Blog
HIPAA Compliance for Connected Medical Devices: Requirements and Best Practices
Learn how to achieve HIPAA compliance for connected medical devices: map PHI, run SRAs, enforce e...
Is Emma HIPAA Compliant? What You Need to Know
Understand Emma HIPAA compliance risks and why Emma is not HIPAA compliant for PHI; learn its sec...
45 CFR §164.308 Explained: The Full HIPAA Administrative Safeguards List
45 CFR §164.308 is the Administrative Safeguards section of the HIPAA Security Rule. It requires ...
Administrative Safeguards Required by HIPAA: A 90-Day Implementation Plan
Use this 90-day blueprint to stand up the administrative safeguards required by HIPAA, align deci...
Who Counts as a HIPAA Business Associate? A 3-Step Test with Role-Based Examples
Definition of Business Associate. A HIPAA business associate is any person or entity that create...
Where to File a HIPAA Violation: OCR, State Attorneys General, or Your Provider’s Privacy Officer?
When you discover a potential HIPAA violation, your first question is often where to file a HIPAA...
Why HIPAA Matters in 2025: Beyond Compliance for Trust, Safety, and Interoperability
HIPAA Security Rule Updates. What changed and why it matters in 2025. In 2025, HIPAA’s Security...
What Records Does HIPAA Protect? A Record‑Type and Source‑System Guide
Protected Health Information Types. Protected Health Information (PHI) is individually identifia...
When to File a HIPAA Complaint: Deadlines, Red Flags, and Escalation Steps
Filing Requirements and Deadlines. Who can file and what qualifies. You may file a complaint if...
What Is the De‑Identification Standard Under HIPAA? Safe Harbor vs. Expert Determination (2025 Guide)
De-Identification Methods under HIPAA. Under the HIPAA Privacy Rule, Protected Health Informatio...
Where Encryption Fits Under HIPAA’s Technical Safeguards: Access Control and Transmission Security
Addressable Implementation Specifications. Under the HIPAA Security Rule’s technical safeguards,...
HIPAA Security Rule Summary for Non-Technical Teams: Scope, Safeguards, and Responsibilities
Overview of the HIPAA Security Rule. The HIPAA Security Rule sets baseline standards to protect ...
What Records Does HIPAA Protect? From Medical Charts to Claims Files—Across Paper, Digital, and Verbal Formats
Definition of Protected Health Information. Under the Health Insurance Portability and Accountab...
What the HIPAA Security Rule Protects: Electronic PHI in Storage, Use, and Transmission
The HIPAA Security Rule protects Electronic Protected Health Information (e-PHI) wherever you cre...
Working from Home and maintaining HIPAA Compliance
Ensuring Security in Remote Environments. In the age of the COVID-19 pandemic, more and more empl...
Read full article
Why Choose Accountable's HIPAA Training
Join thousands of organizations that trust Accountable to manage their compliance needs.
-
Fast and effective - Complete your training in minimal time
-
Engaging video content - No boring slides, just clear and practical lessons
-
Compliance-focused - Covers all key HIPAA regulations for privacy and security