HIPAA Blog
Browse our collection of HIPAA articles and resources
Covered Entity vs Business Associate: Who Is Regulated Under HIPAA and How
Understanding who HIPAA regulates—and how—is essential to managing Protected Health Information (...
HIPAA Covered Entity Explained: Health Plans, Providers, and Clearinghouses with Examples
Understanding who HIPAA applies to is the first step toward effective HIPAA Compliance. A HIPAA c...
Is Texting a HIPAA Violation?
Texting patient information may seem quick and convenient, but is it putting your organization at...
Guide: What Happens After a HIPAA Breach Report to HHS OCR
Breach Reporting Requirements. A HIPAA breach involves the impermissible use or disclosure of Pr...
The HIPAA Security Rule: What Covered Entities Must Do, Explained
The HIPAA Security Rule sets the baseline for how you safeguard Electronic Protected Health Infor...
How to Comply: What the HIPAA Security Rule Requires of Covered Entities
Conduct Security Risk Assessments. The HIPAA Security Rule is risk-based and technology-neutral....
How HIPAA’s Covered Entity Exemption Works Under the Texas Data Privacy and Security Act
Overview of the Texas Data Privacy and Security Act. The Texas Data Privacy and Security Act (TD...
HIPAA Security Rule Requirements for Covered Entities: Safeguards, Examples, Best Practices
If you create, receive, maintain, or transmit electronic protected health information (ePHI), the...
HIPAA Security Rule Compliance Guide for Covered Entities: Risk Analysis to BAAs
Risk Analysis Requirement. The Security Rule requires you to perform an accurate and thorough ri...
Checklist: The HIPAA Security Rule Requires Covered Entities to Implement Safeguards
This practical checklist helps you implement the safeguards the HIPAA Security Rule requires to p...
Maryland MODPA HIPAA Covered Entity Exemption: Scope, Limits, Compliance Guide
Overview of Maryland Online Data Privacy Act. Maryland’s Online Data Privacy Act (MODPA) establi...
Who Investigates Covered Entities and Business Associates for HIPAA Breaches?
When a potential HIPAA breach occurs, multiple authorities may investigate covered entities and b...
Why Choose Accountable's HIPAA Training
Join thousands of organizations that trust Accountable to manage their compliance needs.
-
Fast and effective - Complete your training in minimal time
-
Engaging video content - No boring slides, just clear and practical lessons
-
Compliance-focused - Covers all key HIPAA regulations for privacy and security