HITRUST

Results: 118



#Item
81Health Insurance Portability and Accountability Act / Privacy law / Law / Privacy / Medical informatics / Medical transcription / Information privacy / Confidentiality / HITRUST / Data privacy / Ethics / Transcription

Red Alert to HIPAA Business Associates— HITECH Is Here! T

Add to Reading List

Source URL: www.hpisum.com

Language: English - Date: 2010-03-26 17:16:24
82Data privacy / Health Insurance Portability and Accountability Act / Privacy law / Confidentiality / Mediation / Non-disclosure agreement / HITRUST / Patient Safety and Quality Improvement Act / Law / Ethics / Security

Appendix B1 - HIPAA Business Associate Agreement RFP# 4641Z1

Add to Reading List

Source URL: das.nebraska.gov

Language: English - Date: 2014-02-20 13:56:52
83Ethics / Health Insurance Portability and Accountability Act / Security / Confidentiality / Non-disclosure agreement / Protected health information / Mediation / HITRUST / Law / Data privacy / Privacy law

Appendix B1 - HIPAA Business Associate Agreement RFP# 4641Z1 MASTER INTERAGENCY / BUSINESS ASSOCIATE AGREEMENT HIPAA CONTRACT / ATTACHMENT FOR COMPLIANCE TO THE PRIVACY AND SECURITY OF PROTECTED HEALTH INFORMATION

Add to Reading List

Source URL: das.nebraska.gov

Language: English - Date: 2014-02-24 14:47:17
84Computer security / PKZIP / Law / Health / Zip / Information security / HITRUST / PKWARE /  Inc / Security / Health Insurance Portability and Accountability Act

Meet HIPAA requirements established by the HITECH Act while increasing data security internally & externally with business associates Technology has enabled the healthcare industry to be more efficient and cost-effective

Add to Reading List

Source URL: www.pkware.com

Language: English - Date: 2014-07-07 13:05:21
85Computer network security / Data security / Vulnerability / ISO/IEC 27001 / Risk management / COBIT / HITRUST / IT risk management / Security / Computer security / Information technology management

Based on input from Phil Agcaoili Comments template for Preliminary Cybersecurity Framework #

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-12-13 11:37:16
86Computer network security / Data security / Vulnerability / ISO/IEC 27001 / Risk management / COBIT / HITRUST / IT risk management / Security / Computer security / Information technology management

Based on input from Phil Agcaoili Comments template for Preliminary Cybersecurity Framework #

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-12-03 13:41:15
87Computer network security / Data security / Vulnerability / ISO/IEC 27001 / Risk management / COBIT / HITRUST / IT risk management / Security / Computer security / Information technology management

Based on input from Phil Agcaoili Comments template for Preliminary Cybersecurity Framework #

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-12-13 10:34:50
88Computer network security / National security / Vulnerability / Risk management / HITRUST / ISO/IEC 27001 / COBIT / Security / Computer security / Information technology management

Based on input from Phil Agcaoili Comments template for Preliminary Cybersecurity Framework #

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-12-05 15:08:03
89Computer network security / Data security / Vulnerability / ISO/IEC 27001 / Risk management / COBIT / HITRUST / IT risk management / Security / Computer security / Information technology management

Based on input from Phil Agcaoili Comments template for Preliminary Cybersecurity Framework #

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-12-03 13:41:15
90Computer network security / Data security / Vulnerability / Risk management / HITRUST / ISO/IEC 27001 / COBIT / Security / Computer security / Information technology management

Based on input from Phil Agcaoili Comments template for Preliminary Cybersecurity Framework #

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-12-30 10:05:43
UPDATE