Blog
HIPAA Compliance for Connected Medical Devices: Requirements and Best Practices
Learn how to achieve HIPAA compliance for connected medical devices: map PHI, run SRAs, enforce e...
Is Emma HIPAA Compliant? What You Need to Know
Understand Emma HIPAA compliance risks and why Emma is not HIPAA compliant for PHI; learn its sec...
What Are the 3 Types of HIPAA Safeguards? Administrative, Physical, and Technical Explained
Administrative Safeguards Overview. Administrative safeguards are the policies, processes, and o...
What Medical Information Does HIPAA Protect? PHI and ePHI Explained
Definition of Protected Health Information. Protected Health Information is any Individually Ide...
HIPAA Security Rule Technical Safeguards: Complete List and Requirements
The HIPAA Security Rule technical safeguards define how you protect electronic Protected Health I...
What Constitutes a HIPAA Violation? Common Examples, Penalties, and How to Avoid Them
Common HIPAA Violations. Impermissible uses and disclosures of PHI. A HIPAA violation occurs wh...
HIPAA Technical Safeguards Requirements: What They Are and How to Comply
HIPAA technical safeguards define the technology and related processes you must implement to prot...
What Are HIPAA Physical Safeguards? Examples and How to Stay Compliant
Facility Access Controls. What this means. Facility access controls limit who can enter spaces ...
HIPAA Security Rule Safeguards: Administrative, Physical, and Technical Requirements Explained
Administrative Safeguards Implementation. Administrative safeguards set the governance foundatio...
Protected Health Information (PHI) Definition: What It Means and What Counts Under HIPAA
Overview of Protected Health Information. Protected Health Information (PHI) is individually ide...
HIPAA Security Rule Summary: Key Requirements and Safeguards for Compliance
This HIPAA Security Rule Summary explains how you can safeguard electronic protected health infor...
Protected Health Information (PHI) Under HIPAA: Definition and Examples
Definition of Protected Health Information. Protected Health Information (PHI) under the HIPAA P...
Requirements for HIPAA Authorization: What Your Form Must Include
If you create or review authorization forms, you need a clear, practical checklist. This guide ex...
HIPAA Technical Safeguards Explained: Security Rule Requirements, Examples, and Best Practices
HIPAA’s technical safeguards are the technology standards that protect electronic protected healt...
Working from Home and maintaining HIPAA Compliance
Ensuring Security in Remote Environments. In the age of the COVID-19 pandemic, more and more empl...
Read full article
Why Choose Accountable's HIPAA Training
Join thousands of organizations that trust Accountable to manage their compliance needs.
-
Fast and effective - Complete your training in minimal time
-
Engaging video content - No boring slides, just clear and practical lessons
-
Compliance-focused - Covers all key HIPAA regulations for privacy and security