Business of Information Technology  >   Business Environment  >   Legal Environment  >   Laws  >   Federal Law  >  

Health Insurance Portability and Accountability Act of 1996

RSS Feed    Add to Google    Add to My Yahoo!
Health Insurance Portability and Accountability Act of 1996Reports
 
Leverage Security Intelligence to Protect Sensitive Healthcare Data
sponsored by IBM
WHITE PAPER: This guide explores the importance of end-to-end system visibility and security intelligence for healthcare organizations, and how to combat a full range of security threats.
Posted: 26 Mar 2014 | Published: 31 Dec 2013

IBM

IBM and Inland Northwest Health Services Maximize Your MEDITECH Investments
sponsored by BridgeHead and INHS
WHITE PAPER: Access this comprehensive resource to discover a solution that helps healthcare organizations reach a balance between IT and business and clinical strategy, and further improve patient care while keeping costs low.
Posted: 27 Mar 2014 | Published: 27 Mar 2014

BridgeHead and INHS

The CIO’s Guide to HIPAA Compliant Text Messaging
sponsored by Imprivata
WHITE PAPER: This resource is a guide to ensuring secure texting policies while maintaining compliance with HIPAA and HITECH, and includes best practices and a vendor comparison checklist to use during product evaluation.
Posted: 10 Apr 2014 | Published: 31 Dec 2013

Imprivata

Netwrix Auditor Enterprise Edition
sponsored by Netwrix Corporation
TRIAL SOFTWARE: When diagnosing the cause of your Active Directory problems, native auditing won't show you the complete picture of exactly what changed before your problems started. Netwrix Auditor does what native auditing can't: Download your free 20-day trial of Netwrix Auditor today.
Posted: 09 Oct 2013 | Premiered: 09 Oct 2013

Netwrix Corporation

How Will the Transition to ICD-10 codes affect Health IT?
sponsored by Virtusa Corporation
EGUIDE: As of Oct. 1, 2015, U.S. health care providers must use ICD-10 codes when they submit medical claims. This FAQ e-guide addresses what the transition means, advantages of using ICD-10, as well as best practices on how providers can prepare and succeed in an ICD 10 conversion.
Posted: 31 Mar 2011 | Published: 29 Mar 2011

Virtusa Corporation

How to Comply with the HPAA Security Rule
sponsored by Redspin, Inc.
EGUIDE: The HITECH Act has helped to not only increase productivity, but to streamline data exchange. While this increased efficiency, there are also many requirements that must be met in order ensure that these exchanges are HIPAA compliant. In this e-guide, learn how a well implemented security program can secure patient medical records.
Posted: 21 Nov 2011 | Published: 21 Nov 2011

Redspin, Inc.

Privilege Made Simple: Privilege Identity Management (PIM) Demystified
sponsored by BeyondTrust Corporation
WHITE PAPER: This white paper will discuss how your enterprise can empower IT to eliminate the risk of intentional, accidental and indirect misuse of privileges on desktops and servers using globally proven solutions that increase security and compliance without impacting productivity. Read this paper to find out more.
Posted: 29 Mar 2010 | Published: 26 Mar 2010

BeyondTrust Corporation

Using EHRs to Achieve Meaningful Use
sponsored by SearchHealthIT.com
WHITE PAPER: As stage 2 implementation dates loom, providers and industry stakeholders are assessing how well they've integrated certified electronic health records, technology standards and meaningful use stage 1 requirements into healthcare delivery.
Posted: 17 Jun 2013 | Published: 17 Jun 2013

SearchHealthIT.com

Healthcare and Compliance - The New Reality
sponsored by Juniper Networks, Inc.
WHITE PAPER: This paper outlines the three most important mandates for Healthcare today.
Posted: 13 Apr 2011 | Published: 13 Apr 2011

Juniper Networks, Inc.

E-Book: New Rules for HIPAA
sponsored by SearchSecurity.com & SearchCompliance.com
EBOOK: Organizations that had to comply with HIPAA were frustrated by the lack of enforcement and specifics. The HITECH Act is changing all of that. Read this e-book to learn how the HIPAA is getting new teeth, new ways the FTC is getting involved, and more.
Posted: 17 May 2010 | Published: 17 May 2010

SearchSecurity.com & SearchCompliance.com
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement