Business of Information Technology  >   Business Environment  >   Legal Environment  >   Laws  >   Federal Law  >  

HIPPA

RSS Feed    Add to Google    Add to My Yahoo!
HIPPA Reports
 
Avoid becoming the catch of the day: Four steps to combat phishing attacks
sponsored by Imprivata
WHITE PAPER: Phishing has emerged as the top security threat facing healthcare organizations. Access this white paper now for 4 steps you can take to better prepare for and defend against phishing attacks while maintaining a balance between security and clinical workflow efficiency.
Posted: 18 Apr 2016 | Published: 01 Mar 2016

Imprivata

BYOD and mHealth: Navigating Security and HIPAA
sponsored by Optum
EGUIDE: Learn best practices to implement when using a BYOD device for patient care. Discover which applications are secure and compliant with HIPAA standards and which you should steer clear from.
Posted: 14 Jul 2016 | Published: 13 Jul 2016

Optum

Healthcare Data Security Threats – And How to Prevent Them
sponsored by Optum
EGUIDE: In this e-guide, gain ideas on how you can stay ahead of hackers and secure protected health information, while staying fully compliant with HIPAA requirements.
Posted: 25 Mar 2016 | Published: 23 Mar 2016

Optum

Case Study: How CHWC Improves HCAHPS Scores and Patient Care
sponsored by Imprivata
CASE STUDY: Healthcare organizations are at risk of HIPAA breaches as employees use legacy pagers and personal devices to communicate. This case study examines how one health system replaced their outdated pager system and leveraged BYOD tech to improve patient care and mitigate device risks.
Posted: 22 Mar 2016 | Published: 24 Feb 2016

Imprivata

Netwrix Auditor Enterprise Edition
sponsored by Netwrix Corporation
TRIAL SOFTWARE: When diagnosing the cause of your Active Directory problems, native auditing won't show you the complete picture of exactly what changed before your problems started. Netwrix Auditor does what native auditing can't: Download your free 20-day trial of Netwrix Auditor today.
Posted: 09 Oct 2013 | Premiered: 09 Oct 2013

Netwrix Corporation

Five Steps to Meaningful Use with Workspace Virtualization
sponsored by RES Software
WHITE PAPER: Healthcare IT pros face 3 obstacles when trying to align with meaningful use standards: clinician experience, security and compliance, and legacy infrastructure management. In this expert guide, discover 5 key benefits healthcare organizations will realize when they deploy workspace virtualization.
Posted: 08 Oct 2014 | Published: 31 Dec 2013

RES Software

Secure Text Messaging Saves Time and Fosters HIPAA Compliance for Hospitals
sponsored by TigerText, Inc.
EGUIDE: This e-guide from SearchHealthIT.com offers 12 expert tips on how to evaluate vendors for a secure, HIPAA-compliant text messaging system.
Posted: 29 Apr 2014 | Published: 29 Apr 2014

TigerText, Inc.

October 2013 Health IT E-Zine
sponsored by SearchHealthIT.com
EZINE: In this issue of Pulse, readers will get the latest pros and cons of signal extension systems like distributed antenna systems and femtocells and best practices for implementing technologies to support 2014's health IT initiatives and big data projects.
Posted: 11 Oct 2013 | Published: 11 Oct 2013

SearchHealthIT.com

The 5 Crucial Steps to Achieving PACS Integration
sponsored by GE Healthcare
EGUIDE: This expert E-Guide discusses 5 necessary steps to achieving picture archiving and communication system PACS integration to address strict regulations and increasing user demands.
Posted: 06 Feb 2014 | Published: 06 Feb 2014

GE Healthcare

Personally Identifiable Information (PII) and Personal Health Information (PHI)
sponsored by Voltage Security, Inc.
WHITE PAPER: This white paper features an encrypted email solution that eliminates the need for paper-driven information sharing processes, and ensures secure, compliant transfers.
Posted: 16 Jun 2014 | Published: 16 Jun 2014

Voltage Security, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement