Blog
Is Datadog HIPAA Compliant? BAA Requirements and PHI Best Practices
Understand Datadog HIPAA compliance and apply controls: BAA setup, PHI minimization, redaction, s...
HIPAA Policies for Health Plans: What’s Required and How to Stay Compliant
Protect member data with HIPAA policies for health plans: implement Privacy and Security Rule con...
What Are HIPAA Physical Safeguards? Facility Access, Workstations, and Device/Media Controls Explained
Facility Access Controls. Purpose and scope. Facility Access Controls govern who can enter area...
The HIPAA Security Rule Requires: What Business Associates Must Implement and Document in 2025
Mandatory Implementation of Security Controls. In 2025, business associates must establish, impl...
HIPAA Administrative Safeguards for Small Practices: A Practical Implementation Plan (45 CFR 164.308)
Small practices can meet HIPAA Administrative Safeguards by turning the regulation at 45 CFR 164....
HIPAA Security Rule Standards Crosswalk: Mapping 45 CFR 164.306–316 to NIST 800-53 and ISO 27001
This guide presents a practical compliance crosswalk that links the HIPAA Security Rule (45 CFR 1...
Covered Entities Under HIPAA: Edge Cases, Hybrid Entities, and Common Misclassifications
Understanding when HIPAA applies hinges on who is a covered entity, where hybrid status narrows c...
HIPAA Security Rule’s 3 Safeguards: A Plain-English Comparison of Administrative, Physical, and Technical Controls
The HIPAA Security Rule organizes protections for electronic protected health information (ePHI) ...
Why the HIPAA Security Rule Exists: Its Purpose in Protecting ePHI’s Confidentiality, Integrity, and Availability
The HIPAA Security Rule exists to safeguard electronic Protected Health Information (ePHI) so tha...
HIPAA-Compliant Secure File Transfer: SFTP, MFT, and Audit-Ready Sharing
Transferring electronic Protected Health Information (ePHI) demands controls that satisfy the HIP...
Protected Health Information (PHI) Under HIPAA: Definition, Scope, and What Isn’t PHI
Definition of Protected Health Information. Protected Health Information (PHI) under HIPAA is in...
HIPAA’s Definition of Protected Health Information (PHI): Scope, Exclusions, and Real‑World Edge Cases
Definition of Protected Health Information. What PHI means under HIPAA. Protected Health Inform...
HIPAA Authorization Requirements: 45 CFR 164.508 Required Elements Checklist (With Examples)
This guide distills HIPAA authorization requirements under 45 CFR 164.508 into a practical checkl...
HIPAA Security Rule Requirements: A NIST CSF and SP 800-53 Mapping Guide
HIPAA Security Rule Overview. Scope and risk-based approach. The HIPAA Security Rule protects e...
Working from Home and maintaining HIPAA Compliance
Ensuring Security in Remote Environments. In the age of the COVID-19 pandemic, more and more empl...
Read full article
Why Choose Accountable's HIPAA Training
Join thousands of organizations that trust Accountable to manage their compliance needs.
-
Fast and effective - Complete your training in minimal time
-
Engaging video content - No boring slides, just clear and practical lessons
-
Compliance-focused - Covers all key HIPAA regulations for privacy and security