Blog
How to Create a Business Continuity Plan for Your Urology Practice (Template + Checklist)
Build a practical business continuity plan for your urology practice. Use our quick-start templat...
Autism Clinical Trial Data Protection: Ensuring Privacy, Security, and Compliance
Protect autism clinical trials with privacy design, strong security, and compliant anonymization....
What Identifying Information Is Protected by HIPAA? The 18 PHI Identifiers Explained
Overview of HIPAA and PHI. The HIPAA Privacy Rule protects Protected Health Information (PHI), w...
Is a Business Associate a Covered Entity Under HIPAA? Key Differences Explained
No. Under HIPAA, a business associate is not a covered entity. Each plays a distinct role in hand...
How to Sue a Hospital for a HIPAA Violation: Step-by-Step Guide and What to Do First
Understand Federal HIPAA Limitations. Start by clarifying what HIPAA does—and does not—do. HIPAA...
How Many HIPAA Identifiers Are There for De-Identification? The Full List of 18
Overview of HIPAA Identifiers. Under the HIPAA Privacy Rule, the Safe Harbor Method sets De-Iden...
HIPAA Violation Reporting Requirements Explained: Who Must Report, Deadlines, and How to Comply
Covered Entities and Business Associates. HIPAA violation reporting requirements are driven by t...
HIPAA Violation Lawsuit: Can You Sue, What Counts, and How to Get Started
Filing a Complaint with the Office for Civil Rights. Who can file and when. If you believe your...
Who Is Covered by HIPAA (and Who Isn’t)? Covered Entities, Business Associates, and Examples
Covered Entities Overview. HIPAA applies to covered entities: health plans, healthcare clearingh...
Is HIPAA an Administrative Safeguard? Here’s What the Security Rule Actually Requires
Overview of HIPAA Security Rule. HIPAA itself is not an administrative safeguard; it is a federa...
What Information Is Protected Under HIPAA? PHI Explained with Examples
Definition of Protected Health Information. Protected Health Information (PHI) is any individual...
How to Identify a HIPAA Technical Safeguard: Examples and Requirements
HIPAA technical safeguards are the security controls that protect electronic protected health inf...
HIPAA Telemedicine Requirements: What Providers Need to Stay Compliant
HIPAA Compliance in Telemedicine. Telehealth expands access, but it does not change your HIPAA o...
HIPAA Security Rule Implementation Specifications: Required vs. Addressable Safeguards Explained
HIPAA Security Rule Overview. The HIPAA Security Rule sets national standards for protecting the...
Working from Home and maintaining HIPAA Compliance
Ensuring Security in Remote Environments. In the age of the COVID-19 pandemic, more and more empl...
Read full article
Why Choose Accountable's HIPAA Training
Join thousands of organizations that trust Accountable to manage their compliance needs.
-
Fast and effective - Complete your training in minimal time
-
Engaging video content - No boring slides, just clear and practical lessons
-
Compliance-focused - Covers all key HIPAA regulations for privacy and security