Back to Results
First PageMeta Content
Health / Privacy law / Crime prevention / National security / Health Insurance Portability and Accountability Act / Electronic health record / HITRUST / Information security / Privacy / Computer security / Security / Ethics


ACHIEVING COMPREHENSIVE HEALTH IT PRIVACY AND SECURITY What’s New in HIPAA Compliance and Key Steps to Completing the Meaningful Use Risk Assessment Author: Jared Rhoads
Add to Reading List

Document Date: 2014-12-17 11:21:09


Open Document

File Size: 691,91 KB

Share Result on Facebook

Company

New York Post / Valeo / EHR Evaluate Risks Correct Deficiencies Maintain Technologies / Imprivata Inc. / TechTarget / CSC / Anakam Inc. / Security Consulting / Business Associates / Merrill / IT Privacy / Bloomberg / CMS / Forrester Research / Maintain Your Technologies / HHS / Siemens / /

Currency

USD / /

Facility

CSC’s Global Institute / /

IndustryTerm

large healthcare organizations / storage devices / particular server / anti-spyware software / portable media / healthcare / transcription services / wireless networks / unprotected wireless networks / domain name systems / access logging systems / procedures and tools / internal systems / mobile media / administration services / wireless access / secure network / /

Organization

U.S. Department of Homeland Security / Smart Card Alliance Healthcare Council / CSC’s Global Institute for Emerging Healthcare Practices / office of the Inspector General / Smart Card Alliance / Health IT Policy Committee / Medicare / North Carolina HIMSS Chapter / HHS Regional Extension Center / Office for Civil Rights / office of the National / HIT Policy Committee / Department of Health and Human Services / /

Person

Fran Turisco / John Kahanek / Owen Pate / Jared Rhoads Privacy / /

Position

Meaningful Use Risk Assessment Author / Healthcare Vertical Lead Information Risk Manager / Global Compliance Assurance Manager / security official / Acknowledgements The author / senior research specialist / Author / private contractor / Coordinator / /

ProvinceOrState

Pennsylvania / California / Massachusetts / /

PublishedMedium

Gray Areas / New York Post / /

Technology

Smart Card / mobile devices / encryption / 2010 Encryption / OCR / wireless access / smartphones / Encryption Mobile device encryption / too burdensome Encryption / Health Information Technology / e-mail encryption / flash / /

SocialTag