Blog
Deciphering HIPAA: The Health Insurance Portability and Accountability Act Explained
Explore HIPAA Title II, Privacy and Security rules, compliance steps, and PHI protections to secu...
Defining HIPAA: The 1996 Health Insurance Portability and Accountability Act Explained
Learn HIPAA compliance essentials: Privacy and Security Rule safeguards, enforcement risks, and a...
How to Write a HIPAA Texting Policy: Requirements, Best Practices, and Template
A clear HIPAA texting policy protects patient privacy, reduces organizational risk, and gives sta...
Home Health Compliance Training: Online Courses to Meet HIPAA, OSHA & Medicare Requirements
Overview of Compliance Requirements. Home health compliance training safeguards patients, protec...
Are Appointment Reminders HIPAA Compliant? What You Can and Can't Include
Yes—appointment reminders can be HIPAA compliant when you treat them as Treatment Communications,...
Is monday.com HIPAA Compliant? BAA, Plans, and Security Requirements Explained
HIPAA Compliance Overview. If you handle Protected Health Information (PHI), you need more than ...
HIPAA for Dentists: Compliance Requirements, Training & Checklist
HIPAA for dentists centers on safeguarding Protected Health Information (PHI), documenting sound ...
Healthcare VoIP Solutions: HIPAA-Compliant Phone Systems for Clinics and Hospitals
Overview of Healthcare VoIP Technology. Healthcare VoIP solutions modernize clinical communicati...
Azure BAA: How to Sign Microsoft’s Business Associate Agreement and Meet HIPAA Requirements
Understanding Microsoft’s BAA. What the Azure BAA covers. The Azure Business Associate Agreemen...
Hard Drive Sanitization: How to Securely Erase Data (NIST 800-88 Guide)
Overview of Hard Drive Sanitization. Hard drive sanitization is the process of permanently remov...
Can You Send PHI via Email? HIPAA Rules, Risks, and How to Do It Safely
HIPAA Email Compliance. You can send PHI via email under HIPAA if you implement appropriate admi...
HIPAA’s 18 Identifiers: The PHI Safe Harbor List Explained
The HIPAA Privacy Rule defines Protected Health Information (PHI) and outlines De-identification ...
HIPAA vs. SOC 2: Key Differences, Overlap, and How to Achieve Dual Compliance
Regulatory Authority and Enforcement. HIPAA is a U.S. federal law administered primarily by the ...
Is GoDaddy HIPAA Compliant? No—Here’s Why and What to Use Instead
Overview of HIPAA Compliance Requirements. HIPAA sets standards for safeguarding Protected Healt...
Working from Home and maintaining HIPAA Compliance
Ensuring Security in Remote Environments. In the age of the COVID-19 pandemic, more and more empl...
Read full article
Why Choose Accountable's HIPAA Training
Join thousands of organizations that trust Accountable to manage their compliance needs.
-
Fast and effective - Complete your training in minimal time
-
Engaging video content - No boring slides, just clear and practical lessons
-
Compliance-focused - Covers all key HIPAA regulations for privacy and security