Blog
Is Datadog HIPAA Compliant? BAA Requirements and PHI Best Practices
Understand Datadog HIPAA compliance and apply controls: BAA setup, PHI minimization, redaction, s...
HIPAA Policies for Health Plans: What’s Required and How to Stay Compliant
Protect member data with HIPAA policies for health plans: implement Privacy and Security Rule con...
HIPAA Patient Right of Access: Deadlines, Electronic Formats, and Reasonable Fees Explained
Understanding your HIPAA Patient Right of Access helps you get copies of your protected health in...
HIPAA PII Identifiers: Mapping General PII to PHI’s 18 Identifiers and De‑Identification Steps
Overview of HIPAA PII and PHI Identifiers. HIPAA focuses on Protected Health Information (PHI), ...
HIPAA Privacy Rule for Students: A Clear, Quick Summary of PHI, Rights, and Responsibilities
HIPAA Privacy Rule Scope. The HIPAA Privacy Rule sets national standards for how health informat...
HIPAA’s Individually Identifiable Health Information (IIHI): What Counts, What Doesn’t, and How to De‑Identify It
Definition of Individually Identifiable Health Information. Individually Identifiable Health Inf...
HIPAA Patient Authorization Form: Step-by-Step Guide and Compliance Checklist
HIPAA Authorization Form Requirements. A HIPAA patient authorization form permits a Protected He...
HIPAA De-Identification Methods: Safe Harbor vs. Expert Determination (Practical 2025 Guide)
Safe Harbor Method Requirements. Under the HIPAA Privacy Rule, Safe Harbor lets you publish or s...
HIPAA for Students: A Simple Definition and Why It Matters
Understanding HIPAA for Students helps you know when your health details are protected, who may s...
HIPAA’s Definition of Protected Health Information (PHI): Scope, Exclusions, and De‑Identification Rules
Understanding what counts as PHI is essential to apply HIPAA’s Privacy Rule correctly. This guide...
HIPAA Enforcement for Business Associates: What OCR Targets and How to Avoid Penalties
Security Rule Compliance for Business Associates. What OCR targets. OCR focuses on whether busi...
HIPAA De-Identification Standards: Safe Harbor vs. Expert Determination (45 CFR 164.514)
HIPAA De-Identification Standard Overview. Under 45 CFR 164.514, health information is considere...
HIPAA De‑Identification Safe Harbor Method: A Practical Guide
Overview of Safe Harbor Method. What Safe Harbor requires. The HIPAA Privacy Rule’s De-identifi...
HIPAA De‑Identification: Safe Harbor vs Expert Determination Explained
Safe Harbor Method Overview. What it requires. Under HIPAA’s de‑identification standards, Safe ...
Working from Home and maintaining HIPAA Compliance
Ensuring Security in Remote Environments. In the age of the COVID-19 pandemic, more and more empl...
Read full article
Why Choose Accountable's HIPAA Training
Join thousands of organizations that trust Accountable to manage their compliance needs.
-
Fast and effective - Complete your training in minimal time
-
Engaging video content - No boring slides, just clear and practical lessons
-
Compliance-focused - Covers all key HIPAA regulations for privacy and security