Blog
Is Athenahealth HIPAA Compliant? Security Measures and Compliance Overview
Secure patient data with Athenahealth HIPAA compliance: actionable BAA steps, AES-256 encryption,...
HIPAA Contingency Plan Requirements: A Practical Compliance Checklist
Practical HIPAA contingency plan requirements checklist to implement backups, disaster recovery, ...
HIPAA Compliance Checklist for Therapists: Step-by-Step Guide to Staying Compliant and Protecting PHI
Conduct Risk Assessments and Manage Vulnerabilities. Core actions. Map where Protected Healt...
Does the HIPAA Privacy Rule Apply to All Covered Entities?
Yes. The HIPAA Privacy Rule applies to all covered entities, but your specific duties depend on t...
Does HIPAA Apply to All Medical Records After Death? The 50-Year Rule, Exceptions, and Who Can Access Them
HIPAA Protection Period for Deceased Individuals. Under HIPAA, a deceased person’s Protected Hea...
Does HIPAA Apply to Phone Numbers? When a Phone Number Is (and Isn’t) PHI
Short answer: it depends on context. Under the HIPAA Privacy Rule, a phone number can be Protecte...
What Is a Medical Record Under HIPAA? Definition, Examples, and What’s Not Included
Definition Of Medical Record Under HIPAA. Under HIPAA, a medical record is best understood throu...
Covered Entity Definition (HIPAA): What It Means and Who’s Included
Health Plan Classification. Under the Health Insurance Portability and Accountability Act, a hea...
Does HIPAA Require Physical Safeguards? Yes—Here’s What the Security Rule Requires
Yes. The HIPAA Security Rule requires physical safeguards to protect Electronic Protected Health ...
Who Does the HIPAA Privacy Rule Apply To? Covered Entities and Business Associates
Covered Entities Overview. The HIPAA Privacy Rule applies to organizations and individuals that ...
What Counts as De-Identified Information Under HIPAA? Safe Harbor vs. Expert Determination
Safe Harbor Method Requirements. Under HIPAA, the Safe Harbor method de-identifies data by remov...
HIPAA Definition of Individually Identifiable Health Information (IIHI): What’s Included and What Isn’t
If you handle health data, understanding the HIPAA definition of Individually Identifiable Health...
Technical Safeguards for HIPAA De-Identification: Methods and Best Practices to Protect PHI
Implement Access Controls. Limit who can view, transform, or export PHI by enforcing the minimum...
Are Business Associate Agreements Necessary? When HIPAA Requires a BAA (and When It Doesn’t)
Definition of Business Associate Agreement. A Business Associate Agreement (BAA) is a written co...
Working from Home and maintaining HIPAA Compliance
Ensuring Security in Remote Environments. In the age of the COVID-19 pandemic, more and more empl...
Read full article
Why Choose Accountable's HIPAA Training
Join thousands of organizations that trust Accountable to manage their compliance needs.
-
Fast and effective - Complete your training in minimal time
-
Engaging video content - No boring slides, just clear and practical lessons
-
Compliance-focused - Covers all key HIPAA regulations for privacy and security