Risk Management Blog
Browse our collection of Risk Management articles and resources
OCR-Compliant Security Risk Assessment for HIPAA: Documentation, Evidence, and Remediation Tips
Conducting Comprehensive Risk Analysis. An OCR-compliant security risk assessment starts with a ...
Security Risk Assessment Examples and Common Gaps in HIPAA Programs
Your HIPAA security program is only as strong as the risks you identify and remediate. This guide...
Security Risk Assessment Checklist for HIPAA Compliance: What to Include
A focused security risk assessment is the foundation of HIPAA Security Rule compliance. Use this ...
Accidental PHI Exposure: Assessment Steps, Investigation Checklist, and Reporting Rules
Accidental PHI exposure happens fast—an email to the wrong recipient, a misconfigured folder, or ...
Unintentional HIPAA Violations vs. Acceptable Incidents: Risk Assessment Checklist
Identifying Unintentional HIPAA Violations. Not every privacy lapse is malicious. An unintention...
When Patients Seek Lawyers for HIPAA Violations: Compliance Risk Checklist
When patients contact attorneys about potential HIPAA breaches, you face simultaneous legal, oper...
HIPAA Rights Violated? Requirements, Risk Mitigation, and Notification Timelines
If you suspect an improper use or disclosure of Protected Health Information (PHI), understanding...
Employee Self-Access to Medical Records: Compliance Risks, Examples, Best Practices
Employee self-access to medical records is a high-impact risk area. Even when workers are also pa...
Emailing PHI and Medical Records: Risk Assessment, Safeguards, and Documentation
Emailing PHI and medical records can be compliant when you apply a rigorous risk assessment, impl...
Protecting PHI On-Site: Physical Safeguards, Controls, and Risk Mitigation
Protecting protected health information (PHI) on-site starts with strong physical safeguards that...
PHI Security Requirements Explained: Proven Strategies, Examples, and Risk Mitigation
PHI Security Requirements demand a layered, practical approach. Your goal is simple: ensure only ...
Electronic PHI Risk Management Guide: Common Threats, Controls, and Examples
This Electronic PHI Risk Management Guide explains the most common threats to e-PHI, the controls...
Why Choose Accountable's HIPAA Training
Join thousands of organizations that trust Accountable to manage their compliance needs.
-
Fast and effective - Complete your training in minimal time
-
Engaging video content - No boring slides, just clear and practical lessons
-
Compliance-focused - Covers all key HIPAA regulations for privacy and security