Blog
Healthcare Tracking Pixels and Patient Privacy: HIPAA Risks and How to Stay Compliant
Reduce HIPAA compliance risk from tracking pixels on healthcare sites. Learn controls, BAA requir...
Ambulatory Surgery Center Security Risk Assessment: Step-by-Step Guide and HIPAA Compliance Checklist
Follow HIPAA Security Rule guidance for surgery centers: complete SRAs, apply admin, physical and...
HIPAA Minimum Necessary Rule Explained: What It Is, Who It Applies To, and How to Comply
Overview of the HIPAA Minimum Necessary Rule. The HIPAA Minimum Necessary Rule requires you to l...
Protected Health Information (PHI) Under HIPAA: What Counts and How to Stay Compliant
Protected Health Information (PHI) is the backbone of HIPAA compliance. If you create, receive, m...
Complete List of the 18 HIPAA Identifiers for De-Identification (Safe Harbor)
Overview of HIPAA Safe Harbor Method. The HIPAA Safe Harbor method is one of the De-identificati...
What PHI Is Protected by HIPAA? Definition, 18 Identifiers, and Examples
Definition of PHI. Protected Health Information (PHI) is Individually Identifiable Health Inform...
Is PHI Protected Health Information Under HIPAA? Yes—Definition, Examples, and What’s Covered
Short answer: yes. PHI—protected health information—is the core data set safeguarded by HIPAA. It...
HIPAA Violation Lawsuit: Can You Sue, What Counts, and How to Get Started
Filing a Complaint with the Office for Civil Rights. Who can file and when. If you believe your...
What Identifying Information Is Protected by HIPAA? The 18 PHI Identifiers Explained
Overview of HIPAA and PHI. The HIPAA Privacy Rule protects Protected Health Information (PHI), w...
What Information Is Protected Under HIPAA? PHI Explained with Examples
Definition of Protected Health Information. Protected Health Information (PHI) is any individual...
Who Is Covered by HIPAA (and Who Isn’t)? Covered Entities, Business Associates, and Examples
Covered Entities Overview. HIPAA applies to covered entities: health plans, healthcare clearingh...
HIPAA Violation Reporting Requirements Explained: Who Must Report, Deadlines, and How to Comply
Covered Entities and Business Associates. HIPAA violation reporting requirements are driven by t...
How Many HIPAA Identifiers Are There for De-Identification? The Full List of 18
Overview of HIPAA Identifiers. Under the HIPAA Privacy Rule, the Safe Harbor Method sets De-Iden...
Is HIPAA an Administrative Safeguard? Here’s What the Security Rule Actually Requires
Overview of HIPAA Security Rule. HIPAA itself is not an administrative safeguard; it is a federa...
Working from Home and maintaining HIPAA Compliance
Ensuring Security in Remote Environments. In the age of the COVID-19 pandemic, more and more empl...
Read full article
Why Choose Accountable's HIPAA Training
Join thousands of organizations that trust Accountable to manage their compliance needs.
-
Fast and effective - Complete your training in minimal time
-
Engaging video content - No boring slides, just clear and practical lessons
-
Compliance-focused - Covers all key HIPAA regulations for privacy and security