HIPAA HIPAA Compliance Articles | Accountable

Product Pricing
Ready to get started? Book a demo with our team
Talk to an expert

HIPAA Blog

Browse our collection of HIPAA articles and resources

The HIPAA Privacy Rule’s Training Requirements: Who Must Train, Core Topics, and Documentation
HIPAA Jan 25, 2024

The HIPAA Privacy Rule’s Training Requirements: Who Must Train, Core Topics, and Documentation

Workforce Training Obligations. The HIPAA Privacy Rule requires covered entities to train their ...

HIPAA Security Rule Training: 45 CFR 164.308(a)(5) Requirements by Role, Frequency, and Evidence
HIPAA Jan 25, 2024

HIPAA Security Rule Training: 45 CFR 164.308(a)(5) Requirements by Role, Frequency, and Evidence

Role-Based Training Requirements. Under 45 CFR 164.308(a)(5), you must implement a Security Awar...

Accounting of Disclosures for Protected Health Information (PHI) Under HIPAA: Requirements and How to Build Your Log
HIPAA Jan 25, 2024

Accounting of Disclosures for Protected Health Information (PHI) Under HIPAA: Requirements and How to Build Your Log

HIPAA gives individuals clear rights to understand how their PHI leaves a covered entity. To meet...

HIPAA PHI Definition: What Counts as Protected Health Information—and What Doesn’t
HIPAA Jan 25, 2024

HIPAA PHI Definition: What Counts as Protected Health Information—and What Doesn’t

Overview of Protected Health Information. Under the HIPAA PHI definition, Protected Health Infor...

HIPAA Recognized Identifiers: A Safe Harbor De‑Identification Playbook for Data Teams
HIPAA Jan 25, 2024

HIPAA Recognized Identifiers: A Safe Harbor De‑Identification Playbook for Data Teams

Overview of HIPAA Safe Harbor Method. The HIPAA Safe Harbor Rule gives you a clear path to publi...

HIPAA Security Rule Administrative Safeguards: Complete 164.308(a) List Mapped to Policies, Owners, and Evidence
HIPAA Jan 25, 2024

HIPAA Security Rule Administrative Safeguards: Complete 164.308(a) List Mapped to Policies, Owners, and Evidence

Security Management Process. The security management process sets the governance foundation for ...

HIPAA Security Rule Safeguards: Mapping to NIST CSF and ISO 27001 Controls
HIPAA Jan 25, 2024

HIPAA Security Rule Safeguards: Mapping to NIST CSF and ISO 27001 Controls

The HIPAA Security Rule sets baseline safeguards to protect electronic Protected Health Informati...

HIPAA’s Individually Identifiable Health Information (IIHI): What Counts, What Doesn’t, and How to De‑Identify It
HIPAA Jan 24, 2024

HIPAA’s Individually Identifiable Health Information (IIHI): What Counts, What Doesn’t, and How to De‑Identify It

Definition of Individually Identifiable Health Information. Individually Identifiable Health Inf...

HIPAA NPI Compliance: Enumeration, Proper Use, and Privacy Safeguards
HIPAA Jan 24, 2024

HIPAA NPI Compliance: Enumeration, Proper Use, and Privacy Safeguards

NPI Enumeration and Classification. What an NPI is. The National Provider Identifier (NPI) is a...

HIPAA Patient Right of Access: Deadlines, Electronic Formats, and Reasonable Fees Explained
HIPAA Jan 24, 2024

HIPAA Patient Right of Access: Deadlines, Electronic Formats, and Reasonable Fees Explained

Understanding your HIPAA Patient Right of Access helps you get copies of your protected health in...

HIPAA Medical Records Access Rules for Providers: Processing Requests, Deadlines, Fees, and e‑Copy Formats
HIPAA Jan 24, 2024

HIPAA Medical Records Access Rules for Providers: Processing Requests, Deadlines, Fees, and e‑Copy Formats

Medical Records Access Deadlines. As a covered entity, you must provide individuals with access ...

HIPAA Individual Identifiers: Direct vs. Indirect and How to De‑Identify Data
HIPAA Jan 24, 2024

HIPAA Individual Identifiers: Direct vs. Indirect and How to De‑Identify Data

Direct Identifiers in HIPAA. Under the Health Insurance Portability and Accountability Act, dire...

Why Choose Accountable's HIPAA Training

Join thousands of organizations that trust Accountable to manage their compliance needs.

  • Fast and effective - Complete your training in minimal time
  • Engaging video content - No boring slides, just clear and practical lessons
  • Compliance-focused - Covers all key HIPAA regulations for privacy and security