Business of Information Technology  >   Business Environment  >   Legal Environment  >   Laws  >   Federal Law  >  

HIPAA

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: HIPPA, Health Insurance Portability and Accountability Act of 1996
DEFINITION: HIPAA is the United States Health Insurance Portability and Accountability Act of 1996. There are two sections to the Act. HIPAA Title I deals with protecting health insurance coverage for people who lose or change jobs. HIPAA Title II includes an administrative simplification section which deals with the standardization of healthcare-related information systems. In the information technology industries,  … 
Definition continues below.
HIPAAReports
126 - 145 of 145 Matches Previous Page  |  Next Page
Oracle Database Vault
sponsored by Oracle Corporation
WHITE PAPER: Oracle Database Vault is the industry's leading database security solution for addressing regulatory compliance and concerns over the insider threat.
Posted: 15 Jul 2008 | Published: 01 Jun 2007

Oracle Corporation

How a Leading Psychiatric Hospital Safeguards Key Healthcare Data
sponsored by Cisco Systems, Inc.
CASE STUDY: The Cisco Security MARS solution has given The Menninger Clinic unprecedented visibility into its network operations and eased HIPAA compliance.
Posted: 10 Jul 2008 | Published: 01 Aug 2006

Cisco Systems, Inc.

Unauthorized Applications: Taking Back Control
sponsored by Sophos, Inc.
WHITE PAPER: This paper explains why it is important for businesses to control unauthorized applications such as instant Messaging, VoIP, games and peer-to-peer file-sharing and how malware protection is the simplest and most cost-effective solution.
Posted: 01 Jul 2008 | Published: 01 Dec 2007

Sophos, Inc.

The Role of Password Management in Achieving Compliance
sponsored by PistolStar, Inc.
WHITE PAPER: This paper will look at the dramatic impact password management solutions have had on organizations.
Posted: 13 Jun 2008 | Published: 01 Jan 2006

PistolStar, Inc.

Forrester Research: Improving Application Deployments - How an Application Delivery Architecture Can Help Businesses Overcome Deployment Challenges
sponsored by F5 Networks
WHITE PAPER: Today's businesses must operate in a drastically changing environment. Forrester found most companies are not well equipped to reorient IT as a critical driver of top line success. This report showcases the results of an April 2007 Forrester survey.
Posted: 28 Apr 2008 | Published: 01 Aug 2007

F5 Networks

Realizing Business Value in Managed File Transfer
sponsored by GlobalScape
WHITE PAPER: Managed File Transfer (MFT) is optimized for moving data; often bulk data, in a secure way that additionally involves the ability to manage data.
Posted: 16 Apr 2008 | Published: 15 Apr 2008

GlobalScape

Paperless Benefits Management Strategies Containing Costs and Complexity on a Budget
sponsored by Sage Abra
WHITE PAPER: This guide highlights recent trends in employee benefit costs and discusses the unique challenges faced by small and midsized businesses in the wake of escalating healthcare costs.
Posted: 03 Mar 2008 | Published: 01 Jan 2007

Sage Abra

Safe, Realistic Test Data: The Case for RowGen
sponsored by Innovative Routines International, Inc.
WHITE PAPER: RowGen provides a cost-effective alternative to the practice of production data replication. This is accomplished by providing data content that requires no additional security measures.
Posted: 29 Feb 2008 | Published: 01 Mar 2008

Innovative Routines International, Inc.

Network Faxing and HIPAA: Security and Privacy in the Health Care Industry
sponsored by Castelle
WHITE PAPER: The Health Insurance Portability and Accountability Act (HIPAA) prescribes new health care industry rules and recommendations for the handling and transmission of patient health information.
Posted: 26 Feb 2008 | Published: 01 Jan 2007

TOPICS:  HIPAA | Sales | Security
Castelle

CWAT Data Loss Prevention - Whitepaper/Technical Review
sponsored by Software Engineering of America, Inc.
WHITE PAPER: CWAT monitors all terminals including laptop computers and even missing terminals that are disconnected from networks.
Posted: 25 Feb 2008 | Published: 01 Sep 2006

Software Engineering of America, Inc.

Healthcare 2015: Win-win or Lose-lose?
sponsored by IBM Line of Business
WHITE PAPER: There is a more positive scenario - a "win-win" - but it is one that will require new levels of accountability, tough decisions and hard work on the part of all stakeholders.
Posted: 22 Feb 2008 | Published: 01 Jan 2006

IBM Line of Business

In the Interest of the Patient
sponsored by IBM Line of Business
WHITE PAPER: This paper explores how by collaborating and sharing data, the two industries can realize the full value of the information they collect--and improve patient treatments.
Posted: 22 Feb 2008 | Published: 01 Jan 2006

IBM Line of Business

Log Management Best Practices
sponsored by RSA, The Security Division of EMC
WHITE PAPER: Developing best practices in log management is not a simple task. This paper should help organizations develop their own comprehensive set of best practices by providing a set of 40 recommended best practices covering logging policies; procedures and t...
Posted: 14 Feb 2008 | Published: 01 Jan 2007

RSA, The Security Division of EMC

How to select a KVM over IP system to assist with HIPAA compliance
sponsored by Avocent
WHITE PAPER: Effective security for health care information requires a multi-layered approach. Physical, logical and operational security are essential ingredients for successful compliance with HIPAA.
Posted: 08 Feb 2008 | Published: 01 Feb 2008

Avocent

Financial Opportunities of Human Resources Outsourcing
sponsored by TriNet
WHITE PAPER: This white paper will explore the financial benefits from contracting with a PEO based on industry best practices.
Posted: 27 Dec 2007 | Published: 11 Apr 2007


An Executive's Guide to Cutting HR Costs
sponsored by TriNet
WHITE PAPER: HR is a tremendously important resource in the business equation, but finding ways to cut its cost isn't easy.
Posted: 27 Dec 2007 | Published: 18 Nov 2007


Using Classification to Manage Email Policy for the Enterprise
sponsored by TITUS
WHITE PAPER: Email has historically been a weak link in organizational security. Classification and policy based strategies enable email to be managed more securely and effectively. Email classification is a technique for adding metadata and visual labels to email.
Posted: 09 Nov 2007 | Published: 01 Jan 2006

TITUS

The IT/Compliance Challenge within Segregation of Duties: Eliminating Developer Access to the Production Environment
sponsored by BMC Software, Extending Value with Identify Software
WHITE PAPER: This white paper reviews effective methods for creating controlled, secure access to complete problem data for your developers so they can solve production problems without actually accessing your production environment.
Posted: 16 Nov 2006 | Published: 01 Nov 2006

BMC Software, Extending Value with Identify Software

Information-Centric Security and Data Erasure
sponsored by EMC Corporation
WHITE PAPER: Most data security spending today goes to protecting devices and infrastructure, while little goes to protecting the stored data itself. In this white paper ESG analysts discuss the particulars of information security and data erasure.
Posted: 26 Sep 2006 | Published: 01 Jul 2006

EMC Corporation

Successfully Negotiating the HIPAA Maze - A Sybase, Inc. Healthcare Report on Complying with Administrative Simplification & Security Mandates
sponsored by Sybase, an SAP company
WHITE PAPER: This white paper explores the challenges healthcare organizations are facing with the Healthcare Information Portability and Accountability Act (HIPAA) and the steps needed to successfully negotiate the many aspects of the regulations.
Posted: 02 Jun 2002 | Published: 01 Jan 2002

Sybase, an SAP company
126 - 145 of 145 Matches Previous Page    4 5 6    Next Page
 
HIPAA DEFINITION (continued): …  this section is what most people mean when they refer to HIPAA. HIPAA establishes mandatory regulations that require extensive changes to the way that health providers conduct business. FAQ: What is the impact of HIPAA on IT operations? HIPAA seeks to establish standardized mechanisms for electronic data interchange ( EDI ), security, and confidentiality of all healthcare-related data. The Act mandates: standardized formats for all patient health, administrative, and financial data; unique identifiers (ID numbers) for each healthcare entity, including individuals, employers, health plans and … 
HIPAA definition sponsored by SearchDataManagement.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement