 2007 Forrester survey.
Posted: 28 Apr 2008 | Published: 01 Aug 2007

F5 Networks

Realizing Business Value in Managed File Transfer
sponsored by GlobalScape
WHITE PAPER: Managed File Transfer (MFT) is optimized for moving data; often bulk data, in a secure way that additionally involves the ability to manage data.
Posted: 16 Apr 2008 | Published: 15 Apr 2008

GlobalScape

Paperless Benefits Management Strategies Containing Costs and Complexity on a Budget
sponsored by Sage Abra
WHITE PAPER: This guide highlights recent trends in employee benefit costs and discusses the unique challenges faced by small and midsized businesses in the wake of escalating healthcare costs.
Posted: 03 Mar 2008 | Published: 01 Jan 2007

Sage Abra

Safe, Realistic Test Data: The Case for RowGen
sponsored by Innovative Routines International, Inc.
WHITE PAPER: RowGen provides a cost-effective alternative to the practice of production data replication. This is accomplished by providing data content that requires no additional security measures.
Posted: 29 Feb 2008 | Published: 01 Mar 2008

Innovative Routines International, Inc.

Network Faxing and HIPAA: Security and Privacy in the Health Care Industry
sponsored by Castelle
WHITE PAPER: The Health Insurance Portability and Accountability Act (HIPAA) prescribes new health care industry rules and recommendations for the handling and transmission of patient health information.
Posted: 26 Feb 2008 | Published: 01 Jan 2007

TOPICS:  HIPAA | Sales | Security
Castelle

CWAT Data Loss Prevention - Whitepaper/Technical Review
sponsored by Software Engineering of America, Inc.
WHITE PAPER: CWAT monitors all terminals including laptop computers and even missing terminals that are disconnected from networks.
Posted: 25 Feb 2008 | Published: 01 Sep 2006

Software Engineering of America, Inc.
101 - 125 of 135 Matches Previous Page    3 4 5 6    Next Page
 
HIPAA DEFINITION (continued): …  this section is what most people mean when they refer to HIPAA. HIPAA establishes mandatory regulations that require extensive changes to the way that health providers conduct business. FAQ: What is the impact of HIPAA on IT operations? HIPAA seeks to establish standardized mechanisms for electronic data interchange ( EDI ), security, and confidentiality of all healthcare-related data. The Act mandates: standardized formats for all patient health, administrative, and financial data; unique identifiers (ID numbers) for each healthcare entity, including individuals, employers, health plans and … 
HIPAA definition sponsored by SearchDataManagement.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement