HITRUST

Results: 118



#Item
71Computer security / Data security / Public safety / Information security / Policy / Electronic health record / HITRUST / Security / Crime prevention / National security

Guide to Adoption of Uniform Security Policy

Add to Reading List

Source URL: www.healthit.gov

Language: English - Date: 2013-01-18 20:42:52
72Data privacy / Health Insurance Portability and Accountability Act / Law / Medicine / Electronic health record / Electronic medical record / Code of Federal Regulations / Computer security / HITRUST / Health / Health informatics / Privacy law

[Amended and Restated]***

Add to Reading List

Source URL: www.nchica.org

Language: English - Date: 2010-02-09 10:22:38
73Computing / Information technology management / Computer network security / Security controls / Information security / IT risk management / HITRUST / Computer security / Data security / Security

General Information Technology

Add to Reading List

Source URL: www.documents.dgs.ca.gov

Language: English - Date: 2014-04-21 17:01:24
74Law / Privacy / Management / Chief privacy officer / Internet privacy / HITRUST / Personal Data Privacy and Security Act / Data privacy / Privacy law / Health Insurance Portability and Accountability Act

Microsoft PowerPoint - Final Rule - Finally 1

Add to Reading List

Source URL: www.iub.edu

Language: English - Date: 2014-09-05 01:11:57
75Law / Health / Ethics / Chief privacy officer / Protected health information / Confidentiality / HITRUST / Medical billing / Data privacy / Health Insurance Portability and Accountability Act / Privacy law

HIPAA PRIVACY & SECURITY COMPLIANCE PROGRAM 2012 Materials for HIPAA Liaisons

Add to Reading List

Source URL: www.iub.edu

Language: English - Date: 2014-09-06 01:25:43
76Medical informatics / Health informatics / Security / Standards organizations / Data security / Electronic health record / National Institute of Standards and Technology / Health Insurance Portability and Accountability Act / HITRUST / Health / Medicine / Computer security

Version[removed]February[removed]Security Protecting electronic health information is crucial to organizations exchanging data across the healthcare enterprise.

Add to Reading List

Source URL: www.nist.gov

Language: English - Date: 2011-03-11 11:05:36
77Health Insurance Portability and Accountability Act / Law / Ethics / Protected health information / Medicare / Confidentiality / HITRUST / Jumbleme / Privacy law / Health / Data privacy

Microsoft PowerPoint - HIPAA Privacy Security Training

Add to Reading List

Source URL: www.iub.edu

Language: English - Date: 2014-09-05 01:12:02
78Ethics / Law / Privacy / Government procurement in the United States / Confidentiality / HITRUST / Data privacy / Health Insurance Portability and Accountability Act / Privacy law

COLUMBIA AGREEMENT BUSINESS ASSOCIATE AGREEMENT This Business Associate Agreement (“Agreement”) is entered into as of ___________ (“Effective Date”) by and between The Trustees of Columbia University in the City

Add to Reading List

Source URL: cumc.columbia.edu

Language: English - Date: 2014-03-11 07:10:05
79Cyberwarfare / Computer network security / Software testing / Information security / Security controls / Vulnerability / HITRUST / IT risk management / Data security / Computer security / Security

Resourceful Internet Solutions, Inc. System Security Plan April 25, [removed]RIS/Mediate Caseload Manager Security Control Requirements &

Add to Reading List

Source URL: www.mediate.com

Language: English - Date: 2013-07-15 11:01:33
80Management / Risk management / National Institute of Standards and Technology / Security controls / Information security / Security risk / Vulnerability / HITRUST / NIST Special Publication 800-53 / Computer security / Security / Data security

5000-0002EnterpriseInformationSecurityPolicy

Add to Reading List

Source URL: finance.utah.gov

Language: English - Date: 2013-06-13 09:23:45
UPDATE