Back to Results
First PageMeta Content
Distributed computing / Data privacy / Data management / Business software / Health Insurance Portability and Accountability Act / Privacy law / Cloud computing / Data center / TRAC / Computing / Concurrent computing / Computer security


Third-party relationships and your confidential data Assessing risk and management oversight processes ALL IIA
Add to Reading List

Document Date: 2013-09-16 18:29:33


Open Document

File Size: 1,46 MB

Share Result on Facebook

Company

Grant Thornton LLP / /

Currency

USD / /

Event

Reorganization / /

IndustryTerm

data systems / internal audit / server network / appropriate document management tools / cloud computing use / healthcare internal auditors / clinical applications / healthcare environment / executive management / company social media platforms / practice management / wireless network / data processing services / oversight management / data management / information technology / correct tools / risk management / healthcare internal auditing professionals / computing / cloud computing risks / software updates / adverse media coverage / cloud computing / recovery site / healthcare governance / cloud computing vendors / wireless networks / /

Organization

U.S. Department of Health and Human Services / Association of Internal Auditors / /

Person

Sentara Healthcare Glen Mueller / David Reitzel / Donna Wachman / Healthcare Michael Fabrizius / Mark Ruppert / Linda McKee / Debi Weatherford / Mark Eddy / /

Position

advocate / Contractor / custodian / National Marketing Manager / CPA Carolinas HealthCare System Linda / auditor / the auditor / CCOO Executive / National Leader / Health Care IT Advisory Services Eric Wendler Business Development Director / physician / Chair / auditor / external auditor / Manager / Health Care AHIA white paper project team / /

Technology

encryption / information technology / Reporting Requirements technologies / service level agreement / there adequate encryption / mobile devices / /

URL

www.grantthornton.com/issues/library/articles/technology/2012/TIP-2012-managing-data-security-and-privacy-of-third-party-vendors.aspx / www.gpo.gov/fdsys/pkg/FR-2013-01-25/pdf/2013-01073.pdf / www.ahia.org / http /

SocialTag