Blog
HIPAA Compliance for Connected Medical Devices: Requirements and Best Practices
Learn how to achieve HIPAA compliance for connected medical devices: map PHI, run SRAs, enforce e...
Hospice Employee Security Training: HIPAA Security Rule & Cybersecurity Awareness Course
Start HIPAA Security Rule training for hospice teams to protect PHI, stop breaches, and meet comp...
Who Counts as a HIPAA Business Associate? A 3-Step Test with Role-Based Examples
Definition of Business Associate. A HIPAA business associate is any person or entity that create...
Where to File a HIPAA Violation: OCR, State Attorneys General, or Your Provider’s Privacy Officer?
When you discover a potential HIPAA violation, your first question is often where to file a HIPAA...
Why HIPAA Matters in 2025: Beyond Compliance for Trust, Safety, and Interoperability
HIPAA Security Rule Updates. What changed and why it matters in 2025. In 2025, HIPAA’s Security...
What Records Does HIPAA Protect? A Record‑Type and Source‑System Guide
Protected Health Information Types. Protected Health Information (PHI) is individually identifia...
When to File a HIPAA Complaint: Deadlines, Red Flags, and Escalation Steps
Filing Requirements and Deadlines. Who can file and what qualifies. You may file a complaint if...
What Is the De‑Identification Standard Under HIPAA? Safe Harbor vs. Expert Determination (2025 Guide)
De-Identification Methods under HIPAA. Under the HIPAA Privacy Rule, Protected Health Informatio...
Where Encryption Fits Under HIPAA’s Technical Safeguards: Access Control and Transmission Security
Addressable Implementation Specifications. Under the HIPAA Security Rule’s technical safeguards,...
HIPAA Security Rule Summary for Non-Technical Teams: Scope, Safeguards, and Responsibilities
Overview of the HIPAA Security Rule. The HIPAA Security Rule sets baseline standards to protect ...
What Records Does HIPAA Protect? From Medical Charts to Claims Files—Across Paper, Digital, and Verbal Formats
Definition of Protected Health Information. Under the Health Insurance Portability and Accountab...
What the HIPAA Security Rule Protects: Electronic PHI in Storage, Use, and Transmission
The HIPAA Security Rule protects Electronic Protected Health Information (e-PHI) wherever you cre...
Where Can I File a HIPAA Violation? A Jurisdiction-by-Scenario Guide to the Right Agency
If you are wondering, “Where can I file a HIPAA violation?”, the answer depends on who you are, w...
Where to File a HIPAA Complaint: OCR Submission Links and State-by-State Contacts
If you are deciding where to file a HIPAA complaint, this guide explains the options offered by t...
Working from Home and maintaining HIPAA Compliance
Ensuring Security in Remote Environments. In the age of the COVID-19 pandemic, more and more empl...
Read full article
Why Choose Accountable's HIPAA Training
Join thousands of organizations that trust Accountable to manage their compliance needs.
-
Fast and effective - Complete your training in minimal time
-
Engaging video content - No boring slides, just clear and practical lessons
-
Compliance-focused - Covers all key HIPAA regulations for privacy and security