Blog
Best Practices for Patient Privacy in Geriatric Medicine
Improve patient privacy in geriatric care with practical protocols, consent strategies, EHR safeg...
PHI in Mobile Apps: HIPAA Compliance and Security Best Practices
Protect PHI with HIPAA mobile app security: encryption, access control, secure transport, audits,...
What is a HIPAA Compliance Checklist?
Understanding the HIPAA Compliance Checklist: A Comprehensive Guide. I. Introduction to HIPAA and...
Working with an Attorney for HIPAA Compliance: Pros, Cons, and Cost Considerations
Here are some Pros, Cons, and Cost Considerations. Introduction:. Ensuring compliance with the H...
Safeguarding Your Business: Preventing a Data Incident
Safeguarding Your Business: Preventing a Data Incident. Meta Description: This article provides a...
Business Associate Agreements (BAAs) vs. Data Use Agreements (DUAs)
The Difference between a Data Use Agreement and a BAA: Understanding the Key Distinctions. Introd...
What is Personal Data under the GDPR?
What is Personal Data under the GDPR? A Comprehensive Guide. Understanding Personal Data and the ...
Traits and Responsibilities of a GDPR Data Controller
Traits and Responsibilities of a Data Controller under the GDPR. Introduction. Since its introduc...
Complying with Texas HB300
Complying with Texas HB300: A Guide for Businesses. Introduction. Texas HB300 is a law that was e...
ISO 27001 vs HIPAA: Main Differences
When it comes to safeguarding sensitive information, understanding the unique demands of ISO 2700...
Whose Responsibility Is It To Investigate a Data Privacy Violation?
Whose Responsibility is it to Investigate a Data Privacy Violation?. Investigating Data Privacy V...
Contractors Under CCPA/CPRA
Contractors Under CCPA/CPRA. According to the CCPA (California Consumer Privacy Act), determining...
Navigating the ADA: Does it Apply to SaaS Companies?
Navigating the ADA: Does it Apply to SaaS Companies?. Introduction. The Americans with Disabiliti...
Why was the CCPA Introduced?
Understanding the California Consumer Privacy Act and its Purpose. Introduction. In 2018, the sta...
Working from Home and maintaining HIPAA Compliance
Ensuring Security in Remote Environments. In the age of the COVID-19 pandemic, more and more empl...
Read full article
Why Choose Accountable's HIPAA Training
Join thousands of organizations that trust Accountable to manage their compliance needs.
-
Fast and effective - Complete your training in minimal time
-
Engaging video content - No boring slides, just clear and practical lessons
-
Compliance-focused - Covers all key HIPAA regulations for privacy and security