Blog
Deciphering HIPAA: The Health Insurance Portability and Accountability Act Explained
Explore HIPAA Title II, Privacy and Security rules, compliance steps, and PHI protections to secu...
Defining HIPAA: The 1996 Health Insurance Portability and Accountability Act Explained
Learn HIPAA compliance essentials: Privacy and Security Rule safeguards, enforcement risks, and a...
What Is HIPAA Incidental Exposure? Definition, Examples, and How to Prevent It
Definition of Incidental Exposure. HIPAA incidental exposure refers to a limited, unavoidable di...
Who Started HIPAA? Senators Kassebaum and Kennedy, Signed by President Clinton
Legislative History of HIPAA. If you’re asking who started HIPAA, the short answer is that the f...
What Is a Security Risk Assessment (SRA)? Definition, Steps & Examples
A Security Risk Assessment (SRA) is a structured process for discovering what you must protect, w...
HIPAA‑Compliant Custom Software Development for Secure, Scalable Healthcare Apps
Ensuring HIPAA Compliance in Software Development. Building HIPAA‑compliant custom software star...
Home Health Agency Compliance Checklist: How to Meet Medicare CoPs, HIPAA & State Requirements
Medicare Conditions of Participation. Medicare Conditions of Participation set the baseline for ...
Policy Management Software for Healthcare: Simplify Compliance & Accreditation
Benefits of Policy Management Software. Policy management software for healthcare centralizes po...
What Are Patient Identifiers? Definition, Examples, and HIPAA’s 18 Identifiers
Definition of Patient Identifiers. Patient identifiers are data elements that single out, trace,...
HIPAA and PII Explained: What’s the Difference, Where They Overlap, and What’s Protected
Definition of PII and PHI. PII: Personally Identifiable Information. PII is any data that can i...
EDI Files in Healthcare: What They Are, Common Transactions (837, 835, 270/271), and How They Work
Overview of EDI in Healthcare. Electronic Data Interchange (EDI) is the standardized, machine-to...
Healthcare Risk Management Solutions to Strengthen Patient Safety and Compliance
Effective healthcare risk management solutions align clinical, operational, and regulatory priori...
How PHI is Protected Under HIPAA
Definition of PHI. Protected Health Information (PHI) is any health data about you that can iden...
Document Management System in Healthcare: What It Is, Key Features, and Compliance
Definition of Document Management System in Healthcare. A document management system (DMS) in he...
Working from Home and maintaining HIPAA Compliance
Ensuring Security in Remote Environments. In the age of the COVID-19 pandemic, more and more empl...
Read full article
Why Choose Accountable's HIPAA Training
Join thousands of organizations that trust Accountable to manage their compliance needs.
-
Fast and effective - Complete your training in minimal time
-
Engaging video content - No boring slides, just clear and practical lessons
-
Compliance-focused - Covers all key HIPAA regulations for privacy and security