ComputerWeekly.com Research Library

Powered by Bitpipe.com

HIPAA Research

  • Health care Virtual Data Center Ezine: Server Virtualization Strategies for the Health IT Pro

    Sponsored by: Stratus Technologies

    As healthcare facilities increase their reliance on EHR systems, the need to virtualize servers becomes readily apparent. These facilities can reap the same benefits that enterprises in other industries enjoy, but there are some precautions that providers should take before they embark on a virtualization project. Read on to find out more.

  • Essential Guide to HIPAA Compliance and Data Protection Strategies

    Sponsored by: TechTarget Health IT and TechTarget Security

    Effectively addressing the new HIPAA privacy and security rules introduced in the HITECH Act requires an assessment of your organization’s biggest vulnerabilities as well as the deployment of the right technology to reduce the risk of data loss. Inside this expert resource, gain insight on current healthcare security topics.

  • Protect sensitive data with multiple layers of loss protection

    Sponsored by: CDW Healthcare

    An array of threats — from internal and external breaches to lost or stolen equipment, viruses, hackers and more — put hospital networks and patient data at risk. Learn about a comprehensive data security approach that offers improved methods for discovering, monitoring and protecting sensitive information.

  • Planning for virtualized disaster recovery in a health care setting

    Sponsored by: Dell Compellent

    Server virtualization has proved to be an advantageous in disaster recovery situations because if physical servers have been destroyed, it’s easy to restore backups to virtual hardware. Learn how healthcare facilities can benefit from adding server virtualization to disaster recovery plans, while maintaining compliance.

  • Protecting and simplifying access to Electronic Health Records

    Sponsored by: DigitalPersona, Inc

    Studies show that 85% of healthcare facilities experienced data breaches in the past two years, at an average cost of up to $2 million each. In order to prevent such losses, many hospitals are deploying advanced security systems. In this whitepaper, find a security checklist that provides strategies every healthcare facility should be aware of.

  • Getting the PACS archive and EHR systems to talk to each other

    Sponsored by: Ciena

    Complying with the HITECH Act involves the exchange of data -- such as medical images -- across interoperable systems. Unfortunately, opening up proprietary images enterprise-wide to patients and their physicians can be complex. Inside this expert e-guide, learn how to plan ahead for this process with preparation and testing strategies.

  • The Complete Guide to Log and Event Management

    Sponsored by: Novell, Inc.

    This white paper will provide you with the information you need to purchase an Event and Log Management soutions. This paper outlines both the upside and downside to using both these services sepearte and together.

  • How Will the Transition to ICD-10 codes affect Health IT?

    Sponsored by: Virtusa Corporation

    As of Oct. 1, 2015, U.S. health care providers must use ICD-10 codes when they submit medical claims. This FAQ e-guide addresses what the transition means, advantages of using ICD-10, as well as best practices on how providers can prepare and succeed in an ICD 10 conversion.

  • Optimize Data Management for Smarter Healthcare E-Book

    Sponsored by: IBM

    This e-book will examine the challenges healthcare organizations face today — and how data management techniques can help them deliver better care now and in the future.

  • E-Guide: Planning for virtualized disaster recovery in a health care setting

    Sponsored by: BridgeHead Software

    Many enterprises have embraced virtualized disaster recovery because it restores functions with minimal hardware. Health care orgs can do this too, if they keep HIPAA in mind. Check out this e-guide for more information about planning your virtualized disaster recovery in a health care setting.

  • E-Guide: FAQ: What is Health Data Archiving?

    Sponsored by: BridgeHead Software

    Read this E-guide to learn more about the regulations involved in storing health data, how a SAN can improve data archiving and how to weigh the pro's and con's to achieve the most efficient data archiving strategy for your organization.

  • Information Security Magazine – December 2010: Understanding the Data Accountability and Trust Act

    Sponsored by: Information Security Magazine

    This month’s issue of Information Security magazine takes you deep inside the Data Accountability And Trust Act (DATA), pending legislation that could reshape the national privacy landscape and impact the way enterprises and midmarket companies architect their security operations.

  • E-Guide A Decision Maker’s Guide to Log Management

    Sponsored by: ArcSight, an HP Company

    While often underappreciated by IT professionals, logs are an extremely useful source of data for IT shops. Often undervalued as a strategic weapon, log management tools can play a vital role in securing mission-critical data and assuring accountability. Learn what to consider when it’s time to get a handle on your logs.

  • E-Book: Encryption - What, Where and How

    Sponsored by: TechTarget Health IT

    This e-book, brought to you by SearchHealthIT.com, discusses key issues health care IT pros are facing now, including: HIPAA, the HITECH Act and the new frontier for encryption, network and server encryption, using thin clients to keep data secure, and much more!

  • KineticD Security

    Sponsored by: KineticD

    The purpose of this white paper is to demonstrate how KineticD meets and exceeds its clients' demands and expectations for the security of its online backup SaaS offering.

  • E-Guide: Information Security Essential Guide to Compliance

    Sponsored by: Information Security Magazine

    Compliance with government regulations and industry standards shapes the formation of most information security programs. There’s no way around it; your organization must comply. This essential guide will help you sort out and prioritize your compliance responsibilities.

  • Improving Clinician Workflows with One-Touch Desktop Roaming

    Sponsored by: Imprivata

    The move from paper-based medical records systems to EMR is rightly viewed as a step toward improved patient care, increased clinician productivity, and lower costs. But striking a balance between access for clinicians and privacy for patients can be a difficult task. This paper presents a one-touch desktop roaming solution that benefits both.

  • IT Decision Checklist: Antimalware

    Sponsored by: ESET

    Companies face complicated buying decisions when it comes to buying host-based antimalware, starting with whether to purchase a protection suite, and what to include in that all-in-one package. Read this paper to find out more.

  • E-Book: Optimizing BI and Analytics in Healthcare

    Sponsored by: Tableau Software

    BI and analytics tools can provide healthcare organizations with valuable insights for assessing and improving patient care and better controlling costs. This E-Book provides an overview of the BI and analytics issues facing healthcare organizations, as well as advice on how to best utilize the available technologies in healthcare.

  • E-Book: New Rules for HIPAA

    Sponsored by: TechTarget Security

    Organizations that had to comply with HIPAA were frustrated by the lack of enforcement and specifics. The HITECH Act is changing all of that. Read this e-book to learn how the HIPAA is getting new teeth, new ways the FTC is getting involved, and more.

  • E-Book: DLP for Health Care - Strategies for Securing Electronic Health Information in the Age of HITECH

    Sponsored by: TechTarget Health IT

    Data loss prevention (DLP) in health care—which mostly entails preventing patients’ protected health information (PHI) from falling into the wrong hands—requires well-conceived, well-enforced policies and the technology to back them up.

  • E-Book: Compliance in the EU, U.S.A.-- Learn What U.S. Companies Need to Know About European Union Compliance and Vice Versa

    Sponsored by: TechTarget Security

    Read this e-book to learn about compliance differences in the U.S.A. and the EU, and differences between global business continuity standards.

  • Buyer’s Guide to Antimalware

    Sponsored by: Panda Security

    Companies face complicated buying decisions when it comes to buying host-based antimalware. Should you purchase a protection suite? What should you include in that all-in-one package? Read this guide for helpful information about purchasing antimalware products.

  • Achieving HIPAA Compliance with Red Hat Enterprise Virtualization for Desktops

    Sponsored by: Red Hat and JBoss

    This paper will illustrate how Red Hat Enterprise Virtualization for Desktops can help organizations comply with specific HIPAA mandates, while at the same time increasing their overall efficiency and agility.

  • Protecting Healthcare Organizations from Patient Data Loss

    Sponsored by: Code Green Networks, Inc.

    Negative publicity from a data breach can have lasting consequences, undermining patient confidence and damaging an organization's reputation. This paper covers potential data breaches within healthcare organizations and strategies for preventing them. Read on to learn more about the steps you can take to protect patients' sensitive information.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.