Blog
Deciphering HIPAA: The Health Insurance Portability and Accountability Act Explained
Explore HIPAA Title II, Privacy and Security rules, compliance steps, and PHI protections to secu...
Defining HIPAA: The 1996 Health Insurance Portability and Accountability Act Explained
Learn HIPAA compliance essentials: Privacy and Security Rule safeguards, enforcement risks, and a...
HITRUST Certification Requirements for Mental Health Software: Scope, Controls, and Steps to Get Certified
HITRUST certification gives mental health software providers a rigorous, repeatable way to protec...
HIPAA and Cell Phone Pictures: What’s Allowed, What Isn’t, and How to Stay Compliant
Mobile cameras can streamline clinical workflows, but they also create high-risk exposure for Pro...
Which PHI Disclosures Require Written Authorization Under HIPAA?
Psychotherapy Notes Disclosure Requirements. Under the HIPAA Privacy Rule, psychotherapy notes r...
Parents Denied Access to a Child’s Medical Records? Your Rights and Next Steps
Understanding Parental Rights Under HIPAA. If you are a parent or legal guardian, the Health Ins...
California Medical Records Law: Access, Privacy, and Your Rights Under CMIA and HIPAA
Confidentiality of Medical Information Act Protections. California’s Confidentiality of Medical ...
HIPAA Compliance Attestation: What It Is, Requirements, and a Template You Can Use
HIPAA compliance attestation is a formal statement that you have implemented and maintain control...
Healthcare Vendor Risk: What It Is, Why It Matters, and How to Manage It
Definition of Healthcare Vendor Risk. What it is. Healthcare vendor risk is the exposure your o...
ASC X12 Version 5010: What It Is, Requirements, and Key HIPAA EDI Transactions
Overview of ASC X12 Version 5010. ASC X12 Version 5010 is the HIPAA-adopted standard for exchang...
EDI 834 Benefit Enrollment and Maintenance (X12): Overview, Requirements, and Implementation Guide
Purpose of EDI 834 Transactions. The ASC X12N 834 is the standard Electronic Data Interchange tr...
OIG Compliance Program: The 7 Elements Explained (Checklist + Examples)
An effective OIG compliance program helps you prevent, detect, and correct regulatory risk across...
What Does "Electronically Protected" Mean? Definition, HIPAA, and Examples
Definition of ePHI. Electronically protected health information (ePHI) is Individually Identifia...
HITRUST Checklist: Step-by-Step Guide to CSF Certification Readiness
Use this HITRUST checklist to move from orientation to certification with fewer surprises. You wi...
Working from Home and maintaining HIPAA Compliance
Ensuring Security in Remote Environments. In the age of the COVID-19 pandemic, more and more empl...
Read full article
Why Choose Accountable's HIPAA Training
Join thousands of organizations that trust Accountable to manage their compliance needs.
-
Fast and effective - Complete your training in minimal time
-
Engaging video content - No boring slides, just clear and practical lessons
-
Compliance-focused - Covers all key HIPAA regulations for privacy and security