Blog
Is Athenahealth HIPAA Compliant? Security Measures and Compliance Overview
Secure patient data with Athenahealth HIPAA compliance: actionable BAA steps, AES-256 encryption,...
HIPAA Contingency Plan Requirements: A Practical Compliance Checklist
Practical HIPAA contingency plan requirements checklist to implement backups, disaster recovery, ...
Surgery Partners 2020 Data Breach: What Happened, Who Was Affected, and Next Steps for Patients
Overview of the Alleged 2020 Incident. You may have seen references to a “Surgery Partners 2020 ...
What Is the Federal Stark Law? Requirements, Exceptions, and Penalties
Definition of Federal Stark Law. The Federal Stark Law—often called the physician self-referral ...
How to Build a HIPAA Contingency Plan: Requirements, Templates & Step-by-Step Checklist
HIPAA Contingency Plan Requirements. A HIPAA contingency plan is the set of policies and procedu...
HIPAA Security Incident Definition: What It Means, Examples, and Reporting Requirements
HIPAA Security Incident Definition. Under the HIPAA Security Rule, a security incident is any at...
Best HIPAA-Compliant Flash Drives for 2026: Secure, Encrypted USBs for PHI
Choosing the best HIPAA-compliant flash drives for 2026 comes down to verifiable security and pra...
How to Screen for Medicare Compliance: Step-by-Step Guide and Checklist for Healthcare Providers
Establish Medicare Compliance Program Structure. Build the foundation. Start by appointing a Co...
What Is De-Identified Information? Definition, Examples, and HIPAA Requirements
Definition of De-Identified Information. De-identified information is health data that cannot re...
Healthcare Incident Response: HIPAA‑Compliant Plan, Steps & Best Practices
Incident Response Plan Overview. A healthcare incident response plan (IRP) gives you a repeatabl...
How to Send HIPAA-Compliant Mail: Rules, PHI Protections, and Best Practices
Sending email that contains Protected Health Information (PHI) demands more than basic security—y...
Crohn’s Disease Telehealth Privacy: How to Protect Your Health Data During Virtual Care
Virtual visits make Crohn’s disease care more convenient, but they also raise questions about who...
Stage 1 Meaningful Use Explained: Core Objectives, Measures, and Requirements
Stage 1 Meaningful Use Overview. Stage 1 Meaningful Use is the foundational phase of the EHR Inc...
Is Google Calendar HIPAA Compliant? What to Know About BAA and PHI
You can use Google Calendar in a HIPAA-aligned way, but it is not “HIPAA compliant” by default. C...
Working from Home and maintaining HIPAA Compliance
Ensuring Security in Remote Environments. In the age of the COVID-19 pandemic, more and more empl...
Read full article
Why Choose Accountable's HIPAA Training
Join thousands of organizations that trust Accountable to manage their compliance needs.
-
Fast and effective - Complete your training in minimal time
-
Engaging video content - No boring slides, just clear and practical lessons
-
Compliance-focused - Covers all key HIPAA regulations for privacy and security