Business of Information Technology  >   Business Environment  >   Legal Environment  >   Laws  >   Federal Law  >  

HIPPA

RSS Feed    Add to Google    Add to My Yahoo!
HIPPA Reports
 
Risk or Reward? UC, IM, and Social Media in the Pharmaceutical Industry
sponsored by Actiance
WHITE PAPER: Discover how you can overcome the negative compliance and security side effects of deploying new communications and social channels in the pharmaceutical industry. Learn 6 ways to adopt these technologies while mitigating legal and security risks.
Posted: 25 Apr 2016 | Published: 25 Apr 2016

Actiance

All Stars Panel: Healthcare Security Spotlight
sponsored by Optum
VIDEO: Listen in as four senior health IT professionals explore the top security priorities and projects being grappled with in healthcare today, and the strategies that you can adopt to keep your patients' medical information safe from breach.
Posted: 01 Feb 2016 | Premiered: 22 Jan 2016

Optum

Memorial Hermann Delivers Secure, Reliable Wireless for Mission-Critical Patient Care
sponsored by Aerohive Networks
WHITE PAPER: In this case study, learn how Memorial Hermann Health System is benefiting after upgrading to a wireless network.
Posted: 24 Mar 2014 | Published: 24 Mar 2014

Aerohive Networks

eBook: Trends in Healthcare Data Protection
sponsored by LANDesk Software
EBOOK: This E-Book explores how encryption technologies can help protect health care data, ensuring the avoidance of costly non-compliance penalties.
Posted: 22 Mar 2012 | Published: 22 Mar 2012

LANDesk Software

Industry Perspectives: The Impact of HIPAA and HITECH
sponsored by Symantec Corporation
WHITE PAPER: This white paper features a set of solutions that address not only compliance concerns, but the overarching risk potential in today's healthcare environments.
Posted: 24 Apr 2014 | Published: 30 Jun 2011

Symantec Corporation

The Virtue of Virtual Infrastructure
sponsored by SearchHealthIT.com
EBOOK: Read how healthcare organizations have benefited from implementing virtual desktop infrastructure (VDI) environments, so far enjoying improved efficiency while maintaining HIPAA compliance.
Posted: 21 Mar 2014 | Published: 26 Mar 2014

SearchHealthIT.com

Voltage Success Story: Envision Pharmaceutical Services
sponsored by Voltage Security, Inc.
WHITE PAPER: This case study features Envision Pharmaceutical Services' experience with an easy-to-use, low-cost email platform that ensured secure data sharing and helped maintain HIPAA and PCI DSS compliance.
Posted: 18 Jun 2014 | Published: 18 Jun 2014

Voltage Security, Inc.

Improving PHI Security Through Better HIPAA Compliance
sponsored by Bit9 + Carbon Black
EGUIDE: This white paper catches you up to speed with the latest HIPAA changes impacting security measures and offers practical steps to take to improve your security and compliance strategy.
Posted: 10 Apr 2015 | Published: 06 Nov 2014

Bit9 + Carbon Black

The HIPAA Omnibus Effect on Data Security, Business Associates
sponsored by SearchHealthIT.com
EBOOK: Under the HIPAA omnibus rule, business associates and healthcare providers face increased liability over data security -- requiring changes to health IT operations.
Posted: 23 Jul 2014 | Published: 28 Jul 2014

SearchHealthIT.com

Million Dollar HIPAA Penalties for Healthcare
sponsored by Absolute
WEBCAST: The threat of million dollar penalties from HIPAA regulations is making Healthcare Organizations re-evaluate their patient information security infrastructure. Watch this recorded webcast to see how your organization can reduce the risk.
Posted: 11 Nov 2013 | Premiered: Nov 11, 2013

Absolute
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement