Business of Information Technology  >   Business Environment  >   Legal Environment  >   Laws  >   Federal Law  >  

HIPAA

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: HIPPA, Health Insurance Portability and Accountability Act of 1996
DEFINITION: HIPAA is the United States Health Insurance Portability and Accountability Act of 1996. There are two sections to the Act. HIPAA Title I deals with protecting health insurance coverage for people who lose or change jobs. HIPAA Title II includes an administrative simplification section which deals with the standardization of healthcare-related information systems. In the information technology industries,  … 
Definition continues below.
HIPAA Reports
26 - 50 of 175 Matches Previous Page  |  Next Page
Industry Spotlight: US Healthcare Security Budgets and Priorities
sponsored by Digital Guardian
WHITE PAPER: This Forrester report helps healthcare security professionals learn from their peers and provides best practices for addressing critical security risks as budgets slowly increase. Access now to learn how you can better protect private patient information and retain your organization's good reputation.
Posted: 03 May 2016 | Published: 01 Apr 2016

Digital Guardian

Best Practices for Protecting Patient Data in the Cloud
sponsored by Digital Guardian
WHITE PAPER: Now that many healthcare organizations are using cloud computing to store and share sensitive patient information, they must figure out how to extend data loss prevention (DLP) strategies to include cloud storage. Discover best practices for applying DLP to the cloud.
Posted: 29 Apr 2016 | Published: 01 Mar 2016

Digital Guardian

Enable Mobile Users and Stay Compliant: How Healthcare Organizations Manage Both
sponsored by BlackBerry
WHITE PAPER: Discover how to stay HIPAA compliant even when mobile devices come into play. Read on to uncover insight for securing your enterprise and BYOD to protect sensitive data, and learn about containerization, application-wrapping, and more.
Posted: 21 Apr 2016 | Published: 21 Apr 2016

BlackBerry

Avoid becoming the catch of the day: Four steps to combat phishing attacks
sponsored by Imprivata
WHITE PAPER: Phishing has emerged as the top security threat facing healthcare organizations. Access this white paper now for 4 steps you can take to better prepare for and defend against phishing attacks while maintaining a balance between security and clinical workflow efficiency.
Posted: 18 Apr 2016 | Published: 01 Mar 2016

Imprivata

How Hospitals Can Avoid the Biggest Healthcare Communications Mistake
sponsored by Imprivata
WHITE PAPER: Today, healthcare organizations suffer from poor communications practices due to outdated pager systems. Can secure messaging save your organization from these pitfalls and blunders? Take a look at this white paper to review the pros and cons of each approach.
Posted: 07 Apr 2016 | Published: 17 Feb 2016

Imprivata

How HealthEast Care System Achieved EPCS Success
sponsored by Imprivata
VIDEO: In this short video, hear from key IT and clinical decision makers at HealthEast Care System as they describe how they achieved an efficient way to safely and securely electronically prescribe controlled substances.
Posted: 25 Mar 2016 | Premiered: 29 Feb 2016

Imprivata

Case Study: How CHWC Improves HCAHPS Scores and Patient Care
sponsored by Imprivata
CASE STUDY: Healthcare organizations are at risk of HIPAA breaches as employees use legacy pagers and personal devices to communicate. This case study examines how one health system replaced their outdated pager system and leveraged BYOD tech to improve patient care and mitigate device risks.
Posted: 22 Mar 2016 | Published: 24 Feb 2016

Imprivata

Case Study: Protect Against Prescription Fraud with EPCS
sponsored by Imprivata
WHITE PAPER: The case study outlines Cambridge Health Alliance's drivers for implementing electronic prescribing of controlled substances (EPCS), and strategies and technologies for meeting DEA requirements. Gather best practice advice to help your healthcare organization achieve EPCS success.
Posted: 22 Mar 2016 | Published: 31 Dec 2015

Imprivata

Protecting Patient Data in the Mobile Era
sponsored by SearchHealthIT.com
EZINE: The rapid adoption of EHRs, coupled with the widespread use of mobile devices among providers, has increased the endpoint security threat – and there are more risks ahead. Access this issue of Pulse to find out how providers are locking down access points to protect against data breaches and HIPAA violations.
Posted: 03 Mar 2016 | Published: 29 Feb 2016

SearchHealthIT.com

Healthcare Organizations and Data Breach: How to Lower Risk and Reduce Liability
sponsored by Global Knowledge
WHITE PAPER: Access this guide to find detailed steps on lowering the risks of, and recovering quickly from, a healthcare data breach.
Posted: 25 Aug 2015 | Published: 25 Aug 2015

Global Knowledge

Case Study: Infirmary Health System Secures Endpoints
sponsored by IBM
WHITE PAPER: This case study examines how Infirmary Health Systems effectively and efficiently address the full range of endpoint and event management requirements to meet HIPAA and meaningful use regulations.
Posted: 30 Jul 2015 | Published: 08 Jul 2015

IBM

Methodist Health System’s Success with e-Prescribing of Controlled Substances
sponsored by Imprivata
WEBCAST: In this brief webcast, explore how Methodist Health System of Omaha, Nebraska, leverages fingerprint biometric authentication to enable EPCS.
Posted: 08 Jun 2015 | Premiered: Jun 3, 2015

Imprivata

The C-Suite Battle Plan for Cyber Security Attacks in Healthcare
sponsored by Imprivata
WHITE PAPER: This white paper examines why passwords are the top vulnerability that healthcare hackers exploit . Uncover what techniques and tools your enemies are using and how to defend yourself by improving your key management strategy. Read on now to learn more.
Posted: 27 Apr 2015 | Published: 15 Apr 2015

Imprivata

Security trends in the healthcare industry
sponsored by IBM
WHITE PAPER: This white paper gives you the latest statistics on healthcare-related security breaches and how you can avoid becoming a statistic yourself by falling victim to attack. Learn about the most common cyberattacks against healthcare organizations and how to patch vulnerabilities you may have in your network.
Posted: 15 Mar 2016 | Published: 31 Dec 2015

IBM

Improving PHI Security Through Better HIPAA Compliance
sponsored by Bit9 + Carbon Black
EGUIDE: This white paper catches you up to speed with the latest HIPAA changes impacting security measures and offers practical steps to take to improve your security and compliance strategy.
Posted: 10 Apr 2015 | Published: 06 Nov 2014

Bit9 + Carbon Black

Pulse E-zine: Vol. 3, No. 2
sponsored by SearchHealthIT.com
EZINE: While the health IT spotlight shifts to the release of stage 3 meaningful use guidelines, many providers are still struggling with stage 2 reporting. In this issue of Pulse, learn what's next for meaningful use, how it has affected EHRs, and how to align an analytics plan with the needs of your organization.
Posted: 23 Mar 2015 | Published: 19 Mar 2015

SearchHealthIT.com

Using Flash to Improve Healthcare Storage
sponsored by IBM
VIDEO: Tune into this brief and informative video, featuring Houston's Memorial Hermann Health System, and learn how implementing a flash storage solution dramatically improved their storage performance.
Posted: 12 Feb 2015 | Premiered: 18 May 2014

IBM

Five Steps to Meaningful Use with Workspace Virtualization
sponsored by RES Software
WHITE PAPER: Healthcare IT pros face 3 obstacles when trying to align with meaningful use standards: clinician experience, security and compliance, and legacy infrastructure management. In this expert guide, discover 5 key benefits healthcare organizations will realize when they deploy workspace virtualization.
Posted: 08 Oct 2014 | Published: 31 Dec 2013

RES Software

Addressing HIPAA privacy compliance on hospital wireless networks
sponsored by Absolute
EGUIDE: In this expert e-guide, discover how CIOs can cope with strict HIPAA compliance regulations, and access the 7 trends in mobile device security that helps keep health care data safe and secure.
Posted: 07 Oct 2014 | Published: 07 Oct 2014

Absolute

Managing the Healthcare Information Stream Effectively
sponsored by Commvault
WHITE PAPER: Check out this white paper to discover the looming challenge of managing the healthcare information stream.
Posted: 09 Sep 2014 | Published: 09 Sep 2014

Commvault

The HIPAA Omnibus Effect on Data Security, Business Associates
sponsored by SearchHealthIT.com
EBOOK: Under the HIPAA omnibus rule, business associates and healthcare providers face increased liability over data security -- requiring changes to health IT operations.
Posted: 23 Jul 2014 | Published: 28 Jul 2014

SearchHealthIT.com

Voltage Success Story: Envision Pharmaceutical Services
sponsored by Voltage Security, Inc.
WHITE PAPER: This case study features Envision Pharmaceutical Services' experience with an easy-to-use, low-cost email platform that ensured secure data sharing and helped maintain HIPAA and PCI DSS compliance.
Posted: 18 Jun 2014 | Published: 18 Jun 2014

Voltage Security, Inc.

Personally Identifiable Information (PII) and Personal Health Information (PHI)
sponsored by Voltage Security, Inc.
WHITE PAPER: This white paper features an encrypted email solution that eliminates the need for paper-driven information sharing processes, and ensures secure, compliant transfers.
Posted: 16 Jun 2014 | Published: 16 Jun 2014

Voltage Security, Inc.

Lake Health Enhances Patient Experience with HP ArcSight
sponsored by Hewlett Packard Enterprise
CASE STUDY: Uncover the SIEM a healthcare provider put in place which helped them take a proactive approach to information security, mitigate anomalies, increase visibility, ensure regulatory compliance, and more!
Posted: 05 Jun 2014 | Published: 31 Jan 2014

Hewlett Packard Enterprise

Pulse E-zine: Vol. 2, No. 2
sponsored by SearchHealthIT.com
EZINE: Access this edition of Pulse e-zine to explore the evolving mobile healthcare trend, and learn how to stay compliant for the dreaded unannounced HIPAA audits.
Posted: 07 May 2014 | Published: 07 May 2014

SearchHealthIT.com
26 - 50 of 175 Matches Previous Page    1 2 3 4 5    Next Page
 
HIPAA DEFINITION (continued): …  this section is what most people mean when they refer to HIPAA. HIPAA establishes mandatory regulations that require extensive changes to the way that health providers conduct business. FAQ: What is the impact of HIPAA on IT operations? HIPAA seeks to establish standardized mechanisms for electronic data interchange ( EDI ), security, and confidentiality of all healthcare-related data. The Act mandates: standardized formats for all patient health, administrative, and financial data; unique identifiers (ID numbers) for each healthcare entity, including individuals, employers, health plans and … 
HIPAA definition sponsored by SearchDataManagement.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement