Blog
Is Athenahealth HIPAA Compliant? Security Measures and Compliance Overview
Secure patient data with Athenahealth HIPAA compliance: actionable BAA steps, AES-256 encryption,...
HIPAA Contingency Plan Requirements: A Practical Compliance Checklist
Practical HIPAA contingency plan requirements checklist to implement backups, disaster recovery, ...
What Does a HIPAA Authorization Require? Core Elements, Required Statements, and Compliance Checklist
Core Elements of a HIPAA Authorization. Specific description of information. Your authorization...
Is HIPAA a Confidentiality Law? What It Really Covers and What It Doesn’t
HIPAA Overview and Purpose. At its core, HIPAA creates a federal baseline for health information...
HIPAA Protected Health Information (PHI): Definition and List of 18 Identifiers
Overview of Protected Health Information. Under the Health Insurance Portability and Accountabil...
HIPAA Physical Safeguard Requirements: Complete Guide and Checklist
HIPAA Physical Safeguard Requirements set the standards for protecting Electronic Protected Healt...
Is HIPAA a Privacy or Security Rule? It’s Both—Here’s the Difference
Overview of HIPAA. HIPAA sets national standards for how health information is used, shared, and...
HIPAA Technical Safeguards Explained: Security Rule Requirements and How They Support the Privacy Rule
HIPAA’s Technical Safeguards define how you protect electronic protected health information (ePHI...
HIPAA Minimum Necessary Rule Explained: What It Is, Who It Applies To, and How to Comply
Overview of the HIPAA Minimum Necessary Rule. The HIPAA Minimum Necessary Rule requires you to l...
Protected Health Information (PHI) Under HIPAA: What Counts and How to Stay Compliant
Protected Health Information (PHI) is the backbone of HIPAA compliance. If you create, receive, m...
Complete List of the 18 HIPAA Identifiers for De-Identification (Safe Harbor)
Overview of HIPAA Safe Harbor Method. The HIPAA Safe Harbor method is one of the De-identificati...
What PHI Is Protected by HIPAA? Definition, 18 Identifiers, and Examples
Definition of PHI. Protected Health Information (PHI) is Individually Identifiable Health Inform...
Is PHI Protected Health Information Under HIPAA? Yes—Definition, Examples, and What’s Covered
Short answer: yes. PHI—protected health information—is the core data set safeguarded by HIPAA. It...
HIPAA Violation Lawsuit: Can You Sue, What Counts, and How to Get Started
Filing a Complaint with the Office for Civil Rights. Who can file and when. If you believe your...
Working from Home and maintaining HIPAA Compliance
Ensuring Security in Remote Environments. In the age of the COVID-19 pandemic, more and more empl...
Read full article
Why Choose Accountable's HIPAA Training
Join thousands of organizations that trust Accountable to manage their compliance needs.
-
Fast and effective - Complete your training in minimal time
-
Engaging video content - No boring slides, just clear and practical lessons
-
Compliance-focused - Covers all key HIPAA regulations for privacy and security