Health Insurance Portability and Accountability Act of 1996 Reports

E-Guide: Health care, cloud storage providers and data ownership
sponsored by Intel
EGUIDE: This E-Guide discusses the HIPAA requirements around patient’s access to his or her records as well as issues surrounding data ownership when health care data is stored in the cloud.
Posted: 17 Feb 2012 | Published: 17 Feb 2012

Intel

Getting the PACS archive and EHR systems to talk to each other
sponsored by Ciena
EGUIDE: Complying with the HITECH Act involves the exchange of data -- such as medical images -- across interoperable systems. Unfortunately, opening up proprietary images enterprise-wide to patients and their physicians can be complex. Inside this expert e-guide, learn how to plan ahead for this process with preparation and testing strategies.
Posted: 10 Jun 2011 | Published: 10 Jun 2011

Ciena

Economic & Productivity Impact of IT Security on Healthcare - Video
sponsored by Imprivata
WEBCAST: View this webcast to explore the results of a recent Ponemon Institute study that indicate a clear need for healthcare institutions to invest in modern communications technology to ensure efficient patient care, as well as compliance with the Health Insurance Portability and Accountability Act (HIPAA) regulations.
Posted: 08 Nov 2013 | Premiered: May 8, 2013

Imprivata

Get Smart About Cloud Storage and HIPAA
sponsored by TechTarget Health IT
EBOOK: HIPAA-compliant cloud storage and backup require healthcare organizations to conduct risk assessments of the potential uses of cloud technology.
Posted: 30 Sep 2016 | Published: 30 Sep 2016

TechTarget Health IT

Using EHRs to Achieve Meaningful Use
sponsored by TechTarget Health IT
EBOOK: As stage 2 implementation dates loom, providers and industry stakeholders are assessing how well they've integrated certified electronic health records, technology standards and meaningful use stage 1 requirements into healthcare delivery.
Posted: 17 Jun 2013 | Published: 17 Jun 2013

TechTarget Health IT

How Healthcare Organizations are Tackling IoT Device Management
sponsored by Cisco Umbrella
EGUIDE: Connected medical devices are becoming more widespread in healthcare, but security and management options are limited for IT teams. This e-guide will teach you how to devise a plan to secure each device from surface attacks and cyberthreats. Plus, see how several vendors are tackling this problem and offering tools to keep patient data safe.
Posted: 16 Sep 2016 | Published: 14 Sep 2016

Cisco Umbrella

Protecting Healthcare Organizations from Patient Data Loss
sponsored by Code Green Networks, Inc.
WHITE PAPER: Negative publicity from a data breach can have lasting consequences, undermining patient confidence and damaging an organization's reputation. This paper covers potential data breaches within healthcare organizations and strategies for preventing them. Read on to learn more about the steps you can take to protect patients' sensitive information.
Posted: 08 Sep 2009 | Published: 08 Sep 2009

Code Green Networks, Inc.

Safeguard Your Hospital Against Ransomware to Protect Data, Patient Security
sponsored by Optum
EGUIDE: In this e-guide, CIOs Keith Jennings and Andrew Rosenberg, M.D. share tips on what your organization can do right now to prevent a crippling ransomware attack. They explain new technologies, techniques and past experiences to help improve your healthcare organization's security posture.
Posted: 02 Aug 2016 | Published: 01 Aug 2016

Optum

Personally Identifiable Information (PII) and Personal Health Information (PHI)
sponsored by Voltage Security, Inc.
WHITE PAPER: This white paper features an encrypted email solution that eliminates the need for paper-driven information sharing processes, and ensures secure, compliant transfers.
Posted: 16 Jun 2014 | Published: 16 Jun 2014

Voltage Security, Inc.

E-Guide: Information Security Essential Guide to Compliance
sponsored by Information Security Magazine
ESSENTIAL GUIDE: Compliance with government regulations and industry standards shapes the formation of most information security programs. There’s no way around it; your organization must comply. This essential guide will help you sort out and prioritize your compliance responsibilities.
Posted: 06 Jul 2010 | Published: 06 Jul 2010

Information Security Magazine