The Health Insurance Portability and Accountability Act (HIPAA) was enacted by the U.S. Congress in 1996. Title II of HIPAA, the Administrative Simplification (AS) provisions, requires the establishment of national standards for electronic health care transactions and national identifiers for providers, health insurance plans, and employers.
White Paper Published By: Splunk Inc.
Published Date: Jun 02, 2009
Compliance is high on the IT agenda today, yet no one seems to have a clear picture of what it really involves. Inconsistent interpretation by different auditors, regulators and vendors means what worked in one year's audit could fail in the next. This whitepaper is designed to help Demystify Compliance as it relates to IT and give you some simple recipes for analyzing your own environment in the light of specific mandates.
Data breaches can carry very serious consequences, such as the revelation in February 2008 that that the Hannaford Brothers chain of supermarkets lost more than four million debit and credit card numbers to hackers. The bottom line is that organizations must implement Data Loss Prevention (DLP) systems to protect themselves against the growing array of threats they face from inadvertent and malicious data leaks from email, instant messaging and other systems.
White Paper Published By: Tripwire
Published Date: Mar 31, 2009
HIPAA requires businesses that handle personal health information (PHI) to set up strong controls to ensure the security and integrity of that information. Learn how Tripwire Enterprise helps meet the detailed technical requirements of HIPAA and delivers continuous compliance.
Information security policy development should not be a one-time event. In order to effectively reduce risk and maintain a proper governance structure, organizations must periodically update written security policies as part of an ongoing management process.
How mature is your information security policy program? Do you have a set of outdated documents stored in a binder or intranet site? Or do you have a documented management program that keeps your policies up to date, your users informed and your internal auditors sleeping at night?
Health services organizations around the world are discovering that they can optimize business strategies while protecting patient records. These companies use WebEx online applications to reach and support a growing number of employees and customers. They also follow HIPAA mandates using WebEx secure connections that encrypt all content. This content is never uploaded to any WebEx server, ensuring the highest level of data security and confidentiality.
The purpose of this document is to provide information on the data security features and functions available with WebEx Support Center Remote Support and inherent to the underlying WebEx communication infrastructure known as the WebEx MediaTone™ Network.
White Paper Published By: Computhink
Published Date: Dec 10, 2007
In the arena of corporate governance and compliance, the Sarbanes-Oxley Act (SOX) has commanded considerable attention; in the healthcare industry, it's HIPAA; similar regulations target the financial services and energy sectors. Organizations can use technology to meet compliance demands in a cost-effective way.
How secure are the VPNs and modems that your vendors and partners use to access your data center? Can you confidently track all activity to meet SOX, PCI, and HIPAA compliance requirements? Learn how Axeda ServiceLink for Data Centers empowers you to provide your vendors and partners with secure and auditable access to your mission-critical data center.
Enabling IT equipment vendors to perform remote service on your data centers helps maximize uptime and lower TCO—but at what risk? Dial-up modems and VPNs introduce security vulnerabilities and lack sufficient auditing capabilities—making it virtually impossible to track external access and maintain data center security. Download this white paper to learn how you can manage security risks, lower service-related costs, achieve regulatory and internal compliance, and more.
White Paper Published By: AirDefense
Published Date: Apr 24, 2007
This white paper is designed to guide network administrators and security managers to design, implement, and enforce wireless LAN security policies that enable every organization to fully reap the benefits of wireless LANs without experiencing undue management pains and security holes.
Organizations are struggling to enforce both mandatory regulatory rules as well as internal corporate policies governing email content and distribution. One of the biggest obstacles is determining whether or not the content of an email, or its attachment, is subject to any policy rules or restrictions. This whitepaper describes the techniques required to perform intelligent, accurate content analysis and the shortcomings of most current approaches.
For most organizations email compliance management is synonymous with outbound email control. This white paper describes how internal email control is crucial to an organization's compliance mandate and the underlying technical architecture required to do it effectively.
Webinar Published By: Agile IT
Published Date: Dec 03, 2013
Office 365 empowers businesses to increase productivity and lower costs. From providing all the business tools you need and are familiar with – to keeping you constantly up to date. Join Microsoft and Agile IT for a look inside Office 365 and see for yourself why Office 365 is the last upgrade you’ll need.
White Paper Published By: Dell Storage
Published Date: Aug 14, 2012
Engagement with customers online has evolved from novelty to necessity, with an estimated $202 billion spent in 2011 and projected 10% growth to $327 billion in 2016, according to Forrester Research. Businesses are maneuvering to connect with the growing pool of online customers, but the move to eCommerce brings new security risks with the exchange of sensitive consumer information, including cardholder data and personally identifiable information that can enable identity theft. At stake is reputation of brand, ongoing access to merchant credit lines, and substantial penalties and remediation in the event of a breach.
This white paper elucidates the aspects of PCI DSS (Payment Card Industry Data Security Standards) compliance that must be considered when choosing a secure environment for servers involved in eCommerce. Whether deciding to outsource or keep data hosting in-house, any company collecting, storing or transmitting customer cardholder data needs to be compliant, and this document helps pinpoint the specific concerns and standards a company should be aware of when choosing how to keep their data secure. Understanding requirements and best practices for security policies and procedures, physical safeguards, and security technologies is essential to establishing cardholder data security and meeting QSA and SAQ audit requirements.