Blog
HIPAA Compliance for Developers: Requirements, Technical Controls, and Step‑by‑Step Checklist
Practical HIPAA compliance for developers: step-by-step checklists, risk analysis, encryption, ac...
HIPAA Requirements for Organ Donation Organizations (OPOs): A Practical Compliance Guide
Learn how to meet HIPAA requirements for organ donation organizations: protect PHI, apply Minimum...
What Counts as a HIPAA Violation? Requirements, Examples, and Penalties Explained
Understanding what counts as a HIPAA violation helps you protect patients, manage risk, and avoid...
Requirements for a HIPAA Authorization Form: What Must Be Included for Compliance
Core Elements of a HIPAA Authorization Form. What you must include. Specific description of th...
Texting Patient Information: HIPAA Rules, Compliance Requirements, and Penalties
HIPAA Compliance for Texting Patient Information. HIPAA does not categorically ban texting patie...
Is Texting Patient Information a HIPAA Violation? Requirements and Examples
Texting Patient Information and HIPAA Compliance. Texting patient information is not automatical...
HIPAA and Credit Reporting: Compliance Checklist for Providers and Revenue Cycle Teams
HIPAA Compliance in Revenue Cycle Management. HIPAA and credit reporting intersect where financi...
Can I File a HIPAA Complaint? What Qualifies and How to Submit One
If you believe your health information privacy rights were violated, you can file a HIPAA complai...
Are Physical Safeguards Required by the HIPAA Security Rule? Yes—Here’s What You Must Implement
Yes. The HIPAA Security Rule requires covered entities and business associates to implement physi...
How Many Identifiers Must Be Verified for HIPAA? No Fixed Number—Best Practice Is Two
HIPAA 18 Identifiers. Under the HIPAA Privacy Rule, Protected Health Information (PHI) is any da...
HIPAA Authorization Requirements: When It’s Required and What Must Be Included
Understanding HIPAA authorization requirements helps you decide when you must obtain written perm...
Encryption as a HIPAA Safeguard: How to Implement, Document, and Verify for Audits
Encryption is an addressable safeguard under the HIPAA Security Rule. To achieve Security Rule Co...
Examples and Checklist: Disclosing PHI to Collection Agencies Under HIPAA
When a patient account becomes delinquent, HIPAA allows you to disclose certain Protected Health ...
Best HIPAA-Compliant Healthcare CRM Software (2025): Top Picks, Features, and Pricing
Key Features of HIPAA-Compliant Healthcare CRM. The best HIPAA-compliant healthcare CRM software...
Working from Home and maintaining HIPAA Compliance
Ensuring Security in Remote Environments. In the age of the COVID-19 pandemic, more and more empl...
Read full article
Why Choose Accountable's HIPAA Training
Join thousands of organizations that trust Accountable to manage their compliance needs.
-
Fast and effective - Complete your training in minimal time
-
Engaging video content - No boring slides, just clear and practical lessons
-
Compliance-focused - Covers all key HIPAA regulations for privacy and security