HIPAA HIPAA Compliance Articles | Accountable

Product Pricing
Ready to get started? Book a demo with our team
Talk to an expert

HIPAA Blog

Browse our collection of HIPAA articles and resources

Covered Entity vs Business Associate: Who Is Regulated Under HIPAA and How
HIPAA Jan 24, 2025

Covered Entity vs Business Associate: Who Is Regulated Under HIPAA and How

Understanding who HIPAA regulates—and how—is essential to managing Protected Health Information (...

HIPAA Covered Entity Explained: Health Plans, Providers, and Clearinghouses with Examples
HIPAA Jan 24, 2025

HIPAA Covered Entity Explained: Health Plans, Providers, and Clearinghouses with Examples

Understanding who HIPAA applies to is the first step toward effective HIPAA Compliance. A HIPAA c...

Is Texting a HIPAA Violation?
HIPAA Jan 24, 2025

Is Texting a HIPAA Violation?

Texting patient information may seem quick and convenient, but is it putting your organization at...

Guide: What Happens After a HIPAA Breach Report to HHS OCR
HIPAA Jan 23, 2025

Guide: What Happens After a HIPAA Breach Report to HHS OCR

Breach Reporting Requirements. A HIPAA breach involves the impermissible use or disclosure of Pr...

The HIPAA Security Rule: What Covered Entities Must Do, Explained
HIPAA Jan 23, 2025

The HIPAA Security Rule: What Covered Entities Must Do, Explained

The HIPAA Security Rule sets the baseline for how you safeguard Electronic Protected Health Infor...

How to Comply: What the HIPAA Security Rule Requires of Covered Entities
HIPAA Jan 23, 2025

How to Comply: What the HIPAA Security Rule Requires of Covered Entities

Conduct Security Risk Assessments. The HIPAA Security Rule is risk-based and technology-neutral....

How HIPAA’s Covered Entity Exemption Works Under the Texas Data Privacy and Security Act
HIPAA Jan 23, 2025

How HIPAA’s Covered Entity Exemption Works Under the Texas Data Privacy and Security Act

Overview of the Texas Data Privacy and Security Act. The Texas Data Privacy and Security Act (TD...

HIPAA Security Rule Requirements for Covered Entities: Safeguards, Examples, Best Practices
HIPAA Jan 23, 2025

HIPAA Security Rule Requirements for Covered Entities: Safeguards, Examples, Best Practices

If you create, receive, maintain, or transmit electronic protected health information (ePHI), the...

HIPAA Security Rule Compliance Guide for Covered Entities: Risk Analysis to BAAs
HIPAA Jan 23, 2025

HIPAA Security Rule Compliance Guide for Covered Entities: Risk Analysis to BAAs

Risk Analysis Requirement. The Security Rule requires you to perform an accurate and thorough ri...

Checklist: The HIPAA Security Rule Requires Covered Entities to Implement Safeguards
HIPAA Jan 23, 2025

Checklist: The HIPAA Security Rule Requires Covered Entities to Implement Safeguards

This practical checklist helps you implement the safeguards the HIPAA Security Rule requires to p...

Maryland MODPA HIPAA Covered Entity Exemption: Scope, Limits, Compliance Guide
HIPAA Jan 22, 2025

Maryland MODPA HIPAA Covered Entity Exemption: Scope, Limits, Compliance Guide

Overview of Maryland Online Data Privacy Act. Maryland’s Online Data Privacy Act (MODPA) establi...

Who Investigates Covered Entities and Business Associates for HIPAA Breaches?
HIPAA Jan 22, 2025

Who Investigates Covered Entities and Business Associates for HIPAA Breaches?

When a potential HIPAA breach occurs, multiple authorities may investigate covered entities and b...

Why Choose Accountable's HIPAA Training

Join thousands of organizations that trust Accountable to manage their compliance needs.

  • Fast and effective - Complete your training in minimal time
  • Engaging video content - No boring slides, just clear and practical lessons
  • Compliance-focused - Covers all key HIPAA regulations for privacy and security