HIPAA Compliance Research
-
Strategies for Writing a HIPAA-friendly BYOD Policy
Sponsored by: HP & Intel®This e-guide from SearchHealthIT.com provides expert advice for modeling a HIPAA-friendly BYOD policy. Read now for expert tips and advice on how you can manage consumer devices in your hospital.
-
How to Comply with the HIPAA Security Rule
Sponsored by: Thawte Inc.In this expert guide from SearchHealthIT.com, find out how to comply appropriately with the HIPAA compliance regulations to ensure that your organization doesn't run into unexpected and unneeded complications.
-
Using EHRs to Achieve Meaningful Use
Sponsored by: TechTarget Health ITAs stage 2 implementation dates loom, providers and industry stakeholders are assessing how well they've integrated certified electronic health records, technology standards and meaningful use stage 1 requirements into healthcare delivery.
-
Healthcare Networking Classroom
Sponsored by: TechTarget Health ITBuilding wireless networks for use in the healthcare field can be challenging, especially in light of HIPAA privacy and security concerns. In these classroom lessons, learn how to overcome the challenges of building these networks, and hear from one hospital that has focused on making mobile technology integration part of its long-term strategy.
-
PowerBroker Password Safe: Security, Compliance, Productivity
Sponsored by: BeyondTrust CorporationUncover how PowerBroker Password Safe can help you secure access to privileged accounts, effectively preventing intentional or accidental harm and malicious activity that can be devastating to your business.
-
Tips for Thin Provisioning Storage in a Health Care Setting
Sponsored by: HP & Intel®This E-Guide offers expert insight into how today's health care facilities can use thin provisioning to address the ever-present problem of storage underutilization, eliminating the need for additional storage purchases. Additionally, discover essential tips for implementing thin provisioning in you health care facility.
-
Tips for Creating a HIPAA-Friendly BYOD Policy
Sponsored by: HP & Intel®This e-guide from SearchHealthIT.com provides expert advice for modeling a HIPAA-friendly BYOD policy. Read now for expert tips and advice on how you can manage consumer devices in your hospital.
-
HIPAA Compliance Takes Patient, Employee and Vendor Followup
Sponsored by: HP & Intel®This e-guide highlights ways health care providers improve their mobile device security in the wake of BYOD initiatives. Inside, learn how you can embrace the consumerization of IT while ensuring your facility remains compliant with HIPAA regulations.
-
HealthIT Exclusive Sponsor DataCenter eZine: Server Virtualization
Sponsored by: HP & Intel®This expert e-zine examines four key topics for health care organizations planning to venture into a virtual server implementation – namely security, storage, performance, and hardware considerations. Gain expert advice from industry experts and HIT leaders that have been through the process
-
Mercy Health System Speeds Access to EpicCare and Increases Clinician Satisfaction
Sponsored by: ImprivataThis webcast demonstrates how one hospital was able to benefit from single sign-on technology that helped foster physician satisfaction while meeting HIPAA compliance regulations.
-
Channel executives see need to bolster hospital IT security
Sponsored by: Hewlett Packard EnterpriseRegardless of the size of the institution, hospitals need a sufficient IT security system in place. This E-guide explores why channel professionals and VARs should not only understand hospital vulnerabilities but also be able to convince customers that risk mitigation is worth the price.
-
Comparing health care data security compliance to other industries
Sponsored by: Hewlett Packard EnterpriseThis e-guide discusses the challenges health care companies run into meeting state and federal data security compliance regulations and how health care organizations compare to other industries such as financial services.
-
eBook: Trends in Healthcare Data Protection
Sponsored by: LANDesk SoftwareThis E-Book explores how encryption technologies can help protect health care data, ensuring the avoidance of costly non-compliance penalties.
-
eGuide: Tips for Thin Provisioning Storage in a Health Care Setting
Sponsored by: Hitachi VantaraThis E-Guide offers expert insight into how today's health care facilities can use thin provisioning to address the ever-present problem of storage underutilization, eliminating the need for additional storage purchases. Additionally, discover essential tips for implementing thin provisioning in you health care facility.
-
Deploying desktop virtualization technology in a health care setting
Sponsored by: Accelera SolutionsThis E-Guide addresses the most important considerations for health care organizations that are planning - or are in the midst of - virtual desktop implementation.
-
E-Guide: Health care, cloud storage providers and data ownership
Sponsored by: IntelThis E-Guide discusses the HIPAA requirements around patient’s access to his or her records as well as issues surrounding data ownership when health care data is stored in the cloud.
-
Meeting HIPAA Disaster Recovery Requirements
Sponsored by: HPE and Intel®Failure to have a disaster recovery plan (DRP) in place, could result in catastrophe for your health care organization.This E-Guide explores best practices and expert tips for implementing a DRP, ensuring HIPAA compliance and peace of mind.
-
E-Guide: How Virtual Implementation Addresses Healthcare Regulations
Sponsored by: Pano Logic, IncAccess this expert resource to learn how desktop virtualization can help health care organizations to bolster Health Insurance Portability and Accountability Act (HIPAA) compliance and implement electronic health record (EHR) systems.
-
E-guide: WAN optimization improvesthroughput for medical images
Sponsored by: BeldenIn this day and age, hospitals are growing increasingly more dependent on wide area networks (WAN) to adequately share information without increasing costs though additional bandwidth or data circuits. In this e-guide you will learn how one organization successfully implemented a WAN and how it can work for your organization too.
-
GOING PAPERLESS: BEST PRACTICES TO ACCELERATE YOUR EMR TRANSITION
Sponsored by: Iron MountainThe health care industry is beginning to fully embrace EHR as the foundation for sharing information and delivering quality patient care. The benefits of an electronic environment are clearly recognized, but the transition from paper to pixel is difficult and requires a new strategy. Read on to learn how to simplify the transition to EHR.
-
How to Comply with the HPAA Security Rule
Sponsored by: Redspin, Inc.The HITECH Act has helped to not only increase productivity, but to streamline data exchange. While this increased efficiency, there are also many requirements that must be met in order ensure that these exchanges are HIPAA compliant. In this e-guide, learn how a well implemented security program can secure patient medical records.
-
Upgrading Wireless Networks in the Hospital
Sponsored by: TechTarget Health ITIn the next few years, hospitals will be rolling out all kinds of technology to improve patient care. Each of these devices and systems must be able to send and receive information instantly.
-
E-Guide: Disaster Recovery Planning for Health care Providers
Sponsored by: Dell CompellentFor hospitals, timely access to patient data is critical for maintaining normal operations during a natural or man-made disaster. This e-guide will help health care providers create and implement effective disaster recovery and business continuity plans -- complete with advice from providers who had to put those plans into action.
-
A Decision Maker's Guide to Log Management
Sponsored by: HP Enterprise SecurityOften undervalued as a strategic weapon, log management tools can play a vital role in securing mission-critical data and assuring accountability. Inside this expert resource, learn what factors to consider when it’s time to get a handle on your logs.
-
Presentation Download: Data Protection Strategies: Data Encryption
Sponsored by: CDW HealthcareIf data is encrypted, health care providers are not subject to new, strict data breach notification laws. Server, storage and network encryption adds yet another layer of protection. So why do so many organizations avoid encryption? This presentation download will cover the basics of encryption and explain why its benefits outweigh its costs.