Find Resources & Connect with members on topics that interest you.

AI - Acquire and Implement

PO - Plan and Organize

DS - Deliver and Support

Please sign in to see your topics.

You must be logged in to join this group.

HIPAA

Welcome to the HIPAA topic!

In this topic you may collaborate with your peers by participating in discussions, adding links and documents, and starting or contributing to wikis.

ISACA members can participate by clicking on the “Join this Community” button. You must be signed into the site. Set your alerts to be notified of new discussion activity within this community. Not an ISACA member? Join now!

 
This Topic Has:
345 Members
0 Online
6355 Visits

Community Leader

Knowledge Center Manager

Knowledge Center Manager

Title: Become a Topic Leader!

Badge: Energizer

 

NEW! Activity Badges

Badges help others understand your level of community activity and your reputation as a contributor within the Knowledge Center. Learn More.

Discussions: 9 total

Must be a Topic member to contribute
View All »
In 2017 the AICPA released the Trust Service Criteria 100.  I'm looking for a mapping between the Trust Service Criteria and HIPAA.  Does anyone know where I can get one? Thanks,
Aaron Thomas | 2/28/2018 8:51:26 AM | COMMENTS(1)
I've read about the various IT governance frameworks and standards in the industry; mainly NIST (Cybersecurity framework), COBIT 5, ITIL, and ISO27002 standard. Which one is the best framework/standard for a company that is governed by HIPAA? I come from ...
HW | 5/29/2017 6:12:06 AM | COMMENTS(5)
Does anyone know which are the training requirements for personnel handling PHI ?Is there any kind of mandatory training as per HIPAA? If yes, do you know how often should be taken? Thank you in advance!regardsEsteban
Esteban872 | 3/23/2017 11:42:01 AM | COMMENTS(5)
Does anyone know where I can find a detail mapping of the HIPAA requirements to the SSAE16 SOC II Trust Principles? Thank you in advance!
Huskers2010 | 2/12/2016 2:52:56 PM | COMMENTS(4)
Dear All,  I would like to gain HIPPA and GLBA domain knowledge for audit. Could you please suggest the materials to be read and wanted to take relevant certification on this domains. Kindly suggest! Thank you! Best Regards,Ananda Narayanan, CISA
Ananth13 | 5/5/2015 4:25:37 AM | COMMENTS(4)
Can anyone point me in the right direction of planning documents or spreadsheets for assessing ones compliance with HIPAA?
Mark556 | 4/3/2015 9:51:49 AM | COMMENTS(9)

Documents & Publications: 1 total

Must be a Topic member to contribute
Books
Posted by ISACA 1534 days ago

Events & Online Learning: 0 total

No Results Found

Journal Articles: 9 total

Volume 5, 2016
by Craig R. Hollingsworth, CISA
Within the last two years, the author’s research-oriented company installed a commercial, off-the-shelf (COTS) tool within its Moderate network to use for survey work.
Volume 4, 2015
by Arian Eigen Heald, CISA, CGEIT, CEH, CISSP, GCFA
From businesses to government agencies, nearly every entity contracts some aspect of software development, system integration and hosting services—creating an emerging crisis in accountability.
Volume 2, 2013
by Tommie W. Singleton, Ph.D., CISA, CGEIT, CITP, CPA
This article attempts to provide the basics of where to find authoritative, reliable standards and frameworks from which an IT audit can be developed and conducted.
Volume 2, 2012
by Robbie Sauerberg, Weston Smith and Jonathan Tudor, CCNA
This article first describes the benefits of CRM systems and identifies risk areas inherent in CRM systems that threaten the benefits an organization can receive from a CRM system.
Volume 1, 2012
by Prakhar Srivastava and Tarun Verma
Log management can play a pivotal role in addressing PCI DSS requirements, be a success factor and enabler for safeguarding cardholder transaction data, and provide a secure and vulnerability-free environment for cardholders.
Volume 6, 2011
by Michael R. Overly, CISA, CRISC, CIPP, CISSP, ISSMP, Chanley T. Howell, and R. Michael Scarano
This article discusses three tools that providers can immediately put to use to substantially reduce the information security threats posed by their business associates.

Wikis: 2 total

Blog Posts: 1 total

Must be a Topic member to view blog posts
There is no doubt with our current business environment, we will be experiencing more cyber breaches in the next few months.  The latest threat is an architectural design flaw in newer CPU's.  These design vulnerabilities could allow attackers to intercep...
Posted By : Fred586 | 1 comments