Blog
Deciphering HIPAA: The Health Insurance Portability and Accountability Act Explained
Explore HIPAA Title II, Privacy and Security rules, compliance steps, and PHI protections to secu...
Defining HIPAA: The 1996 Health Insurance Portability and Accountability Act Explained
Learn HIPAA compliance essentials: Privacy and Security Rule safeguards, enforcement risks, and a...
Can Medical Records Be Emailed? What HIPAA Says and How to Send Them Securely
Yes—medical records can be emailed when you follow HIPAA’s rules. This guide explains exactly wha...
HIPAA OCR Audit: What to Expect and How to Prepare
Audit Notification Process. An audit by the U.S. Department of Health and Human Services (HHS) O...
Clinical Trial Compliance Software to Stay GCP & FDA Ready
Clinical trial compliance software helps you operationalize Good Clinical Practice across study d...
What Does the 2013 HIPAA Security Rule Require? Key ePHI Safeguards Explained
The 2013 HIPAA Security Rule sets national standards for safeguarding Electronic Protected Health...
HIPAA-Compliant Photo App: Securely Capture, Store, and Share Patient Images
Secure Photo Capture Techniques. Controlled capture environment. A HIPAA-compliant photo app re...
Do Individual Access Authorizations Need to Be Verified? Compliance Rules and Best Practices
Yes—individual access authorizations must be verified continuously, not just at onboarding. Ongoi...
Health Information Management: Concepts, Principles, and Practice — A Comprehensive Guide
Data Content and Governance. Foundations of trustworthy health data. At the core of health info...
Aetna Data Breach 2024: What Happened, Who’s Affected, and How to Protect Yourself
Overview of 2024 Data Breaches at Aetna. The Aetna data breach 2024 refers to a series of data p...
SOC 2 vs HIPAA: Key Differences, Compliance Requirements, and Which One You Need
SOC 2 Compliance Framework. SOC 2 is an independent attestation that evaluates how well your org...
Security Event vs. Incident: What’s the Difference and When to Escalate
Knowing when a security event becomes an incident is the difference between routine monitoring an...
Dental HIPAA Violations: Examples, Fines, and How to Stay Compliant
Common Dental HIPAA Violation Examples. Dental teams handle Protected Health Information every d...
EMR Audit Trail: What It Is, Why It Matters, and How to Stay HIPAA-Compliant
An EMR audit trail is your strongest proof of who accessed which patient record, when, from where...
Working from Home and maintaining HIPAA Compliance
Ensuring Security in Remote Environments. In the age of the COVID-19 pandemic, more and more empl...
Read full article
Why Choose Accountable's HIPAA Training
Join thousands of organizations that trust Accountable to manage their compliance needs.
-
Fast and effective - Complete your training in minimal time
-
Engaging video content - No boring slides, just clear and practical lessons
-
Compliance-focused - Covers all key HIPAA regulations for privacy and security