Blog
Is Datadog HIPAA Compliant? BAA Requirements and PHI Best Practices
Understand Datadog HIPAA compliance and apply controls: BAA setup, PHI minimization, redaction, s...
HIPAA Policies for Health Plans: What’s Required and How to Stay Compliant
Protect member data with HIPAA policies for health plans: implement Privacy and Security Rule con...
When Is a HIPAA Authorization Required? Scenarios, Exceptions, and Examples
HIPAA Authorization Requirement. You must obtain a signed HIPAA authorization before using or di...
What Are HIPAA Administrative Safeguards? Requirements, Examples, and a Compliance Checklist
HIPAA Administrative Safeguards are the policies, procedures, and oversight mechanisms you put in...
Administrative Requirements of the HIPAA Security Rule: Risk Analysis, Training, and BAAs Explained
The administrative safeguards of the HIPAA Security Rule set the foundation for protecting Electr...
What Are the HIPAA Security Rule’s Administrative Safeguards? Key Requirements Explained
The HIPAA Security Rule’s Administrative Safeguards are the management policies and procedures th...
What Are HIPAA Security Rule Administrative Safeguards? Requirements, Examples, and Compliance Tips
Security Management Process. The security management process is the backbone of HIPAA Security R...
What Is the HIPAA Privacy Rule and Security Rule? Key Differences and Compliance Essentials
Overview of the HIPAA Privacy Rule. The HIPAA Privacy Rule sets national standards for how cover...
What Is PHI Protected by HIPAA? What’s Covered, What Isn’t, and Examples
Understanding what counts as PHI protected by HIPAA helps you protect patients and meet complianc...
What Is the HIPAA Technical Safeguards List? Key Requirements, Controls, and Examples
HIPAA’s Security Rule defines five technical safeguards that every covered entity and business as...
What Is PHI Under HIPAA? Definition, Examples, and What’s Covered
Understanding what counts as Protected Health Information (PHI) under HIPAA helps you classify da...
What Records Are Not Protected by HIPAA? Examples and Exceptions You Should Know
HIPAA protects Protected Health Information (PHI) held by Covered Entities and their Business Ass...
What Medical Records Are Protected by HIPAA? PHI Examples, Exceptions, and Access Rules
Definition of Protected Health Information. Under HIPAA, Protected Health Information (PHI) is I...
What Is Protected Health Information (PHI)? Definition, Examples, and HIPAA Basics
Protected Health Information (PHI) is the cornerstone of health information privacy in the United...
Working from Home and maintaining HIPAA Compliance
Ensuring Security in Remote Environments. In the age of the COVID-19 pandemic, more and more empl...
Read full article
Why Choose Accountable's HIPAA Training
Join thousands of organizations that trust Accountable to manage their compliance needs.
-
Fast and effective - Complete your training in minimal time
-
Engaging video content - No boring slides, just clear and practical lessons
-
Compliance-focused - Covers all key HIPAA regulations for privacy and security