Blog
Is Datadog HIPAA Compliant? BAA Requirements and PHI Best Practices
Understand Datadog HIPAA compliance and apply controls: BAA setup, PHI minimization, redaction, s...
HIPAA Policies for Health Plans: What’s Required and How to Stay Compliant
Protect member data with HIPAA policies for health plans: implement Privacy and Security Rule con...
HIPAA Security Rule Training: 45 CFR 164.308(a)(5) Requirements by Role, Frequency, and Evidence
Role-Based Training Requirements. Under 45 CFR 164.308(a)(5), you must implement a Security Awar...
HIPAA PHI Definition: What Counts as Protected Health Information—and What Doesn’t
Overview of Protected Health Information. Under the HIPAA PHI definition, Protected Health Infor...
HIPAA Security Rule Safeguards: Mapping to NIST CSF and ISO 27001 Controls
The HIPAA Security Rule sets baseline safeguards to protect electronic Protected Health Informati...
HIPAA Security Rule Standards Map: Linking 45 CFR 164.308, 164.310, 164.312, and 164.316 to Real-World Controls
Administrative Safeguards. What 45 CFR 164.308 covers. Administrative safeguards set the manage...
HIPAA Recognized Identifiers: A Safe Harbor De‑Identification Playbook for Data Teams
Overview of HIPAA Safe Harbor Method. The HIPAA Safe Harbor Rule gives you a clear path to publi...
HIPAA Security Rule Administrative Safeguards: Complete 164.308(a) List Mapped to Policies, Owners, and Evidence
Security Management Process. The security management process sets the governance foundation for ...
Twenty-six BILLION Records Breached!
In the world of cybersecurity, a recent incident has sent shockwaves through the industry. Dubbed...
What HIPAA Laws Protect vs State Privacy Laws (CMIA, HB300, CPRA): 2025 Guide
You face overlapping healthcare data privacy laws. This 2025 guide clarifies what HIPAA protects ...
HIPAA Minimum Necessary in Practice: A Step-by-Step Implementation Checklist
Understanding the Minimum Necessary Standard. The HIPAA Privacy Rule requires you to limit uses,...
HIPAA Medical Records Access Rules for Providers: Processing Requests, Deadlines, Fees, and e‑Copy Formats
Medical Records Access Deadlines. As a covered entity, you must provide individuals with access ...
HIPAA Individual Identifiers: Direct vs. Indirect and How to De‑Identify Data
Direct Identifiers in HIPAA. Under the Health Insurance Portability and Accountability Act, dire...
HIPAA NPI Compliance: Enumeration, Proper Use, and Privacy Safeguards
NPI Enumeration and Classification. What an NPI is. The National Provider Identifier (NPI) is a...
Working from Home and maintaining HIPAA Compliance
Ensuring Security in Remote Environments. In the age of the COVID-19 pandemic, more and more empl...
Read full article
Why Choose Accountable's HIPAA Training
Join thousands of organizations that trust Accountable to manage their compliance needs.
-
Fast and effective - Complete your training in minimal time
-
Engaging video content - No boring slides, just clear and practical lessons
-
Compliance-focused - Covers all key HIPAA regulations for privacy and security