September 28, 2012 - (Free Research) This whitepaper reviews guidelines for meeting the HIPAA privacy law's requirements and offers recommendations for how providers can build a sustainable approach to HIPAA compliance and an integrated set of controls across all identity and access management processes.
November 23, 2010 - (Free Research) The Health Insurance Portability and Accountability Act of 1996 (HIPAA) enacted reform and standardization in the healthcare industry to protect patient confidentiality. Continue reading to learn more about the goals of HIPAA.
January 01, 2007 - (Free Research) The Health Insurance Portability and Accountability Act (HIPAA) prescribes new health care industry rules and recommendations for the handling and transmission of patient health information.
October 21, 2011 - (Free Research) Health care CIOs are caught between a rock and a hard place. On one hand, demanding patients and increasing numbers of wireless medical devices are requiring they open up their wireless networks. On the other, tighter rules for HIPAA compliance are forcing them to lock networks down. Find out how your peers are coping with this challenge.
August 02, 2010 - (Free Research) Data Deposit Box supports HIPAA compliance through automated, continuous off-site dataprotection with on-demand recovery, while ensuring strict data security and confidentiality. Data Deposit Box eliminates the damaging impact of data loss. Read this paper to find out more.
October 05, 2009 - (Free Research) This paper will illustrate how Red Hat Enterprise Virtualization for Desktops can help organizations comply with specific HIPAA mandates, while at the same time increasing their overall efficiency and agility.
September 14, 2011 - (Free Research) Healthcare facilities are rapidly adopting electronic health records (EHR) in order to meet regulatory compliance requirements. Central to this effort is document conversion — the scanning of new and existing records to digital format. Inside this white paper, uncover best practices for a HIPAA-compliant approach to EHR transition.
August 17, 2011 - (Free Research) Effectively addressing the new HIPAA privacy and security rules introduced in the HITECH Act requires an assessment of your organization’s biggest vulnerabilities as well as the deployment of the right technology to reduce the risk of data loss. Inside this expert resource, gain insight on current healthcare security topics.
May 17, 2010 - (Free Research) Organizations that had to comply with HIPAA were frustrated by the lack of enforcement and specifics. The HITECH Act is changing all of that. Read this e-book to learn how the HIPAA is getting new teeth, new ways the FTC is getting involved, and more.
September 08, 2009 - (Free Research) Negative publicity from a data breach can have lasting consequences, undermining patient confidence and damaging an organization's reputation. This paper covers potential data breaches within healthcare organizations and strategies for preventing them. Read on to learn more about the steps you can take to protect patients' sensitive information.
August 08, 2011 - (Free Research) View this paper to learn about the key elements of the HIPAA Security Rule including administrative, technical and, physical safeguards. In addition, explore how new advanced technology, QRadar, can help covered entities ease the burden of these rules and meet compliance.
March 08, 2011 - (Free Research) Learn how Novell's Sentinel Log Manager allows organizations to simplify their compliance efforts, reduce deployment and management costs, and build a scalable compliance and security foundation that grows with their needs.
October 21, 2011 - (Free Research) In order to maintain patient privacy while complying with HIPAA standards, medical records must be tightly protected and there must be a solid backup plan in place in the case of a data breach. In this e-guide, learn how to prevent data breaches as well as what to do should a safety breach occur.
December 01, 2009 - (Free Research) This case study describes how Alegent, a large healthcare system in Nebraska, implemented Courion Solutions to assist with their access assurance needs. Read on to learn what was changed and the benefits that were attained.
April 17, 2013 - (Free Research) Explore this health IT tech guide for expert advice to help you build an effective and HIPAA-compliant wireless network. Learn more about implementing UC in a hospital setting, managing medical and mobile devices and preparing your wireless network for EHR, PACS and telemedicine.
October 25, 2011 - (Free Research) If data is encrypted, health care providers are not subject to new, strict data breach notification laws. Server, storage and network encryption adds yet another layer of protection. So why do so many organizations avoid encryption? This presentation download will cover the basics of encryption and explain why its benefits outweigh its costs.
October 26, 2010 - (Free Research) This e-book, brought to you by SearchHealthIT.com, discusses key issues health care IT pros are facing now, including: HIPAA, the HITECH Act and the new frontier for encryption, network and server encryption, using thin clients to keep data secure, and much more!
TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.