Health Care Compliance

RSS Feed    Add to Google    Add to My Yahoo!
Health Care Compliance Reports
1 - 25 of 278 Matches Previous Page  |  Next Page
NHS Hospitals Treat Patient Data as an Operational Asset, You Should Too
sponsored by SAS
WHITE PAPER: For organizations to use data analytics effectively, they need to understand the deficiencies they're trying to solve and adopt the right tools to tell the right stories. Explore the technology and approaches NHS Trust Boards uses to collect, manage, and analyze both internal and external data, and make better decisions that ensure patient safety.
Posted: 20 Jul 2016 | Published: 28 Feb 2013

SAS

How to guard secure data
sponsored by Optum
EGUIDE: IT staffers should consider using additional applications to track all relevant devices and applications that could pose a security risk. Learn how to best protect patient data with simple security updates and ensure HIPAA compliance to lessen vulnerabilities.
Posted: 14 Jul 2016 | Published: 01 Jun 2016

Optum

BYOD and mHealth: Navigating Security and HIPAA
sponsored by Optum
EGUIDE: Learn best practices to implement when using a BYOD device for patient care. Discover which applications are secure and compliant with HIPAA standards and which you should steer clear from.
Posted: 14 Jul 2016 | Published: 13 Jul 2016

Optum

Security Tips for HIPAA-Compliant Cloud Storage and Texting
sponsored by Optum
EGUIDE: Understanding the rules of HIPAA is only the first step. But then, you must ensure your practices – and your vendors – are compliant. Access this e-guide to gain tips and criteria for evaluating cloud storage vendors and texting systems for sensitive healthcare information.
Posted: 13 Jul 2016 | Published: 12 Jul 2016

Optum

Protected Health Information Data Breach Report
sponsored by Verizon
RESEARCH CONTENT: Put PHI security under the microscope to help you identify threats and mitigate risks to your medical records, by accessing this exclusive "Protected Health Information Data Breach" report. Additionally, examine the top three threats that account for 73% of all healthcare data security incidents to protect your customer trust.
Posted: 08 Jul 2016 | Published: 31 Dec 2015

Verizon

Security Implications of BYOD in Healthcare
sponsored by Optum
WHITE PAPER: This white paper examines the security implications of new mobile technology and movements like BYOD in the healthcare organization. Read on to uncover the unique impacts of BYOD, the most overlooked gaps in healthcare security, and more.
Posted: 06 Jul 2016 | Published: 06 Jul 2016

Optum

A Modular Approach to HIPAA B2B Success at AmeriHealth Caritas
sponsored by IBM
WEBCAST: This panel discussion examines the successful implementation of HIPAA B2B at AmeriHealth Caritas, using the IBM Standards Processing Engine for Healthcare Payers for partner onboarding, enveloping, de-enveloping, and code set management services. Also, learn about the IBM Websphere Transformation Extender for validation and transformation services.
Posted: 06 Jul 2016 | Premiered: Apr 2, 2015

IBM

IBM SPE Healthcare Payer Solution Part 3: External Code Set Validation
sponsored by IBM
VIDEO: This video – part 3 in a series of videos about healthcare payer technology – takes you beyond the basics of HIPAA envelope configuration. Receive a demo on a 3-step process to setting up HIPAA WEDI Snip Type 5 compliance checking.
Posted: 05 Jul 2016 | Premiered: 27 May 2014

IBM

Transformation Extender Advanced: Part 2, Process Walkthrough
sponsored by IBM
VIDEO: Addressing regulatory complexities related to healthcare, supply chain management, and financial payment and processing is essential to staying in compliance. In part 2 of this 3-part series, continue exploring Transformation Extender Advanced (previously known as Standards Processing Engine).
Posted: 05 Jul 2016 | Premiered: 27 May 2014

IBM

Case Study: Biomeme Accelerates HIPAA-Compliant Mobility
sponsored by CloudMine
CASE STUDY: Discover how Biomeme was able to develop a handheld DNA lab without having to perform the overwhelming backend work, and instead focusing in on key objectives like meeting HIPAA compliance standards.
Posted: 01 Jul 2016 | Published: 01 Jul 2016


Demo: Configuring HIPAA EDI Envelopes (Part 1)
sponsored by IBM
VIDEO: In Part 1 of this 3-part series, IBM Product Architect Stephanie Fetzer explains HIPAA envelope configuration using the Transformation Extender Advanced (previously known as Standards Processing Engine). Using the analogy of sending a postal package, Stephanie shows the configuration process in three simple steps.
Posted: 30 Jun 2016 | Premiered: 22 May 2014

IBM

HITRUST CSF Certification – Frequently Asked Questions
sponsored by Coalfire
WHITE PAPER: What do you know about the HITRUST Common Security Framework (CSF) Assurance Program? Access this resource now to obtain answers to 20 FAQs about HITRUST CSF – including its relationship with HIPAA – and bolster the security posture of your healthcare organization.
Posted: 28 Jun 2016 | Published: 28 Jun 2016

Coalfire

5 Benefits of Building Apps for Healthcare
sponsored by CloudMine
RESOURCE: In this infographic, discover 5 benefits of building applications for healthcare, including secure and HIPAA compliant communication, increased interoperability, and more.
Posted: 28 Jun 2016 | Published: 28 Jun 2016


Health Care Security Is Personal: Act Now to Protect Patient Care
sponsored by Optum
WHITE PAPER: In this white paper, learn how healthcare organizations can successfully manage vulnerabilities in today's ever-evolving threat landscape. Inside, uncover how to identify, prioritize, prevent, and respond to new threats without impeding the flow of communications between patients, clinicians, admins, and 3rd party organizations.
Posted: 24 Jun 2016 | Published: 24 Jun 2016

Optum

6 Critical Trends in Smart Healthcare Technology
sponsored by Avaya
RESOURCE: Discover the technological solutions to deliver better patient outcomes. From patient satisfaction to mobility to security, technology's role in healthcare is changing rapidly as costs go up and demands of an aging population skyrocket. Explore this infographic to learn the six major trends in smart healthcare you need to know now.
Posted: 23 Jun 2016 | Published: 23 Jun 2016

Avaya

Healthcare Content Management: Eliminate Data Silos
sponsored by Lexmark Healthcare
VIDEO: Discover how to give your clinicians complete access to patient information within your EHR by eliminating silos and uniting content across the healthcare organization, delivering consistent viewing experience across devices, and more.
Posted: 16 Jun 2016 | Premiered: 16 Jun 2016

Lexmark Healthcare

What Healthcare Executives Must Know About Data Breaches
sponsored by Coalfire
EGUIDE: BYOD and complex medical devices are forcing CIOs and IT departments to update their data security protocols to avoid violating HIPAA, patient privacy, and more. Explore the vulnerabilities created by this influx of devices, and dig into data on past healthcare data breaches so that you can prevent repeat scenarios.
Posted: 10 Jun 2016 | Published: 02 Jun 2016

Coalfire

Jumpstart HITRUST CSF Certification with a Proven Methodology
sponsored by Coalfire
WEBCAST: Has your organization received a letter requiring you to be HITRUST CSF certified or is your organization considering HITRUST validation? This webinar educates you about the HITRUST CSF certification process and provides clarification for any questions you might have.
Posted: 09 Jun 2016 | Premiered: Sep 30, 2015

Coalfire

Managing Healthcare Cybersecurity Risk: HIPAA vs. HITRUST
sponsored by Coalfire
WHITE PAPER: Should you assess your compliance and risk management posture against HIPAA, or HITRUST? Discover the answers to health IT security professionals' frequently asked questions on the two frameworks to help you identify the best approach to developing a solid security risk and management program for your organization.
Posted: 02 Jun 2016 | Published: 01 May 2016

Coalfire

St. Joseph Health Goes Mobile to Improve Patient Care
sponsored by MobileIron
CASE STUDY: As mobile devices become more widely adopted throughout the healthcare industry, one healthcare provider's audit revealed a need for better security. Read this case study to learn why St. Joseph Health needed a better enterprise mobility management solution and how they made their decision.
Posted: 02 Jun 2016 | Published: 31 May 2016

MobileIron

Four security tips for HIPAA compliance in healthcare cloud storage
sponsored by Pure Storage
EGUIDE: Healthcare cloud storage requires more layers of data security and compliance strategies, making some CIOs reluctant to engage the services of third parties. But in this e-guide, find 4 key tips to evaluate cloud storage vendors to ensure patient data protection and HIPAA compliance.
Posted: 01 Jun 2016 | Published: 20 May 2016

Pure Storage

Case Study: Going Mobile Without Sacrificing Security
sponsored by MobileIron
CASE STUDY: As mobile devices become more prevalent in the workplace, ensuring security for these devices becomes a necessity. Uncover a case study about Nemours, a healthcare provider, which gave its employees secure mobility with a single solution.
Posted: 01 Jun 2016 | Published: 25 May 2016

MobileIron

Use Your Own Data to Rewrite the Map
sponsored by Pyramid Analytics
WHITE PAPER: Learn how you can keep up with changes using data-driven insights. Using the healthcare landscape as an example, discover how you can leverage self-service reporting, dashboards, and analysis to cut costs, deliver higher-quality care, meet regulatory requirements, and more.
Posted: 20 May 2016 | Published: 20 May 2016

Pyramid Analytics

Conquering New Challenges with Business Intelligence
sponsored by Pyramid Analytics
WHITE PAPER: On average, hospitals lose $70.2 million annually by failing to fully use the clinical data they collect. Organizations in all industries are missing major opportunities like this. Exploring healthcare, this infographic looks at leveraging BI to improve operations, comply with regulations, and gain more visibility into your organization.
Posted: 19 May 2016 | Published: 19 May 2016

Pyramid Analytics

Data Visibility, Secure Remote Connections, and Increased Compliance Policy Awareness
sponsored by Digital Guardian
WHITE PAPER: This organization was able to adopt an organization-wide solution that provided real time policy application based on network awareness, enforce connections through the organization's VPN and prompt users who might otherwise violate appropriate use.
Posted: 24 May 2016 | Published: 01 Apr 2016

Digital Guardian
1 - 25 of 278 Matches Previous Page    1 2 3 4    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement