Business of Information Technology  >   Business Environment  >   Legal Environment  >   Laws  >   Federal Law  >  

Health Insurance Portability and Accountability Act of 1996

RSS Feed   
Health Insurance Portability and Accountability Act of 1996 White Papers (View All Report Types)
 
Beaufort Memorial Case Study
sponsored by Imprivata
WHITE PAPER: This case study highlights Beaufort Memorial Hospital's success in implementing a secure communications platform that allowed a more efficient, secure, and cost-effective clinician workflow.
Posted: 07 Apr 2014 | Published: 28 Feb 2014

Imprivata

Managing the Explosion of Medical Data
sponsored by HP & Intel®
WHITE PAPER: This timely white paper takes an in-depth look at the enormous growth of health care data and offers ways to overcome the challenges associated with it. Specifically, uncover how you can manage and secure the increasingly large data sets every organization is coping with.
Posted: 01 Aug 2013 | Published: 15 Nov 2012

HP & Intel®

Healthcare Reference Architecture – Mobile Access Solutions for Point-of-Care Applications
sponsored by Aerohive Networks
WHITE PAPER: In this white paper, discover a set of solutions that enable healthcare providers with reliable, high-performance mobile voice and data access to help improve point-of-care delivery.
Posted: 24 Mar 2014 | Published: 31 Dec 2012

Aerohive Networks

Achieving HIPAA Compliance with Red Hat Enterprise Virtualization for Desktops
sponsored by Red Hat and JBoss
WHITE PAPER: This paper will illustrate how Red Hat Enterprise Virtualization for Desktops can help organizations comply with specific HIPAA mandates, while at the same time increasing their overall efficiency and agility.
Posted: 05 Oct 2009 | Published: 05 Oct 2009

Red Hat and JBoss

Selecting the right EHR for the Life of your Practice and Your Patients
sponsored by HP & Intel®
WHITE PAPER: If we are at or approaching a technological tipping point in the history of healthcare, then it has never been more important for physician practices to select the right electronic health record (EHR) – and there are tangible reasons to believe so. This white paper discusses criteria for selecting the right EHR solution.
Posted: 01 Aug 2013 | Published: 16 Sep 2011

HP & Intel®

Five Steps to Meaningful Use with Workspace Virtualization
sponsored by RES Software
WHITE PAPER: Healthcare IT pros face 3 obstacles when trying to align with meaningful use standards: clinician experience, security and compliance, and legacy infrastructure management. In this expert guide, discover 5 key benefits healthcare organizations will realize when they deploy workspace virtualization.
Posted: 08 Oct 2014 | Published: 31 Dec 2013

RES Software

Information-Centric Security and Data Erasure
sponsored by EMC Corporation
WHITE PAPER: Most data security spending today goes to protecting devices and infrastructure, while little goes to protecting the stored data itself. In this white paper ESG analysts discuss the particulars of information security and data erasure.
Posted: 26 Sep 2006 | Published: 01 Jul 2006

EMC Corporation

Memorial Hermann Delivers Secure, Reliable Wireless for Mission-Critical Patient Care
sponsored by Aerohive Networks
WHITE PAPER: In this case study, learn how Memorial Hermann Health System is benefiting after upgrading to a wireless network.
Posted: 24 Mar 2014 | Published: 24 Mar 2014

Aerohive Networks

Protect sensitive data with multiple layers of loss protection
sponsored by CDW Healthcare
WHITE PAPER: An array of threats — from internal and external breaches to lost or stolen equipment, viruses, hackers and more — put hospital networks and patient data at risk. Learn about a comprehensive data security approach that offers improved methods for discovering, monitoring and protecting sensitive information.
Posted: 26 Jul 2011 | Published: 26 Jul 2011

CDW Healthcare

Addressing Compliance Initiatives with Center for Internet Security Benchmarks
sponsored by Tripwire, Inc.
WHITE PAPER: This whitepaper details the background you need to build an effective compliance program by understanding benchmarks, the basic building blocks of compliance initiatives. You'll learn about the benchmarks specified by the Center for Internet Security (CIS), which are often used as a starting point for creating a compliance initiative.
Posted: 30 Mar 2009 | Published: 01 Jan 2009

Tripwire, Inc.
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info