Health Care Compliance

RSS Feed    Add to Google    Add to My Yahoo!
Health Care Compliance Reports
101 - 125 of 317 Matches Previous Page  |  Next Page
4 Tips for HIPAA-Compliant Cloud Storage
sponsored by Pure Storage
EGUIDE: Healthcare cloud storage requires more layers of data security and compliance strategies, making some CIOs reluctant to engage the services of third parties. But in this e-guide, find 4 key tips to evaluate cloud storage vendors to ensure patient data protection and HIPAA compliance.
Posted: 01 Jun 2016 | Published: 20 May 2016

Pure Storage

Virtualization Making a Real Impression on Health IT
sponsored by SearchHealthIT.com
EBOOK: In this handbook, our health IT experts closely examine the benefits of virtual desktop infrastructures in healthcare. Access now for advice on you can avoid the common virtualization installation traps, plus 5 reasons you should consider desktop virtualization for your healthcare organization.
Posted: 22 Apr 2016 | Published: 22 Apr 2016

SearchHealthIT.com

Protecting Patient Data in the Mobile Era
sponsored by SearchHealthIT.com
EZINE: The rapid adoption of EHRs, coupled with the widespread use of mobile devices among providers, has increased the endpoint security threat – and there are more risks ahead. Access this issue of Pulse to find out how providers are locking down access points to protect against data breaches and HIPAA violations.
Posted: 03 Mar 2016 | Published: 29 Feb 2016

SearchHealthIT.com

Healthcare Data Access Compliance
sponsored by ComputerWeekly.com
RESEARCH CONTENT: Concurrent logins, manual logoffs, password sharing and the lack of unique logins are putting patient records at risk, according to this research paper by IS Decisions.
Posted: 23 Nov 2015 | Published: 23 Nov 2015

ComputerWeekly.com

Managing Medical Data and Developing a HIPAA-Compliant Storage Plan
sponsored by Pure Storage
EGUIDE: This expert guide provides tips on managing, storing, and protecting healthcare data in ways that will help you meet regulations and compliance.
Posted: 27 Aug 2015 | Published: 27 Aug 2015

Pure Storage

HITRUST CSF Certification – Frequently Asked Questions
sponsored by Coalfire
WHITE PAPER: What do you know about the HITRUST Common Security Framework (CSF) Assurance Program? Access this resource now to obtain answers to 20 FAQs about HITRUST CSF – including its relationship with HIPAA – and bolster the security posture of your healthcare organization.
Posted: 28 Jun 2016 | Published: 28 Jun 2016

Coalfire

6 Critical Trends in Smart Healthcare Technology
sponsored by Avaya
RESOURCE: Discover the technological solutions to deliver better patient outcomes. From patient satisfaction to mobility to security, technology's role in healthcare is changing rapidly as costs go up and demands of an aging population skyrocket. Explore this infographic to learn the six major trends in smart healthcare you need to know now.
Posted: 23 Jun 2016 | Published: 23 Jun 2016

Avaya

What Healthcare Executives Must Know About Data Breaches
sponsored by Coalfire
EGUIDE: BYOD and complex medical devices are forcing CIOs and IT departments to update their data security protocols to avoid violating HIPAA, patient privacy, and more. Explore the vulnerabilities created by this influx of devices, and dig into data on past healthcare data breaches so that you can prevent repeat scenarios.
Posted: 10 Jun 2016 | Published: 02 Jun 2016

Coalfire

Jumpstart HITRUST CSF Certification with a Proven Methodology
sponsored by Coalfire
WEBCAST: Has your organization received a letter requiring you to be HITRUST CSF certified or is your organization considering HITRUST validation? This webinar educates you about the HITRUST CSF certification process and provides clarification for any questions you might have.
Posted: 09 Jun 2016 | Premiered: Sep 30, 2015

Coalfire

Managing Cybersecurity Risk in a HIPAA-Compliant World: HIPAA and HITRUST
sponsored by Coalfire
WHITE PAPER: Should you assess your compliance and risk management posture against HIPAA, or HITRUST? Discover the answers to health IT security professionals' frequently asked questions on the two frameworks to help you identify the best approach to developing a solid security risk and management program for your organization.
Posted: 02 Jun 2016 | Published: 01 May 2016

Coalfire

10 Characteristics of a HIPAA-Compliant ePHI Application
sponsored by Coalfire
WHITE PAPER: The root cause of HIPAA-compliance gaps often lies in application software that is not HIPAA-compliant – the software simply lacks the required or implied security functionality. Uncover the 10 security requirements of a HIPAA-compliant ePHI app.
Posted: 19 May 2016 | Published: 19 May 2016

Coalfire

Optimize Patient Documentation with Enterprise Content Management
sponsored by Actiance
EGUIDE: In this e-guide, healthcare industry expert Reda Chouffani discusses how to enhance patient documentation with an enterprise content management platform. Discover a platform that offers features like: customization, advanced workflow functions, security and HIPAA compliance, and more.
Posted: 04 Apr 2016 | Published: 01 Apr 2016

Actiance

How to Keep Cloud Services Compliant with HIPAA Standards
sponsored by Actiance
EGUIDE: In this expert e-guide, health IT consultant Reda Chouffani explores how your healthcare organization can keep cloud services compliant with HIPAA standards.
Posted: 29 Mar 2016 | Published: 28 Mar 2016

Actiance

Buyer's Essentials: What to Look for in Single Sign-On Technology
sponsored by SearchHealthIT.com
EBOOK: Are you on the hunt for single sign-on (SSO) technology? Discover the differences between the numerous approaches to SSO, their benefits, and what works for various types of healthcare organizations. In this guide, health IT expert Rick Krohn shares his advice on choosing the right SSO tech for your practice.
Posted: 24 Mar 2016 | Published: 18 Mar 2016

SearchHealthIT.com

Planning for Wireless Hospital Networks and RTLS Technologies
sponsored by Ekahau, Inc.
EGUIDE: This exclusive e-guide explores critical considerations for planning a hospital wireless network. Learn about planning access points, uncover the impact of real-time location systems (RTLS) for healthcare systems, and more.
Posted: 26 Jan 2016 | Published: 26 Jan 2016

Ekahau, Inc.

Learn the new definition of Revenue Cycle Management and what it means to you
sponsored by SearchHealthIT.com
EBOOK: Technology advancements and the ICD-10 transition have expanded the scope of revenue cycle management, challenging IT to keep up. Find tips on decreasing revenue risk, strengthening your revenue cycle strategy and more, in our expert handbook.
Posted: 30 Dec 2015 | Published: 22 Dec 2015

SearchHealthIT.com

Providers Aim to Keep Mobile Security on Track
sponsored by SearchHealthIT.com
EZINE: In this issue of Pulse e-zine, explore the challenges health IT pros face when deploying mobile healthcare applications, and how you can protect patient data while still practicing mHealth.
Posted: 08 Jul 2015 | Published: 08 Jul 2015

SearchHealthIT.com

Improving PHI Security Through Better HIPAA Compliance
sponsored by Bit9 + Carbon Black
EGUIDE: This white paper catches you up to speed with the latest HIPAA changes impacting security measures and offers practical steps to take to improve your security and compliance strategy.
Posted: 10 Apr 2015 | Published: 06 Nov 2014

Bit9 + Carbon Black

The Adobe EchoSign advantage for heatlhcare
sponsored by Adobe EchoSign
WHITE PAPER: Access this white paper to learn more about e-signatures in the healthcare sector.
Posted: 23 Feb 2015 | Published: 23 Feb 2015

Adobe EchoSign

Using Flash to Improve Healthcare Storage
sponsored by IBM
VIDEO: Tune into this brief and informative video, featuring Houston's Memorial Hermann Health System, and learn how implementing a flash storage solution dramatically improved their storage performance.
Posted: 12 Feb 2015 | Premiered: 18 May 2014

IBM

Achieving Data Security and Compliance in the Healthcare Industry
sponsored by IBM
VIDEO: In this video, Mark Starry, Director of Enterprise Architecture and Security at Capital Region Health Care in central New Hampshire, discusses the technology they leveraged to achieve total network visibility and cost-effectively achieve compliance with security requirements.
Posted: 30 Jan 2015 | Premiered: 11 Jul 2012

IBM

Temple University Health System Customer Testimonial
sponsored by Commvault
VIDEO: This video details how Temple Univeristy Health improved its storage and backup methods.
Posted: 10 Dec 2014 | Premiered: 23 Jun 2013

Commvault

Mobile Security Best Practices in a Healthcare Setting
sponsored by Insight
EGUIDE: This expert e-guide discusses 5 tips that you must consider when developing a mobile computing or healthcare BYOD strategy. Additionally, learn why device encryption, access control and third-party apps are common ways to manage and secure the smartphones and tablets used in a health care organization.
Posted: 15 Oct 2014 | Published: 15 Oct 2014

Insight

VDI Environments Addressing Mobile Devices in Healthcare
sponsored by RES Software
EGUIDE: In this expert e-guide, learn about desktop sharing, remote access, and one other key factor you should consider before implementing desktop virtualization. Additionally, learn how vendors are strengthening their virtual desktop infrastructure products to meet the demands imposed by healthcare applications.
Posted: 15 Oct 2014 | Published: 15 Oct 2014

RES Software

A Clean Bill of Health: A New Breed of RCM Assists Independent Physicians
sponsored by SearchHealthIT.com
EBOOK: This three-part guide explains how revenue cycle management systems are becoming a valuable tool for accounts receivables departments everywhere.
Posted: 09 Oct 2014 | Published: 09 Oct 2014

SearchHealthIT.com
101 - 125 of 317 Matches Previous Page    3 4 5 6 7 8    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement