Blog
Healthcare Tracking Pixels and Patient Privacy: HIPAA Risks and How to Stay Compliant
Reduce HIPAA compliance risk from tracking pixels on healthcare sites. Learn controls, BAA requir...
Ambulatory Surgery Center Security Risk Assessment: Step-by-Step Guide and HIPAA Compliance Checklist
Follow HIPAA Security Rule guidance for surgery centers: complete SRAs, apply admin, physical and...
Top HIPAA Compliance Mistakes to Avoid
Maintaining HIPAA compliance is essential if you handle protected health information (PHI). Your ...
How to Conduct a HIPAA Risk Assessment
Risk Assessment Requirement. Under HIPAA, conducting a thorough risk assessment is mandatory for...
How to Build a HIPAA Data Backup Plan: Requirements, Checklist & Step-by-Step Template
Data Identification for ePHI. Your HIPAA data backup plan starts with knowing exactly what elect...
How to Create a Healthcare Risk Management Plan: Steps, Examples, and Template
Risk Management Plan Definition. A healthcare risk management plan is a documented, organization...
Is Office 365 HIPAA Compliant? BAA, Security Settings, and Checklist
Business Associate Agreement Overview. Office 365 can support HIPAA requirements when you execut...
Under HIPAA, Who Determines If an Impermissible Disclosure Is a Reportable Breach?
Determination of Reportable Breach. Under HIPAA, the entity that experiences or discovers the in...
Not All Software Vendors Are Business Associates of Covered Entities—Here’s How to Tell Under HIPAA
Definition of Business Associate. A business associate is any person or organization, other than...
Is Zoom HIPAA-Compliant for Telehealth? Everything You Need to Know
Whether Zoom is HIPAA-compliant for telehealth depends on how you procure it, the contract you si...
What Are the Requirements of Meaningful Use? Objectives, Measures & Eligibility
Meaningful Use Stages Overview. Purpose and eligibility at a glance. Meaningful Use defines how...
Which HIPAA Rule Covers Records Management? The Privacy Rule Explained
HIPAA Privacy Rule Overview. The HIPAA Privacy Rule is the primary rule that governs records man...
When Must PHI-Related Breaches Be Reported? HIPAA Deadlines and Notification Requirements
The HIPAA Breach Notification Rule sets clear deadlines for reporting breaches of Unsecured Prote...
Medicare Parts C & D Sponsor Compliance Program Requirements: Checklist and Key Elements for Plan Sponsors
Use this practical guide to build, evaluate, and document a Medicare Compliance Program that sati...
Working from Home and maintaining HIPAA Compliance
Ensuring Security in Remote Environments. In the age of the COVID-19 pandemic, more and more empl...
Read full article
Why Choose Accountable's HIPAA Training
Join thousands of organizations that trust Accountable to manage their compliance needs.
-
Fast and effective - Complete your training in minimal time
-
Engaging video content - No boring slides, just clear and practical lessons
-
Compliance-focused - Covers all key HIPAA regulations for privacy and security