Blog
HIPAA Compliance for Connected Medical Devices: Requirements and Best Practices
Learn how to achieve HIPAA compliance for connected medical devices: map PHI, run SRAs, enforce e...
Is Emma HIPAA Compliant? What You Need to Know
Understand Emma HIPAA compliance risks and why Emma is not HIPAA compliant for PHI; learn its sec...
Covered Individuals Under HIPAA: Official Definition and How They Differ from Covered Entities
Understanding who HIPAA protects and who must comply clarifies how your health information is han...
Does HIPAA Cover Medical Records? What’s Protected, What Isn’t, and Who Must Comply
HIPAA Coverage of Medical Records. Yes—HIPAA covers medical records when they qualify as protect...
HIPAA Covered Entity vs. Hybrid Entity: How to Designate and Document Your Status
If you handle protected health information, knowing whether you are a HIPAA covered entity or a h...
HIPAA Covered Entity Definition: 45 CFR 160.103, Hybrid Entities, and Common Misclassifications
HIPAA Covered Entity Criteria. Core categories under 45 CFR 160.103. Under 45 CFR 160.103, a “c...
Does HIPAA Protect Email? Coverage Rules for Messages, Email Addresses, and Encryption
HIPAA does protect email when the message contains Protected Health Information (PHI) or when an ...
HIPAA-Covered Organizations: Covered Entities, Business Associates, Hybrid Entities, and OHCAs Explained
HIPAA-covered organizations handle Protected Health Information (PHI) and must follow the HIPAA P...
Does HIPAA Protect My Information? What’s Covered—and What Isn’t—Across Apps, Employers, and Everyday Life
If you’ve wondered, “Does HIPAA protect my information?” the honest answer is: sometimes. HIPAA i...
Are All Medical Records Covered by HIPAA? What’s Protected vs. Exempt (Providers, Schools, Employers, Health Apps)
HIPAA Coverage for Healthcare Providers. Who counts as a covered entity?. Under HIPAA, covered ...
U.S. Counters Chinese Botnet Threat
Seeking to protect its essential infrastructure, the United States has taken decisive action agai...
Can You Send a HIPAA Authorization by Email? Legal Requirements, E‑Signature Validity, and Secure Delivery Options
Legal Requirements for Emailing HIPAA Authorizations. You may email a HIPAA authorization if the...
Are Technical Safeguards Required under HIPAA? What OCR Expects in 2025 and How to Prove Compliance
Yes—technical safeguards are required under the HIPAA Security Rule for any environment that crea...
All Required HIPAA Security Safeguards (2025): Complete List of Administrative, Physical, and Technical Controls
This 2025 guide compiles all required HIPAA Security Safeguards so you can achieve Security Rule ...
Working from Home and maintaining HIPAA Compliance
Ensuring Security in Remote Environments. In the age of the COVID-19 pandemic, more and more empl...
Read full article
Why Choose Accountable's HIPAA Training
Join thousands of organizations that trust Accountable to manage their compliance needs.
-
Fast and effective - Complete your training in minimal time
-
Engaging video content - No boring slides, just clear and practical lessons
-
Compliance-focused - Covers all key HIPAA regulations for privacy and security