ComputerWeekly.com Research Library

Powered by Bitpipe.com

HIPAA Compliance Research

  • Virtual Data Center: Health Care IT Edition, Sept. 2011

    Sponsored by: SearchDataCenter.com

    Cloud computing holds a lot of promise for the healthcare industry, since infrastructure costs can hinder the adoption of EHR systems. However, many providers shy away from cloud services because of security concerns. Inside this e-zine, gain insight on how to utilize the cloud while still ensuring patient data security and HIPAA compliance.

  • Meeting HIPAA Disaster Recovery Requirements

    Sponsored by: HPE and Intel®

    Failure to have a disaster recovery plan (DRP) in place, could result in catastrophe for your health care organization.This E-Guide explores best practices and expert tips for implementing a DRP, ensuring HIPAA compliance and peace of mind.

  • E-Guide: How Virtual Implementation Addresses Healthcare Regulations

    Sponsored by: Pano Logic, Inc

    Access this expert resource to learn how desktop virtualization can help health care organizations to bolster Health Insurance Portability and Accountability Act (HIPAA) compliance and implement electronic health record (EHR) systems.

  • E-guide: WAN optimization improvesthroughput for medical images

    Sponsored by: Belden

    In this day and age, hospitals are growing increasingly more dependent on wide area networks (WAN) to adequately share information without increasing costs though additional bandwidth or data circuits.  In this e-guide you will learn how one organization successfully implemented a WAN and how it can work for your organization too.

  • GOING PAPERLESS: BEST PRACTICES TO ACCELERATE YOUR EMR TRANSITION

    Sponsored by: Iron Mountain

    The health care industry is beginning to fully embrace EHR as the foundation for sharing information and delivering quality patient care. The benefits of an electronic  environment are clearly recognized, but the transition from paper to pixel is difficult and requires a new strategy. Read on to learn how to simplify the transition to EHR.

  • How to Comply with the HPAA Security Rule

    Sponsored by: Redspin, Inc.

    The HITECH Act has helped to not only increase productivity, but to streamline data exchange. While this increased efficiency, there are also many requirements that must be met in order ensure that these exchanges are HIPAA compliant. In this e-guide, learn how a well implemented security program can secure patient medical records.

  • Upgrading Wireless Networks in the Hospital

    Sponsored by: SearchHealthIT.com

    In the next few years, hospitals will be rolling out all kinds of technology to improve patient care. Each of these devices and systems must be able to send and receive information instantly.

  • E-Guide: Disaster Recovery Planning for Health care Providers

    Sponsored by: Dell Compellent

    For hospitals, timely access to patient data is critical for maintaining normal operations during a natural or man-made disaster. This e-guide will help health care providers create and implement effective disaster recovery and business continuity plans -- complete with advice from providers who had to put those plans into action.

  • A Decision Maker's Guide to Log Management

    Sponsored by: HP Enterprise Security

    Often undervalued as a strategic weapon, log management tools can play a vital role in securing mission-critical data and assuring accountability. Inside this expert resource, learn what factors to consider when it’s time to get a handle on your logs.

  • Presentation Download: Data Protection Strategies: Data Encryption

    Sponsored by: CDW Healthcare

    If data is encrypted, health care providers are not subject to new, strict data breach notification laws. Server, storage and network encryption adds yet another layer of protection. So why do so many organizations avoid encryption? This presentation download will cover the basics of encryption and explain why its benefits outweigh its costs.

  • Eguide: Avoiding a patient data breach – and how to handle one if it does occur

    Sponsored by: CDW Healthcare

    In order to maintain patient privacy while complying with HIPAA standards, medical records must be tightly protected and there must be a solid backup plan in place in the case of a data breach. In this e-guide, learn how to prevent data breaches as well as what to do should a safety breach occur.

  • Eguide: Addressing HIPAA privacy compliance on hospital wireless network

    Sponsored by: CDW Healthcare

    Health care CIOs are caught between a rock and a hard place. On one hand, demanding patients and increasing numbers of wireless medical devices are requiring they open up their wireless networks. On the other, tighter rules for HIPAA compliance are forcing them to lock networks down. Find out how your peers are coping with this challenge.

  • E-Guide: Using a virtualized server environment to address HIPAA compliance

    Sponsored by: Dell Compellent

    In an ever-digitized storage environment, there can be an array of threats posed to patient medical records. Amidst all of these concerns, how can you be sure which virtual server environment is right for you? In this exclusive e-guide, learn how one company successfully took the leap to a virtualized server environment.

  • Disaster recovery planning for HIPAA compliance

    Sponsored by: HP & Intel®

    The HIPAA Security Rule requires all HIPAA covered entities to create a plan for first protecting and then restoring confidential patient data in the event of a disaster. Unfortunately, HIPAA does not say much about what should go into such a disaster recovery plan. Inside this e-guide, find tips for a compliant disaster recovery plan.

  • HIPAA Primer Best Practices

    Sponsored by: Iron Mountain

    Healthcare facilities are rapidly adopting electronic health records (EHR) in order to meet regulatory compliance requirements. Central to this effort is document conversion — the scanning of new and existing records to digital format. Inside this white paper, uncover best practices for a HIPAA-compliant approach to EHR transition.

  • FAQ Guide: Regulatory Compliance Issues Drive Some IT Shops to Data Archive Appliances

    Sponsored by: IBM

    Check out this SearchStorage.com FAQ guide to learn about the latest developments and the evolution of data archiving technology, the key characteristics of different appliances and more.

  • Storage Virtualization Strategies for Health Care

    Sponsored by: SearchHealthIT.com und SearchStorage.com

    Using EHRs means that terabytes of patient records must be stored for decades at a time. Doing this without breaking the bank means deciding which storage approach is right for your healthcare facility. Inside this exclusive e-zine, learn about a variety of storage strategies, including tiered storage, thin provisioning and data replication.

  • Advantages of virtual desktop in a healthcare environment

    Sponsored by: DellEMC and Intel®

    Many healthcare facilities in the midst of EHR deployment are facing the same question: What is the most effective solution to upgrading all existing desktops in an environment? This e-guide presents desktop virtualization as the answer to this question and discusses benefits including flexibility and data security for HIPAA compliance.

  • Healthcare IT Channel E-Book: Ride the Health Care IT Modernization Wave: How To Enter the Health Care Technology Market or Grow Your Existing Healthcare IT Business

    Sponsored by: Stratus Technologies

    More than 75% of hospitals view electronic health records (EHRs) as the primary driver of IT spending and almost as many believe that EHR implementations will transform their IT environments. Inside this expert e-book, learn how healthcare facilities are preparing for network, storage and security changes in order to accommodate EHR implementation.

  • IT in the Electronic Hospital

    Sponsored by: SearchHealthIT.com

    The federal government’s push for electronic healthcare records has made compliance and data security even more pressing. This e-guide offers a look at where healthcare IT leaders should begin, and what they should watch out for as they move to embrace the HITECH Act, HIPAA and other initiatives.

  • Essential Guide to HIPAA Compliance and Data Protection Strategies

    Sponsored by: SearchHealthIT.com and SearchSecurity.com

    Effectively addressing the new HIPAA privacy and security rules introduced in the HITECH Act requires an assessment of your organization’s biggest vulnerabilities as well as the deployment of the right technology to reduce the risk of data loss. Inside this expert resource, gain insight on current healthcare security topics.

  • Getting the PACS archive and EHR systems to talk to each other

    Sponsored by: Ciena

    Complying with the HITECH Act involves the exchange of data -- such as medical images -- across interoperable systems. Unfortunately, opening up proprietary images enterprise-wide to patients and their physicians can be complex. Inside this expert e-guide, learn how to plan ahead for this process with preparation and testing strategies.

  • IBM InfoSphere Guardium Data Redaction

    Sponsored by: IBM

    InfoSphere Guardium is a key part of the IBM InfoSphere portfolio. IBM InfoSphere software is an integrated platformfor defining, integrating, protecting and managing trusted information across your systems.

  • How Will the Transition to ICD-10 codes affect Health IT?

    Sponsored by: Virtusa Corporation

    As of Oct. 1, 2015, U.S. health care providers must use ICD-10 codes when they submit medical claims. This FAQ e-guide addresses what the transition means, advantages of using ICD-10, as well as best practices on how providers can prepare and succeed in an ICD 10 conversion.

  • Data Breaches: A Growing Problem for the Healthcare Community

    Sponsored by: Wave Systems Corp.

    While the pros of Electronic Medical Records (EMR) and online Healthcare Portals greatly outweigh the cons, their introduction comes at a price — an increased risk of both accidental and intentional data loss.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.