What functionality is currently available in BW to provide HIPAA required protection of data?
Answer Question | March 1, 2010 10:18 PM
I’m hoping to find a solid, inexpensive network auditing tool for virtual networks as prep for a HIPPA compliance audit. Does anyone have suggestions of open source or pay tools they’d recommend? Do I need to pull in an outside party for this?
Answer Question | March 9, 2010 6:48 PM
Cloud Computing, Cloud Computing in 2010, HIPAA, Knowledge Point Challenge, Virtual networking
Trying to figure out if by using Permissions in Outlook 2007 to encrypt and password protect information–it that considered HIPAA compliant?
Answer Question | October 9, 2009 1:32 PM
HIPAA, IT Compliance, Outlook 2007, Outlook permissions
does any one have a sample contract that is similar to the HIPAA business partner agreement
Answer Question | September 2, 2009 4:06 PM
Contract management, HIPAA
I am looking for documentation to support blocking personal e-mail at work(aol, comcast, hotmail etc) for virus and hippa compliance regions. Can anyone direct me to any publications that support this? Thanks!
Answer Question | April 17, 2009 7:37 PM
AOL, Email security, Gmail, HIPAA, Network monitoring
I have a .dbf file from my dental software (FOXDENT V7.0B) MS DOS program that allows the printing of a standard 1994 American Dental Association form. HIPPA is now requiring the 2006 format- Mostly the government and Medicaid forms. Can anyone help me with this conversion as this software has worked perfectly for me since [...]
Answer Question | August 9, 2008 9:05 PM
Database, FoxDent, FoxPro, FoxPro 2.6, HIPAA, Printing
Hey everyone, I’m an assistant editor for SearchDataCenter, and was curious what our users think of the Info Center we have on compliance. Has anybody checked it out? Is it useful? Any suggestions? Are there any topics you’d like to see more coverage on? If you haven’t seen it, here’s a link: http://searchdatacenter.techtarget.com/infoCenter/0,,sid80_iid2652,00.html Thanks, and [...]
Answer Question | June 28, 2005 2:54 PM
California Security Breach Information Act, Can Spam Act, Compliance, Do Not Call Lists, Gramm-Leach-Bliley Act, HIPAA, ISO 17799, Laws, Regulations, Sarbanes-Oxley Act, standards, USA Patriot Act
1st of all this is a win2k AD Domain w/all XP Clients and the extended GPManager Grouppolicy. Okay, so B/C of HIPAA I have to have my computers screensaver/password protected. Even though I’m forever telling’em to sign off when they leave computers my staff still doesn’t do it. Thusly the computer locks and (when I’m [...]
Answer Question | May 29, 2009 4:01 PM
Administration, Biometrics, Digital certificates, HIPAA, Identity & Access Management, Management, provisioning, Security, Security tokens, Service and support, Single sign-on, Tech support
If it turns out, as I believe, that enemies of the United States are behind a lot of the major ID thefts in the US, that would mean that a lot of money is going to our enemies. Can we therefore surmise that those who mishandle our identity information, by means of their poor stewardship [...]
Answer Question | September 21, 2010 10:35 PM
Application security, Auditing, Biometrics, Business/IT alignment, California Security Breach Information Act, Can Spam Act, Compliance, CRM, Database, Digital certificates, Disaster Recovery, E-business, Encryption, Exchange, Gramm-Leach-Bliley Act, HIPAA, Identity & Access Management, Incident response, Information risk management, Instant Messaging, ISO 17799, Laws, Policies, provisioning, Regulations, Risk management, Sarbanes-Oxley Act, Secure Coding, Security, Security management, Security products, Security Program Management, Security tokens, Single sign-on, standards, USA Patriot Act, Vulnerability Assessment & Audit