{"id":1025,"date":"2015-06-01T01:47:40","date_gmt":"2015-06-01T08:47:40","guid":{"rendered":"https:\/\/www.microsoft.com\/industry\/blog\/uncategorized\/security-compliance-and-trusted-technology\/"},"modified":"2023-07-17T12:27:22","modified_gmt":"2023-07-17T19:27:22","slug":"security-compliance-and-trusted-technology","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/healthcare\/2015\/06\/01\/security-compliance-and-trusted-technology\/","title":{"rendered":"Healthcare compliance, security, and trusted health technology"},"content":{"rendered":"
\n

Integrate and simplify\u00a0your healthcare compliance<\/h2>\n<\/div>\n
\n

Security and healthcare compliance offerings from Microsoft and our partners help protect your ICT infrastructure. Protection, access , and management features help you manage risk and achieve your strategic goals.<\/p>\n

Download\u00a0the free whitepaper:<\/strong>\u00a0<\/span>A Practical Guide to Designing Secure Health Solutions Using Microsoft Azure<\/a><\/p>\n<\/div>\n

\n

Deliver security-enhanced access from virtually anywhere*<\/h2>\n<\/div>\n
\n

A comprehensive, user-centric approach to security and healthcare\u00a0compliance management helps protect health data by providing in-depth defense across multiple layers. It also enables security-enhanced access for your mobile workforce and patients.<\/p>\n

The cloud is a far more powerful, far less expensive way to innovate than health solutions built the traditional way. But health organizations need to trust that sensitive information will stay secure and comply with regulations when they adopt cloud platforms. We are committed to ensuring that your data stays secure, private, and under your control, and that with the Microsoft Cloud, you will stay compliant, even as regulations and standards evolve.<\/p>\n

The Microsoft family of devices, services, and partner solutions can help transform the way care teams communicate and access and use information throughout the course of their day. Windows-based, clinical-grade devices help to enable virtually anywhere access to actionable intelligence, resources, and personalized experiences that improve user productivity. With these enterprise-grade solutions that help keep patient information secure and compliant, users can leverage any single clinical-grade device to tap into comprehensive information systems while enjoying the ease of use associated with advanced technology. By providing efficient access to patient health information to both care teams and patients, all involved parties have the information they need to make informed decisions and to follow through on the prescribed care regimen.<\/p>\n

Learn more about mobile home health<\/a> and Windows 10<\/a><\/p>\n<\/div>\n

\n

Integrate and extend security features across your organization<\/h2>\n<\/div>\n
\n

Built-in security features work across multiple platforms and environments, and integration across the layers helps you get more value from your existing investments.<\/p>\n

Manage healthcare compliance, simplify the security experience<\/h2>\n<\/div>\n
\n

Help simplify the deployment and delivery of security features aligned to the needs of health professionals and patients so health professionals and patients can quickly and easily access security-enhanced applications and information.<\/p>\n

Visit the Microsoft Trust Center<\/a><\/p>\n<\/div>\n

\n

\"healthcareAccelerate the planning and delivery of health solutions<\/h2>\n<\/div>\n
\n

The Microsoft Connected Health Platform (CHP) provides a collection of best practices and guidelines to help build e-health solutions that are efficient, security-enhanced, flexible, and scalable. All of these features build a platform that helps improve patient engagement.<\/p>\n

Based on the extensible and agile principles of the\u00a0Connected Health Framework<\/a>\u00a0(CHF), Microsoft CHP provides offerings for optimizing health information and communication technology, including prescriptive architecture, design, and deployment guidance; tools; and solution accelerators. Microsoft CHP is built primarily on a foundation of application platform technologies and services, as well as generic Microsoft infrastructure optimization models and tools, tailored for the health environment, enabling the delivery and management of on-premises, cloud, or hybrid solutions.<\/p>\n


\n

*An appropriate device, Internet connection, and supported versions of Internet Explorer, Firefox, or Safari browsers are required. Access from mobile devices requires Wi-Fi capability or depends on network availability.<\/p>\n<\/div>\n","protected":false},"excerpt":{"rendered":"

Healthcare compliance and security offerings from Microsoft and our partners help protect your ICT infrastructure.<\/p>\n","protected":false},"author":843,"featured_media":9624,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"ep_exclude_from_search":false,"_classifai_error":"","footnotes":""},"categories":[1507],"post_tag":[],"content-type":[1483],"coauthors":[4314],"class_list":["post-1025","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-healthcare","content-type-thought-leadership"],"yoast_head":"\nHealthcare compliance, security, and trusted health technology - Microsoft Industry Blogs<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/healthcare\/2015\/06\/01\/security-compliance-and-trusted-technology\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Healthcare compliance, security, and trusted health technology - Microsoft Industry Blogs\" \/>\n<meta property=\"og:description\" content=\"Healthcare compliance and security offerings from Microsoft and our partners help protect your ICT infrastructure.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/healthcare\/2015\/06\/01\/security-compliance-and-trusted-technology\/\" \/>\n<meta property=\"og:site_name\" content=\"Microsoft Industry Blogs\" \/>\n<meta property=\"article:published_time\" content=\"2015-06-01T08:47:40+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-07-17T19:27:22+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-content\/uploads\/2016\/04\/Health-Security.png\" \/>\n\t<meta property=\"og:image:width\" content=\"290\" \/>\n\t<meta property=\"og:image:height\" content=\"125\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Microsoft Industry for Healthcare Team\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Microsoft Industry for Healthcare Team\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 min read\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/healthcare\/2015\/06\/01\/security-compliance-and-trusted-technology\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/healthcare\/2015\/06\/01\/security-compliance-and-trusted-technology\/\"},\"author\":[{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/author\/microsoft-industry-for-healthcare-team\/\",\"@type\":\"Person\",\"@name\":\"Microsoft Industry for Healthcare Team\"}],\"headline\":\"Healthcare compliance, security, and trusted health technology\",\"datePublished\":\"2015-06-01T08:47:40+00:00\",\"dateModified\":\"2023-07-17T19:27:22+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/healthcare\/2015\/06\/01\/security-compliance-and-trusted-technology\/\"},\"wordCount\":518,\"publisher\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/healthcare\/2015\/06\/01\/security-compliance-and-trusted-technology\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-content\/uploads\/2016\/04\/Health-Security.png\",\"articleSection\":[\"Healthcare\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/healthcare\/2015\/06\/01\/security-compliance-and-trusted-technology\/\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/healthcare\/2015\/06\/01\/security-compliance-and-trusted-technology\/\",\"name\":\"Healthcare compliance, security, and trusted health technology - Microsoft Industry Blogs\",\"isPartOf\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/healthcare\/2015\/06\/01\/security-compliance-and-trusted-technology\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/healthcare\/2015\/06\/01\/security-compliance-and-trusted-technology\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-content\/uploads\/2016\/04\/Health-Security.png\",\"datePublished\":\"2015-06-01T08:47:40+00:00\",\"dateModified\":\"2023-07-17T19:27:22+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/healthcare\/2015\/06\/01\/security-compliance-and-trusted-technology\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/healthcare\/2015\/06\/01\/security-compliance-and-trusted-technology\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/healthcare\/2015\/06\/01\/security-compliance-and-trusted-technology\/#primaryimage\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-content\/uploads\/2016\/04\/Health-Security.png\",\"contentUrl\":\"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-content\/uploads\/2016\/04\/Health-Security.png\",\"width\":290,\"height\":125},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/healthcare\/2015\/06\/01\/security-compliance-and-trusted-technology\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Healthcare compliance, security, and trusted health technology\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/#website\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/\",\"name\":\"Microsoft Industry Blogs\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/#organization\",\"name\":\"Microsoft Industry Blogs\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-content\/uploads\/2019\/08\/Microsoft-Logo.png\",\"contentUrl\":\"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-content\/uploads\/2019\/08\/Microsoft-Logo.png\",\"width\":259,\"height\":194,\"caption\":\"Microsoft Industry Blogs\"},\"image\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Healthcare compliance, security, and trusted health technology - Microsoft Industry Blogs","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/healthcare\/2015\/06\/01\/security-compliance-and-trusted-technology\/","og_locale":"en_US","og_type":"article","og_title":"Healthcare compliance, security, and trusted health technology - Microsoft Industry Blogs","og_description":"Healthcare compliance and security offerings from Microsoft and our partners help protect your ICT infrastructure.","og_url":"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/healthcare\/2015\/06\/01\/security-compliance-and-trusted-technology\/","og_site_name":"Microsoft Industry Blogs","article_published_time":"2015-06-01T08:47:40+00:00","article_modified_time":"2023-07-17T19:27:22+00:00","og_image":[{"width":290,"height":125,"url":"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-content\/uploads\/2016\/04\/Health-Security.png","type":"image\/png"}],"author":"Microsoft Industry for Healthcare Team","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Microsoft Industry for Healthcare Team","Est. reading time":"2 min read"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/healthcare\/2015\/06\/01\/security-compliance-and-trusted-technology\/#article","isPartOf":{"@id":"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/healthcare\/2015\/06\/01\/security-compliance-and-trusted-technology\/"},"author":[{"@id":"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/author\/microsoft-industry-for-healthcare-team\/","@type":"Person","@name":"Microsoft Industry for Healthcare Team"}],"headline":"Healthcare compliance, security, and trusted health technology","datePublished":"2015-06-01T08:47:40+00:00","dateModified":"2023-07-17T19:27:22+00:00","mainEntityOfPage":{"@id":"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/healthcare\/2015\/06\/01\/security-compliance-and-trusted-technology\/"},"wordCount":518,"publisher":{"@id":"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/#organization"},"image":{"@id":"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/healthcare\/2015\/06\/01\/security-compliance-and-trusted-technology\/#primaryimage"},"thumbnailUrl":"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-content\/uploads\/2016\/04\/Health-Security.png","articleSection":["Healthcare"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/healthcare\/2015\/06\/01\/security-compliance-and-trusted-technology\/","url":"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/healthcare\/2015\/06\/01\/security-compliance-and-trusted-technology\/","name":"Healthcare compliance, security, and trusted health technology - Microsoft Industry Blogs","isPartOf":{"@id":"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/healthcare\/2015\/06\/01\/security-compliance-and-trusted-technology\/#primaryimage"},"image":{"@id":"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/healthcare\/2015\/06\/01\/security-compliance-and-trusted-technology\/#primaryimage"},"thumbnailUrl":"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-content\/uploads\/2016\/04\/Health-Security.png","datePublished":"2015-06-01T08:47:40+00:00","dateModified":"2023-07-17T19:27:22+00:00","breadcrumb":{"@id":"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/healthcare\/2015\/06\/01\/security-compliance-and-trusted-technology\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.microsoft.com\/en-us\/industry\/blog\/healthcare\/2015\/06\/01\/security-compliance-and-trusted-technology\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/healthcare\/2015\/06\/01\/security-compliance-and-trusted-technology\/#primaryimage","url":"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-content\/uploads\/2016\/04\/Health-Security.png","contentUrl":"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-content\/uploads\/2016\/04\/Health-Security.png","width":290,"height":125},{"@type":"BreadcrumbList","@id":"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/healthcare\/2015\/06\/01\/security-compliance-and-trusted-technology\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/"},{"@type":"ListItem","position":2,"name":"Healthcare compliance, security, and trusted health technology"}]},{"@type":"WebSite","@id":"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/#website","url":"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/","name":"Microsoft Industry Blogs","description":"","publisher":{"@id":"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/#organization","name":"Microsoft Industry Blogs","url":"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-content\/uploads\/2019\/08\/Microsoft-Logo.png","contentUrl":"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-content\/uploads\/2019\/08\/Microsoft-Logo.png","width":259,"height":194,"caption":"Microsoft Industry Blogs"},"image":{"@id":"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/#\/schema\/logo\/image\/"}}]}},"distributor_meta":false,"distributor_terms":false,"distributor_media":false,"distributor_original_site_name":"Microsoft Industry Blogs","distributor_original_site_url":"https:\/\/www.microsoft.com\/en-us\/industry\/blog","push-errors":false,"_links":{"self":[{"href":"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-json\/wp\/v2\/posts\/1025"}],"collection":[{"href":"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-json\/wp\/v2\/users\/843"}],"replies":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-json\/wp\/v2\/comments?post=1025"}],"version-history":[{"count":0,"href":"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-json\/wp\/v2\/posts\/1025\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-json\/wp\/v2\/media\/9624"}],"wp:attachment":[{"href":"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-json\/wp\/v2\/media?parent=1025"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-json\/wp\/v2\/categories?post=1025"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-json\/wp\/v2\/post_tag?post=1025"},{"taxonomy":"content-type","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-json\/wp\/v2\/content-type?post=1025"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-json\/wp\/v2\/coauthors?post=1025"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}