HIPAA Research
-
Health care Virtual Data Center Ezine: Server Virtualization Strategies for the Health IT Pro
Sponsored by: Stratus TechnologiesAs healthcare facilities increase their reliance on EHR systems, the need to virtualize servers becomes readily apparent. These facilities can reap the same benefits that enterprises in other industries enjoy, but there are some precautions that providers should take before they embark on a virtualization project. Read on to find out more.
-
Essential Guide to HIPAA Compliance and Data Protection Strategies
Sponsored by: TechTarget Health IT and TechTarget SecurityEffectively addressing the new HIPAA privacy and security rules introduced in the HITECH Act requires an assessment of your organization’s biggest vulnerabilities as well as the deployment of the right technology to reduce the risk of data loss. Inside this expert resource, gain insight on current healthcare security topics.
-
Protect sensitive data with multiple layers of loss protection
Sponsored by: CDW HealthcareAn array of threats — from internal and external breaches to lost or stolen equipment, viruses, hackers and more — put hospital networks and patient data at risk. Learn about a comprehensive data security approach that offers improved methods for discovering, monitoring and protecting sensitive information.
-
Planning for virtualized disaster recovery in a health care setting
Sponsored by: Dell CompellentServer virtualization has proved to be an advantageous in disaster recovery situations because if physical servers have been destroyed, it’s easy to restore backups to virtual hardware. Learn how healthcare facilities can benefit from adding server virtualization to disaster recovery plans, while maintaining compliance.
-
Protecting and simplifying access to Electronic Health Records
Sponsored by: DigitalPersona, IncStudies show that 85% of healthcare facilities experienced data breaches in the past two years, at an average cost of up to $2 million each. In order to prevent such losses, many hospitals are deploying advanced security systems. In this whitepaper, find a security checklist that provides strategies every healthcare facility should be aware of.
-
Getting the PACS archive and EHR systems to talk to each other
Sponsored by: CienaComplying with the HITECH Act involves the exchange of data -- such as medical images -- across interoperable systems. Unfortunately, opening up proprietary images enterprise-wide to patients and their physicians can be complex. Inside this expert e-guide, learn how to plan ahead for this process with preparation and testing strategies.
-
The Complete Guide to Log and Event Management
Sponsored by: Novell, Inc.This white paper will provide you with the information you need to purchase an Event and Log Management soutions. This paper outlines both the upside and downside to using both these services sepearte and together.
-
How Will the Transition to ICD-10 codes affect Health IT?
Sponsored by: Virtusa CorporationAs of Oct. 1, 2015, U.S. health care providers must use ICD-10 codes when they submit medical claims. This FAQ e-guide addresses what the transition means, advantages of using ICD-10, as well as best practices on how providers can prepare and succeed in an ICD 10 conversion.
-
Optimize Data Management for Smarter Healthcare E-Book
Sponsored by: IBMThis e-book will examine the challenges healthcare organizations face today — and how data management techniques can help them deliver better care now and in the future.
-
E-Guide: Planning for virtualized disaster recovery in a health care setting
Sponsored by: BridgeHead SoftwareMany enterprises have embraced virtualized disaster recovery because it restores functions with minimal hardware. Health care orgs can do this too, if they keep HIPAA in mind. Check out this e-guide for more information about planning your virtualized disaster recovery in a health care setting.
-
E-Guide: FAQ: What is Health Data Archiving?
Sponsored by: BridgeHead SoftwareRead this E-guide to learn more about the regulations involved in storing health data, how a SAN can improve data archiving and how to weigh the pro's and con's to achieve the most efficient data archiving strategy for your organization.
-
Information Security Magazine – December 2010: Understanding the Data Accountability and Trust Act
Sponsored by: Information Security MagazineThis month’s issue of Information Security magazine takes you deep inside the Data Accountability And Trust Act (DATA), pending legislation that could reshape the national privacy landscape and impact the way enterprises and midmarket companies architect their security operations.
-
E-Guide A Decision Maker’s Guide to Log Management
Sponsored by: ArcSight, an HP CompanyWhile often underappreciated by IT professionals, logs are an extremely useful source of data for IT shops. Often undervalued as a strategic weapon, log management tools can play a vital role in securing mission-critical data and assuring accountability. Learn what to consider when it’s time to get a handle on your logs.
-
E-Book: Encryption - What, Where and How
Sponsored by: TechTarget Health ITThis e-book, brought to you by SearchHealthIT.com, discusses key issues health care IT pros are facing now, including: HIPAA, the HITECH Act and the new frontier for encryption, network and server encryption, using thin clients to keep data secure, and much more!
-
KineticD Security
Sponsored by: KineticDThe purpose of this white paper is to demonstrate how KineticD meets and exceeds its clients' demands and expectations for the security of its online backup SaaS offering.
-
E-Guide: Information Security Essential Guide to Compliance
Sponsored by: Information Security MagazineCompliance with government regulations and industry standards shapes the formation of most information security programs. There’s no way around it; your organization must comply. This essential guide will help you sort out and prioritize your compliance responsibilities.
-
Improving Clinician Workflows with One-Touch Desktop Roaming
Sponsored by: ImprivataThe move from paper-based medical records systems to EMR is rightly viewed as a step toward improved patient care, increased clinician productivity, and lower costs. But striking a balance between access for clinicians and privacy for patients can be a difficult task. This paper presents a one-touch desktop roaming solution that benefits both.
-
IT Decision Checklist: Antimalware
Sponsored by: ESETCompanies face complicated buying decisions when it comes to buying host-based antimalware, starting with whether to purchase a protection suite, and what to include in that all-in-one package. Read this paper to find out more.
-
E-Book: Optimizing BI and Analytics in Healthcare
Sponsored by: Tableau SoftwareBI and analytics tools can provide healthcare organizations with valuable insights for assessing and improving patient care and better controlling costs. This E-Book provides an overview of the BI and analytics issues facing healthcare organizations, as well as advice on how to best utilize the available technologies in healthcare.
-
E-Book: New Rules for HIPAA
Sponsored by: TechTarget SecurityOrganizations that had to comply with HIPAA were frustrated by the lack of enforcement and specifics. The HITECH Act is changing all of that. Read this e-book to learn how the HIPAA is getting new teeth, new ways the FTC is getting involved, and more.
-
E-Book: DLP for Health Care - Strategies for Securing Electronic Health Information in the Age of HITECH
Sponsored by: TechTarget Health ITData loss prevention (DLP) in health care—which mostly entails preventing patients’ protected health information (PHI) from falling into the wrong hands—requires well-conceived, well-enforced policies and the technology to back them up.
-
E-Book: Compliance in the EU, U.S.A.-- Learn What U.S. Companies Need to Know About European Union Compliance and Vice Versa
Sponsored by: TechTarget SecurityRead this e-book to learn about compliance differences in the U.S.A. and the EU, and differences between global business continuity standards.
-
Buyer’s Guide to Antimalware
Sponsored by: Panda SecurityCompanies face complicated buying decisions when it comes to buying host-based antimalware. Should you purchase a protection suite? What should you include in that all-in-one package? Read this guide for helpful information about purchasing antimalware products.
-
Achieving HIPAA Compliance with Red Hat Enterprise Virtualization for Desktops
Sponsored by: Red Hat and JBossThis paper will illustrate how Red Hat Enterprise Virtualization for Desktops can help organizations comply with specific HIPAA mandates, while at the same time increasing their overall efficiency and agility.
-
Protecting Healthcare Organizations from Patient Data Loss
Sponsored by: Code Green Networks, Inc.Negative publicity from a data breach can have lasting consequences, undermining patient confidence and damaging an organization's reputation. This paper covers potential data breaches within healthcare organizations and strategies for preventing them. Read on to learn more about the steps you can take to protect patients' sensitive information.