HIPAA Blog
Browse our collection of HIPAA articles and resources
What To Know about HIPAA As Practice Manager
HIPAA Guidance for Practice Managers. When it comes to all covered entities, but specifically med...
Basics of HIPAA Compliance
. What is HIPAA Compliance? - -. HIPAA compliance, to put it simply, means that an organization m...
The HIPAA Privacy Rule
The Health Information Portability and Accountability Act was formed as a broad healthcare reform...
Proposed Changes to the HIPAA Privacy Rule
Proposed Changes to the HIPAA Privacy Rule . Just in the last month of the year, there have ...
Is Zendesk HIPAA Compliant?
Organizations that operate under the rules and regulations of HIPAA know that there are certain e...
Creating a Contingency Plan for HIPAA Compliance
Creating a Contingency Plan for HIPAA Compliance isn’t just a regulatory box to check—it’s an ess...
Difference Between PHI vs PII: Definition & Examples
Understanding the difference between PHI vs PII is essential for anyone handling sensitive data—e...
Prepare for the End of Telehealth Waivers
Following a declaration of a national emergency by President Trump, on March 15th, the HHS announ...
Is AWS HIPAA Compliant?
. If you are a company that operates in the healthcare industry to some extent, you are probably...
HIPAA Could be Changing. Are you Ready?
As we have noted before, medical records are some of the most valuable assets cybercriminals can ...
EHRs and HIPAA Compliance
. Traditionally, all medical records were kept on paper and were manually filed. All information...
HIPAA and Pandemics: Finding a Balance
. Many of us have, at some point, played the game of Telephone in our youth. The idea is simple;...
Why Choose Accountable's HIPAA Training
Join thousands of organizations that trust Accountable to manage their compliance needs.
-
Fast and effective - Complete your training in minimal time
-
Engaging video content - No boring slides, just clear and practical lessons
-
Compliance-focused - Covers all key HIPAA regulations for privacy and security