HIPAA Blog
Browse our collection of HIPAA articles and resources
Does HIPAA Protect My Medical Records? Doctor’s Offices vs. Apps vs. Employers
You’ve likely heard that HIPAA keeps your health information private—but the answer to “Does HIPA...
Does the HIPAA Privacy Rule Require Patient Consent? When You Need Authorization vs. TPO
HIPAA Privacy Rule Overview. The HIPAA Privacy Rule governs how covered entities handle protecte...
The Ultimate Guide to HIPAA De-Identification Standards and Practices
Use this guide to understand HIPAA de-identification standards and practices so you can responsib...
Unlocking the Secrets of HIPAA Compliant De-Identification Methods
Safe Harbor Method Requirements. What the rule requires. The HIPAA Privacy Rule allows you to d...
Does HIPAA Protect All Medical Information? PHI Coverage vs. Gaps in Apps, Wearables, and Employer Records
Short answer: no. HIPAA protects Protected Health Information (PHI) when it is handled by specifi...
Secure DICOM File Sharing: Ensuring HIPAA Compliance
Implement HIPAA-Compliant Encryption Methods. Encrypt data in transit and at rest. Protect DICO...
Does HIPAA Protect My Medical Records? A Simple Answer by Who’s Handling Them
Overview of HIPAA Privacy Protections. The short answer: your medical records are protected by H...
Does HIPAA Require Technical Safeguards? What the Security Rule Mandates for ePHI
Access Control Implementation. The HIPAA Security Rule requires technical safeguards that limit ...
Does HIPAA Protect Medical Information? Only PHI from Covered Entities—What’s Covered vs. Not Covered
HIPAA Coverage and Scope. HIPAA protects medical information only when it qualifies as Protected...
Comprehensive Guide to HIPAA De-Identification Methods
Safe Harbor Method Requirements. The HIPAA Privacy Rule permits you to treat data as non–Protect...
Exploring HIPAA's Requirement for Administrative Safeguards: A Comprehensive Overview
Administrative safeguards are the backbone of the HIPAA Security Rule. They require you to implem...
The Complete Guide to HIPAA PHI De-Identification Standards
De-Identification Definition. Under the HIPAA Privacy Rule, Protected Health Information (PHI) i...
Why Choose Accountable's HIPAA Training
Join thousands of organizations that trust Accountable to manage their compliance needs.
-
Fast and effective - Complete your training in minimal time
-
Engaging video content - No boring slides, just clear and practical lessons
-
Compliance-focused - Covers all key HIPAA regulations for privacy and security