Blog
How to Create a Business Continuity Plan for Your Urology Practice (Template + Checklist)
Build a practical business continuity plan for your urology practice. Use our quick-start templat...
Autism Clinical Trial Data Protection: Ensuring Privacy, Security, and Compliance
Protect autism clinical trials with privacy design, strong security, and compliant anonymization....
Does the HIPAA Privacy Rule Protect Medical Records? Coverage, Exceptions, and Your Rights
Yes. The HIPAA Privacy Rule sets a national baseline for how medical records are used, disclosed,...
How to Request a HIPAA Amendment to Your Medical Records: Rights, Steps, and Timeline
Patient Rights to Amend Medical Records. Under the HIPAA Privacy Rule, you have the right to req...
What Is a Medical Record Under HIPAA? Definition, Examples, and What’s Not Included
Definition Of Medical Record Under HIPAA. Under HIPAA, a medical record is best understood throu...
Does HIPAA Require Physical Safeguards? Yes—Here’s What the Security Rule Requires
Yes. The HIPAA Security Rule requires physical safeguards to protect Electronic Protected Health ...
HIPAA Definition of Individually Identifiable Health Information (IIHI): What’s Included and What Isn’t
If you handle health data, understanding the HIPAA definition of Individually Identifiable Health...
Does HIPAA Apply to All Medical Records After Death? The 50-Year Rule, Exceptions, and Who Can Access Them
HIPAA Protection Period for Deceased Individuals. Under HIPAA, a deceased person’s Protected Hea...
Does the HIPAA Privacy Rule Apply to All Covered Entities?
Yes. The HIPAA Privacy Rule applies to all covered entities, but your specific duties depend on t...
Who Does the HIPAA Privacy Rule Apply To? Covered Entities and Business Associates
Covered Entities Overview. The HIPAA Privacy Rule applies to organizations and individuals that ...
Does HIPAA Apply to Phone Numbers? When a Phone Number Is (and Isn’t) PHI
Short answer: it depends on context. Under the HIPAA Privacy Rule, a phone number can be Protecte...
Technical Safeguards for HIPAA De-Identification: Methods and Best Practices to Protect PHI
Implement Access Controls. Limit who can view, transform, or export PHI by enforcing the minimum...
Covered Entity Definition (HIPAA): What It Means and Who’s Included
Health Plan Classification. Under the Health Insurance Portability and Accountability Act, a hea...
What Counts as De-Identified Information Under HIPAA? Safe Harbor vs. Expert Determination
Safe Harbor Method Requirements. Under HIPAA, the Safe Harbor method de-identifies data by remov...
Working from Home and maintaining HIPAA Compliance
Ensuring Security in Remote Environments. In the age of the COVID-19 pandemic, more and more empl...
Read full article
Why Choose Accountable's HIPAA Training
Join thousands of organizations that trust Accountable to manage their compliance needs.
-
Fast and effective - Complete your training in minimal time
-
Engaging video content - No boring slides, just clear and practical lessons
-
Compliance-focused - Covers all key HIPAA regulations for privacy and security