Blog
HIPAA Compliance for Connected Medical Devices: Requirements and Best Practices
Learn how to achieve HIPAA compliance for connected medical devices: map PHI, run SRAs, enforce e...
Is Emma HIPAA Compliant? What You Need to Know
Understand Emma HIPAA compliance risks and why Emma is not HIPAA compliant for PHI; learn its sec...
HIPAA Security Rule Technical Safeguards: Requirements, Examples, and How to Comply
The HIPAA Security Rule’s technical safeguards tell you how to protect electronic protected healt...
HIPAA Security Rule Encryption: What’s Required and How to Comply
Encryption Requirement Overview. The HIPAA Security Rule requires safeguards to protect electron...
What Are HIPAA Safeguards? Administrative, Physical, and Technical Requirements Explained
Administrative Safeguards Implementation. Administrative safeguards are the governance layer of ...
What Are the Three HIPAA Security Rule Safeguards? Administrative, Physical & Technical
Overview of the HIPAA Security Rule. The HIPAA Security Rule sets national standards for safegua...
HIPAA Security Rule Administrative Safeguards Requirements: Complete Guide and Checklist
The HIPAA Security Rule’s administrative safeguards set the foundation for protecting electronic ...
HIPAA Right of Access: Your Guide to Getting Your Medical Records (Timelines, Fees, and How to Request)
HIPAA Overview of Right of Access. What the right covers. The HIPAA Right of Access gives you t...
HIPAA Technical Safeguards Summary: Key Security Rule Requirements Explained
The HIPAA Security Rule defines technical safeguards that protect electronic protected health inf...
HIPAA Right of Amendment: How to Correct Errors in Your Medical Records
Right to Request Amendment. The HIPAA right of amendment lets you ask a covered entity—such as a...
HIPAA PHI List: The 18 Identifiers of Protected Health Information (With Examples)
Overview of HIPAA PHI. Under the HIPAA Privacy Rule, Protected Health Information (PHI) is any h...
HIPAA PHI Definition: What Counts as Protected Health Information (Examples and the 18 Identifiers)
Overview of Protected Health Information. Protected Health Information (PHI) is individually ide...
HIPAA Privacy and Security Rule Explained: Key Requirements, Differences, and How to Comply
The HIPAA Privacy and Security Rule Explained: Key Requirements, Differences, and How to Comply h...
HIPAA Protected Health Information (PHI) Definition: What It Is, What Counts, and Examples
Definition of PHI. What PHI means under HIPAA. Protected Health Information (PHI) is Individual...
Working from Home and maintaining HIPAA Compliance
Ensuring Security in Remote Environments. In the age of the COVID-19 pandemic, more and more empl...
Read full article
Why Choose Accountable's HIPAA Training
Join thousands of organizations that trust Accountable to manage their compliance needs.
-
Fast and effective - Complete your training in minimal time
-
Engaging video content - No boring slides, just clear and practical lessons
-
Compliance-focused - Covers all key HIPAA regulations for privacy and security