Skip to main content
 

iron mountain

Results 1 - 24 of 24Sort Results By: Published Date | Title | Company Name
Published By: Iron Mountain     Published Date: Aug 28, 2014
Download this infographic to learn 5 common myths about EMR Transition and enterprise-wide information governance revealed in a survey conducted by Iron Mountain.
Tags : 
iron mountain, him, health information managers, healthcare technology, information management, healthcare it, emr, emr transition
    
Iron Mountain
Published By: Iron Mountain     Published Date: Aug 28, 2014
The terms disaster recovery and business continuity planning are often used interchangeably but, when you think about it, one is much preferable to the other. While disaster recovery makes clear that the organization will rise again, it does not let the world (and your patient population) know that the business of care will go on during the recovery process. In this important on-demand webinar, you’ll hear from one CIO who has given a lot of thought to keeping operations up and running no matter what gets thrown the organization’s way. With so many varieties of disaster lurking in wait, this is one webinar you can’t afford to miss.
Tags : 
iron mountain, healthcare it, disaster recover, business continuity plan, healthcare operation, business operations, information technology
    
Iron Mountain
Published By: Iron Mountain     Published Date: Aug 28, 2014
Download this analytics report to learn how your healthcare organization can develop a successful strategy to manage data.
Tags : 
iron mountain, healthcare it, health it, data management, healthcare data management, hit, meaniingful use, icd-10
    
Iron Mountain
Published By: Iron Mountain     Published Date: Aug 28, 2014
Download this whitepaper to learn strategies for effective healthcare information lifecycle management.
Tags : 
iron mountain, healthcare data, healthcare it, hit, ehr, health information, information lifecycle management, ilm
    
Iron Mountain
Published By: Iron Mountain     Published Date: Aug 28, 2014
The volume of information in the healthcare industry continues to grow exponentially. Meaningful Use, ICD-10, and Accountable Care are all contributing to this data growth. Download this whitepaper to learn how your organization can develop strategies to effectively manage this information throughout its life cycle.
Tags : 
iron mountain, healthcare information, information governance, information management, healthcare it, hit, data management, electronic information
    
Iron Mountain
Published By: Iron Mountain     Published Date: Aug 28, 2014
This paper examines a new paradigm for Health Information and Records Management (HIRM) and provides practical guidance to help HIM professionals unwind paper records, offload the burden of low-value production work and lead the transition from traditional records management to an optimized HIRM model.
Tags : 
iron mountain, health information management, information governance, healthcare it, electronic health records, ehr, him, him professionals
    
Iron Mountain
Published By: Iron Mountain     Published Date: Aug 28, 2014
This white paper describes findings from the first major survey of information governance practices at healthcare organizations.
Tags : 
iron mountain, information governance practices, ahima, cohasset associates, healthcare benchmarking, healthcare it, information lifecycle practices, health information management
    
Iron Mountain
Published By: IBM APAC     Published Date: Aug 22, 2017
While working to maintain tactical control of the mobile environment, IT managers often find themselves drowning in minutiae. Overwhelmed by the number of moving parts, they’re unable to stay abreast of the latest threats, let alone extract meaning from or make decisions based on the mountains of data now being collected. With limited IT resources dedicated to mobile technology tools that facilitate reactive rather than proactive management—and limited visibility into mobile intelligence across the organization—many managers have had to choose between security and productivity as the focus of their efforts.
Tags : 
security risks, it operations, workforce, advisor, mobile security, mobile metrics, cloud based, benchmarking data
    
IBM APAC
Published By: Iron Mountain     Published Date: Sep 13, 2010
Today, more organizations than ever recognize the value and convenience of using cloud backup to protect their data.
Tags : 
iron mountain, cloud, pc backup, recovery, connected, data management, data storage, cloud storage
    
Iron Mountain
Published By: Iron Mountain     Published Date: Sep 24, 2010
Increasingly firms are adopting data protection and recovery for enterprise laptops and desktops. Read this IDC Report to find out if your PCs and Laptops are Recovery and Discovery Ready.
Tags : 
iron mountain, cloud, pc backup, recovery, connected, data management, data storage, cloud storage
    
Iron Mountain
Published By: Iron Mountain     Published Date: Jun 01, 2015
Il constitue une étape cruciale non seulement pour assurer la conformité avec la législation, mais aussi pour contrôler les coûts et garantir que vos données sont disponibles à tout moment – quel que soit leur emplacement.
Tags : 
    
Iron Mountain
Published By: Iron Mountain     Published Date: Jun 01, 2015
L'économie de l'information apporte une stratégie qui aide les entreprises à optimiser la valeur de leurs données et à limiter les risques à chaque étape, de la création initiale des documents et des données à leur exploitation et à leur destruction sécurisée.
Tags : 
    
Iron Mountain
Published By: Iron Mountain     Published Date: Jun 01, 2015
Er ist nicht nur wichtig für die Compliance, sondern hilft auch, Kosten zu kontrollieren und sicherzustellen, dass Informationen zur Verfügung stehen, wenn sie benötigt werden - unabhängig vom Speicher- oder Aufbewahrungsort.
Tags : 
    
Iron Mountain
Published By: Iron Mountain     Published Date: Jun 01, 2015
Der wirtschaftliche Umgang mit Informationen basiert auf einer umfassenden, von allen Beteiligten unterstützten Strategie, die eine optimale Wertschöpfung der Informationen ermöglicht und das Risiko in jeder "Lebensphase" von Akten und Informationen minimiert, angefangen bei der ersten Erstellung bis hin zur sicheren Vernichtung.
Tags : 
    
Iron Mountain
Published By: Iron Mountain     Published Date: Jun 01, 2015
Deze stap is belangrijk, niet alleen om compliance te verzekeren maar ook om de kosten in de hand te houden. Ook waarborgt u dat uw informatie op het juiste moment beschikbaar is, onafhankelijk van waar deze zich bevindt.
Tags : 
    
Iron Mountain
Published By: Iron Mountain     Published Date: Jun 01, 2015
Dit vijfdelige e-book biedt een uitgebreide en samenwerkingsgerichte strategie om organisaties te helpen hun informatiewaarde te maximaliseren en de risico's in elke fase te beperken. Dit geldt voor de gehele levenscyclus van documenten. Van het aanmaken van records en informatie, via het actieve leven tot de veilige vernietiging ervan.
Tags : 
    
Iron Mountain
Published By: Iron Mountain     Published Date: Jun 04, 2015
Este concepto proporciona una estrategia completa y de colaboración para ayudar a las empresas a optimizar el valor de la información y limitar el riesgo en todas las fases, desde la creación inicial de los documentos e información hasta su fin de vida y destrucción segura.
Tags : 
    
Iron Mountain
Published By: Iron Mountain     Published Date: Jun 01, 2015
Es un paso importante no solo para obtener la conformidad, sino también para controlar los costes y asegurar que la información está disponible cuando se necesita, independientemente de donde se encuentre.
Tags : 
    
Iron Mountain
Published By: IBM     Published Date: May 01, 2017
Today's mobile landscape is very much a moving target. IT managers must keep track of all types of devices and platforms, hundreds if not thousands of applications and a threat landscape that changes by the minute. In this ever-changing environment, IT staff often find themselves drowning in mobile minutiae, overwhelmed by mountains of endpoint data but unable to extract meaning from it or make business decisions based on it. The tactical challenge of keeping infrastructure and business data secure while keeping workers productive each day takes precedence. And even then, IT managers can find themselves choosing between security and productivity as they decide how best to spend limited time and resources. This whitepaper will guide you how to get deep visibility into relevant endpoint data within the platform, granting actionable intelligence that can have a measurable impact on your organization.
Tags : 
it staff, applications, business data, data security, it managers, endpoint data, device, platforms
    
IBM
Published By: ProofSpace     Published Date: Jul 31, 2007
This paper details the processes by which ProofMark tags electronic records with a self-validating cryptographic seal that acts as a "tamper indicator" based on a true and provable time-reference datum.  With this it is able to provide instantaneous and irrefutable proof of authenticity, no matter where the data resides or who has controlled it.
Tags : 
proofspace, proofmark, proofspace, proofmark, signing key vulnerability, trustworthy time, authenticated time stamps, time existence of data
    
ProofSpace
Published By: ProofSpace     Published Date: Aug 07, 2007
This white paper presents a solution framework for Life Science Organizations that want to implement enterprise digital trust management to protect their electronic value chain.
Tags : 
proofspace, proofmark, signing key vulnerability, trustworthy time, authenticated time stamps, time existence of data, electronic postmark, time stamp
    
ProofSpace
Published By: ProofSpace     Published Date: Aug 08, 2007
Digital signatures aren't enough. This paper posits that data integrity needs to be redefined within the context of a time-sensitive mechanism.
Tags : 
proofspace, proofmark, signing key vulnerability, trustworthy time, authenticated time stamps, time existence of data, electronic postmark, time stamp
    
ProofSpace
Published By: ProofSpace     Published Date: Aug 17, 2007
This white paper defines the life cycle of an electronically signed record and describes  the requirements for handwritten signature-equivalence throughout its retention period.
Tags : 
proofspace, proofmark, signing key vulnerability, trustworthy time, authenticated time stamps, time existence of data, electronic postmark, asymmetric key cryptography
    
ProofSpace
Published By: ProofSpace     Published Date: Sep 10, 2007
Read this paper and learn the principles that are prerequisites to enforceable electronic agreements as required by existing legal standards and electronic signature legislation.  This paper will also specify sixteen measurement criteria that can be used as metrics to assess whether the architecture of an electronic transaction will meet the requirements of admissibility.
Tags : 
proofspace, proofmark, signing key vulnerability, trustworthy time, authenticated time stamps, time existence of data, electronic postmark, asymmetric key cryptography
    
ProofSpace
Search      

Add Research

Get your company's research in the hands of targeted business professionals.