Blog
Healthcare Proximity Badge Security: Best Practices, Risks, and Compliance
Learn how Proximity Badge Technology secures healthcare with AES encryption, MFA, tailgating prev...
Equipment Maintenance Privacy Considerations: Best Practices to Protect Sensitive Data During Service and Repair
Secure sensitive data with equipment maintenance that enforces access controls, encryption, sanit...
GLBA Safeguards Rule Updates: What’s New, Best Practices, and Compliance Tips
FTC Safeguards Rule Amendment Overview. The latest GLBA Safeguards Rule updates add a federal Br...
Beginner’s Guide to California’s Confidentiality of Medical Information Act (CMIA): What It Covers and How to Comply
CMIA Overview. California’s Confidentiality of Medical Information Act (CMIA) is the state’s cor...
Beginner's Guide to the Massive T-Mobile Data Breach: Everything You Need to Know
Overview of the T-Mobile Data Breach. The Massive T-Mobile Data Breach refers to several securit...
HIPAA-Compliant Email Providers Roundup: Real-World Scenarios to Help You Understand Your Options
Overview of HIPAA Compliance Requirements. What HIPAA means for email. HIPAA applies when you c...
California Confidentiality of Medical Information Act (CMIA): Best Practices and Compliance Tips
CMIA Overview and Scope. The California Confidentiality of Medical Information Act (CMIA) protec...
California Confidentiality of Medical Information Act (CMIA): Real-World Scenarios to Help You Understand Your Medical Privacy Rights
Definition of Medical Information. The CMIA protects medical information created, received, or m...
T-Mobile’s Massive Data Breach Explained: Real-World Scenarios and Everything You Need to Know
Overview of Major T-Mobile Data Breaches. T-Mobile has faced multiple security incidents over th...
AI in Healthcare; What it means for HIPAA
Artificial intelligence is rapidly transforming healthcare, unlocking new possibilities for diagn...
Real-World GLBA Scenarios: Practical Examples to Understand the Gramm-Leach-Bliley Act
Financial Industry Consolidation Under GLBA. Scenario: One customer, three lines of business. A...
How to Get a BAA with AWS: Real-World Scenarios for HIPAA Compliance
Securing a BAA with AWS is the first concrete step to process or store Protected Health Informati...
PII (Personally Identifiable Information): Best Practices and Compliance Tips
Protecting PII (Personally Identifiable Information) demands a balanced mix of sound security eng...
Real-World PII Examples: Everyday Scenarios to Help You Understand Personally Identifiable Information
Definition of Personally Identifiable Information. Personally identifiable information (PII) is ...
Working from Home and maintaining HIPAA Compliance
Ensuring Security in Remote Environments. In the age of the COVID-19 pandemic, more and more empl...
Read full article
Why Choose Accountable's HIPAA Training
Join thousands of organizations that trust Accountable to manage their compliance needs.
-
Fast and effective - Complete your training in minimal time
-
Engaging video content - No boring slides, just clear and practical lessons
-
Compliance-focused - Covers all key HIPAA regulations for privacy and security