ComputerWeekly.com Research Library

Powered by Bitpipe.com

HIPAA Compliance Research

  • Eguide: Avoiding a patient data breach – and how to handle one if it does occur

    Sponsored by: CDW Healthcare

    In order to maintain patient privacy while complying with HIPAA standards, medical records must be tightly protected and there must be a solid backup plan in place in the case of a data breach. In this e-guide, learn how to prevent data breaches as well as what to do should a safety breach occur.

  • Eguide: Addressing HIPAA privacy compliance on hospital wireless network

    Sponsored by: CDW Healthcare

    Health care CIOs are caught between a rock and a hard place. On one hand, demanding patients and increasing numbers of wireless medical devices are requiring they open up their wireless networks. On the other, tighter rules for HIPAA compliance are forcing them to lock networks down. Find out how your peers are coping with this challenge.

  • E-Guide: Using a virtualized server environment to address HIPAA compliance

    Sponsored by: Dell Compellent

    In an ever-digitized storage environment, there can be an array of threats posed to patient medical records. Amidst all of these concerns, how can you be sure which virtual server environment is right for you? In this exclusive e-guide, learn how one company successfully took the leap to a virtualized server environment.

  • Disaster recovery planning for HIPAA compliance

    Sponsored by: HP & Intel®

    The HIPAA Security Rule requires all HIPAA covered entities to create a plan for first protecting and then restoring confidential patient data in the event of a disaster. Unfortunately, HIPAA does not say much about what should go into such a disaster recovery plan. Inside this e-guide, find tips for a compliant disaster recovery plan.

  • HIPAA Primer Best Practices

    Sponsored by: Iron Mountain

    Healthcare facilities are rapidly adopting electronic health records (EHR) in order to meet regulatory compliance requirements. Central to this effort is document conversion — the scanning of new and existing records to digital format. Inside this white paper, uncover best practices for a HIPAA-compliant approach to EHR transition.

  • FAQ Guide: Regulatory Compliance Issues Drive Some IT Shops to Data Archive Appliances

    Sponsored by: IBM

    Check out this SearchStorage.com FAQ guide to learn about the latest developments and the evolution of data archiving technology, the key characteristics of different appliances and more.

  • Virtual Data Center: Health Care IT Edition, Sept. 2011

    Sponsored by: TechTarget Data Center

    Cloud computing holds a lot of promise for the healthcare industry, since infrastructure costs can hinder the adoption of EHR systems. However, many providers shy away from cloud services because of security concerns. Inside this e-zine, gain insight on how to utilize the cloud while still ensuring patient data security and HIPAA compliance.

  • Storage Virtualization Strategies for Health Care

    Sponsored by: TechTarget Health IT and TechTarget Storage

    Using EHRs means that terabytes of patient records must be stored for decades at a time. Doing this without breaking the bank means deciding which storage approach is right for your healthcare facility. Inside this exclusive e-zine, learn about a variety of storage strategies, including tiered storage, thin provisioning and data replication.

  • Advantages of virtual desktop in a healthcare environment

    Sponsored by: DellEMC and Intel®

    Many healthcare facilities in the midst of EHR deployment are facing the same question: What is the most effective solution to upgrading all existing desktops in an environment? This e-guide presents desktop virtualization as the answer to this question and discusses benefits including flexibility and data security for HIPAA compliance.

  • Healthcare IT Channel E-Book: Ride the Health Care IT Modernization Wave: How To Enter the Health Care Technology Market or Grow Your Existing Healthcare IT Business

    Sponsored by: Stratus Technologies

    More than 75% of hospitals view electronic health records (EHRs) as the primary driver of IT spending and almost as many believe that EHR implementations will transform their IT environments. Inside this expert e-book, learn how healthcare facilities are preparing for network, storage and security changes in order to accommodate EHR implementation.

  • IT in the Electronic Hospital

    Sponsored by: TechTarget Health IT

    The federal government’s push for electronic healthcare records has made compliance and data security even more pressing. This e-guide offers a look at where healthcare IT leaders should begin, and what they should watch out for as they move to embrace the HITECH Act, HIPAA and other initiatives.

  • Essential Guide to HIPAA Compliance and Data Protection Strategies

    Sponsored by: TechTarget Health IT and TechTarget Security

    Effectively addressing the new HIPAA privacy and security rules introduced in the HITECH Act requires an assessment of your organization’s biggest vulnerabilities as well as the deployment of the right technology to reduce the risk of data loss. Inside this expert resource, gain insight on current healthcare security topics.

  • Getting the PACS archive and EHR systems to talk to each other

    Sponsored by: Ciena

    Complying with the HITECH Act involves the exchange of data -- such as medical images -- across interoperable systems. Unfortunately, opening up proprietary images enterprise-wide to patients and their physicians can be complex. Inside this expert e-guide, learn how to plan ahead for this process with preparation and testing strategies.

  • IBM InfoSphere Guardium Data Redaction

    Sponsored by: IBM

    InfoSphere Guardium is a key part of the IBM InfoSphere portfolio. IBM InfoSphere software is an integrated platformfor defining, integrating, protecting and managing trusted information across your systems.

  • How Will the Transition to ICD-10 codes affect Health IT?

    Sponsored by: Virtusa Corporation

    As of Oct. 1, 2015, U.S. health care providers must use ICD-10 codes when they submit medical claims. This FAQ e-guide addresses what the transition means, advantages of using ICD-10, as well as best practices on how providers can prepare and succeed in an ICD 10 conversion.

  • Data Breaches: A Growing Problem for the Healthcare Community

    Sponsored by: Wave Systems Corp.

    While the pros of Electronic Medical Records (EMR) and online Healthcare Portals greatly outweigh the cons, their introduction comes at a price — an increased risk of both accidental and intentional data loss.

  • E-Guide: FAQ: What is Health Data Archiving?

    Sponsored by: BridgeHead Software

    Read this E-guide to learn more about the regulations involved in storing health data, how a SAN can improve data archiving and how to weigh the pro's and con's to achieve the most efficient data archiving strategy for your organization.

  • Engineering the Wireless Hospital

    Sponsored by: Aerohive Networks

    Implementing a wireless network in a hospital allows physicians to use state-of-the-art equipment. However, there are security, infrastructure, and connectivity obstacles to overcome. Check out this e-book to learn more.

  • Presentation Transcript: Overcoming the Challenges with Configuration and Patch Mgmt

    Sponsored by: BigFix

    In this presentation transcript, you’ll gain insight on how to improve your asset discovery processes, determine the patch level of the machines in your environment, and improve testing and deployment processes to keep pace with Patch Tuesday and quarterly Oracle and Adobe releases.

  • E-Guide A Decision Maker’s Guide to Log Management

    Sponsored by: ArcSight, an HP Company

    While often underappreciated by IT professionals, logs are an extremely useful source of data for IT shops. Often undervalued as a strategic weapon, log management tools can play a vital role in securing mission-critical data and assuring accountability. Learn what to consider when it’s time to get a handle on your logs.

  • E-Book: Encryption - What, Where and How

    Sponsored by: TechTarget Health IT

    This e-book, brought to you by SearchHealthIT.com, discusses key issues health care IT pros are facing now, including: HIPAA, the HITECH Act and the new frontier for encryption, network and server encryption, using thin clients to keep data secure, and much more!

  • E-Guide: Information Security Essential Guide to Compliance

    Sponsored by: Information Security Magazine

    Compliance with government regulations and industry standards shapes the formation of most information security programs. There’s no way around it; your organization must comply. This essential guide will help you sort out and prioritize your compliance responsibilities.

  • Improving Clinician Workflows with One-Touch Desktop Roaming

    Sponsored by: Imprivata

    The move from paper-based medical records systems to EMR is rightly viewed as a step toward improved patient care, increased clinician productivity, and lower costs. But striking a balance between access for clinicians and privacy for patients can be a difficult task. This paper presents a one-touch desktop roaming solution that benefits both.

  • E-Book: New Rules for HIPAA

    Sponsored by: TechTarget Security

    Organizations that had to comply with HIPAA were frustrated by the lack of enforcement and specifics. The HITECH Act is changing all of that. Read this e-book to learn how the HIPAA is getting new teeth, new ways the FTC is getting involved, and more.

  • IDC White Paper: Effective Information Security

    Sponsored by: CA (India) Technologies Pvt. Ltd

    Securing personally identifiable information (PII) and IP has become a high priority for enterprise management and IT. In this white paper, IDC provides an overview of information security and its impact on enterprises, discusses IT operation challenges, and describes CA's answer to helping enterprise IT organizations attain increased visibility...

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.