Blog
Automated Security Testing in Healthcare: Tools, Best Practices, and HIPAA Compliance
Automated security testing finds risks earlier, proves HIPAA compliance, and protects PHI with co...
Illinois Substance Abuse Record Privacy Laws: What Patients and Providers Need to Know
Secure Illinois substance use disorder records: align 42 CFR Part 2 and Illinois law, use complia...
What is Personal Information Under the CPRA?
What is Personal Information Under the CPRA?. With all of the different types of data privacy law...
Steps to Ensure Operational Resilience
Steps to Ensure Operational Resilience. The worldwide epidemic forced every organization in the g...
The CCPA Do Not Sell Requirement
The CCPA Do Not Sell Requirement. Under the CCPA and CPRA, there’s a stipulation called the ‘Do n...
Am I a Data Controller or Data Processor?
Am I a Data Controller or Data Processor?. The two key roles within the GDPR are the data control...
Service Providers Under CCPA/CPRA
Service Providers Under CCPA/CPRA. According to the CCPA (California Consumer Privacy Act), deter...
What To Do if Your Email Has Been In a Breach
Discovering your email has been leaked in a breach can feel overwhelming and personal. Whether yo...
PIPEDA's Definition of Personal Information
PIPEDA is a federal privacy law in Canada that applies to organizations that collect, use, and di...
Why Security Does Not Equal Data Privacy
Why Security Does Not Equal Data Privacy. Although they are related, data security and privacy ar...
What Does PHI Stand For?
Protected Health Information (PHI) is at the heart of patient data privacy and security in health...
How to Streamline the Employee Onboarding Process
Employee onboarding, as well as employee offboarding, are extremely important processes, especial...
HIPAA vs. GLBA: Main Differences
When it comes to protecting sensitive information, HIPAA and GLBA are two of the most important U...
"Likely to Result in Risk" Under GDPR
"Likely to Result in Risk" Examples. Under the GDPR, one of the requirements for compliance is th...
Working from Home and maintaining HIPAA Compliance
Ensuring Security in Remote Environments. In the age of the COVID-19 pandemic, more and more empl...
Read full article
Why Choose Accountable's HIPAA Training
Join thousands of organizations that trust Accountable to manage their compliance needs.
-
Fast and effective - Complete your training in minimal time
-
Engaging video content - No boring slides, just clear and practical lessons
-
Compliance-focused - Covers all key HIPAA regulations for privacy and security