Hipaa Violation North CarolinaWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Hipaa Violation North Carolina returned the following results.
RSS What is RSS?
Related Categories

 •   Virtualization
 •   Networks
 •   Network Security
 •   Data Security
 •   Application Security
 •   Enterprise Content Management (ECM)
 •   Network Management
 •   Compliance Management/ Sarbanes-Oxley Compliance
 •   Data Center Management
 •   Endpoint Security

Related Searches
 •   Computerized Hipaa Violation North
 •   Create Hipaa
 •   Design Hipaa Violation
 •   Global Hipaa Violation North
 •   Hipaa Activities
 •   Hipaa Violation Conference
 •   Hipaa Violation North Pay
 •   Hipaa Violation North Policy
 •   Hipaa Violation Schema
 •   Part Hipaa Violation North
Advertisement

ALL RESULTS
1 - 25 of 358 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

HIPAA Violations Incur Multi-Million Dollar Penalties by Absolute Software

January 15, 2013 - (Free Research)
In this resource, read about some recent HIPAA breaches that cost the violating parties significant penalties and learn about the measures that can be put in place to help maintain compliance. 
(WHITE PAPER) READ ABSTRACT |

E-Book: DLP for Health Care - Strategies for Securing Electronic Health Information in the Age of HITECH by SearchHealthIT.com

April 15, 2010 - (Free Research)
Data loss prevention (DLP) in health care—which mostly entails preventing patients’ protected health information (PHI) from falling into the wrong hands—requires well-conceived, well-enforced policies and the technology to back them up. 
(EBOOK) READ ABSTRACT |

North Carolina State University - Matches research assets to potential partners with analytics by IBM

April 30, 2013 - (Free Research)
North Carolina State University needed a way to match its technologies to potential partners, licenese or both. T university needed to reduce the effort required to find potential partners, while also improving the return on its research and development investment. Consult this white paper to find out how they overcame this challenge. 
(WHITE PAPER) READ ABSTRACT |

The Value of Storage Consolidation by Dell, Inc.

March 01, 2005 - (Free Research)
When storage solution provider VeriStor Systems, Duluth, Ga., bid on consolidating the storage environment at North Carolina Central University in Durham, N.C., it put its reputation and its money behind an EqualLogic iSCSI SAN. This white paper gives the details. 
(CASE STUDY) READ ABSTRACT |

North Carolina Center for Automotive Research uses borderless network to keep engineers connected to data and services anywhere, anytime by Cisco Systems, Inc.

October 10, 2011 - (Free Research)
This case study demonstrates how one organization used borderless network technology to help them grow substantially in a short amount of time. 
(CASE STUDY) READ ABSTRACT |

Benefit Solution Case Study - Timmons Group by EMC Corporation

April 2008 - (Free Research)
Timmons Group is a leader in the civil engineering industry; however, their storage requirements were growing at an unprecedented pace. Read this case study to learn how this company was able to overcome their challenges with innovative SAN solutions. 
(WHITE PAPER) READ ABSTRACT |

Paramount Foods Upgrades Store Technology by Hewlett-Packard Company

March 2008 - (Free Research)
Read how the owner of a North Carolina based food company found a way to keep up with major supermarket chains with HP POS hardware and servers. 
(WHITE PAPER) READ ABSTRACT |

Lumber Company Cuts Customer Delays down to Size by Cisco Systems, Inc.

January 2006 - (Free Research)
In this case study, Mountain Lumber Company streamlined their customer and employee communications with a Cisco Unified Communications system. They have also eliminated the need for a separate intercom system. Read this study to learn more. 
(CASE STUDY) READ ABSTRACT |

NC State makes a breakthrough in improving access to academic computing resources. by IBM

May 2011 - (Free Research)
Read how IBM and NC State created a “cloud computing” model for provisioning technology that offered a quantum improvement in access, efficiency and convenience over traditional computer labs. 
(WHITE PAPER) READ ABSTRACT |

E-Book: Encryption - What, Where and How by SearchHealthIT.com

October 2010 - (Free Research)
This e-book, brought to you by SearchHealthIT.com, discusses key issues health care IT pros are facing now, including: HIPAA, the HITECH Act and the new frontier for encryption, network and server encryption, using thin clients to keep data secure, and much more! 
(EBOOK)

Case Study: Mid-Carolina Electric Cooperative, Inc. by Perceptive Software

August 2010 - (Free Research)
Read this case study of Mid-Carolina Electric Cooperative, Inc. to learn how replacing its old document imaging system with a new low-maintenance full-featured document management, imaging and workflow suite improved allowed for better information sharing and document availability, faster customer service and increased productivity. 
(CASE STUDY) READ ABSTRACT |

Dimension Data Helps South Carolina Department of Social Services Achieve Rapid Network Upgrade and Maintain Top Performance with Uptime Powered by Cisco Services Support by Dimension Data

February 2010 - (Free Research)
Faced with limited time and money to upgrade its network and network support, the South Carolina Department of Social Services determined it needed a new services partner to provide world-class expertise and support. Learn how they used Uptime powered by Cisco Services to achieve a seamless upgrade of their network infrastructure and more. 
(CASE STUDY) READ ABSTRACT |

Forrester Research: Improving Application Deployments - How an Application Delivery Architecture Can Help Businesses Overcome Deployment Challenges by F5 Networks

August 2007 - (Free Research)
Today's businesses must operate in a drastically changing environment. Forrester found most companies are not well equipped to reorient IT as a critical driver of top line success. This report showcases the results of an April 2007 Forrester survey. 
(WHITE PAPER) READ ABSTRACT |

Top Ten Essentials for Privileged Account Management by FoxT

February 2010 - (Free Research)
In this white paper, discover how you can effectively and efficiently control privileged accounts using the latest in adaptive access controls management. You will also learn about how to leverage the latest in Role-Based Access Controls. 
(WHITE PAPER) READ ABSTRACT |

Niksun NetDetectorLIVE Data Sheet by NIKSUN

NetDetectorLive is a content and compliance monitoring appliance enabling companies to monitor content flowing in and out of their corporate networks. 
(HARDWARE PRODUCT)

Prairie North Health Region - Case Study by VMware, Inc.

January 2012 - (Free Research)
Access this case study to learn how the Prairie North Health Region consolidated its server environment, reducing its hardware and power costs, and is leveraging a desktop virtualization solution to lower costs while improving the performance and availability of its desktop computing services — as well as those of neighboring regions. 
(CASE STUDY) READ ABSTRACT |

Achieving North American Electric Reliability Corporation (NERC) Cyber Security Standards by Lumension

March 2009 - (Free Research)
Learn about NERC compliance challenges and how to ensure audit-readiness by delivering end-to-end vulnerability management, endpoint protection and data protection solutions. 
(WHITE PAPER) READ ABSTRACT |

WAVE SYSTEMS CASE STUDY - Mazda North American Operations by Wave Systems Corp.

September 2010 - (Free Research)
THE CHALLENGE: Protect customer personal identifiable information and confidential business information on employee laptops scattered across North America without overburdening in-house IT resources. Read on to learn how they did it. 
(CASE STUDY) READ ABSTRACT |

CodePro AnalytiX, A Powerful Approach to Developing High Quality Code Using Eclipse by Instantiations

February 2008 - (Free Research)
This white paper highlights how to attain high quality Java code using Eclipse by eliminating code quality, code review and code dependency issues typically faced in software development. 
(WHITE PAPER) READ ABSTRACT |

Outbound Email And Data Loss Prevention In Today's Enterprise, 2009 by Proofpoint, Inc.

August 2009 - (Free Research)
The convenience and ubiquity of email as a business communications tool has exposed enterprises to a wide variety of legal, financial and regulatory risks associated with outbound email. This report summarizes the findings of Proofpoint's sixth annual survey of enterprise attitudes about outbound email, content security and data protection. 
(WHITE PAPER) READ ABSTRACT |

The CIO’s Guide to HIPAA Compliant Text Messaging by Imprivata

December 2013 - (Free Research)
This resource is a guide to ensuring secure texting policies while maintaining compliance with HIPAA and HITECH, and includes best practices and a vendor comparison checklist to use during product evaluation. 
(WHITE PAPER) READ ABSTRACT |

Strategic Brief – HIPAA by Alliance Storage Technologies

November 2010 - (Free Research)
The Health Insurance Portability and Accountability Act of 1996 (HIPAA) enacted reform and standardization in the healthcare industry to protect patient confidentiality. Continue reading to learn more about the goals of HIPAA. 
(WHITE PAPER) READ ABSTRACT |

Cloud Backup and Recovery by Vision Solutions

September 2010 - (Free Research)
The right way to evaluate the quality of your system and data protection is to evaluate the Recovery Time Objective (RTO) and Recovery Point Objective (RPO). These metrics define how long you think it will take you to get back online and how current the data has to be. Read this white paper to learn more. 
(WHITE PAPER) READ ABSTRACT |

Disaster recovery planning for HIPAA compliance by HP & Intel®

September 2011 - (Free Research)
The HIPAA Security Rule requires all HIPAA covered entities to create a plan for first protecting and then restoring confidential patient data in the event of a disaster. Unfortunately, HIPAA does not say much about what should go into such a disaster recovery plan. Inside this e-guide, find tips for a compliant disaster recovery plan. 
(EGUIDE) READ ABSTRACT |

Case Study: North York General Hospital Doubles Storage Performance: Cutting Costs and Simplifying Management by Standardizing on IBM XIV by IBM

August 2011 - (Free Research)
This case study details how North York General Hospital's implementaiton of the IBM XIV Storage Systemen helped them reduce rackspace requirements and cut data center hosting costs. They now have a fast, resilient and flexible storage architecture that will support their mission-critical IT systems for years to come. 
(CASE STUDY) READ ABSTRACT |

1 - 25 of 358 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts