Business of Information Technology  >   Business Environment  >   Legal Environment  >   Laws  >   Federal Law  >  

HIPAA

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: HIPPA, Health Insurance Portability and Accountability Act of 1996
DEFINITION: HIPAA is the United States Health Insurance Portability and Accountability Act of 1996. There are two sections to the Act. HIPAA Title I deals with protecting health insurance coverage for people who lose or change jobs. HIPAA Title II includes an administrative simplification section which deals with the standardization of healthcare-related information systems. In the information technology industries,  … 
Definition continues below.
HIPAAReports
101 - 125 of 145 Matches Previous Page  | Next Page
Buyer’s Guide to Antimalware
sponsored by Panda Security
EGUIDE: Companies face complicated buying decisions when it comes to buying host-based antimalware. Should you purchase a protection suite? What should you include in that all-in-one package? Read this guide for helpful information about purchasing antimalware products.
Posted: 30 Oct 2009 | Published: 27 Oct 2009

Panda Security

Reduce the Cost to Achieving HIPAA Security Compliance with Lumension® Solutions
sponsored by Lumension
WHITE PAPER: Healthcare organizations face a host of HIPAA Security Rule compliance challenges with the move to put patient medical records online. Lumension helps organizations address these compliance challenges by providing the proactive IT risk management and the required audit readiness to meet many aspects of the HIPAA Security Rule.
Posted: 19 Oct 2009 | Published: 19 Oct 2009

Lumension

Data Protection Virtual Seminar
sponsored by SearchSecurity.com
VIRTUAL TRADESHOW: The combination of the ever-changing compliance landscape, Web 2.0 and technologies such as mobile devices have made it increasingly more difficult to track where your confidential data resides and put mechanisms in place to protect it.
Posted: 19 Oct 2009 | Premiered: Nov 17, 2009, 09:30 EST (14:30 GMT)

TOPICS:  HIPAA | Web 2.0
SearchSecurity.com

Managing the Cost and Complexity of Compliance through Governance
sponsored by McAfee, Inc.
PRESENTATION TRANSCRIPT: Read this presentation transcript for a discussion on risk management, corporate governance, regulatory compliance, and information quality presented by speaker Laurence Anker.
Posted: 08 Oct 2009 | Published: 08 Oct 2009

McAfee, Inc.

Achieving HIPAA Compliance with Red Hat Enterprise Virtualization for Desktops
sponsored by Red Hat and JBoss
WHITE PAPER: This paper will illustrate how Red Hat Enterprise Virtualization for Desktops can help organizations comply with specific HIPAA mandates, while at the same time increasing their overall efficiency and agility.
Posted: 05 Oct 2009 | Published: 05 Oct 2009

Red Hat and JBoss

Protecting Healthcare Organizations from Patient Data Loss
sponsored by Code Green Networks, Inc.
WHITE PAPER: Negative publicity from a data breach can have lasting consequences, undermining patient confidence and damaging an organization's reputation. This paper covers potential data breaches within healthcare organizations and strategies for preventing them. Read on to learn more about the steps you can take to protect patients' sensitive information.
Posted: 08 Sep 2009 | Published: 08 Sep 2009

Code Green Networks, Inc.

PODCAST: SOX, GLBA and HIPAA: Multiple Regulations, One Compliance Solution
sponsored by Tripwire, Inc.
PODCAST: What do SOX, GLBA, and HIPPA all have in common? These important regulations all require technical safeguards to protect or guarantee the veracity of critical information. In this Q&A podcast, gain an understanding of the above regulations and discover what capabilities and organization must have in place to address the requirements.
Posted: 01 Sep 2009 | Premiered: Aug 24, 2009

Tripwire, Inc.

SOX, GLBA and HIPAA: Multiple Regulations, One Compliance Solution
sponsored by Tripwire, Inc.
WEBCAST: SOX, GLBA and HIPAA share a common regulatory compliance thread - the need to use automation to ensure continuous compliance with required IT controls. View this webcast for an overview of each regulation. Also, gain an understanding of the capabilities an organization must have in place to address these requirements.
Posted: 01 Sep 2009 | Premiered: Aug 24, 2009

Tripwire, Inc.

The Critical Need for Encrypted Email and Secure File Transfer Solutions
sponsored by Proofpoint, Inc.
WHITE PAPER: This free email encryption whitepaper from Osterman Research discusses key issues around the encryption of both email and file transfer systems, some of the leading statutes that require sensitive content to be encrypted, and suggestions for moving forward with encryption.
Posted: 04 Aug 2009 | Published: 01 Jul 2009

Proofpoint, Inc.

The New Age of Compliance: Preparing Your Organization for a New Era of Increased Accountability and Enforcement
sponsored by Mimosa Systems
WHITE PAPER: This white paper examines the current state of regulatory compliance and the impact of non-compliance. It also addresses the current political environment and the shift in the compliance landscape and compliance enforcement for which organizations need to be prepared. Finally, it discusses some best practices that can be applied to streamline..
Posted: 06 Jul 2009 | Published: 10 Jun 2009

Mimosa Systems

Addressing Compliance Initiatives with Center for Internet Security Benchmarks
sponsored by Tripwire, Inc.
WHITE PAPER: This whitepaper details the background you need to build an effective compliance program by understanding benchmarks, the basic building blocks of compliance initiatives. You'll learn about the benchmarks specified by the Center for Internet Security (CIS), which are often used as a starting point for creating a compliance initiative.
Posted: 30 Mar 2009 | Published: 01 Jan 2009

Tripwire, Inc.

Aligning Business and IT through Connected Requirements: Unifying the Development Process
sponsored by IBM
WHITE PAPER: Check out this white paper to learn how the connected-requirements approach serves as the framework for the use of products and technologies that are designed to allow you to optimize team performance, align the development process with your organization's business goals and meet auditing and regulatory compliance requirements.
Posted: 20 Feb 2009 | Published: 01 Oct 2008

IBM

Presentation Transcript: Data Masking Essentials for SAP Software
sponsored by IBM
PRESENTATION TRANSCRIPT: In this paper Sandeep S. Desai and Cynthia Babb explain about the IBM and Enterprise data management, how to protect privacy, what's at stake and data privacy in a sap environment.
Posted: 11 Feb 2009 | Published: 11 Feb 2009

IBM

Email Management in Today's Regulatory Environment
sponsored by Ontrack® PowerControls™ by Kroll Ontrack
WHITE PAPER: Many businesses use the Exchange email server because of its full feature set and integration with Microsoft Office via the Outlook email client. But Exchange has one glaring drawback - it is very difficult to restore messages, mailboxes, and other data. Ontrack® PowerControls™ for Microsoft® Exchange Server solves the problem..
Posted: 10 Feb 2009 | Published: 10 Feb 2009

Ontrack® PowerControls™ by Kroll Ontrack

Outbound Email and Data Loss Prevention in Today's Enterprise
sponsored by Proofpoint, Inc.
WHITE PAPER: This white paper overviews a survey completed by Proofpoint and Forrester Consulting that analyzes the legal, financial, and regulatory risks associated with outbound email in large enterprises.
Posted: 05 Feb 2009 | Published: 01 May 2008

Proofpoint, Inc.

IT Governance in an IBM Lotus Software Environment
sponsored by Sherpa Software
IT BRIEFING: This document describes concepts and definitions for governance, elements of governance, distinguishing myth from reality, approaches that go beyond "just good enough", control frameworks etc.
Posted: 16 Jan 2009 | Published: 16 Jan 2009

Sherpa Software

Enabling Sustainable Compliance Management
sponsored by IBM
WHITE PAPER: Read this white paper to see how adopting a sustainable security compliance strategy minimizes risk, while making proper use of people, process and technology. Also learn how you can cost-effectively comply with regulations, while maintaining business flexibility to achieve mission goals.
Posted: 22 Dec 2008 | Published: 19 Dec 2008

IBM

Laws, regulations and compliance: Top tips for keeping your data under your control
sponsored by Sophos, Inc.
WHITE PAPER: This paper outlines the rules, looks at the main threats to security compliance and highlights how a well-defined strategy, backed up by powerful technology, can provide the solution.
Posted: 22 Dec 2008 | Published: 22 Dec 2008

Sophos, Inc.

eBook: Understanding GRC(Governance, Risk Management, and Compliance): Frameworks, Tools and Strategies
sponsored by SearchSecurity.com
EBOOK: Check out this expert eBook to learn about the benefits of implementing a GRC program and get best practices for integrating these strategies into your company's infrastructure. This eBook is sponsored by Application Security, Inc, Beyond Trust, Lumension Security, MessageLabs, Thawte, Varonis and Websense.
Posted: 10 Dec 2008 | Published: 10 Dec 2008

SearchSecurity.com

Cisco Storage Media Encryption: Meeting the Security Challenge
sponsored by Cisco Systems, Inc.
BROCHURE: This white paper is an introduction to Cisco Storage Media Encryption (SME), a heterogeneous, standards-based encryption solution for data at rest with comprehensive built-in key-management features.
Posted: 04 Nov 2008 | Published: 04 Nov 2008

Cisco Systems, Inc.

Document Solutions IP Faxing versus Conventional Faxing: A Critical Analysis
sponsored by Premiere Global Services
WHITE PAPER: This white paper uses examples in three industries with the heaviest fax usage - finance, healthcare, and insurance - to demonstrate costs and risks that are shared across all industries.
Posted: 10 Oct 2008 | Published: 10 Oct 2008

Premiere Global Services

Turning the Compliance Challenge into a Business Advantage
sponsored by SAP America, Inc.
WHITE PAPER: New rules have spawned an army of consultants, vendors and solutions to address the "compliance" problem. Read this paper to learn how to turn the compliance challenge into a business advantage.
Posted: 26 Sep 2008 | Published: 18 Sep 2008

SAP America, Inc.

Achieving Compliance in a Virtualized Environment
sponsored by Tripwire, Inc.
WHITE PAPER: The goal of this paper is to present the unique considerations that virtualization presents to regulatory and standards compliance, and then prescriptively describe how to mitigate risks.
Posted: 25 Sep 2008 | Published: 19 Sep 2008

Tripwire, Inc.

Protecting Vital Business Interests with a Simplified Storage Solution
sponsored by Dell | EMC
PRODUCT LITERATURE: Effective storage systems have become a critical element of enterprise operations. This paper explains how Dell Services enables organizations to maximize business continuity and mitigate the risk of disaster or litigation.
Posted: 08 Aug 2008 | Published: 01 Nov 2007

Dell | EMC

Global Best Practices in Email Security, Privacy and Compliance
sponsored by Proofpoint, Inc.
WHITE PAPER: A new generation of email security solutions is needed to meet the challenges of growing message traffic, rapidly-evolving security threats and increasingly complex data protection and privacy regulations. This paper examines such a solution.
Posted: 06 Aug 2008 | Published: 06 Aug 2008

Proofpoint, Inc.
101 - 125 of 145 Matches Previous Page    3 4 5 6    Next Page
 
HIPAA DEFINITION (continued): …  this section is what most people mean when they refer to HIPAA. HIPAA establishes mandatory regulations that require extensive changes to the way that health providers conduct business. FAQ: What is the impact of HIPAA on IT operations? HIPAA seeks to establish standardized mechanisms for electronic data interchange ( EDI ), security, and confidentiality of all healthcare-related data. The Act mandates: standardized formats for all patient health, administrative, and financial data; unique identifiers (ID numbers) for each healthcare entity, including individuals, employers, health plans and … 
HIPAA definition sponsored by SearchDataManagement.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement