Health Insurance Portability and Accountability Act of 1996 Reports

Healthcare Reference Architecture – Mobile Access Solutions for Point-of-Care Applications
sponsored by Aerohive Networks
WHITE PAPER: In this white paper, discover a set of solutions that enable healthcare providers with reliable, high-performance mobile voice and data access to help improve point-of-care delivery.
Posted: 24 Mar 2014 | Published: 31 Dec 2012

Aerohive Networks

Get Smart About Cloud Storage and HIPAA
sponsored by TechTarget Health IT
EBOOK: This handbook examines cloud storage and backup technology in relation to HIPAA compliance. Learn how business associates and covered entities are preparing for HIPAA audits, how health systems use the cloud for backup storage purposes and DR efforts, and how moving healthcare data into the cloud has changed other aspects of providers' businesses.
Posted: 05 Oct 2016 | Published: 30 Sep 2016

TechTarget Health IT

Using EHRs to Achieve Meaningful Use
sponsored by TechTarget Health IT
EBOOK: As stage 2 implementation dates loom, providers and industry stakeholders are assessing how well they've integrated certified electronic health records, technology standards and meaningful use stage 1 requirements into healthcare delivery.
Posted: 17 Jun 2013 | Published: 17 Jun 2013

TechTarget Health IT

Disaster recovery planning for HIPAA compliance
sponsored by HP & Intel®
EGUIDE: The HIPAA Security Rule requires all HIPAA covered entities to create a plan for first protecting and then restoring confidential patient data in the event of a disaster. Unfortunately, HIPAA does not say much about what should go into such a disaster recovery plan. Inside this e-guide, find tips for a compliant disaster recovery plan.
Posted: 19 Sep 2011 | Published: 19 Sep 2011

HP & Intel®

HIPAA Compliance Statement
sponsored by TigerText, Inc.
WEBCAST: This white paper presents a simple, secure mobile platform that enables your healthcare facility with text messaging capabilities that remain in compliance with HIPAA.
Posted: 14 Apr 2014 | Premiered: Apr 14, 2014

TigerText, Inc.

The CIO’s Guide to HIPAA Compliant Text Messaging
sponsored by Imprivata
WHITE PAPER: This resource is a guide to ensuring secure texting policies while maintaining compliance with HIPAA and HITECH, and includes best practices and a vendor comparison checklist to use during product evaluation.
Posted: 10 Apr 2014 | Published: 31 Dec 2013

Imprivata

Economic & Productivity Impact of IT Security on Healthcare - Video
sponsored by Imprivata
WEBCAST: View this webcast to explore the results of a recent Ponemon Institute study that indicate a clear need for healthcare institutions to invest in modern communications technology to ensure efficient patient care, as well as compliance with the Health Insurance Portability and Accountability Act (HIPAA) regulations.
Posted: 08 Nov 2013 | Premiered: May 8, 2013

Imprivata

Optimize Data Management for Smarter Healthcare E-Book
sponsored by IBM
EBOOK: This e-book will examine the challenges healthcare organizations face today — and how data management techniques can help them deliver better care now and in the future.
Posted: 18 Mar 2011 | Published: 18 Mar 2011

IBM

Selecting the right EHR for the Life of your Practice and Your Patients
sponsored by HP & Intel®
WHITE PAPER: If we are at or approaching a technological tipping point in the history of healthcare, then it has never been more important for physician practices to select the right electronic health record (EHR) – and there are tangible reasons to believe so. This white paper discusses criteria for selecting the right EHR solution.
Posted: 01 Aug 2013 | Published: 16 Sep 2011

HP & Intel®

Buyer’s Guide to Antimalware
sponsored by Panda Security
EGUIDE: Companies face complicated buying decisions when it comes to buying host-based antimalware. Should you purchase a protection suite? What should you include in that all-in-one package? Read this guide for helpful information about purchasing antimalware products.
Posted: 30 Oct 2009 | Published: 27 Oct 2009

Panda Security