Health IT and Electronic Health Activate your FREE membership today |  Log-in

Community Blog:

HIPAA


September 27, 2011  11:30 AM

Key attributes of solid contracts and SLAs for cloud hosting in health care



Posted by: Jenny Laurello
Chris Witt, Cloud, Cloud computing, Contracting, Data storage, HIPAA, Service Level Agreement (SLA), SLA

By Chris Witt, President and Co-Founder, WAKE TSI In my earlier entries, we discussed the pros and cons of using public cloud...

July 21, 2011  11:46 AM

The health care cloud: Data security opening up mobile possibilities



Posted by: Jenny Laurello
Cloud, Cloud computing, data privacy and security, HIPAA, mHealth, mobile health

Guest post by: Kevin Dodson, Appirio’s Mobile Practice Generally speaking, doctors have a phobia of moving health care data to places that they can't physically see or touch. A majority of medical information is still housed in local servers and paper folders or dusty...


June 8, 2011  1:07 PM

Views from the top: On health information exchange and RECs



Posted by: Jenny Laurello
Data management, EHR, electronic health records, health information exchange, HIE, HIPAA, REC, Regional Extension Centers

Note: Live Chat has ended. Transcript from 6/15 Q&A with speakers can be found below As the health care IT industry continues to balance the requirements of the meaningful use program, along with other pending...


June 2, 2011  8:00 AM

HIPAA 5010 testing: Benefits of a rules based testing approach



Posted by: Jenny Laurello
5010 conversion, HIPAA, HIPAA 5010

Guest post by: Baskar Mohan, Director, Healthcare Practice, Virtusa Corporation A crucial requirement for the successful implementation of HIPAA 5010 is the testing of systems, applications and processes.


May 19, 2011  8:55 AM

HIPAA 5010 testing: 5 crucial steps to program success



Posted by: Jenny Laurello
data privacy and security, HIPAA, HIPAA 5010, ICD-10

Guest post by: Baskar Mohan, director, healthcare practice, Virtusa Corporation We are quickly approaching the HIPAA 5010 implementation deadline, which is forcing healthcare payers to engage in testing with their external partners. With less than seven months...


April 27, 2011  10:01 PM

Secure file transmission in the age of health information exchange



Posted by: Jenny Laurello
Data privacy, Data security, health information exchange, HIE, HIPAA

Guest post by Ruby Raley, director, health care solutions, Axway The HITECH Act and strengthened HIPAA regulations share the same goal: the promotion of health information technology and, in particular, health information exchange, to improve the well-being of society and reduce the...


April 21, 2011  8:59 AM

Enabling a HITECH and HIPAA compliant organization: Addressing meaningful use mandates and ensuring audit readiness



Posted by: Jenny Laurello
Data privacy, Data security, EHR, HIPAA, HIPAA Academy

In this SearchHealthIT presentation, Uday Ali Pabrai, chief executive and co-founder of the HIPAA Academy, shares best practices for maintaining data privacy and security and ensuring HIPAA...


April 20, 2011  2:18 PM

Why making data “worthless” is useful: Best practices for ensuring the privacy and security of health care data



Posted by: Jenny Laurello
Data management, data masking, Data privacy, Data security, HIPAA, HITECH Act

Guest post by Jan Rosenberg, Director, ILM, Informatica It's safe to say that it's a challenging time for health care IT professionals who are leading the data management and...


April 14, 2011  9:05 AM

Implementing user activity monitoring to ensure data privacy and security



Posted by: Jenny Laurello
data privacy and security, HIPAA, security information and event management

In this Health IT Exchange executive webcast, hear how health care organizations can use security information and event management (SIEM) solutions to help address complex privacy and security rules while meeting today’s ever-changing regulatory requirements. Novell’s Solution Marketing...


March 7, 2011  2:26 PM

Risk of data breach: Tips for mitigating risk now that the threat has shifted from external to internal



Posted by: Jenny Laurello
Data privacy, Data security, HIPAA, HITECH, PHI, Risk assessment

Guest Post:  Jay Hill, Director of Product Management and Marketing, Informatica Your computer network is protected by a firewall including endpoint protection against malware and other types of attacks. Antivirus software is in place to prevent and detect...


Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: