Blog
HIPAA Compliance for Connected Medical Devices: Requirements and Best Practices
Learn how to achieve HIPAA compliance for connected medical devices: map PHI, run SRAs, enforce e...
Is Emma HIPAA Compliant? What You Need to Know
Understand Emma HIPAA compliance risks and why Emma is not HIPAA compliant for PHI; learn its sec...
Are Appointment Reminders HIPAA Compliant? What You Can and Can't Include
Yes—appointment reminders can be HIPAA compliant when you treat them as Treatment Communications,...
Healthcare Certificate Management Software: Automated PKI for EHRs and Medical Devices
Automated Certificate Issuance and Renewal. Healthcare certificate management software centraliz...
Is GoDaddy HIPAA Compliant? No—Here’s Why and What to Use Instead
Overview of HIPAA Compliance Requirements. HIPAA sets standards for safeguarding Protected Healt...
Healthcare VoIP Solutions: HIPAA-Compliant Phone Systems for Clinics and Hospitals
Overview of Healthcare VoIP Technology. Healthcare VoIP solutions modernize clinical communicati...
HIPAA for Dentists: Compliance Requirements, Training & Checklist
HIPAA for dentists centers on safeguarding Protected Health Information (PHI), documenting sound ...
MRI Centers HIPAA Compliance Checklist: Required Policies, Procedures, and Documentation
Administrative Safeguards Implementation. To protect ePHI across scheduling, imaging, and report...
HIPAA’s 18 Identifiers: The PHI Safe Harbor List Explained
The HIPAA Privacy Rule defines Protected Health Information (PHI) and outlines De-identification ...
Azure BAA: How to Sign Microsoft’s Business Associate Agreement and Meet HIPAA Requirements
Understanding Microsoft’s BAA. What the Azure BAA covers. The Azure Business Associate Agreemen...
HIPAA vs. SOC 2: Key Differences, Overlap, and How to Achieve Dual Compliance
Regulatory Authority and Enforcement. HIPAA is a U.S. federal law administered primarily by the ...
How to Make a HIPAA-Compliant Spreadsheet (and When to Use Safer Alternatives)
Implement Access Controls. Start with written Access Control Policies that define who may view, ...
Hard Drive Sanitization: How to Securely Erase Data (NIST 800-88 Guide)
Overview of Hard Drive Sanitization. Hard drive sanitization is the process of permanently remov...
Can You Send PHI via Email? HIPAA Rules, Risks, and How to Do It Safely
HIPAA Email Compliance. You can send PHI via email under HIPAA if you implement appropriate admi...
Working from Home and maintaining HIPAA Compliance
Ensuring Security in Remote Environments. In the age of the COVID-19 pandemic, more and more empl...
Read full article
Why Choose Accountable's HIPAA Training
Join thousands of organizations that trust Accountable to manage their compliance needs.
-
Fast and effective - Complete your training in minimal time
-
Engaging video content - No boring slides, just clear and practical lessons
-
Compliance-focused - Covers all key HIPAA regulations for privacy and security