Blog
Is Athenahealth HIPAA Compliant? Security Measures and Compliance Overview
Secure patient data with Athenahealth HIPAA compliance: actionable BAA steps, AES-256 encryption,...
HIPAA Contingency Plan Requirements: A Practical Compliance Checklist
Practical HIPAA contingency plan requirements checklist to implement backups, disaster recovery, ...
D2C Healthcare Data Security Requirements: A Compliance Checklist
Data Encryption. You handle sensitive health data end to end, so encrypt everything in transit a...
HIPAA Policies and Procedures for Clinical Laboratories: Your Complete Compliance Guide
HIPAA Privacy Rule Requirements. As a clinical laboratory, you handle vast amounts of Protected ...
HIPAA and Workers’ Compensation Overlap: What Can Be Disclosed in a Claim
HIPAA Privacy Rule and Workers' Compensation. The HIPAA Privacy Rule protects Protected Health I...
HIPAA Risk Assessment for Chief Information Officers: Step-by-Step CIO Guide and Compliance Checklist
HIPAA Risk Assessment Overview. A HIPAA risk assessment is a systematic evaluation of how your o...
HIPAA Compliance in Missouri: State‑Specific Requirements You Need to Know
HIPAA sets a national baseline, but providers, health plans, and business associates operating in...
HIPAA-Compliant Healthcare Test Data Management: Best Practices and Practical Steps
Balancing realistic testing with the duty to safeguard Protected Health Information (PHI) is a co...
HIPAA Best Practices for Privacy Officers: A Practical Compliance Checklist
Designate a Privacy Officer. You set the tone for HIPAA Privacy Rule Compliance by appointing a ...
HIPAA Risk Assessment for Clinical Social Workers: A Step-by-Step Guide and Checklist
As a clinical social worker, you handle protected health information (PHI) every day—in notes, bi...
Tuberculosis Treatment Records and HIPAA: What’s Protected and What Can Be Shared
Ophthalmology Practice Network Security Audit: Step-by-Step HIPAA Compliance Checklist
A successful ophthalmology practice network security audit protects electronic protected health i...
SMART on FHIR Security Explained: OAuth 2.0, Scopes, and Best Practices for Protecting Patient Data
OAuth 2.0 Authorization Code Grant Flow. Key steps in the Authorization Code Grant Flow. Dis...
Lighthouse 360 HIPAA Compliance: What Dental Practices Need to Know
Using Lighthouse 360 within a dental practice means handling Protected Health Information (PHI) a...
Working from Home and maintaining HIPAA Compliance
Ensuring Security in Remote Environments. In the age of the COVID-19 pandemic, more and more empl...
Read full article
Why Choose Accountable's HIPAA Training
Join thousands of organizations that trust Accountable to manage their compliance needs.
-
Fast and effective - Complete your training in minimal time
-
Engaging video content - No boring slides, just clear and practical lessons
-
Compliance-focused - Covers all key HIPAA regulations for privacy and security