Business of Information Technology  >   Business Environment  >   Legal Environment  >   Laws  >   Federal Law  >  

HIPAA

RSS Feed   
ALSO CALLED: HIPPA, Health Insurance Portability and Accountability Act of 1996
DEFINITION: HIPAA is the United States Health Insurance Portability and Accountability Act of 1996. There are two sections to the Act. HIPAA Title I deals with protecting health insurance coverage for people who lose or change jobs. HIPAA Title II includes an administrative simplification section which deals with the standardization of healthcare-related information systems. In the information technology industries,  … 

HIPAA definition sponsored by SearchDataManagement.com, powered by WhatIs.com an online computer dictionary
HIPAA Reports
1 - 25 of 133 Matches Previous Page  |  Next Page
Compliance Made Easy
sponsored by Armor
RESOURCE: The Armor Compliance Matrix was created with the intention of helping IT, IT security and compliance teams understand the major compliance mandates their organizations are subject to and how Armor can help accelerate adherence. Read on for an exclusive look at the matrix.
Posted: 06 Oct 2020 | Published: 06 Oct 2020

Armor

Finding HIPAA/HITRUST Compliance-ready Cloud security
sponsored by Armor
CASE STUDY: The complexities of compliance are daunting for any organization, especially those under pressure to manage their cloud-hosting infrastructure with speed and agility. To address these challenges, healthcare SaaS provider VitalAxis chose Armor Anywhere with secure hosting for its laboratory management and medical billing software.
Posted: 02 Oct 2020 | Published: 02 Oct 2020

Armor

HIPAA-Compliant Cloud: Avoid the 7 Deadly Sins
sponsored by Armor
WHITE PAPER: Cloud capabilities are skyrocketing in popularity across all industries, and healthcare is no exception. However, the requirements of HIPAA make cloud migration a bit more challenging for healthcare industries. Read this white paper to unlock the 7 deadly sins of building HIPAA-compliant clouds.
Posted: 01 Oct 2020 | Published: 31 Mar 2020

Armor

Advances in Technology Make Virtual Health a Reality
sponsored by Comcast Business
WHITE PAPER: Virtual health, otherwise known as telehealth, has gained popularity over the last few years. More than video chat with a physician, it has emerged as an extension of, and possibly a replacement for, in-person health services. But the technology behind it must live up to expectation. Read this white paper to learn 4 challenges of virtual health.
Posted: 11 Sep 2020 | Published: 11 Sep 2020

Comcast Business

Cybersecurity Compliance Guide
sponsored by Arctic Wolf Networks, Inc.
EGUIDE: Consumer data protection has become so heavily regulated that compliance is now a key part of any cybersecurity program. In order to better understand the various regulations and their implications, Arctic Wolf created this Cybersecurity Compliance Guide, which explores relevant regulations across industries and geography.
Posted: 01 Sep 2020 | Published: 01 Sep 2020

Arctic Wolf Networks, Inc.

The Healthcare Cybersecurity Checklist
sponsored by Arctic Wolf Networks, Inc.
WHITE PAPER: According to the Ponemon Institute, the average cost of a data breach in the healthcare sector is $6.5 million. For these organizations, cybersecurity is a top priority – especially when it comes to meeting HIPAA compliance requirements. Use the following checklist to develop your cybersecurity strategy, step by step.
Posted: 28 Aug 2020 | Published: 28 Aug 2020

Arctic Wolf Networks, Inc.

Know the Ins and Outs of HIPAA Compliance
sponsored by Zones, Inc.
WHITE PAPER: Though ensuring HIPAA compliance can be complicated, a complaint can produce fines, long-term damage to your organization’s reputation, or worse. Dive into this guide to learn strategies for factoring HIPAA compliance into your enterprise data planning – and find out how to enhance the security of all the data under your purview.
Posted: 11 Aug 2020 | Published: 11 Aug 2020

TOPICS:  HIPAA
Zones, Inc.

Staying Secure in the Cloud While Driving Innovation: Healthcare & Life Sciences
sponsored by DivvyCloud
EGUIDE: In order to ensure they are meeting user demands, healthcare and life sciences organizations are rapidly embracing cloud capabilities. However, within this industry, security often goes hand in hand with HIPAA compliance. So, how can these organizations balance security, compliance and innovation? Download this e-guide to find out.
Posted: 29 Jul 2020 | Published: 29 Jul 2020

DivvyCloud

Hunt for Data Protection Ends with Encryptionizer®
sponsored by NetLib Security
CASE STUDY: In this case study, discover how a medical device manufacturer (MDM) was able to address the risks targeting their patient data and overcome internal challenges related to protecting PHI, encrypting devices and ensuring compliance with increasingly stringent regulations.
Posted: 08 Jul 2020 | Published: 08 Jul 2020

NetLib Security

Beginners Guide – Securing Legacy Devices
sponsored by NetLib Security
RESOURCE: Medical devices often have lifespans averaging around 15 years. However, these aging devices are still required to meet the data protection benchmarks outlined by HIPAA. This article overviews how organizations with legacy devices can ensure data protection and meet compliance requirements. Read on to learn more.
Posted: 14 May 2020 | Published: 14 May 2020

NetLib Security

InfoSec Risk Management in Healthcare Environments a Primer to Assessing Technical Risk
sponsored by CI Security
WHITE PAPER: In some healthcare organizations, risk assessment and risk management as it relates to cybersecurity are a bit of a mystery. In this white paper, learn how to assess your IT security risks.
Posted: 18 Mar 2020 | Published: 18 Mar 2020

CI Security

HIPAA Compliance Checklist: The Key to Staying Compliant in 2020
sponsored by Ostendio
EGUIDE: Get insight on HIPAA's two fundamental rules, read up on the major elements of a HIPAA compliance program and review a HIPAA compliance checklist to ensure regulation requirements are satisfactorily met.
Posted: 06 Apr 2020 | Published: 06 Apr 2020

Ostendio

Strengthen Health IT Security, Maintain HIPAA Compliance
sponsored by PatientKeeper
EGUIDE: Download this expert guide to find out why HIPAA compliance is not guaranteed with ePHI security and uncover how strengthening you cybersecurity strategy can better protect patient data from attacks.
Posted: 12 Mar 2019 | Published: 12 Mar 2019

PatientKeeper

The Perfect Rx for HIPAA Compliance
sponsored by AT&T Cybersecurity
WHITE PAPER: Complying with HIPAA's Security Rule and demonstrating that security controls are in place and working is no easy task. Explore this white paper to gain a deeper understanding of how to comply with HIPAA and ensure your healthcare organization is secure.
Posted: 18 Oct 2017 | Published: 18 Oct 2017

AT&T Cybersecurity

When Cyberthieves Attack, Technologies Have Your Back
sponsored by SearchHealthIT.com
EZINE: Access this issue of Pulse e-zine now to gain insight into cybersecurity technologies such as multifactor authentication, behavioral analytics and honeypot to help prevent cyberthieves from stealing patient data. Also in this issue, we explore five key reasons why healthcare is so vulnerable a target for ransomware attacks.
Posted: 24 Jan 2017 | Published: 24 Jan 2017

SearchHealthIT.com

Healthcare Ransomware Attacks: The Critical Role of Backup and 5 Steps for Response
sponsored by Xerox
EGUIDE: In early 2016 alone, healthcare organizations saw a 300% increase in daily ransomware attacks from 2015. That's why Harun Rashid, CIO of Children's Hospital of Pittsburgh, has provided 6 pointers for the prevention of a ransomware attack. And in the event that attacks still get through, read through Reda Chouffani's 5 steps for effective response.
Posted: 20 Oct 2016 | Published: 19 Oct 2016

Xerox

Get Smart About Cloud Storage and HIPAA
sponsored by SearchHealthIT.com
EBOOK: This handbook examines cloud storage and backup technology in relation to HIPAA compliance. Learn how business associates and covered entities are preparing for HIPAA audits, how health systems use the cloud for backup storage purposes and DR efforts, and how moving healthcare data into the cloud has changed other aspects of providers' businesses.
Posted: 05 Oct 2016 | Published: 30 Sep 2016

SearchHealthIT.com

Get Smart About Cloud Storage and HIPAA
sponsored by SearchHealthIT.com
EBOOK: HIPAA-compliant cloud storage and backup require healthcare organizations to conduct risk assessments of the potential uses of cloud technology.
Posted: 30 Sep 2016 | Published: 30 Sep 2016

SearchHealthIT.com

Technology, Training Team Up to Defend Endpoint Security
sponsored by SearchHealthIT.com
EBOOK: At many healthcare organizations, endpoint devices can become areas for cybercriminals to exploit. In this handbook, learn how you can improve endpoint security through expert tips from the field, including advice from one hospital CIO on preventing HIPAA breaches with stronger endpoint security.
Posted: 16 Sep 2016 | Published: 16 Sep 2016

SearchHealthIT.com

How Healthcare Organizations are Tackling IoT Device Management
sponsored by Cisco Umbrella
EGUIDE: Connected medical devices are becoming more widespread in healthcare, but security and management options are limited for IT teams. This e-guide will teach you how to devise a plan to secure each device from surface attacks and cyberthreats. Plus, see how several vendors are tackling this problem and offering tools to keep patient data safe.
Posted: 16 Sep 2016 | Published: 14 Sep 2016

Cisco Umbrella

Improving Revenue and Population Health: New Strategies for Health IT
sponsored by Medfusion
EGUIDE: Orlando Health found a way to create a more efficient and accurate revenue cycle, while saving money. But how did they do it? Plus, could the gamification of healthcare apps influence a positive change on population health? Access this e-guide to discover the answers to these question and more.
Posted: 06 Sep 2016 | Published: 02 Sep 2016

Medfusion

Safeguard Your Hospital Against Ransomware to Protect Data, Patient Security
sponsored by Optum
EGUIDE: In this e-guide, CIOs Keith Jennings and Andrew Rosenberg, M.D. share tips on what your organization can do right now to prevent a crippling ransomware attack. They explain new technologies, techniques and past experiences to help improve your healthcare organization's security posture.
Posted: 02 Aug 2016 | Published: 01 Aug 2016

Optum

Healthcare CIOs Address Cybersecurity Vulnerabilities
sponsored by Optum
EGUIDE: As breaches continue in healthcare, it's imperative that CIOs know what best practices and technologies they should be implementing to safeguard their organization. Discover the proven practices that best stave off healthcare cybersecurity vulnerabilities based on advice from four CIOs attending HIMSS 2016.
Posted: 01 Aug 2016 | Published: 28 Jul 2016

Optum

How to guard secure data
sponsored by Optum
EGUIDE: IT staffers should consider using additional applications to track all relevant devices and applications that could pose a security risk. Learn how to best protect patient data with simple security updates and ensure HIPAA compliance to lessen vulnerabilities.
Posted: 14 Jul 2016 | Published: 01 Jun 2016

Optum

BYOD and mHealth: Navigating Security and HIPAA
sponsored by Optum
EGUIDE: BYOD is almost the new norm for healthcare providers, and it has introduced the challenge of protecting devices and data without restricting employees' mobile capabilities. Find out how you can navigate the complex task of meeting HIPAA regulations while allowing the use of BYOD apps and devices, cloud services, and desktop virtualization.
Posted: 14 Jul 2016 | Published: 13 Jul 2016

Optum
1 - 25 of 133 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info