Business of Information Technology  >   Business Environment  >   Legal Environment  >   Laws  >  

Security Compliance

RSS Feed   
Security Compliance Reports
 
Addressing Drug Diversion in Healthcare: Where Do I Start?
sponsored by FairWarning
WHITE PAPER: Download this white paper to learn more about the current drug diversion landscape and the overall effects of drug diversion on the patient, provider and drug diverter. You'll also uncover 9 steps to create a full-lifecycle drug diversion monitoring program.
Posted: 23 Jul 2019 | Published: 23 Jul 2019

FairWarning

The ROI of a New Learning Management System (LMS): How to Construct a Successful Business Case
sponsored by SuccessFactors
WHITE PAPER: This resource describes key features and capabilities of a new-generation learning management system (LMS), and counts down six steps for demonstrating LMS value, rooted in ROI. Learn how you can make a successful business case for an LMS by reading on now.
Posted: 20 Feb 2014 | Published: 20 Feb 2014

SuccessFactors

October 2013 Health IT E-Zine
sponsored by SearchHealthIT.com
EZINE: In this issue of Pulse, readers will get the latest pros and cons of signal extension systems like distributed antenna systems and femtocells and best practices for implementing technologies to support 2014's health IT initiatives and big data projects.
Posted: 11 Oct 2013 | Published: 11 Oct 2013

SearchHealthIT.com

eBook: Data Security in the E-discovery Process
sponsored by Dell and VMware
EBOOK: In this e-book from SearchCompliance.com, find expert advice that will help you ease the pain – and the cost – of e-discovery, as well as tips and tactics for bridging the gap between e-discovery and data security.
Posted: 27 Aug 2013 | Published: 31 Dec 2011

Dell and VMware

Rochester General Relies on MOVEit to Transfer Medical Records and Meet HIPAA/HITECH Compliance
sponsored by Ipswitch File Transfer
CASE STUDY: This two-page case study unveils the security solution Rochester General Hospital put in place to help them quickly, easily, and securely track file transfers while simultaneously complying all regulatory requirements.
Posted: 09 Jul 2013 | Published: 31 May 2013

Ipswitch File Transfer

Build Your Identity And Access Management Strategy
sponsored by Symplified
WHITE PAPER: This Forrester Research, Inc., paper explores the current and future states of identity and access management and describes steps your organization should take to create an IAM strategy and successfully put it into use.
Posted: 26 Apr 2013 | Published: 14 Mar 2012

Symplified

Million Dollar HIPAA Penalties for Healthcare
sponsored by Absolute
WEBCAST: The threat of million dollar penalties from HIPAA regulations is making Healthcare Organizations re-evaluate their patient information security infrastructure. Watch this recorded webcast to see how your organization can reduce the risk.
Posted: 11 Nov 2013 | Premiered: Nov 11, 2013

Absolute

Computer Weekly – 25 August 2015: Coping with a crisis
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, IT leaders discuss their experiences of dealing with disaster and the importance of planning to ensure business continuity. Jaeger's CIO talks about bring the iconic fashion brand into the digital age. And we look at the issues around writing supplier contracts for agile software development. Read the issue now.
Posted: 21 Aug 2015 | Published: 21 Aug 2015

ComputerWeekly.com

Protect People, Processes and Technology from Web Application Threats
sponsored by IBM
WHITE PAPER: Securing externally facing applications is an important step toward safeguarding your critical assets. Find out why.
Posted: 08 Oct 2014 | Published: 29 Nov 2013

IBM

One Easily Avoidable Pitfall in Your eDiscovery and Compliance Strategy
sponsored by Commvault
WHITE PAPER: This white paper explains the challenges of big data and highlights one common pitfall organizations fall into when dealing with their eDiscovery and Compliance strategy. It also highlights how a solution from CommVault can help avoid this pitfall by delivering searchable endpoint data for more comprehensive searches.
Posted: 28 Apr 2014 | Published: 28 Apr 2014

Commvault
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info