Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

Home > Proofpoint > HIPAA and Beyond 2012: An Update on Healthcare Security Regulations for Email

HIPAA and Beyond 2012: An Update on Healthcare Security Regulations for Email

White Paper Published By: Proofpoint
Published:  Apr 23, 2010
Type:  White Paper
Length:  12 pages

Healthcare regulations for IT security-such as HIPAA and the new HITECH provisions of HIPAA-are now broader than ever. And they apply not just to healthcare organizations, but to all kinds of companies that handle or store private health information, from Web hosting firms to accountants. Today's penalties for data breaches are increasingly onerous: fines are bigger, notification requirements are more stringent and enforcement organizations have new incentives for taking action against organizations that fail to protect healthcare privacy.

Email continues to be the #1 source of exposures of protected health information (PHI) and other private data in today's enterprise, but most organizations have yet to deploy technology to prevent costly breaches of PHI.

Download this whitepaper to find out what you need to know about the latest security, privacy and data breach regulations for health information. Also learn what to look for in a secure email solution for complying with the web of regulations that now apply to so many companies.

Download HIPAA and Beyond 2012: Meeting New Healthcare Security Requirements for Email to learn:

  • New provisions of the US economic stimulus legislation (ARRA) that expand the scope of HIPAA security rules, and the impact on your organization's email security and compliance strategy
  • New HIPAA violation penalties and the impact of other recent data breach notification laws
  • Technology requirements for protecting the confidentiality of healthcare information in outbound email
  • How policy-based encryption can help protect private healthcare information

Tags :