Blog
Healthcare Cybersecurity ROI: How to Measure and Maximize the Value of Your Security Investments
Measure healthcare cybersecurity ROI with practical formulas, key metrics, and layered controls t...
U.S. Virgin Islands Healthcare Privacy Laws: A Practical Guide to HIPAA, Territorial Rules, and Patient Rights
Practical guide to USVI HIPAA compliance: steps to secure PHI, honor patient rights, manage HIE a...
Does HIPAA Protect Medical Information? Only PHI from Covered Entities—What’s Covered vs. Not Covered
HIPAA Coverage and Scope. HIPAA protects medical information only when it qualifies as Protected...
Secure DICOM File Sharing: Ensuring HIPAA Compliance
Implement HIPAA-Compliant Encryption Methods. Encrypt data in transit and at rest. Protect DICO...
The Complete Guide to HIPAA PHI De-Identification Standards
De-Identification Definition. Under the HIPAA Privacy Rule, Protected Health Information (PHI) i...
Comprehensive Guide to HIPAA De-Identification Methods
Safe Harbor Method Requirements. The HIPAA Privacy Rule permits you to treat data as non–Protect...
Unlocking the Secrets of HIPAA Compliant De-Identification Methods
Safe Harbor Method Requirements. What the rule requires. The HIPAA Privacy Rule allows you to d...
Does HIPAA Protect All Medical Information? PHI Coverage vs. Gaps in Apps, Wearables, and Employer Records
Short answer: no. HIPAA protects Protected Health Information (PHI) when it is handled by specifi...
Does HIPAA Protect My Medical Records? A Simple Answer by Who’s Handling Them
Overview of HIPAA Privacy Protections. The short answer: your medical records are protected by H...
Does HIPAA Require Technical Safeguards? What the Security Rule Mandates for ePHI
Access Control Implementation. The HIPAA Security Rule requires technical safeguards that limit ...
Exploring HIPAA's Requirement for Administrative Safeguards: A Comprehensive Overview
Administrative safeguards are the backbone of the HIPAA Security Rule. They require you to implem...
Defining Covered Entities Under HIPAA: Roles and Responsibilities
Overview of Covered Entities. Under the Health Insurance Portability and Accountability Act (HIP...
Navigating the HIPAA Complaint Process: A Step-by-Step Guide
Filing a HIPAA Complaint. Who can file and when. If you believe a covered entity or business as...
Combining HIPAA Authorizations: Guidelines and Best Practices
Prohibited Combinations of Authorizations. What “compound” means in practice. Combining HIPAA a...
Working from Home and maintaining HIPAA Compliance
Ensuring Security in Remote Environments. In the age of the COVID-19 pandemic, more and more empl...
Read full article
Why Choose Accountable's HIPAA Training
Join thousands of organizations that trust Accountable to manage their compliance needs.
-
Fast and effective - Complete your training in minimal time
-
Engaging video content - No boring slides, just clear and practical lessons
-
Compliance-focused - Covers all key HIPAA regulations for privacy and security