Data Protection Blog
Browse our collection of Data Protection articles and resources
Transcript De-identification Examples and Redaction Steps to Avoid PHI Disclosure
Protecting Protected Health Information in transcripts requires precise Data Anonymization, caref...
Transcript PHI Protection Checklist: Controls to Stop Accidental Exposure and Leakage
Transcripts—from medical dictations and patient interviews to contact-center call logs—often cont...
Protecting Patient Data: Omnibus Motion Best Practices for Criminal Proceedings
Understanding Omnibus Motions in Criminal Cases. Purpose and scope. An omnibus motion lets you ...
Examples and Best Practices: Minimizing PHI in Medical Debt Reporting
Data Minimization in Medical Debt Reporting. Apply the minimum necessary standard. You should l...
What is Personal Data under the GDPR?
What is Personal Data under the GDPR? A Comprehensive Guide. Understanding Personal Data and the ...
Traits and Responsibilities of a GDPR Data Controller
Traits and Responsibilities of a Data Controller under the GDPR. Introduction. Since its introduc...
GDPR Compliance for Startups
GDPR Compliance for Startups. Startups and small software companies tend to need a bit of help ma...
Am I a Data Controller or Data Processor?
Am I a Data Controller or Data Processor?. The two key roles within the GDPR are the data control...
"Likely to Result in Risk" Under GDPR
"Likely to Result in Risk" Examples. Under the GDPR, one of the requirements for compliance is th...
Common GDPR Compliance Mistakes & Pain Points
5 Common GDPR Compliance Mistakes & Pain Points. The GDPR, or General Data Protection Regulat...
Compliant Ways to Backup Data
Compliant Ways to Backup Data. When it comes to advising our users of best practices for data sec...
Key Elements of a Data Processing Agreement
Key Elements of a Data Processing Agreement. Almost all businesses rely on outside parties to pro...
Why Choose Accountable's HIPAA Training
Join thousands of organizations that trust Accountable to manage their compliance needs.
-
Fast and effective - Complete your training in minimal time
-
Engaging video content - No boring slides, just clear and practical lessons
-
Compliance-focused - Covers all key HIPAA regulations for privacy and security