The browser version you are using is not recommended for this site.Please consider upgrading to the latest version of your browser by clicking one of the following links.
We are sorry, This PDF is available in download format only
Wireless Credential Exchange-embedded RFID tag helps safeguard protected health information by enabling security policy enforcement based on device location.Executive OverviewThe Health Insurance Portability and Accountability Act (HIPAA) Security Rule requires healthcare organizations in the United States to prevent unauthorized access to their patients’ electronic protected health information (PHI). When PHI is compromised, these organizations can be fined millions of dollars, have their reputations damaged, and lose their patients’ trust. The primary causes of security breaches are lost or stolen devices and unauthorized access to PHI or applications that can compromise PHI.To help mitigate the risk of security breaches in healthcare, Intel is exploring a premises-aware security capability that enables an organization’s IT department to monitor all devices, receive alerts if a device leaves a secure zone, and control access to data and applications using location-based security policies, including forced encryption or self-wipe.
Intel professionals discuss how healthcare security controls prevent optimized care and privacy.
Researchers discuss next-gen genome sequencing on the Intel® Xeon® processor E5-2600 v3 product family.
Ward efficiency boosts on Intel®-based tablets, providing doctors convenient workstation apps in-hand.
Discussing the importance of bringing an enterprise-ready big data platform to the mainstream.
Genome data analysis realizes a competitive advantage for the collation of Big Data with cost-effective scalability
Jenna Hartley wants to help people through medical research, like those with CF-related infections.