Kevin Henry | Accountable Author

Product Pricing
Ready to get started? Book a demo with our team
Talk to an expert
HIPAA Violation Complaints: What Happens After You File? Timelines, Investigations, and Outcomes
HIPAA Jan 26, 2024

HIPAA Violation Complaints: What Happens After You File? Timelines, Investigations, and Outcomes

Filing a HIPAA Complaint. If you believe your protected health information (PHI) was mishandled,...

Anonymous HIPAA Violation Complaints: Rights, Safe Reporting Options, and What Happens Next
HIPAA Jan 26, 2024

Anonymous HIPAA Violation Complaints: Rights, Safe Reporting Options, and What Happens Next

Filing HIPAA Violation Complaints. When and where to file. If you believe protected health info...

HIPAA Security Rule Technical Safeguards List: 164.312 Control-by-Control Checklist
HIPAA Jan 25, 2024

HIPAA Security Rule Technical Safeguards List: 164.312 Control-by-Control Checklist

This control-by-control checklist translates 45 CFR 164.312 into practical steps you can implemen...

HIPAA PHI Definition: What Counts as Protected Health Information—and What Doesn’t
HIPAA Jan 25, 2024

HIPAA PHI Definition: What Counts as Protected Health Information—and What Doesn’t

Overview of Protected Health Information. Under the HIPAA PHI definition, Protected Health Infor...

Accounting of Disclosures for Protected Health Information (PHI) Under HIPAA: Requirements and How to Build Your Log
HIPAA Jan 25, 2024

Accounting of Disclosures for Protected Health Information (PHI) Under HIPAA: Requirements and How to Build Your Log

HIPAA gives individuals clear rights to understand how their PHI leaves a covered entity. To meet...

HIPAA Security Standards Mapped to NIST CSF: Control Examples and Audit Evidence
HIPAA Jan 25, 2024

HIPAA Security Standards Mapped to NIST CSF: Control Examples and Audit Evidence

HIPAA Security Rule Overview. The HIPAA Security Rule requires you to protect the confidentialit...

HIPAA Security Rule Training: 45 CFR 164.308(a)(5) Requirements by Role, Frequency, and Evidence
HIPAA Jan 25, 2024

HIPAA Security Rule Training: 45 CFR 164.308(a)(5) Requirements by Role, Frequency, and Evidence

Role-Based Training Requirements. Under 45 CFR 164.308(a)(5), you must implement a Security Awar...

HIPAA Recognized Identifiers: A Safe Harbor De‑Identification Playbook for Data Teams
HIPAA Jan 25, 2024

HIPAA Recognized Identifiers: A Safe Harbor De‑Identification Playbook for Data Teams

Overview of HIPAA Safe Harbor Method. The HIPAA Safe Harbor Rule gives you a clear path to publi...

HIPAA Security Rule Administrative Safeguards: Complete 164.308(a) List Mapped to Policies, Owners, and Evidence
HIPAA Jan 25, 2024

HIPAA Security Rule Administrative Safeguards: Complete 164.308(a) List Mapped to Policies, Owners, and Evidence

Security Management Process. The security management process sets the governance foundation for ...

HIPAA Security Rule Safeguards: Mapping to NIST CSF and ISO 27001 Controls
HIPAA Jan 25, 2024

HIPAA Security Rule Safeguards: Mapping to NIST CSF and ISO 27001 Controls

The HIPAA Security Rule sets baseline safeguards to protect electronic Protected Health Informati...

HIPAA Security Rule Standards Map: Linking 45 CFR 164.308, 164.310, 164.312, and 164.316 to Real-World Controls
HIPAA Jan 25, 2024

HIPAA Security Rule Standards Map: Linking 45 CFR 164.308, 164.310, 164.312, and 164.316 to Real-World Controls

Administrative Safeguards. What 45 CFR 164.308 covers. Administrative safeguards set the manage...

The HIPAA Privacy Rule’s Training Requirements: Who Must Train, Core Topics, and Documentation
HIPAA Jan 25, 2024

The HIPAA Privacy Rule’s Training Requirements: Who Must Train, Core Topics, and Documentation

Workforce Training Obligations. The HIPAA Privacy Rule requires covered entities to train their ...

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Kevin Henry

Kevin Henry

CEO @Accountable

As founder and CEO of Accountable, Kevin leads our mission to simplify HIPAA compliance for healthcare organizations. With a background in healthcare technology and healthcare, he has been instrumental in developing innovative solutions that make compliance accessible and manageable for organizations of all sizes.