Features
Features
HIPAA
-
Protecting Patient Information
In this excerpt from chapter two of Protecting Patient Information, author Paul Cerrato discusses the consequences of data breaches in healthcare. Continue Reading
-
Policies and regulatory compliance
An overview of the type of policies needed for regulatory compliance. Continue Reading
-
Making sense of the maze
The program director of regulatory compliance for the Object Management Group discusses a new project known as Compliance Global Regulatory Information Database, which should help businesses manage regulatory compliance demands across international ... Continue Reading
-
Ensure that legal responsibilities are clear -- Especially when trouble strikes
Excerpt from Chapter 15 of Information Nation Warrior: Information Management Compliance Boot Camp. Continue Reading
-
Nominate your peers
-
ID theft and national security
Check out what some ITKnowledge Exchange members had to say about this controversial issue. Continue Reading
-
HIPAA 2003 deadline sparks rush toward compliance
With the HIPAA 2003 privacy rule deadline approaching, some health care organizations are speeding toward HIPAA compliance; others hope to avoid a bitter security pill. Continue Reading
-
Network security case study: Inside the Cleveland Clinic
Using a SIM system to monitor information in a DMZ, the Cleveland Clinic provides a network security case study from which others can learn. Continue Reading