IT Downloads Results for Topic : Compliance

All
All
 
 
Showing 1-10 of 28 Results    
 
 
Compliance2

Building a GRC Program: Assessing Stakeholder Needs and Readiness

  ITDownload  
  |   CHECKLISTS   |   Oct 25, 2016
 

This table outlines the top needs of each stakeholder group that can help guide your conversations on priorities and needs for the GRC program.

...  More >>

 
HealthCare01

Technical Evaluation, Testing, and Validation of the Usability of Electronic Health Records

  ITDownload  
  |   TUTORIALS   |   Oct 12, 2015
 

This document provides the empirical rationale for critical patient safety-related usability guidelines for standardization of EHRs.

...  More >>

 
Security35.jpg

Secrets: Managing Information Assets in the Age of Cyberespionage

  ITDownload  
  |   BOOK EXCERPTS   |   Sep 30, 2015
 

In this excerpt, Pooley focuses on managing your information assets, specifically looking at how to keep them safe, stay out of trouble, and maximize their utility in your business.

...  More >>

 

Risk Management: Concepts and Guidance

  ITDownload  
  |   BOOK EXCERPTS   |   Apr 08, 2015
 

The excerpt from chapter 5 focuses on the ins and outs of preparing for and running a risk management planning meeting, including necessary resources and expected outcomes.

...  More >>

 
Security7

Risk Management for Replication Devices

  ITDownload  
  |   POLICIES   |   Feb 24, 2015
 

This publication provides guidance on protecting the confidentiality, integrity, and availability of information processed, stored, or transmitted on replication devices.

...  More >>

 
DataM25

Guidelines for Media Sanitization

  ITDownload  
  |   POLICIES   |   Dec 29, 2014
 

This guide will assist organizations and system owners in making practical sanitization decisions based on the categorization of confidentiality of their information.

...  More >>

 
Money3

PCI Compliance: The Definitive Guide

  ITDownload  
  |   BOOK EXCERPTS   |   Aug 21, 2014
 

In this excerpt from chapter 20, the author briefly discusses the challenges and success factors that the organization must be aware of to maintain compliance and achieve optimum information security for the enterprise.

...  More >>

 
HealthCare01

Wi-Fi Enabled Healthcare

  ITDownload  
  |   BOOK EXCERPTS   |   May 27, 2014
 

This excerpt from chapter 6 looks at the use of Wi-Fi-enabled mobile medical devices in health care settings.

...  More >>

 
Security5TN

A Methodology for Developing Authentication Assurance Level Taxonomy for Smart Card-based Identity Verification

  ITDownload  
  |   POLICIES   |   Mar 19, 2014
 

This publication presents a methodology for assigning authentication strengths based on the strength of pair wise bindings between the five entities involved in smart card based authentications.

...  More >>

 
NIST Guide to the Processes Approach for Improving the Usability of Electronic Health Records

NIST Guide to the Processes Approach for Improving the Usability of Electronic Health Records

  ITDownload  
  |   TUTORIALS   |   Jun 05, 2012
 

The NIST guide ensures that designed EHRs are efficient, effective and satisfying to the user....  More >>

 
 
 
Pages:   1 2Next » 
 
 
Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.