Business of Information Technology  >   Business Environment  >   Legal Environment  >   Laws  >   Federal Law  >  

HIPAA

RSS Feed   
ALSO CALLED: HIPPA, Health Insurance Portability and Accountability Act of 1996
DEFINITION: HIPAA is the United States Health Insurance Portability and Accountability Act of 1996. There are two sections to the Act. HIPAA Title I deals with protecting health insurance coverage for people who lose or change jobs. HIPAA Title II includes an administrative simplification section which deals with the standardization of healthcare-related information systems. In the information technology industries,  … 

HIPAA definition sponsored by SearchDataManagement.com, powered by WhatIs.com an online computer dictionary
HIPAA Reports
1 - 25 of 129 Matches Previous Page  |  Next Page
Big Data Analytics - Security and Compliance Challenges in 2019
sponsored by comForte AG
WHITE PAPER: There are an increasing number of people, devices and sensors that generate, communicate and share data via the internet. However, there are security and compliance concerns about the way that the data is being used. In this white paper, explore the challenges of using big data in ways that are secure, compliant and ethical.
Posted: 13 May 2019 | Published: 30 Apr 2019

comForte AG

Achieving Hitrust Certification with Impenetrable Cloud Security
sponsored by Armor
CASE STUDY: As a SaaS provider of population health and care management technology and services, Medecision made the commitment to meet the most rigorous standards and protocols available, including achieving HITRUST CSF certification. In this case study, learn how Medicison was able to achieve the certification by deploying Armor Anywhere.
Posted: 06 May 2019 | Published: 06 May 2019

Armor

Secure Neuroscience Technology for Better Brain Health
sponsored by Armor
CASE STUDY: After Cambridge Cognition decided to host data in the cloud, they faced the challenge of weather they could guarantee the security of information at rest and in transmission. In this case study, learn how they were able to secure their data by deploying Armor's secure cloud hosting platform.
Posted: 03 May 2019 | Published: 03 May 2019

Armor

A Startup Built to Revolutionize Injury Recovery
sponsored by Armor
CASE STUDY: As SaRA Health plotted its growth leveraging the public cloud, its leadership realized that layering cybersecurity on top of their cloud service was the best bet for ensuring their security needs were met. In this case study, learn how they used Armor as a third-party provider to handle their cybersecurity and compliance needs.
Posted: 03 May 2019 | Published: 03 May 2019

Armor

Partners Healthcare Turns to ClearSky Data for an All-in-one Storage Solution
sponsored by ClearSky Data
CASE STUDY: Download this study to discover how you can benefit, just as Partners HealthCare, the largest healthcare system in Massachusetts, did from employing an all-in-one backup solution to establish compliant data encryption, improve audit logging, and expand storage capacity as needs grow.
Posted: 17 Apr 2019 | Published: 17 Apr 2019

ClearSky Data

Wildflower Health Case Study
sponsored by Data Theorem
CASE STUDY: Wildflower helps families manage their health needs on one shared mobile application. However, the development team was facing both regulatory compliance and customer demand issues, as their apps process sensitive HIPAA-regulated data. In this case study, learn how Wildflower was able to achieve security coverage of all their mobile apps.
Posted: 09 Apr 2019 | Published: 09 Apr 2019

Data Theorem

Strengthen Health IT Security, Maintain HIPAA Compliance
sponsored by PatientKeeper
EGUIDE: Download this expert guide to find out why HIPAA compliance is not guaranteed with ePHI security and uncover how strengthening you cybersecurity strategy can better protect patient data from attacks.
Posted: 12 Mar 2019 | Published: 12 Mar 2019

PatientKeeper

Healthcare Compliance with Cornerstone
sponsored by Cornerstone OnDemand
WHITE PAPER: For hospitals juggling an array of ever-changing regulation requirements, maintaining compliance can seem impossible. In this white paper from Cornerstone, explore how a configurable learning platform is helping hospitals provide better patient care.
Posted: 10 Jan 2019 | Published: 10 Jan 2019

Cornerstone OnDemand

Guide to HIPAA Compliance for Containers
sponsored by Twistlock, Inc.
WHITE PAPER: Explore this resource as it will guide you through the ways you can achieve compliance with the HIPAA Security Rule for containerized workloads.
Posted: 08 Aug 2018 | Published: 08 Aug 2018


The Perfect Rx for HIPAA Compliance
sponsored by AT&T Cybersecurity
WHITE PAPER: Complying with HIPAA's Security Rule and demonstrating that security controls are in place and working is no easy task. Explore this white paper to gain a deeper understanding of how to comply with HIPAA and ensure your healthcare organization is secure.
Posted: 18 Oct 2017 | Published: 18 Oct 2017

AT&T Cybersecurity

When Cyberthieves Attack, Technologies Have Your Back
sponsored by SearchHealthIT.com
EZINE: Access this issue of Pulse e-zine now to gain insight into cybersecurity technologies such as multifactor authentication, behavioral analytics and honeypot to help prevent cyberthieves from stealing patient data. Also in this issue, we explore five key reasons why healthcare is so vulnerable a target for ransomware attacks.
Posted: 24 Jan 2017 | Published: 24 Jan 2017

SearchHealthIT.com

Healthcare Ransomware Attacks: The Critical Role of Backup and 5 Steps for Response
sponsored by Xerox
EGUIDE: In early 2016 alone, healthcare organizations saw a 300% increase in daily ransomware attacks from 2015. That's why Harun Rashid, CIO of Children's Hospital of Pittsburgh, has provided 6 pointers for the prevention of a ransomware attack. And in the event that attacks still get through, read through Reda Chouffani's 5 steps for effective response.
Posted: 20 Oct 2016 | Published: 19 Oct 2016

Xerox

Get Smart About Cloud Storage and HIPAA
sponsored by SearchHealthIT.com
EBOOK: This handbook examines cloud storage and backup technology in relation to HIPAA compliance. Learn how business associates and covered entities are preparing for HIPAA audits, how health systems use the cloud for backup storage purposes and DR efforts, and how moving healthcare data into the cloud has changed other aspects of providers' businesses.
Posted: 05 Oct 2016 | Published: 30 Sep 2016

SearchHealthIT.com

Get Smart About Cloud Storage and HIPAA
sponsored by SearchHealthIT.com
EBOOK: HIPAA-compliant cloud storage and backup require healthcare organizations to conduct risk assessments of the potential uses of cloud technology.
Posted: 30 Sep 2016 | Published: 30 Sep 2016

SearchHealthIT.com

Technology, Training Team Up to Defend Endpoint Security
sponsored by SearchHealthIT.com
EBOOK: At many healthcare organizations, endpoint devices can become areas for cybercriminals to exploit. In this handbook, learn how you can improve endpoint security through expert tips from the field, including advice from one hospital CIO on preventing HIPAA breaches with stronger endpoint security.
Posted: 16 Sep 2016 | Published: 16 Sep 2016

SearchHealthIT.com

How Healthcare Organizations are Tackling IoT Device Management
sponsored by Cisco Umbrella
EGUIDE: Connected medical devices are becoming more widespread in healthcare, but security and management options are limited for IT teams. This e-guide will teach you how to devise a plan to secure each device from surface attacks and cyberthreats. Plus, see how several vendors are tackling this problem and offering tools to keep patient data safe.
Posted: 16 Sep 2016 | Published: 14 Sep 2016

Cisco Umbrella

Improving Revenue and Population Health: New Strategies for Health IT
sponsored by Medfusion
EGUIDE: Orlando Health found a way to create a more efficient and accurate revenue cycle, while saving money. But how did they do it? Plus, could the gamification of healthcare apps influence a positive change on population health? Access this e-guide to discover the answers to these question and more.
Posted: 06 Sep 2016 | Published: 02 Sep 2016

Medfusion

Safeguard Your Hospital Against Ransomware to Protect Data, Patient Security
sponsored by Optum
EGUIDE: In this e-guide, CIOs Keith Jennings and Andrew Rosenberg, M.D. share tips on what your organization can do right now to prevent a crippling ransomware attack. They explain new technologies, techniques and past experiences to help improve your healthcare organization's security posture.
Posted: 02 Aug 2016 | Published: 01 Aug 2016

Optum

Healthcare CIOs Address Cybersecurity Vulnerabilities
sponsored by Optum
EGUIDE: As breaches continue in healthcare, it's imperative that CIOs know what best practices and technologies they should be implementing to safeguard their organization. Discover the proven practices that best stave off healthcare cybersecurity vulnerabilities based on advice from four CIOs attending HIMSS 2016.
Posted: 01 Aug 2016 | Published: 28 Jul 2016

Optum

How to guard secure data
sponsored by Optum
EGUIDE: IT staffers should consider using additional applications to track all relevant devices and applications that could pose a security risk. Learn how to best protect patient data with simple security updates and ensure HIPAA compliance to lessen vulnerabilities.
Posted: 14 Jul 2016 | Published: 01 Jun 2016

Optum

BYOD and mHealth: Navigating Security and HIPAA
sponsored by Optum
EGUIDE: BYOD is almost the new norm for healthcare providers, and it has introduced the challenge of protecting devices and data without restricting employees' mobile capabilities. Find out how you can navigate the complex task of meeting HIPAA regulations while allowing the use of BYOD apps and devices, cloud services, and desktop virtualization.
Posted: 14 Jul 2016 | Published: 13 Jul 2016

Optum

How to Prevent Healthcare Cybersecurity Attacks
sponsored by ServiceNow
EGUIDE: In this e-guide, we chat with the former CIO of Community Health Systems as he discusses how to prevent healthcare cyberattacks and lessons learned during his career. Uncover best practices on maintaining proper healthcare security.
Posted: 13 Jun 2016 | Published: 06 Jun 2016

ServiceNow

Protecting Patient Data in the Mobile Era
sponsored by SearchHealthIT.com
EZINE: The rapid adoption of EHRs, coupled with the widespread use of mobile devices among providers, has increased the endpoint security threat – and there are more risks ahead. Access this issue of Pulse to find out how providers are locking down access points to protect against data breaches and HIPAA violations.
Posted: 03 Mar 2016 | Published: 29 Feb 2016

SearchHealthIT.com

Pulse E-zine: Vol. 3, No. 2
sponsored by SearchHealthIT.com
EZINE: While the health IT spotlight shifts to the release of stage 3 meaningful use guidelines, many providers are still struggling with stage 2 reporting. In this issue of Pulse, learn what's next for meaningful use, how it has affected EHRs, and how to align an analytics plan with the needs of your organization.
Posted: 23 Mar 2015 | Published: 19 Mar 2015

SearchHealthIT.com

Five Steps to Meaningful Use with Workspace Virtualization
sponsored by RES Software
WHITE PAPER: Healthcare IT pros face 3 obstacles when trying to align with meaningful use standards: clinician experience, security and compliance, and legacy infrastructure management. In this expert guide, discover 5 key benefits healthcare organizations will realize when they deploy workspace virtualization.
Posted: 08 Oct 2014 | Published: 31 Dec 2013

RES Software
1 - 25 of 129 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement