Blog
Healthcare Tracking Pixels and Patient Privacy: HIPAA Risks and How to Stay Compliant
Reduce HIPAA compliance risk from tracking pixels on healthcare sites. Learn controls, BAA requir...
Ambulatory Surgery Center Security Risk Assessment: Step-by-Step Guide and HIPAA Compliance Checklist
Follow HIPAA Security Rule guidance for surgery centers: complete SRAs, apply admin, physical and...
What Is HIPAA Individually Identifiable Health Information (IIHI)? A Simple Definition with Examples
Definition of Individually Identifiable Health Information. Simple definition. Individually Ide...
What Is a HIPAA Violation Penalty? Fines, Jail Time, and Penalty Tiers Explained
Civil Penalty Tiers and Fines. A HIPAA violation penalty is a civil monetary penalty the governm...
What Is Considered PHI (Protected Health Information) Under HIPAA? Definition and Examples
Definition of PHI. Under the HIPAA Privacy Rule, Protected Health Information (PHI) is Individua...
What Are HIPAA Administrative Safeguards? Complete List of Security Rule Requirements
HIPAA administrative safeguards are the policies and procedures that direct how you manage people...
What Does the HIPAA Privacy Rule Apply To? Covered Entities, Business Associates, and PHI Explained
The HIPAA Privacy Rule sets national standards for how health information is used and disclosed. ...
What Is HIPAA-Compliant File Sharing? Key Requirements, How It Works, and Best Practices
HIPAA-compliant file sharing is the combination of security controls, legal safeguards, and opera...
What Information HIPAA Does Not Protect: Examples and Exceptions
HIPAA protects Protected Health Information (PHI) held by Covered Entities and their Business Ass...
What Is HIPAA De-Identification? Definition, Safe Harbor vs. Expert Determination, and Compliance Requirements
HIPAA De-Identification Definition. HIPAA de-identification is the process of transforming prote...
What Is a Business Associate Agreement (BAA) and When Is It Required for HIPAA Compliance?
Definition of Business Associate Agreements. A Business Associate Agreement (BAA) is a HIPAA-req...
What Are the HIPAA Technical Safeguards Requirements? Key Controls Explained
HIPAA’s technical safeguards set the baseline for how you protect electronic protected health inf...
What Are the Physical Safeguards Required by HIPAA? Examples and Compliance Checklist
HIPAA’s Physical Safeguards (45 CFR §164.310) protect Electronic Protected Health Information (eP...
Secure Messaging That’s HIPAA Compliant: Requirements, Features, and Top Tools
HIPAA-Compliant Messaging Requirements. What HIPAA covers in messaging. Any message that can id...
Working from Home and maintaining HIPAA Compliance
Ensuring Security in Remote Environments. In the age of the COVID-19 pandemic, more and more empl...
Read full article
Why Choose Accountable's HIPAA Training
Join thousands of organizations that trust Accountable to manage their compliance needs.
-
Fast and effective - Complete your training in minimal time
-
Engaging video content - No boring slides, just clear and practical lessons
-
Compliance-focused - Covers all key HIPAA regulations for privacy and security