Blog
HIPAA Compliance for Connected Medical Devices: Requirements and Best Practices
Learn how to achieve HIPAA compliance for connected medical devices: map PHI, run SRAs, enforce e...
Hospice Employee Security Training: HIPAA Security Rule & Cybersecurity Awareness Course
Start HIPAA Security Rule training for hospice teams to protect PHI, stop breaches, and meet comp...
HIPAA’s Formal Definition of Protected Health Information (PHI): What Qualifies, What Doesn’t, and Why It Matters
Definition of Protected Health Information. Under the HIPAA Privacy Rule, protected health infor...
HIPAA Security Rule Requirements: A NIST CSF and SP 800-53 Mapping Guide
HIPAA Security Rule Overview. Scope and risk-based approach. The HIPAA Security Rule protects e...
HIPAA Security Rule Administrative Safeguards Crosswalk: Map to ISO 27001 and NIST CSF with Practical Controls
This HIPAA Security Rule Administrative Safeguards Crosswalk maps each safeguard to ISO 27001 and...
HIPAA Authorization Requirements: 45 CFR 164.508 Required Elements Checklist (With Examples)
This guide distills HIPAA authorization requirements under 45 CFR 164.508 into a practical checkl...
HIPAA’s Definition of Protected Health Information (PHI): Scope, Exclusions, and Real‑World Edge Cases
Definition of Protected Health Information. What PHI means under HIPAA. Protected Health Inform...
Protected Health Information (PHI) Under HIPAA: Definition, Scope, and What Isn’t PHI
Definition of Protected Health Information. Protected Health Information (PHI) under HIPAA is in...
Telemedicine HIPAA Compliance Checklist for Secure Virtual Care
This Telemedicine HIPAA Compliance Checklist for Secure Virtual Care guides you through the essen...
HIPAA Privacy Rule Preemption: Federal vs. State Privacy Laws Explained
Establishing Federal Privacy Baseline. The HIPAA Privacy Rule—part of HIPAA Administrative Simpl...
HIPAA Physical Safeguards Checklist: A Complete, Printable List by Facility Area
Use this HIPAA physical safeguards checklist to quickly assess ePHI physical security across each...
Your HIPAA Right of Access: How to Request Your Medical Records, 30-Day Rule and Reasonable Fees
HIPAA Right of Access Overview. Your HIPAA Right of Access lets you inspect or obtain copies of ...
The HIPAA National Identifiers Explained: Providers, Health Plans, Employers—and the Patient ID That Never Was
National Provider Identifier (NPI) Overview. The National Provider Identifier is the cornerstone...
HIPAA Patient Authorization Form: 45 CFR 164.508 Requirements, Revocation Rights, and Redisclosure Notices
Core Elements of HIPAA Authorization. Under 45 CFR 164.508, a valid HIPAA patient authorization ...
Working from Home and maintaining HIPAA Compliance
Ensuring Security in Remote Environments. In the age of the COVID-19 pandemic, more and more empl...
Read full article
Why Choose Accountable's HIPAA Training
Join thousands of organizations that trust Accountable to manage their compliance needs.
-
Fast and effective - Complete your training in minimal time
-
Engaging video content - No boring slides, just clear and practical lessons
-
Compliance-focused - Covers all key HIPAA regulations for privacy and security