HIPAA Compliance White Papers

The Health Insurance Portability and Accountability Act (HIPAA) was enacted by the U.S. Congress in 1996. Title II of HIPAA, the Administrative Simplification (AS) provisions, requires the establishment of national standards for electronic health care transactions and national identifiers for providers, health insurance plans, and employers.
Results 1 - 25 of 79Sort Results By: Published Date | Title | Company Name
By: Agile IT     Published Date: Dec 03, 2013

Office 365 empowers businesses to increase productivity and lower costs. From providing all the business tools you need and are familiar with – to keeping you constantly up to date. Join Microsoft and Agile IT for a look inside Office 365 and see for yourself why Office 365 is the last upgrade you’ll need.

Tags : office 365, hipaa, finra, productivity, hipaa compliance, it spending, total cost of ownership, voice over ip
    
By: EVault Inc.     Published Date: Aug 22, 2012

How will you prepare your company for cloud adoption? Cloud services are especially attractive to midmarket companies hit with the high cost of meeting compliance requirements. Author and information security expert Felix Santos discusses: . Information security and data protection in the cloud . Recent cloud standards and audit initiatives . Evaluation criteria for selecting a cloud provider that offers trusted data assurance

Tags : evault, ebook, trusted, data, assurance, cloud, services, compliance
    
By: ForeScout     Published Date: Aug 14, 2012

Information security has undergone a sea change in the past 10 years. Compliance mandates in the form of industry standards and Federal rules like NERC, FFIEC, HIPAA/HITECH and PCI-DSS are the new norm. To stay in compliance, IT teams need to be able to keep up with updatesand changes to existing mandates while also being prepared for new ones. To maximize efficiency, manage risk and reduce potential violations due to compliance failure, organizations need to implement security tools whose features support multiple specifications within and across different compliance frameworks.

Tags : forescout, counteract, compliance, independent, assesment, network, access, control
    
By: Sybase PowerBuilder     Published Date: Jan 19, 2012

Sybase PowerBuilder has remained throughout the years a bastion of application development productivity for a wide class of enterprise applications that combine database access with a highly productive graphical user interface (GUI).

Tags : sybase, powerbuilder, data, development, applications, integrated development environments, ides, .net
    
By: CenturyLink     Published Date: Nov 18, 2011

Find out how your organization can protect business-critical functions, minimize downtime and mitigate risk.

Tags : centurylink, qwest, high speed internet, phone, mobile, tv services, offers, bundles
    
By: GFI Software     Published Date: Oct 06, 2011

Download a free 30-Day Trial of GFI FaxMaker - GFI FaxMaker makes sending and receiving faxes an efficient, simple and cost-effective process.

Tags : gfi fax maker, server, faxing, benefits, free trial, enterprise applications, hippa compliance, voip
    
By: WatchGuard Technologies     Published Date: Apr 20, 2011

Email encryption is fast becoming the must-have technology to achieve regulatory compliance, secure corporate assets, and protect privacy. Effective, affordable, and easy-to-use encryption was once unheard of. Now businesses can have it all.

Tags : watchguard xcs, securemail encryption, email encryption, ibe, data loss over e-mail, compliance, identity-based encryption, email security
    
By: SAP     Published Date: Feb 10, 2011

Learn how SAP Collaborative E-Care Management supports these objectives by enabling proactive collaboration between patient and care provider.

Tags : sap, collaboration, e-care management, ecare, healthcare, infrastructure, enterprise resource planning, hipaa compliance
    
By: Astaro     Published Date: Jan 19, 2011

Astaro now ensures that the network is running smoothly and the entire organization has become more productive through content filtering.

Tags : astaro, healthcare technology, associates for rehabilitation medicine, data management, data privacy, network security, content filtering, hipaa compliance
    
By: NetIQ     Published Date: Dec 23, 2010

The paper also provides an overview of the HITECH Act, which addresses the privacy and security concerns associated with the electronic transmission of health information, in part, through several provisions that strengthen the civil and criminal enforcement of the HIPAA rules.

Tags : netiq, security, hipaa compliance, protected data, compliance, internet security, data protection
    
By: SAP     Published Date: Aug 17, 2010

Most organizations find managing risk and compliance a challenge - but the rewards for doing so well can be considerable. By putting the right processes, systems and controls in place, you can gain visibility into decisions taken all across the enterprise - and protect both corporate performance and reputation.

Tags : sap, risk, regulation, grc, risk, compliance, governance, erm
    
By: Symantec Health     Published Date: Jul 13, 2010

This white paper from Symantec™ Health provides a guide for IT departments as they examine their current image archiving strategy and explore new options. It summarizes challenges, existing approaches, and the benefits of cloudbased archiving approaches.

Tags : symantec, health, healthcare, medical images, cloud, storage, pacs, infrastructures
    
By: ASG Software Solutions     Published Date: Apr 29, 2010

The key benefit of creating a case management methodology is to multiply its effectiveness by replicating it across the organization's patient-facing departments, practices and functions. In this way, your organization can reduce costs, increase quality and streamline its operations.

Tags : asg, case management, healthcare, physicians, p4p, hospital case management, case studies, case management bi
    
By: Proofpoint     Published Date: Apr 23, 2010

Email security and compliance issues related to HIPAA healthcare privacy regulations for 2012.

Tags : email security, intrusion detection, intrusion prevention, secure instant messaging, hipaa compliance, database security
    
By: SAP     Published Date: Dec 31, 2009

Many US companies find themselves acting like Wait-and-See, Inc. They interpret the switch from US Generally Accepted Accounting Principles (GAAP) to IFRS as a matter of compliance rather than an opportunity to become more globally competitive by improving key internal processes.

Tags : sap, business intelligence, sap businessobjects, explorer, gaap, ifrs, xbrl, business analytics
    
By: Trend Micro, Inc.     Published Date: Nov 25, 2009

The increasing adoption of electronic health records greatly complicates the tasks of security and privacy requirements. In this webcast, *Trend Micro* and *Beth Israel Deaconess Medical Center* discuss how to successfully navigate through the challenges associated with securing Web-based applications.

Tags : trend, trend micro, webcast, security, hitrust, web, privacy, ehrs
    
By: SAP     Published Date: Sep 10, 2009

To meet evolving regulatory mandates, companies around the world are adopting International Financial Reporting Standards (IFRS), a set of methodologies and disclosure requirements for the preparation and presentation of financial statements. Yet making the transition to IFRS is not just a rote accounting exercise.

Tags : sap, business objects, business intelligence, ifrs, financial reporting, cash flow, spend management, iasb
    
By: SAP     Published Date: Sep 02, 2009

Learn how solutions for large hospitals that provide intelligently aggregate and summarize clinical, operational, and financial data can offer CFOs faster, hospital-wide insight. When CFOs can immediately access information across existing systems, better decision making and financial outcomes result.

Tags : sap, cfo, hospital data, integration, cfo, aha, business intelligence, enterprise resource planning
    
By: IBM ILOG.     Published Date: Jul 14, 2009

This white paper explains how a business rule management system can make business process automation easier to understand, maintain and manage. Compare BRMS with other business automation schemes, like traditonal software coding or standard business rule engines. Learn how the Welsh Assembly Government and a United States commercial lender have implemented business rules to make a difference in their business processes.

Tags : ibm, bpm, business, business rule management, brms, hipaa, risk, operational cost
    
By: Tripwire     Published Date: Jun 30, 2009

Find out how a robust configuration audit and control system can enable electronic submissions and signatures, and validate electronic data, in compliance with the FDA's mandatory submission of clinical trials records.

Tags : tripwire, integrity, data, clinical, electronic, software, cfr11, trustworthiness
    
By: Tripwire     Published Date: Jun 30, 2009

Find out whether your health company's network systems are well enough to pass an internal security checkup, or are running the risk of a much more invasive examination by federal regulators and plaintiff's lawyers.

Tags : tripwire, hipaa, security, provision, network, health, company, system
    
By: Splunk Inc.     Published Date: Jun 02, 2009

Compliance is high on the IT agenda today, yet no one seems to have a clear picture of what it really involves. Inconsistent interpretation by different auditors, regulators and vendors means what worked in one year's audit could fail in the next. This whitepaper is designed to help Demystify Compliance as it relates to IT and give you some simple recipes for analyzing your own environment in the light of specific mandates.

Tags : compliance, splunk, it agenda, it security, regulations, proof-of-compliance, pci, hipaa
    
By: Trend Micro, Inc.     Published Date: Apr 29, 2009

Data breaches can carry very serious consequences, such as the revelation in February 2008 that that the Hannaford Brothers chain of supermarkets lost more than four million debit and credit card numbers to hackers. The bottom line is that organizations must implement Data Loss Prevention (DLP) systems to protect themselves against the growing array of threats they face from inadvertent and malicious data leaks from email, instant messaging and other systems.

Tags : trend micro, data breach, dlp, credit cards, breaches, data breaches, data loss prevention, dlp
    
By: Tripwire     Published Date: Mar 31, 2009

HIPAA requires businesses that handle personal health information (PHI) to set up strong controls to ensure the security and integrity of that information. Learn how Tripwire Enterprise helps meet the detailed technical requirements of HIPAA and delivers continuous compliance.

Tags : tripwire, hipaa, security standards, section 164, american recovery and reinvestment act, new electronic health record systems, protected health information, phi
    
By: Tripwire     Published Date: Mar 31, 2009

Learn the basics about security benchmarks, and specifically how the security benchmarks developed by the Center for Internet Security (CIS) can help you with your compliance initiatives.

Tags : center for internet security, cis, tripwire, compliance, internet security, cis-certified, framework, regulation
    
Start   Previous   1 2 3 4    Next    End

Related IT Whitepaper Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.