HIPAA HIPAA Compliance Articles | Accountable

Product Pricing
Ready to get started? Book a demo with our team
Talk to an expert

HIPAA Blog

Browse our collection of HIPAA articles and resources

HIPAA Administrative Safeguards: Mapping Requirements to NIST CSF 2.0 with Actionable Steps
HIPAA Feb 06, 2024

HIPAA Administrative Safeguards: Mapping Requirements to NIST CSF 2.0 with Actionable Steps

Overview of HIPAA Administrative Safeguards. HIPAA administrative safeguards are the policies an...

HIPAA Amendment Request: How to Correct Your Medical Records
HIPAA Feb 06, 2024

HIPAA Amendment Request: How to Correct Your Medical Records

Right to Request Amendment. You have the right to ask a Covered Entity to correct or add informa...

Does the HIPAA Privacy Rule Require an Accounting of Disclosures?
HIPAA Feb 06, 2024

Does the HIPAA Privacy Rule Require an Accounting of Disclosures?

Overview of Accounting of Disclosures. Yes. Under the HIPAA Privacy Rule, individuals have Patie...

Does HIPAA Protect My Medical Information Outside the Doctor’s Office? Apps, Employers, and Schools Explained
HIPAA Feb 06, 2024

Does HIPAA Protect My Medical Information Outside the Doctor’s Office? Apps, Employers, and Schools Explained

If you’re wondering, “Does HIPAA protect my medical information outside the doctor’s office?” the...

HIPAA‑Compliant Electronic Signatures: Requirements, UETA/ESIGN Alignment, and BAA Checklist
HIPAA Feb 06, 2024

HIPAA‑Compliant Electronic Signatures: Requirements, UETA/ESIGN Alignment, and BAA Checklist

HIPAA Compliance for Electronic Signatures. Electronic signatures can be used across healthcare ...

HIPAA Administrative Safeguards Requirements for Business Associates (2025 Guide)
HIPAA Feb 06, 2024

HIPAA Administrative Safeguards Requirements for Business Associates (2025 Guide)

Technology Asset Inventory. Why it matters. A complete, current technology asset inventory is t...

HIPAA‑Compliant File Transfer: Secure Ways to Send and Receive PHI (SFTP, FTPS, MFT)
HIPAA Feb 06, 2024

HIPAA‑Compliant File Transfer: Secure Ways to Send and Receive PHI (SFTP, FTPS, MFT)

Moving electronic protected health information (ePHI) safely demands more than a fast connection....

Does the HIPAA Security Rule Require Encryption? A Risk‑Based Answer for ePHI at Rest and in Transit
HIPAA Feb 06, 2024

Does the HIPAA Security Rule Require Encryption? A Risk‑Based Answer for ePHI at Rest and in Transit

Addressable Implementation Specification for Encryption. Under the current HIPAA Security Rule, ...

HIPAA Covered Entity vs. Hybrid Entity: How to Designate and Document Your Status
HIPAA Feb 05, 2024

HIPAA Covered Entity vs. Hybrid Entity: How to Designate and Document Your Status

If you handle protected health information, knowing whether you are a HIPAA covered entity or a h...

Does HIPAA Cover Medical Records? What’s Protected, What Isn’t, and Who Must Comply
HIPAA Feb 05, 2024

Does HIPAA Cover Medical Records? What’s Protected, What Isn’t, and Who Must Comply

HIPAA Coverage of Medical Records. Yes—HIPAA covers medical records when they qualify as protect...

Are You a Covered Entity Under HIPAA—or a Hybrid Entity? A Practical Guide to Covered Components
HIPAA Feb 05, 2024

Are You a Covered Entity Under HIPAA—or a Hybrid Entity? A Practical Guide to Covered Components

Covered Entities under HIPAA. HIPAA applies directly to three types of organizations: health pla...

Covered Individuals Under HIPAA: Official Definition and How They Differ from Covered Entities
HIPAA Feb 05, 2024

Covered Individuals Under HIPAA: Official Definition and How They Differ from Covered Entities

Understanding who HIPAA protects and who must comply clarifies how your health information is han...

Why Choose Accountable's HIPAA Training

Join thousands of organizations that trust Accountable to manage their compliance needs.

  • Fast and effective - Complete your training in minimal time
  • Engaging video content - No boring slides, just clear and practical lessons
  • Compliance-focused - Covers all key HIPAA regulations for privacy and security