HIPAA HIPAA Compliance Articles | Accountable

Product Pricing Demo Video Free HIPAA Training
LATEST
video thumbnail
Admin Dashboard Walkthrough Jake guides you step-by-step through the process of achieving HIPAA compliance
Ready to get started? Book a demo with our team
Talk to an expert

HIPAA Blog

Browse our collection of HIPAA articles and resources

HIPAA De-identification Requirements and Common Pitfalls: Compliance Guide for Teams
HIPAA May 01, 2024

HIPAA De-identification Requirements and Common Pitfalls: Compliance Guide for Teams

De-identification Methods Overview. HIPAA de-identification allows you to transform Protected He...

HIPAA Workforce Compliance Explained: Training Standards, Privacy Safeguards, and Documentation
HIPAA May 01, 2024

HIPAA Workforce Compliance Explained: Training Standards, Privacy Safeguards, and Documentation

Workforce Training Requirements. HIPAA workforce compliance hinges on role-tailored training tha...

What Is ePHI? A Practical Guide for Covered Entities and Business Associates
HIPAA May 01, 2024

What Is ePHI? A Practical Guide for Covered Entities and Business Associates

ePHI Definition. Core concept. Electronic Protected Health Information (ePHI) is individually i...

HIPAA Breach Notification Checklist: Reporting Requirements, Content, and Examples
HIPAA May 01, 2024

HIPAA Breach Notification Checklist: Reporting Requirements, Content, and Examples

Breach Definition and Risk Assessment. A HIPAA breach is an impermissible acquisition, access, u...

HIPAA De-identification Checklist: Steps to Remove Identifiers and Reduce Risk
HIPAA May 01, 2024

HIPAA De-identification Checklist: Steps to Remove Identifiers and Reduce Risk

HIPAA De-identification Requirements. De-identification transforms Protected Health Information ...

A Compliance Guide to HIPAA De-Identification: Requirements, Steps, and Examples
HIPAA May 01, 2024

A Compliance Guide to HIPAA De-Identification: Requirements, Steps, and Examples

HIPAA De-Identification Methods Overview. What HIPAA de-identification means. HIPAA de-identifi...

HIPAA Safe Harbor Checklist: 18 Identifiers to Remove for Compliance
HIPAA May 01, 2024

HIPAA Safe Harbor Checklist: 18 Identifiers to Remove for Compliance

The HIPAA Safe Harbor method gives you a clear, rule-based path to Privacy Rule compliance by rem...

Expert Determination Method under HIPAA: Best Practices to Minimize Re‑Identification Risk
HIPAA May 01, 2024

Expert Determination Method under HIPAA: Best Practices to Minimize Re‑Identification Risk

Applying Statistical and Scientific Methods. The expert determination method under HIPAA require...

Understanding the HIPAA Breach Notification Rule: Purpose, Scope, and Best Practices
HIPAA Apr 30, 2024

Understanding the HIPAA Breach Notification Rule: Purpose, Scope, and Best Practices

The HIPAA Breach Notification Rule sets clear expectations for how you identify, assess, and repo...

HIPAA Basics for Providers: Privacy, Security, and Breach Notification Explained
HIPAA Apr 30, 2024

HIPAA Basics for Providers: Privacy, Security, and Breach Notification Explained

HIPAA Privacy Rule Overview. What the Privacy Rule Covers. The HIPAA Privacy Rule governs how C...

Provider Guide to HIPAA: Privacy Rule, Security Rule, Breach Requirements
HIPAA Apr 30, 2024

Provider Guide to HIPAA: Privacy Rule, Security Rule, Breach Requirements

HIPAA Privacy Rule Standards. The HIPAA Privacy Rule, issued by the Department of Health and Hum...

Texas PHI Breach Notification Rules: HIPAA and HB 300 Requirements Explained
HIPAA Apr 30, 2024

Texas PHI Breach Notification Rules: HIPAA and HB 300 Requirements Explained

HIPAA Breach Notification Requirements. Who must comply. Under HIPAA, covered entities—and thei...

Why Choose Accountable's HIPAA Training

Join thousands of organizations that trust Accountable to manage their compliance needs.

  • Fast and effective - Complete your training in minimal time
  • Engaging video content - No boring slides, just clear and practical lessons
  • Compliance-focused - Covers all key HIPAA regulations for privacy and security