Product
Features
Compliance
AI Risk Assessment
AI powered Gap Analysis
Policy Management
Customizable templates
Data Inventory
Document data sources
Employee Training
HIPAA Training
Best in class training
Security Awareness Training
Monitor training progress
Company Training
Create your own training
Data Breach Monitoring
Monitor employee emails
Vendor & Contract Management
Vendor Management
Monitor vendors
Contract Management
e-signature for agreements
Vendor Assessments
Manage vendor risk
Business Associate Agreements
Send BAA's for e-signature
Customer Trust
Privacy Center
Custom branded portal
Data Access Request
Comply with DSAR laws
Reporting
Prove compliance
HIPAA Seal of Compliance
Show compliance on site
Ready to get started?
Book a Demo
Pricing
Watch demo
Talk To An Expert
Resources
Use cases
HIPAA Compliance
Achieve HIPAA compliance easily
GDPR Compliance
Comply with global privacy laws
Playbooks
Get step-by-step guidance with tasks
Resources
Blog
The latest industry info and guidance
Risk Assessment
See how you stack up against compliance
HIPAA Training
Take individual HIPAA training
Company
About us
Learn more about Accountable
Contact us
Get in touch and ask us a question
Careers
We're hiring!
Join our awesome team
We've just released an update!
Check out our changelog for the latest features in Accountable!
Changelog
Demo
Pricing
Log in
Log in
Get Started Free
Sitemap
Product Features
$100k Compliance Protection
Data Breach Monitoring
Data Inventory Management
Employee Portal & Training
Playbooks
Policy Management
Privacy Center
Privacy Compliance Software
Privacy Incident Response
Security Risk Assessment
Vendor Management Software
HIPAA Blog Posts
Does HIPAA Apply After Death? Understanding Privacy Rights
HIPAA Training: A Must for Healthcare Businesses
Navigating HIPAA's Privacy Rule: Your Quick Guide to Accounting for Disclosures
HIPAA and Workforce Training
Understanding HIPAA Certification
Fraud, Waste and Abuse
What are examples of HIPAA Safeguards?
Fasten Health has achieved HIPAA Compliance with Accountable
What's Healthcare GRC?
Working from Home and maintaining HIPAA Compliance
Hospitals and HIPAA Compliance
Accountable; Easing your journey to HIPAA compliance
HIPAA and speaking to the Press
AI in Healthcare; What it means for HIPAA
Northwell Hospital System Suffers a Huge Breach
Why develop a compliance plan?
Cognimate has achieved HIPAA Compliance with Accountable
Recent HIPAA Settlement Highlights the Threat of Ransomware Attacks in the Healthcare Industry
HIPAA Compliance and Online Reputation Management: How to Handle Negative Reviews
It Sounds Like The Plot Of A Movie: The Story of How Russian Spies Committed a HIPAA Violation in 2022
Simplifying Medical Release Forms
Skali has achieved HIPAA Compliance with Accountable
Understanding the HIPAA Minimum Necessary Rule: Why it Matters for Your Healthcare Organization
A Guide to Understanding HIPAA Compliance for Vendor Management
Stress Free Incident Reporting: The Tech and Support You Deserve with Accountable
How To Comply With the HIPAA Security Rule
Working with an Attorney for HIPAA Compliance: Pros, Cons, and Cost Considerations
What Does HIPAA Stand For? - Beyond the acronym
3 Dental Practices Reach HIPAA Settlements
Medical Marketing & HIPAA
Eleven HIPAA Enforcement Actions Settled in July 2022
The HIPAA Enforcement Rule: What to Know
What Does the “P” in HIPAA Stand For?
10 State-Of-The-Art Innovations Helping Doctors Streamline Operations
Breaking Down Physical Safeguards of the Security Rule
Why is PHI Valuable to Hackers?
Updated HIPAA Guidance for Extreme Risk Protection Orders
The Cost of HIPAA Violations
What is PHI? (Protected Health Information)?
November 2021 HIPAA Fines and Settlements
All About PIPEDA, Canada's Version of HIPAA
HIPAA Compliance for Dental Offices
Do Vaccine Status Questions Violate HIPAA?
How to Ensure HIPAA Compliance in the Cloud
How to Conduct a HIPAA Risk Assessment
The HIPAA Safe Harbor Act
HIPAA and Social Media
How to be HIPAA Certified
The HITECH Act: Putting the “Force” Into HIPAA Enforcement
Requirements to be HIPAA Compliant
Duties of a HIPAA Privacy Officer
Technical Safeguards of the Security Rule
Physical Safeguards of the Security Rule
Administrative Safeguards of the Security Rule
HIPAA Certification vs HIPAA Compliance
HIPAA vs PCI
What to Expect During an OCR Audit
What is HIPAA? The Main Rules of HIPAA
Communication Platforms and HIPAA Compliance
What is a Covered Entity?
The 18 PHI Identifiers
How to file a HIPAA Complaint with the OCR
Medical Marijuana and HIPAA Compliance
What is your Risk of a HIPAA Compliance Audit?
The History of HIPAA
Addressable vs. Required Implementation Standards under HIPAA
HIPAA Compliance for Business Associates
What is ePHI? Electronic Protected Health Information
HIPAA and The Minimum Necessary Standard
HIPAA Compliance Checklist for 2021
Examples of Phishing Scams
Everything Startups Should Know About HIPAA
What are the Differences Between HITECH and HiTrust?
How to be HIPAA Compliant When Working Remotely
The OCR’s Dedication to the Right of Access Initiative
What To Know about HIPAA As Practice Manager
Basics of HIPAA Compliance
The HIPAA Privacy Rule
Proposed Changes to the HIPAA Privacy Rule
HIPAA Compliant Hosting Best Practices
Creating a Contingency Plan for HIPAA Compliance
HIPAA Compliant Text Messaging
Breaking down Technical Safeguards of the Security Rule
Risks of Improper Employee Offboarding
HIPAA and the Omnibus Rule
HIPAA and Pandemics: Finding a Balance
Do Accountants Need to be HIPAA Compliant?
What You Need to Know About Healthcare Marketing & HIPAA
HIPAA Training for Human Resources
FAU Study Finds Upcoming Grads will Violate HIPAA for Money
HIPAA Compliance for Medical Interpreters
What Lies Ahead for Telehealth after Covid Passes?
What are the HIPAA Training Requirements?
Setting a HIPAA Proof Password
What to do after a PHI breach? Recovering after Disaster
HIPAA Compliance for SAAS
HIPAA Compliance for SAAS
Email and HIPAA Compliance
What is a HIPAA Business Associate Agreement? All About BAAs
Overseas HIPAA Compliance
Data Privacy Compliance
Common Examples Of Employee HIPAA Violations and How to Avoid Them
First CCPA Settlement Announced by California AG
How to Map Data Flows
Texas House Bill 300
A Look at Marketing and Data Privacy
What is T.E.F.C.A.?
How Does the CCPA Apply Outside of California?
Overview On China's New Data Protection Law, The PIPL
Why We're Thankful for Data Privacy
The Importance of Data Privacy to your Organization Flowchart
What is the LGPD?
CPRA Obligations for Employers
Responsibilities of a Data Protection Officer
What is PCI? Payment Card Industry Compliance Standards
What is Data Privacy?
What is a Data Subject Access Request?
What is the CPRA?
Protected Health Information vs Personal Identifiable Information
Data Security Posts
President Biden Looks to Boost Cybersecurity at U.S. Ports
First Phishing and Cyber-Attack Investigation Settled
What You Need to Know About HIPAA Data Encryption
23 And Me Has a Huge Incident
Whose Responsibility Is It To Investigate a Data Privacy Violation?
PIPEDA's Definition of Personal Information
Compliant Ways to Backup Data
How to Improve Your Data Security and Data Compliance
The Role Online Forums Play in Breach Discovery
Four Things That Can Doom Your Data Security
Updates to the GLBA Safeguards Rule
Top Five Computer Vulnerabilities
5 Tips on Avoiding Cybersecurity Attacks While Working From Home
Data Privacy Statistics To Watch Out for in 2022
Data Privacy Predictions for 2022
All We Want for Christmas Is a National Data Privacy Law
Five Tips to Protect Business Data
4 Types of Cybersecurity Vulnerabilities
What is Data Security's Biggest Threat?
Simplify HIPAA Compliance With Privileged Access Management
How to Recognize Phishing Messages
Glitch or Attack: Either Way, Be Ready for Disruptions
Are You Ready For A Data Breach?
Remote Work and Data Security
Working Remotely While Maintaining Data Security
What is Data Security?
5 Cybersecurity Best Practices to Protect your Data
Why are Healthcare Organizations Targeted by Criminals?
What you Can Do to Protect Your Systems from Attacks
How to Avoid Phishing Emails
Compliant Software
Common Examples Of Employee HIPAA Violations and How to Avoid Them
Is Chat GPT HIPAA Compliant?
Ticketmaster just had a Huge Breach
GenixTec has achieved HIPAA Compliance with Accountable
Unlocking HIPAA Compliance: A Sneak Peek into Our Revamped Dashboard
Is Google Docs HIPAA Compliant?
Is Calendly HIPAA Compliant?
Is iCloud HIPAA Compliant?
Is Google Sheets HIPAA Compliant?
President Biden Looks to Boost Cybersecurity at U.S. Ports
U.S. Counters Chinese Botnet Threat
Twenty-six BILLION Records Breached!
First Phishing and Cyber-Attack Investigation Settled
How Accountable Gets You HIPAA Compliant
What You Need to Know About HIPAA Data Encryption
Are Government Officials permitted the same HIPAA rights as a Citizen?
Mr. Cooper suffers a huge breach
23 And Me Has a Huge Incident
Accountable Simplifies Annual HIPAA Training for Staff
Streamline Your Offboarding Process with Accountable
Re-Introduction to Accountable
Kapsa Has Achieved HIPAA Compliance
Whose Responsibility Is It To Investigate a Data Privacy Violation?
Navigating the ADA: Does it Apply to SaaS Companies?
Is Stripe HIPAA Compliant?
What is Multi-Factor Authentication?
What is Two Factor Authentication?
Roundup of Recent OCR Settlements
HIPAA Compliant Cloud Storage Solutions
What To Do if Your Email Has Been In a Breach
PIPEDA's Definition of Personal Information
How to Streamline the Employee Onboarding Process
How to Get a BAA with AWS
Compliant Ways to Backup Data
Maintaining HIPAA Compliance
How to Improve Your Data Security and Data Compliance
ADA Compliance Tax Credit
The Role Online Forums Play in Breach Discovery
First CCPA Settlement Announced by California AG
How to Map Data Flows
Lyric Health Has Achieved HIPAA Compliance
Function Health Has Achieved HIPAA Compliance with Accountable
Connect2MyDoctor Has Achieved HIPAA Compliance
VyTrac Has Achieved HIPAA Compliance
Four Things That Can Doom Your Data Security
TrueCare24 Has Achieved HIPAA Compliance
Updates to the GLBA Safeguards Rule
Cercle.ai Has Achieved HIPAA Compliance
Top Five Computer Vulnerabilities
Texas House Bill 300
HighSide - the HIPAA-compliant Slack Alternative
A Look at Marketing and Data Privacy
Choix Has Achieved HIPAA Compliance
What is T.E.F.C.A.?
March 2022 HIPAA Fines and Settlements
Chapter Has Achieved HIPAA Compliance
How To Make a HIPAA Compliant Website
HIPAA Compliant Telehealth Platforms for your Practice
The Benefits of Voluntary Compliance
Top HIPAA Compliant eFax Services
5 Tips on Avoiding Cybersecurity Attacks While Working From Home
Rootd Has Achieved HIPAA Compliance
Is Paubox HIPAA Compliant?
All About the Gramm Leach Bliley Act (GLBA)
Data Privacy Statistics To Watch Out for in 2022
Five Principles of Risk Management
How Does the CCPA Apply Outside of California?
Is GoToMeeting HIPAA Compliant?
PCI Compliance Audit Overview
Data Privacy Predictions for 2022
Is Hushmail HIPAA Compliant?
All We Want for Christmas Is a National Data Privacy Law
Why Prevention is More Important Than Recovery in Data Security
What Is GRC and Why Does It Matter?
Overview On China's New Data Protection Law, The PIPL
What Are the Main Types of Business Risk?
Is Updox HIPAA Compliant?
Why We're Thankful for Data Privacy
Five Tips to Protect Business Data
4 Types of Cybersecurity Vulnerabilities
Haze Has Achieved HIPAA Compliance
The Importance of Data Privacy to your Organization Flowchart
Is MailHippo HIPAA Compliant?
How to Protect Your Privacy On Social Media
What is Data Security's Biggest Threat?
What is the LGPD?
September 2021 HIPAA Fines and Settlements
October is National Cybersecurity Awareness Month!
Is Virtru HIPAA Compliant?
FTC Requires That Health Apps Must Notify Customers About Data Breaches
Simplify HIPAA Compliance With Privileged Access Management
How to Recognize Phishing Messages
Massive T-Mobile Breach: Everything You Need to Know
CPRA Obligations for Employers
Chat Agents is HIPAA Compliant
Glitch or Attack: Either Way, Be Ready for Disruptions
Responsibilities of a Data Protection Officer
What is PCI? Payment Card Industry Compliance Standards
June 2021 HIPAA Fines and Settlements
Colorado Passes Comprehensive Privacy Legislation
Risk Management Posts
Ticketmaster just had a Huge Breach
Navigating the ADA: Does it Apply to SaaS Companies?
What is Multi-Factor Authentication?
What is Two Factor Authentication?
What To Do if Your Email Has Been In a Breach
How to Streamline the Employee Onboarding Process
Five Principles of Risk Management
PCI Compliance Audit Overview
Why Prevention is More Important Than Recovery in Data Security
What Is GRC and Why Does It Matter?
What Are the Main Types of Business Risk?
Resources
How to Respond to a Breach or Cyberattack
CMIA (California Confidentiality of Medical Information Act)
What is a HIPAA Compliance Checklist?
Ten Common HIPAA Compliance Mistakes and Effective Strategies for Mitigation
Safeguarding Your Business: Preventing a Data Incident
What is Personal Data under the GDPR?
Streamlining the Employee Off-boarding Process
Traits and Responsibilities of a GDPR Data Controller
ISO 27001 vs HIPAA
Complying with Texas HB300
Contractors Under CCPA/CPRA
Why was the CCPA Introduced?
HIPAA IT Compliance Checklist
How to Secure Your Company's Email Communication: Best Practices and Strategies
Complying with ISO 27001: Strategies and Best Practices
GDPR Compliance for Startups
CCPA vs CPRA vs GDPR
What is Personal Information Under the CPRA?
Steps to Ensure Operational Resilience
The CCPA Do Not Sell Requirement
Am I a Data Controller or Data Processor?
Service Providers Under CCPA/CPRA
Why Security Does Not Equal Data Privacy
What Does PHI Stand For?
Common GDPR Compliance Mistakes & Pain Points
"Likely to Result in Risk" Under GDPR
HIPAA vs. GLBA
Key Elements of a Data Processing Agreement
What Is a Data Processor?
What is a Business Associate Subcontractor?
What You Need To Know About Browser Cookies
How Long Should You Retain Personal Data?
Operational Risk Management
ADPPA Preview
What is a Data Controller?
Data Protection Impact Assessments (DPIAs)
The Importance of Monitoring External Data Breaches
GDPR vs. HIPAA
Fraud Risk Factors
Security Awareness Training
5 Steps to Creating a Vendor Management Process
The 18 PHI Identifiers
Notice of Privacy Practices for Protected Health Information For HIPAA
Data Subject Access Requests
What is a HIPAA Lawyer?
ISO 27001
Types of Financial Risk
SOC 2 Compliance Mistakes
Data Disaster Recovery Plan
What is Data Security?
Business Continuity Plans
Security Risk Assessment
How To Ensure GDPR Compliance
The Complete Guide to PCI Compliance
Data Governance in Healthcare
Why is Personal Data Valuable?
8 Steps To Establish a Risk Management Framework
How To Prevent a Former Employee From Becoming a Security Risk
Vendor Risk Management
4 PCI DSS Compliance Levels
The Difference Between DoS and DDoS Attacks
Internet of Things (IoT) Security
Compliance as a Competitive Advantage
SOC 2 Compliance
Opt-In vs. Opt-Out Data Rights
5 Habits of an Effective Privacy Officer
Principles of Data Governance
Data Protection Officer vs. HIPAA Privacy Officer
What is Personally Identifiable Information (PII)
Trusted by startups and large companies