Blog
How to Create a Business Continuity Plan for Your Urology Practice (Template + Checklist)
Build a practical business continuity plan for your urology practice. Use our quick-start templat...
Autism Clinical Trial Data Protection: Ensuring Privacy, Security, and Compliance
Protect autism clinical trials with privacy design, strong security, and compliant anonymization....
Examples and Best Practices: Removing HIPAA Identifiers for De-Identification
HIPAA De-Identification Methods. Overview. HIPAA allows two lawful paths to de-identify Protect...
HIPAA Policies and Procedures: Complete Guide to Requirements and Examples
HIPAA Policy and Procedure Development. Effective HIPAA policies and procedures start with clear...
How to Comply with HIPAA De-Identification Rules: Best Practices and Pitfalls
HIPAA De-Identification Methods. HIPAA recognizes two lawful paths to de-identify protected heal...
HIPAA’s Two Methods of De-Identification Explained: Safe Harbor vs. Expert Determination
Safe Harbor Method Requirements. Safe Harbor is the rule-based pathway under HIPAA’s data de-ide...
HIPAA Policies and Procedures Checklist: Templates, Best Practices, and Compliance Steps
HIPAA Compliance Checklist Overview. Your HIPAA Policies and Procedures Checklist should transla...
HIPAA Privacy Rule De-Identification Checklist: 18 Identifiers, Exceptions, and Examples
Overview of the HIPAA Privacy Rule. The HIPAA Privacy Rule protects individually identifiable he...
HIPAA Policies and Procedures Explained: What to Include, Risks, and Enforcement
Written Policies and Procedures Implementation. Purpose and scope. HIPAA policies and procedure...
HIPAA De-Identification Explained: Safe Harbor, Expert Determination, and Risk Controls
HIPAA De-Identification Methods. Under the HIPAA Privacy Rule, data are considered de-identified...
HIPAA De-Identification Guide for Organizations: Examples, Controls, and Enforcement Risks
This HIPAA De-Identification Guide for Organizations explains how to responsibly use health data ...
HIPAA De-Identification Requirements: Safe Harbor, Expert Determination, and Documentation
Safe Harbor Method Overview. Under the HIPAA Privacy Rule, Safe Harbor is a prescriptive path fo...
How to De-Identify PHI Under the HIPAA Privacy Rule
De-identifying Protected Health Information allows you to share and analyze health data while hon...
HIPAA Policies and Procedures for 2025: Updates, Enforcement, and Documentation
HIPAA Security Rule Updates. Where things stand in 2025. The HIPAA Security Rule NPRM proposes ...
Working from Home and maintaining HIPAA Compliance
Ensuring Security in Remote Environments. In the age of the COVID-19 pandemic, more and more empl...
Read full article
Why Choose Accountable's HIPAA Training
Join thousands of organizations that trust Accountable to manage their compliance needs.
-
Fast and effective - Complete your training in minimal time
-
Engaging video content - No boring slides, just clear and practical lessons
-
Compliance-focused - Covers all key HIPAA regulations for privacy and security