Blog
Is Athenahealth HIPAA Compliant? Security Measures and Compliance Overview
Secure patient data with Athenahealth HIPAA compliance: actionable BAA steps, AES-256 encryption,...
HIPAA Contingency Plan Requirements: A Practical Compliance Checklist
Practical HIPAA contingency plan requirements checklist to implement backups, disaster recovery, ...
What Information HIPAA Does Not Protect: Examples and Exceptions
HIPAA protects Protected Health Information (PHI) held by Covered Entities and their Business Ass...
What Is HIPAA De-Identification? Definition, Safe Harbor vs. Expert Determination, and Compliance Requirements
HIPAA De-Identification Definition. HIPAA de-identification is the process of transforming prote...
What Is a Business Associate Agreement (BAA) and When Is It Required for HIPAA Compliance?
Definition of Business Associate Agreements. A Business Associate Agreement (BAA) is a HIPAA-req...
What Are the HIPAA Technical Safeguards Requirements? Key Controls Explained
HIPAA’s technical safeguards set the baseline for how you protect electronic protected health inf...
What Are the Physical Safeguards Required by HIPAA? Examples and Compliance Checklist
HIPAA’s Physical Safeguards (45 CFR §164.310) protect Electronic Protected Health Information (eP...
Secure Messaging That’s HIPAA Compliant: Requirements, Features, and Top Tools
HIPAA-Compliant Messaging Requirements. What HIPAA covers in messaging. Any message that can id...
Is Telemedicine HIPAA Compliant? Requirements, Best Practices, and Secure Platforms
HIPAA Compliance in Telemedicine. Telemedicine can be HIPAA compliant when you safeguard protect...
HIPAA: What It Protects and What It Doesn’t
HIPAA sets a national baseline for health privacy in the United States. It defines what counts as...
What Does the HIPAA Security Rule Protect? The Confidentiality, Integrity, and Availability of Electronic PHI (ePHI)
The HIPAA Security Rule sets national standards to safeguard the confidentiality, integrity, and ...
What Are the 18 HIPAA Identifiers? Complete PHI List Explained
The HIPAA Privacy Rule defines 18 specific identifiers that make health data “individually identi...
What Does HIPAA Not Protect? Health Data Outside Its Scope (Apps, Employers, Wearables)
Wondering what HIPAA does not protect? This guide maps where HIPAA stops and where other rules—an...
What Are the Administrative Safeguards Required by HIPAA? A Complete Guide
HIPAA’s administrative safeguards are the policies, procedures, and governance practices that pro...
Working from Home and maintaining HIPAA Compliance
Ensuring Security in Remote Environments. In the age of the COVID-19 pandemic, more and more empl...
Read full article
Why Choose Accountable's HIPAA Training
Join thousands of organizations that trust Accountable to manage their compliance needs.
-
Fast and effective - Complete your training in minimal time
-
Engaging video content - No boring slides, just clear and practical lessons
-
Compliance-focused - Covers all key HIPAA regulations for privacy and security