ComputerWeekly.com Research Library

Powered by Bitpipe.com

HIPAA Compliance Research

  • Strategies for Writing a HIPAA-friendly BYOD Policy

    Sponsored by: HP & Intel®

    This e-guide from SearchHealthIT.com provides expert advice for modeling a HIPAA-friendly BYOD policy. Read now for expert tips and advice on how you can manage consumer devices in your hospital.

  • How to Comply with the HIPAA Security Rule

    Sponsored by: Thawte Inc.

    In this expert guide from SearchHealthIT.com, find out how to comply appropriately with the HIPAA compliance regulations to ensure that your organization doesn't run into unexpected and unneeded complications.

  • Using EHRs to Achieve Meaningful Use

    Sponsored by: TechTarget Health IT

    As stage 2 implementation dates loom, providers and industry stakeholders are assessing how well they've integrated certified electronic health records, technology standards and meaningful use stage 1 requirements into healthcare delivery.

  • Healthcare Networking Classroom

    Sponsored by: TechTarget Health IT

    Building wireless networks for use in the healthcare field can be challenging, especially in light of HIPAA privacy and security concerns. In these classroom lessons, learn how to overcome the challenges of building these networks, and hear from one hospital that has focused on making mobile technology integration part of its long-term strategy.

  • PowerBroker Password Safe: Security, Compliance, Productivity

    Sponsored by: BeyondTrust Corporation

    Uncover how PowerBroker Password Safe can help you secure access to privileged accounts, effectively preventing intentional or accidental harm and malicious activity that can be devastating to your business.

  • Tips for Thin Provisioning Storage in a Health Care Setting

    Sponsored by: HP & Intel®

    This E-Guide offers expert insight into how today's health care facilities can use thin provisioning to address the ever-present problem of storage underutilization, eliminating the need for additional storage purchases. Additionally, discover essential tips for implementing thin provisioning in you health care facility.

  • Tips for Creating a HIPAA-Friendly BYOD Policy

    Sponsored by: HP & Intel®

    This e-guide from SearchHealthIT.com provides expert advice for modeling a HIPAA-friendly BYOD policy. Read now for expert tips and advice on how you can manage consumer devices in your hospital.

  • HIPAA Compliance Takes Patient, Employee and Vendor Followup

    Sponsored by: HP & Intel®

    This e-guide highlights ways health care providers improve their mobile device security in the wake of BYOD initiatives. Inside, learn how you can embrace the consumerization of IT while ensuring your facility remains compliant with HIPAA regulations.

  • HealthIT Exclusive Sponsor DataCenter eZine: Server Virtualization

    Sponsored by: HP & Intel®

    This expert e-zine examines four key topics for health care organizations planning to venture into a virtual server implementation – namely security, storage, performance, and hardware considerations. Gain expert advice from industry experts and HIT leaders that have been through the process

  • Mercy Health System Speeds Access to EpicCare and Increases Clinician Satisfaction

    Sponsored by: Imprivata

    This webcast demonstrates how one hospital was able to benefit from single sign-on technology that helped foster physician satisfaction while meeting HIPAA compliance regulations.

  • Channel executives see need to bolster hospital IT security

    Sponsored by: Hewlett Packard Enterprise

    Regardless of the size of the institution, hospitals need a sufficient IT security system in place. This E-guide explores why channel professionals and VARs should not only understand hospital vulnerabilities but also be able to convince customers that risk mitigation is worth the price.

  • Comparing health care data security compliance to other industries

    Sponsored by: Hewlett Packard Enterprise

    This e-guide discusses the challenges health care companies run into meeting state and federal data security compliance regulations and how health care organizations compare to other industries such as financial services.

  • eBook: Trends in Healthcare Data Protection

    Sponsored by: LANDesk Software

    This E-Book explores how encryption technologies can help protect health care data, ensuring the avoidance of costly non-compliance penalties.

  • eGuide: Tips for Thin Provisioning Storage in a Health Care Setting

    Sponsored by: Hitachi Vantara

    This E-Guide offers expert insight into how today's health care facilities can use thin provisioning to address the ever-present problem of storage underutilization, eliminating the need for additional storage purchases. Additionally, discover essential tips for implementing thin provisioning in you health care facility.

  • Deploying desktop virtualization technology in a health care setting

    Sponsored by: Accelera Solutions

    This E-Guide addresses the most important considerations for health care organizations that are planning - or are in the midst of - virtual desktop implementation.

  • E-Guide: Health care, cloud storage providers and data ownership

    Sponsored by: Intel

    This E-Guide discusses the HIPAA requirements around patient’s access to his or her records as well as issues surrounding data ownership when health care data is stored in the cloud.

  • Meeting HIPAA Disaster Recovery Requirements

    Sponsored by: HPE and Intel®

    Failure to have a disaster recovery plan (DRP) in place, could result in catastrophe for your health care organization.This E-Guide explores best practices and expert tips for implementing a DRP, ensuring HIPAA compliance and peace of mind.

  • E-Guide: How Virtual Implementation Addresses Healthcare Regulations

    Sponsored by: Pano Logic, Inc

    Access this expert resource to learn how desktop virtualization can help health care organizations to bolster Health Insurance Portability and Accountability Act (HIPAA) compliance and implement electronic health record (EHR) systems.

  • E-guide: WAN optimization improvesthroughput for medical images

    Sponsored by: Belden

    In this day and age, hospitals are growing increasingly more dependent on wide area networks (WAN) to adequately share information without increasing costs though additional bandwidth or data circuits.  In this e-guide you will learn how one organization successfully implemented a WAN and how it can work for your organization too.

  • GOING PAPERLESS: BEST PRACTICES TO ACCELERATE YOUR EMR TRANSITION

    Sponsored by: Iron Mountain

    The health care industry is beginning to fully embrace EHR as the foundation for sharing information and delivering quality patient care. The benefits of an electronic  environment are clearly recognized, but the transition from paper to pixel is difficult and requires a new strategy. Read on to learn how to simplify the transition to EHR.

  • How to Comply with the HPAA Security Rule

    Sponsored by: Redspin, Inc.

    The HITECH Act has helped to not only increase productivity, but to streamline data exchange. While this increased efficiency, there are also many requirements that must be met in order ensure that these exchanges are HIPAA compliant. In this e-guide, learn how a well implemented security program can secure patient medical records.

  • Upgrading Wireless Networks in the Hospital

    Sponsored by: TechTarget Health IT

    In the next few years, hospitals will be rolling out all kinds of technology to improve patient care. Each of these devices and systems must be able to send and receive information instantly.

  • E-Guide: Disaster Recovery Planning for Health care Providers

    Sponsored by: Dell Compellent

    For hospitals, timely access to patient data is critical for maintaining normal operations during a natural or man-made disaster. This e-guide will help health care providers create and implement effective disaster recovery and business continuity plans -- complete with advice from providers who had to put those plans into action.

  • A Decision Maker's Guide to Log Management

    Sponsored by: HP Enterprise Security

    Often undervalued as a strategic weapon, log management tools can play a vital role in securing mission-critical data and assuring accountability. Inside this expert resource, learn what factors to consider when it’s time to get a handle on your logs.

  • Presentation Download: Data Protection Strategies: Data Encryption

    Sponsored by: CDW Healthcare

    If data is encrypted, health care providers are not subject to new, strict data breach notification laws. Server, storage and network encryption adds yet another layer of protection. So why do so many organizations avoid encryption? This presentation download will cover the basics of encryption and explain why its benefits outweigh its costs.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.