Case Study: CMS Data-Sharing Project Highlights the Benefits of a Multiplatform Approach
|
|
|
- Jemima Franklin
- 9 years ago
- Views:
Transcription
1 Case Study: CMS Data-Sharing Project Highlights the Benefits of a Multiplatform Approach 9 November 2009 Jay Heiser, John Girard Gartner RAS Core Research Note G The U.S. government agency responsible for healthcare payments needed a secure way to share sensitive data, most of it subject to regulatory requirements, with a disparate set of external partners. The success of its implementation offers valuable lessons for many other types of enterprises. Overview The Centers for Medicare & Medicaid Services (CMS) implemented new cross-platform data security technology to meet public and regulatory demand for improved privacy protection. This government agency's experience offers valuable lessons for enterprises that need to protect sensitive data, particularly across heterogeneous extended computing environments. Key Findings Sharing data with a set of partners using a wide variety of system platforms, applications and data formats is practical only when the sharing organization uses a mechanism that is capable of translating that data into formats that the partners can readily use. The effective use of encryption and compression/decompression can improve data security and reduce the logistical and administrative burdens of data handling. Enterprises with large partner networks cannot expect all their partners to have compatible IT systems or comparable data-handling skill sets in place. 1
2 Recommendations Enterprises planning to share encrypted data with partners that use platforms the enterprise does not have in-house must select a product vendor with the necessary expertise to address those partners' support needs. When very large datasets are to be moved, compression must be combined with encryption to reduce the logistical and administrative burdens of data handling and to avoid exceeding the storage limits of available media. If sensitive data cannot be monitored after it has been shared with a partner, the sending enterprise must establish a clear boundary of responsibility and liability with the receiving enterprises. What you need to know Enterprises that share sensitive data with diverse networks of partners cannot expect to manage, or even fully understand, the varying systems, applications, data formats and skill levels their partners possess. Translating and securing the data so that it can be shared requires multiplatform technology and expertise. Case Study Introduction The Centers for Medicare & Medicaid Services (CMS), the agency responsible for healthcare payments and financing for the United States government, maintains one of the largest collections of healthcare information in the world at its data centers in Baltimore, Maryland; Tulsa, Oklahoma; and Columbia, South Carolina. This highly sensitive data includes information related to various U.S. government healthcare programs, such as Medicare which alone represents 1.2 billion separate claims annually Medicaid and the Plan D prescription drug plan. The CMS exchanges data with hundreds of external entities, including other governmental bodies and research facilities, many of which have computing environments that may be incompatible with the CMS's mainframe systems. Under increasing regulatory and public pressure, the CMS recognized that improved data security was an urgent requirement. The CMS's first attempt at implementing data encryption across its partner network proved unworkable because of interoperability issues, and the agency recognized that it needed simple, versatile file-handling technology that would facilitate data security but not place undue financial or administrative burdens on its partners. The solution CMS found SecureZIP PartnerLink, a multiplatform encryption/compression product from Pkware has both enhanced its data security and reduced the logistical and administrative burdens of transmitting vast amounts of data. The Challenge The CMS has historically sent data to its huge network of external partners using mainframe tape cartridges. This practice, which required the shipment of more than 20,000 cartridges annually, has presented significant administrative and logistical burdens and security risks that the CMS increasingly recognized as unacceptable. The CMS has had significant reasons to implement stronger data security measures, including the fact that virtually all the data it houses and transmits is subject to rigorous regulatory requirements, including those of the 2
3 U.S. Health Insurance Portability and Accountability Act (HIPAA). The agency has received security directives from its parent agency, the Department of Health & Human Services, and the federal government's fiscal "watchdog" agency, the Office of Management and Budget. Moreover, the CMS, like many other entities, has faced increasing public concern about security after a series of highly publicized data breaches, including the 2006 theft of more than 26 million individuals' personal information from the Department of Veterans Affairs systems. In late 2006, in response to these concerns, the CMS purchased the IBM Encryption Facility for z/os and informed its partners that no unencrypted data would be sent after 1 January However, this technology assumes a mainframe for decryption and has limited nonmainframe client alternatives, and CMS discovered that many, if not most, of its partners do not use mainframes instead, they rely on tape cartridge readers connected to other systems that are not supported by IBM s decryption technology. When the mainframe-based system proved unworkable in its real-world partner environment, the CMS began evaluating other data protection technologies. The critical selection criteria were the need for: A multiplatform offering that could encrypt and decrypt very large sets of virtually any type of data (including fixed-block and variable-block) on virtually any system A file storage and retrieval format that could be read on any known computing platform Low cost or no cost for CMS's partners The ability to provide direct technical support to partner organizations using a huge variety of different platforms The CMS also considered sending all data via telecommunications lines, completely stopping the mailing of mainframe cartridges. Many CMS partners that receive only small files did, in fact, make the transition to electronic receipt of data. However, careful study of the size of individual files revealed that many of them were far too large for this to be a viable overall solution. The use of physical media remained the only practical solution for the largest-volume files the agency needs to distribute. Approach The CMS tasked Lockheed Martin, the outside contractor that manages its Baltimore data center, with surveying the marketplace to determine whether any available products could meet the agency's needs. Lockheed Martin identified several offerings that were advertised as multiplatform encryption products. These products were subjected to rigorous testing over several months before CMS selected Pkware's combined SecureZIP/PartnerLink encryption/decompression product offering. Pkware's SecureZIP allows the CMS and its partners to encrypt, decrypt, compress and decompress data for storage and transmission, while PartnerLink enables the receipt of data across different computing platforms at no cost to CMS's partners. New partners can download the PartnerLink code and use it for data encryption and compression. The cross-platform Pkware product uses a variety of encryption standards, including the Advanced Encryption Standard, and public-key methodology for authentication. All CMS partners including all individuals receiving CMS data sign an agreement detailing how data will be used, what it will be used for, how long it will be held and what steps will be taken to dispose of it. All recipients receive configuration files and public keys from CMS, which allows them to verify that the data is coming from CMS. A critical Pkware advantage is the ability to archive, retrieve and convert any type of mainframe data, including binary, fixedblock and variable-block. Formats held in the zip archive are not corrupted during transit, even when data passes across systems that use different binary word lengths and different endian bit orientations. This feature was particularly helpful, because many CMS partners use different processing platforms. 3
4 The CMS implementation team which included individuals with deep expertise in government IT deployments had some reservations about using an off-the-shelf product. It had been their experience that products seldom met all customer needs and usually had to be customized at customer expense. Moreover, testing was typically done in a test environment with test data. For this reason, the CMS team requested a 90-day period prior to the actual purchase to continue testing the product in a production environment, and Pkware agreed. This extended "live test" period allowed it to observe all the potential problems that the CMS's users might have, and verify that the Pkware product could meet operational needs and that Pkware service could live up to CMS requirements. Pkware was also able to build CMS-requested new features into its offering with only a few months' turnaround time. This customization was done without any additional cost to CMS. The CMS reports that Pkware was, in general, extremely responsive and effective in implementing the custom features that the agency required, and that Pkware's support, particularly for CMS's external partners, was outstanding. Partner support by Pkware and Lockheed Martin was crucial, because implementation and interoperability issues (mostly related to file conversion formats) emerged at many of the receiving partner sites, because of highly disparate platforms and skill sets. One problem that emerged during testing and implementation was the difficulty of determining all the parameters used to generate data formats and encryption formats. The translation of character sets to different formats particularly binary files in variable-block formats required technical expertise and understanding of formats that many of the partners did not have. Pkware worked with CMS and Lockheed Martin to develop a simplified set of parameters to be used for the various file formats. The different systems and varying skill sets of the many CMS partners required a considerable amount of "hand-holding" that CMS was not equipped to provide. Lacking experience and access to platforms, CMS does not have the ability to support every computer and operating system used by data recipients. The CMS found that deep expertise and close engagement by the vendor and the agency's contractor were crucial to the success of this implementation. The CMS implementation team developed a standard procedure for every new partner. The process began with a conference call with CMS and Pkware, during which the vendor asked about the platform being used, the amount of data being sent and other issues, and the partner could ask any questions about the product and its implementation. In many cases, this was all the preparation the partner needed. Most partners were then able to have the technology up and running within hours. The Pkware implementation has delivered an additional benefit that was not originally central for the CMS: a significant reduction in the administrative and logistical burdens of handling the huge amounts of data sent to and received from its partners. A compression rate of approximately 80% (a ratio of 5:1) has dramatically reduced the number of mainframe tape cartridges that must be used. Data can now also be easily placed on DVD or, in an increasing number of cases, transmitted via the Internet. This reverses the issues of the z/os encryption approach that the CMS previously attempted to deploy, which had significantly increased the number of cartridges used. Results The Pkware encryption/compression technology the CMS implemented across its partner network has significantly improved data security, helping the agency to meet its crucial regulatory compliance mandates for privacy protection. The offering's compression functionality significantly reduced the burdens of transmitting large numbers of tape cartridges and enabled the CMS and its partners to use alternative media, including DVDs and online transfers over the Internet. 4
5 Huge amounts of highly sensitive information are being rapidly shared with hundreds of different recipients, enabling all of them to safely meet their business goals and make effective use of this medical data. Critical Success Factors One of the key factors the CMS has identified in the success of this project is the deep commitment by the product vendor. The extreme heterogeneity of the CMS partner network's extended computing environment created many interoperability challenges that the CMS team had neither the time nor the expertise to address, but Pkware had already encountered virtually all these issues in previous engagements. The partners' IT organizations and other stakeholders brought widely varying degrees of sophistication and expertise to the project, and the vendor was able to provide them with the necessary hand-holding for successful implementation. The development of a repeatable standard procedure for introducing partners to the technology and its uses was also extremely helpful. Pkware's ability to support this project through its engineering support staff was essential in securely sharing data with so many different partners and platforms. The relative simplicity of Pkware's approach to generating encrypted file archives was sufficient for the task. The fact that Pkware's technology is widely known and could already be read on major platforms using simple executable tools was essential to the project's success. Lessons Learned The CMS had already recognized that it was virtually impossible to manage or even understand the range of systems, applications and data formats used by the partners in its huge and constantly changing extended network. This crucial fact was underscored still further by the experience of implementing the Pkware SecureZIP/PartnerLink offering. The prolonged engagement of the vendor provided the CMS with the depth of expertise necessary to bridge both platform gaps and differences in skill sets. The CMS recognized that clear delineation of responsibility for the data, for access key management and for the transfer of liability when data left the CMS must all be considered basic requirements of doing business with the agency. Without these conditions in place, the program and the responsible personnel would be exposed to potential fines and violations. With these conditions in place, the program can expand without incrementally increasing exposure risks Gartner, Inc. and/or its Affiliates. All Rights Reserved. Reproduction and distribution of this publication in any form without prior written permission is forbidden. The information contained herein has been obtained from sources believed to be reliable. Gartner disclaims all warranties as to the accuracy, completeness or adequacy of such information. Although Gartner's research may discuss legal issues related to the information technology business, Gartner does not provide legal advice or services and its research should not be construed or used as such. Gartner shall have no liability for errors, omissions or inadequacies in the information contained herein or for interpretations thereof. The opinions expressed herein are subject to change without notice. 5
Secure your data. Wherever it is, Wherever it goes, However it gets there...on all major platforms. For every user.
Secure your data. Wherever it is, Wherever it goes, However it gets there......on all major platforms. For every user. SecureZIP Product Family SecureZIP products are designed as enterprise-class, data-centric
CDOs Should Use IT Governance and Risk Compliance Management to Advance Compliance
Industry Research Publication Date: 1 May 2008 ID Number: G00156708 CDOs Should Use IT Governance and Risk Compliance Management to Advance Compliance Barry Runyon Care delivery organizations (CDOs) are
Protecting Data-at-Rest with SecureZIP for DLP
Protecting Data-at-Rest with SecureZIP for DLP TABLE OF CONTENTS INTRODUCTION 3 PROTECTING DATA WITH DLP 3 FINDING INDIVIDUAL AND SHARED INFORMATION-AT-REST 4 METHODS FOR REMEDIATION 4 ENCRYPTING UNPROTECTED
IBM Software Information Management Creating an Integrated, Optimized, and Secure Enterprise Data Platform:
Creating an Integrated, Optimized, and Secure Enterprise Data Platform: IBM PureData System for Transactions with SafeNet s ProtectDB and DataSecure Table of contents 1. Data, Data, Everywhere... 3 2.
Business Process Management's Success Hinges on Business-Led Initiatives
Business Process Management's Success Hinges on Business-Led Initiatives 26 July 2005 Michael James Melenovsky Source: Gartner Note Number: G00129411 Organizations that had the most-successful BPM initiatives
TOTAL DATA WAREHOUSING: 2013-2018
TOTAL DATA WAREHOUSING: 2013-2018 Analytic Database and Hadoop Market Sizing and Forecasts This report examines the marketplace for Total Data Warehousing including competing players, revenue generation
Service Virtualization andRecycling
Message Driven SOA -- Enterprise Service Oriented Architecture Service virtualization and component applications Driving reusability and ROI in SOA deployments --- Atul Saini Entire contents Fiorano Software
Magic Quadrant for Data Center Outsourcing, 4Q03
Markets, R. Matlus, W. Maurer, L. Scardino, B. Caldwell Research Note 12 November 2003 Magic Quadrant for Data Center Outsourcing, 4Q03 Gartner's positioning of the 14 external service providers in the
Why cloud backup? Top 10 reasons
Why cloud backup? Top 10 reasons HP Autonomy solutions Table of contents 3 Achieve disaster recovery with secure offsite cloud backup 4 Free yourself from manual and complex tape backup tasks 4 Get predictable
MOBILE APP LIFECYCLE
MOBILE APP LIFECYCLE Design and Development As enterprises invest in developing or externally sourcing mobile apps, they are finding the need to integrate this process into the overall software development
Management Update: Gartner s Updated Help Desk Outsourcing Magic Quadrant
IGG-02192003-03 R. Matlus Article 19 February 2003 Management Update: Gartner s Updated Help Desk Outsourcing Magic Quadrant The North American help desk outsourcing market is growing despite a down economy.
tips A quick and easy guide to securing your private information www.pkware.com
tips A quick and easy guide to securing your private information tips A quick and easy guide to securing your private information Basic Information 1. How to install SecureZIP for Windows Desktop for individual
Preparing for the HIPAA Security Rule
A White Paper for Health Care Professionals Preparing for the HIPAA Security Rule Introduction The Health Insurance Portability and Accountability Act (HIPAA) comprises three sets of standards transactions
Five Business Drivers of Identity and Access Management
Research Publication Date: 31 October 2003 ID Number: SPA-21-3673 Five Business Drivers of Identity and Access Management Roberta J. Witty The primary reasons to implement IAM solutions are business facilitation,
RBC Insurance Fetes Online Auto/Home Insurance Growth
Case Studies, K. Harris Research Note 29 October 2002 RBC Insurance Fetes Online Auto/Home Insurance Growth RBC Insurance's e-business successes are generating greater than $3 million in premiums per month.
The Four "A's" of Information Security
Strategic Planning, R. Witty, A. Allan, J. Enck, R. Wagner Research Note 4 November 2003 Identity and Access Management Defined An IAM solution requires multiple products from multiple vendors. It also
Case Study Success with a. into a Corporate Integrity Agreement (CIA)
Case Study Success with a Corporate Integrity Agreement (CIA) More than 100 affiliated physician practices and healthcare facilities Operations in multiple states More than 2,000 Covered Persons under
SecureZIP User Guide
SecureZIP User Guide SecureZIP is an application for zipping files to save storage space as well as encrypting files with password control to protect information. SecureZIP not only works alone to perform
WHITE PAPER WHY ORGANIZATIONS NEED LTO-6 TECHNOLOGY TODAY
WHITE PAPER WHY ORGANIZATIONS NEED LTO-6 TECHNOLOGY TODAY CONTENTS Storage and Security Demands Continue to Multiply.......................................3 Tape Keeps Pace......................................................................4
Deploying PGP Encryption and Compression for z/os Batch Data Protection to (FIPS-140) Compliance
Deploying PGP Encryption and Compression for z/os Batch Data Protection to (FIPS-140) Compliance Patrick Townsend Software Diversified Services/Townsend Security August 9, 2011 Session Number 9347 PGP
Computer Security Log Files as Evidence
Product Evaluation: ArcSight ESM www.kahnconsultinginc.com Computer Security Log Files as Evidence An Evaluation of ArcSight ESM I. Executive Summar y It is the opinion of Kahn Consulting, Inc., that ArcSight
Cyber Governance Preparing for the Inevitable Perimeter Breach
SAP Brief SAP Extensions SAP Regulation Management by Greenlight, Cyber Governance Edition Objectives Cyber Governance Preparing for the Inevitable Perimeter Breach Augment your preventive cybersecurity
Should Costing Version 1.1
Should Costing Identify should cost elements early in the design phase, and enable cost down initiatives Version 1.1 August, 2010 WHITE PAPER Copyright Notice Geometric Limited. All rights reserved. No
HIPAA and Network Security Curriculum
HIPAA and Network Security Curriculum This curriculum consists of an overview/syllabus and 11 lesson plans Week 1 Developed by NORTH SEATTLE COMMUNITY COLLEGE for the IT for Healthcare Short Certificate
Security and Identity Management Auditing Converge
Research Publication Date: 12 July 2005 ID Number: G00129279 Security and Identity Management Auditing Converge Earl L. Perkins, Mark Nicolett, Ant Allan, Jay Heiser, Neil MacDonald, Amrit T. Williams,
Lead architect. Business architect. Technical architect. Lead Architect
Tactical Guidelines, G. James Research Note 20 September 2002 Best Practices for Selecting Enterprise Architects A good enterprise architect needs not only excellent technical skills, but business and
HIPAA Security Alert
Shipman & Goodwin LLP HIPAA Security Alert July 2008 EXECUTIVE GUIDANCE HIPAA SECURITY COMPLIANCE How would your organization s senior management respond to CMS or OIG inquiries about health information
HIPAA Security. 4 Security Standards: Technical Safeguards. Security Topics
HIPAA Security S E R I E S Security Topics 1. Security 101 for Covered Entities 2. Security Standards - Administrative Safeguards 3. Security Standards - Physical Safeguards 4. Security Standards - Technical
EXECUTIVE BRIEF SPON. File Synchronization and Sharing Market Forecast, 2012-2017. Published May 2013. An Osterman Research Executive Brief
EXECUTIVE BRIEF N Sharing Market Forecast, sponsored by An Osterman Research Executive Brief Published May 2013 SPON sponsored by Osterman Research, Inc. P.O. Box 1058 Black Diamond, Washington 98010-1058
Patch management point solution. Platform. Patch Management Point Solution
Markets, R. Colville, M. Nicolett Research Note 18 March 2003 Patch Management: Identifying the Vendor Landscape As the importance of patch management increases, it is important to understand the limitations
HIPAA Compliance Review Analysis and Summary of Results
HIPAA Compliance Review Analysis and Summary of Results Centers for Medicare & Medicaid Services (CMS) Office of E-Health Standards and Services (OESS) Reviews 2008 Table of Contents Introduction 1 Risk
Swedish Armed Forces: Modernizing Inventory Management Technology with SAP Mobile Platform
Picture Credit Swedish Armed Forces, Stockholm, Sweden. Used with permission. Swedish Armed Forces: Modernizing Inventory Management Technology with SAP Mobile Platform The Swedish Armed Forces are the
State of Nevada Department of Health and Human Services (DHHS) Division of Health Care Financing and Policy (DHCFP)
Hewlett Packard Enterprise for HIPAA Compliant Electronic Transactions Nevada Medicaid Management Information System (NV MMIS) State of Nevada Department of Health and Human Services (DHHS) Division of
DEMONSTRATING THE ROI FOR SIEM
DEMONSTRATING THE ROI FOR SIEM Tales from the Trenches HP Enterprise Security Business Whitepaper Introduction Security professionals sometimes struggle to demonstrate the return on investment for new
Alliance AES Encryption for IBM i Solution Brief
Encryption & Tokenization Alliance AES Encryption for IBM i Solution Brief A Complete AES Encryption Solution Alliance AES Encryption for IBM i provides AES encryption for sensitive data everywhere it
Estimating the Costs of an ERP/Business Application Initiative
Estimating the Costs of an ERP/Business Application Initiative Gartner RAS Core Research Note G00167162, Denise Ganly, 30 April 2009, RA4 09122009 Using a cost-estimation process will help to ensure that
Vertical Data Warehouse Solutions for Financial Services
Decision Framework, M. Knox Research Note 24 July 2003 Vertical Data Warehouse Solutions for Financial Services Packaged DW financial services solutions differ in degree of and approach to verticalization,
Warwick Analytics: Building Powerful Software Certified to Integrate with SAP HANA
SAP Success Story High Tech Warwick Analytics 2014 SAP SE or an SAP affiliate company. All rights reserved. Warwick Analytics: Building Powerful Software Certified to Integrate with SAP HANA Company Warwick
10 Steps to Establishing an Effective Email Retention Policy
WHITE PAPER: 10 STEPS TO EFFECTIVE EMAIL RETENTION 10 Steps to Establishing an Effective Email Retention Policy JANUARY 2009 Eric Lundgren INFORMATION GOVERNANCE Table of Contents Executive Summary SECTION
Cloud Marketing: Faces in the Cloud
Robert Groebel September 25, 2015 Features Cloud Marketing: Faces in the Cloud Share this article: facebook twitter linkedin google Comments Email Print As the need for more informed conversations with
The disaster recovery procedures started immediately. Services to IBM users were restored within 48 hours.
C. Da Rold, S. Mingay Research Note 7 November 2003 Commentary Italian Blackout Impacts IBM Image and Clients' Business IBM's data center in Vimercate failed to deliver IT services to several clients after
Midsize Enterprises Lead in Adoption of Payment Outsourcing
Research Brief Midsize Enterprises Lead in Adoption of Payment Outsourcing Abstract: More than one-third of midsize enterprises plan to use payment outsourcing by 2004. New areas of interest include automated
Best Practices for DLP Implementation in Healthcare Organizations
Best Practices for DLP Implementation in Healthcare Organizations Healthcare organizations should follow 4 key stages when deploying data loss prevention solutions: 1) Understand Regulations and Technology
EMC White Paper EMC EmailXtender Provides E-mail Records Management for Microsoft Exchange Server 2003
EMC White Paper EMC EmailXtender Provides E-mail Records Management for Microsoft Exchange Server 2003 Abstract: This white paper describes how Microsoft Exchange Server 2003 and EMC EmailXtender work
Business white paper Top 10 reasons to choose Cloud-based Archiving
Business white paper Top 10 reasons to choose Cloud-based Archiving Table of contents 3 Reason 1: Equal or better security 4 Reason 2: Lower risk 4 Reason 3: Cost savings 5 Reason 4: Greater data access
Secure Data Transmission Solutions for the Management and Control of Big Data
Secure Data Transmission Solutions for the Management and Control of Big Data Get the security and governance capabilities you need to solve Big Data challenges with Axway and CA Technologies. EXECUTIVE
Cloud Management Platform Market Map 2016
MARKET MAP Cloud Management Platform Market Map 2016 MAY 2016 William Fellows, Research Vice President A cloud management platform should operate like a cloud Uber app for IT consumption and delivery that
Building a Comprehensive Mobile Security Strategy
WHITE PAPER Building a Comprehensive Mobile Security Strategy A key to safeguarding data and apps is finding the right partner. protecting mobile environments has become more complex. Fortunately, solutions
Enterprise effectiveness of digital certificates: Are they ready for prime-time?
Enterprise effectiveness of digital certificates: Are they ready for prime-time? by Jim Peterson As published in (IN)SECURE Magazine issue 22 (September 2009). www.insecuremag.com www.insecuremag.com 1
White Paper. From Policy to Practice: A Practical Guide to Implementing HIPAA Security Safeguards
From Policy to Practice: A Practical Guide to Implementing HIPAA Security Safeguards Abstract HIPAA requires a number of administrative, technical, and physical safeguards to protect patient information
CIO Update: Legacy Modernization Magic Quadrant Helps in Providing Applications for Tomorrow
IGG-03192003-03 D. Vecchio Article 19 March 2003 CIO Update: Legacy Modernization Magic Quadrant Helps in Providing Applications for Tomorrow The conversion of aging applications to more modern architectures
MOBILE BANKING SERVICES INCLUDING TEXT MESSAGING AND REMOTE DEPOSIT SERVICE ENROLLMENT TERMS AND CONDITIONS ( END USER TERMS )
MOBILE BANKING SERVICES INCLUDING TEXT MESSAGING AND REMOTE DEPOSIT SERVICE ENROLLMENT TERMS AND CONDITIONS ( END USER TERMS ) The Mobile Banking Services including Text Messaging and Remote Deposit Service
Managing Mobile Devices in a Device-Agnostic World Finding and Enforcing a Policy That Makes Business Sense
SAP White Paper SAP Partner Organization Mobile Device Management Managing Mobile Devices in a Device-Agnostic World Finding and Enforcing a Policy That Makes Business Sense Table of Content 4 Mobile Device
Big Data, Big Security:
Big Data, Big Security: Best Practices for Enterprise Data Encryption Introduction Big Data is a big topic right now and well it should be. The ebb and flow of commerce and other interactions around the
Thales e-security keyauthority Security-Hardened Appliance with IBM Tivoli Key Lifecycle Manager Support for IBM Storage Devices
> Thales e-security keyauthority Security-Hardened Appliance with IBM Tivoli Key Lifecycle Manager Support for IBM Storage Devices WHITE PAPER November 2011 www.thales-esecurity.com TABLE OF CONTENTS THE
Orbograph HIPAA/HITECH Compliance, Resiliency and Security
Orbograph HIPAA/HITECH Compliance, Resiliency and Security Version 1.0 August 2013 Legal Notice This document is delivered subject to the following conditions and restrictions: The document contains proprietary
AlienVault for Regulatory Compliance
AlienVault for Regulatory Compliance Overview of Regulatory Compliance in Information Security As computers and networks have become more important in society they and the information they contain have
Smartcrypt Encryption Key Management
Smartcrypt Encryption Key Management Executive Summary Encryption key management is the cornerstone of any enterprise encryption solution. The National Institute of Standards and Technology (NIST) has
BUSINESS ASSOCIATE AGREEMENT
BUSINESS ASSOCIATE AGREEMENT The parties to this ( Agreement ) are, a _New York_ corporation ( Business Associate ) and ( Client ) you, as a user of our on-line health record system (the "System"). BY
Magic Quadrant for Storage Services, 2Q05 25 May 2005 Adam W. Couture Robert E. Passmore
Magic Quadrant for Storage Services, 2Q05 25 May 2005 Adam W. Couture Robert E. Passmore Source: Gartner Note Number: G00127958 Leading storage service providers in North America are executing on clear
Securing Patient Data in Today s Mobilized Healthcare Industry. A Good Technology Whitepaper
Securing Patient Data in Today s Mobilized Healthcare Industry Securing Patient Data in Today s Mobilized Healthcare Industry 866-7-BE-GOOD good.com 2 Contents Executive Summary The Role of Smartphones
Organizations Must Employ Effective Data Security Strategies
Research Publication Date: 30 August 2005 ID Number: G00123639 Organizations Must Employ Effective Data Security Strategies Rich Mogull Organizations can best protect data through a hierarchical data security
U.S. Department of State, Selects Syclo SMART Mobile Suite For Maximo
U.S. Department of State, Selects Syclo SMART Mobile Suite For Maximo Presented by: Charles Kalajian Syclo, Federal Account Executive Steve Hamilton Syclo, Vice President of Sales John Bainbridge U.S.
RTE Strategies for Revenue Cycle Management
Tutorials, M. Davis Research Note 18 February 2003 RTE Strategies for Revenue Cycle Management By 2005, care delivery organizations will have to adopt realtime enterprise strategies to survive the continued
Direct Secure Messaging: Improving the Secure and Interoperable Exchange of Health Information
Direct Secure Messaging: Improving the Secure and Interoperable Exchange of Health Information Within the healthcare industry, the exchange of protected health information (PHI) is governed by regulations
FIVE KEY CONSIDERATIONS FOR ENABLING PRIVACY IN HEALTH INFORMATION EXCHANGES
FIVE KEY CONSIDERATIONS FOR ENABLING PRIVACY IN HEALTH INFORMATION EXCHANGES The implications for privacy and security in the emergence of HIEs The emergence of health information exchanges (HIE) is widely
PRACTICE NOTE 1013 ELECTRONIC COMMERCE - EFFECT ON THE AUDIT OF FINANCIAL STATEMENTS
PRACTICE NOTE 1013 ELECTRONIC COMMERCE - EFFECT ON THE AUDIT OF FINANCIAL STATEMENTS (Issued December 2003; revised September 2004 (name change)) PN 1013 (September 04) PN 1013 (December 03) Contents Paragraphs
