Blog
Is Datadog HIPAA Compliant? BAA Requirements and PHI Best Practices
Understand Datadog HIPAA compliance and apply controls: BAA setup, PHI minimization, redaction, s...
HIPAA Policies for Health Plans: What’s Required and How to Stay Compliant
Protect member data with HIPAA policies for health plans: implement Privacy and Security Rule con...
HIPAA 835 File Format Example: Sample ERA (X12 835) with Segments and Loops Explained
Overview of X12 835 Transaction Set. The HIPAA 835 transaction is the Electronic Remittance Advi...
HIPAA Amendment Process: How to Request Changes to Your Medical Records, Step by Step
Patient's Right to Amend Medical Records. Under HIPAA, you have the right to request an amendmen...
HIPAA Administrative Safeguard Requirements: Security Rule Checklist
Use this HIPAA Administrative Safeguard Requirements: Security Rule Checklist to structure polici...
HIPAA 834 EDI File Format Example: Enrollment File with Segment-by-Segment Breakdown
ANSI 834 EDI File Format Overview. The 834 is the HIPAA-mandated X12 Transaction Set used for Be...
HIPAA Encryption Rule Explained: What the Security Rule Actually Requires
HIPAA Security Rule Overview. The HIPAA Security Rule sets national standards for safeguarding e...
Encryption as a HIPAA Technical Safeguard: What the Security Rule Requires and How to Comply
Encryption in HIPAA Security Rule. Encryption is a technical safeguard under the HIPAA Security ...
How to Ensure HIPAA-Compliant File Transfer: Requirements, Best Practices, and Tools
Secure Data Transmission and Storage. Encrypt data in transit with Secure Communication Channels...
Free HIPAA Compliance Training for Employees: Online Courses with Certificates
HIPAA Compliance Essentials. Free HIPAA compliance training for employees gives you the core ski...
HIPAA Encryption Requirements Explained: What’s Required vs. Addressable and How to Comply
Encryption as Addressable Specification. Under the HIPAA Security Rule, encryption for Electroni...
Does the HIPAA Security Rule Apply to All Covered Entities? Who’s Covered and What’s Required
HIPAA Security Rule Applicability. The HIPAA Security Rule applies whenever you create, receive,...
Electronic Signatures for HIPAA-Compliant Forms: Secure, Legal, and Easy
HIPAA Compliance Requirements. Electronic signatures for HIPAA-compliant forms must protect the ...
Electronic Protected Health Information (ePHI) Under HIPAA: Definition, Examples, and Compliance Requirements
Definition of Electronic Protected Health Information. Electronic Protected Health Information (...
Working from Home and maintaining HIPAA Compliance
Ensuring Security in Remote Environments. In the age of the COVID-19 pandemic, more and more empl...
Read full article
Why Choose Accountable's HIPAA Training
Join thousands of organizations that trust Accountable to manage their compliance needs.
-
Fast and effective - Complete your training in minimal time
-
Engaging video content - No boring slides, just clear and practical lessons
-
Compliance-focused - Covers all key HIPAA regulations for privacy and security