Blog
Is Athenahealth HIPAA Compliant? Security Measures and Compliance Overview
Secure patient data with Athenahealth HIPAA compliance: actionable BAA steps, AES-256 encryption,...
HIPAA Contingency Plan Requirements: A Practical Compliance Checklist
Practical HIPAA contingency plan requirements checklist to implement backups, disaster recovery, ...
When to File a HIPAA Violation Complaint: What Qualifies, Deadlines, and How to Report
Identifying Qualifying HIPAA Violations. Who is covered and what information is protected. HIPA...
When Is a HIPAA Authorization Required? Scenarios, Exceptions, and Examples
HIPAA Authorization Requirement. You must obtain a signed HIPAA authorization before using or di...
Who Is a Covered Entity Under HIPAA? Definition and Examples
Definition of Covered Entity. Core criteria. Under HIPAA, a covered entity is an organization t...
Who Enforces the HIPAA Security Rule? The HHS Office for Civil Rights (OCR)
OCR Enforcement Responsibilities. The U.S. Department of Health and Human Services Office for Ci...
What Are HIPAA Administrative Safeguards? Requirements, Examples, and a Compliance Checklist
HIPAA Administrative Safeguards are the policies, procedures, and oversight mechanisms you put in...
Why the HIPAA Security Rule Is Important: Protecting Patient Data, Preventing Breaches, and Building Trust
Purpose of the HIPAA Security Rule. The HIPAA Security Rule sets national standards to protect t...
Why HIPAA Compliance Is Important for Small Businesses: Avoid Fines, Protect Data, and Build Trust
Protecting Patient Health Information. What counts as Protected Health Information (PHI)?. Prot...
What Is HIPAA? Definition, Meaning, and Who Must Comply
HIPAA Definition and Purpose. HIPAA, the Health Insurance Portability and Accountability Act of ...
What Records Are Not Protected by HIPAA? Examples and Exceptions You Should Know
HIPAA protects Protected Health Information (PHI) held by Covered Entities and their Business Ass...
What Are the HIPAA Security Rule’s Administrative Safeguards? Key Requirements Explained
The HIPAA Security Rule’s Administrative Safeguards are the management policies and procedures th...
What Is the HIPAA Technical Safeguards List? Key Requirements, Controls, and Examples
HIPAA’s Security Rule defines five technical safeguards that every covered entity and business as...
What Medical Records Are Protected by HIPAA? PHI Examples, Exceptions, and Access Rules
Definition of Protected Health Information. Under HIPAA, Protected Health Information (PHI) is I...
Working from Home and maintaining HIPAA Compliance
Ensuring Security in Remote Environments. In the age of the COVID-19 pandemic, more and more empl...
Read full article
Why Choose Accountable's HIPAA Training
Join thousands of organizations that trust Accountable to manage their compliance needs.
-
Fast and effective - Complete your training in minimal time
-
Engaging video content - No boring slides, just clear and practical lessons
-
Compliance-focused - Covers all key HIPAA regulations for privacy and security