Blog
Hospice Employee Security Training: HIPAA Security Rule & Cybersecurity Awareness Course
Start HIPAA Security Rule training for hospice teams to protect PHI, stop breaches, and meet comp...
Automated Security Testing in Healthcare: Tools, Best Practices, and HIPAA Compliance
Automated security testing finds risks earlier, proves HIPAA compliance, and protects PHI with co...
Sending Medical Records via Email: A Simple, HIPAA-Compliant Step-by-Step Guide
Understanding HIPAA Compliance for Emailing Medical Records. When you email medical records, you...
Washington State HIPAA Laws Explained: What Patients and Providers Need to Know
Overview of Washington State Privacy Regulations. Washington overlays federal HIPAA with robust ...
Is PHI a Type of CUI? When Protected Health Information Counts as Controlled Unclassified Information
Short answer: sometimes. Protected Health Information (PHI) becomes Controlled Unclassified Infor...
At Minimum, an Effective Compliance Program Includes These 7 Core Elements
An effective compliance program aligns your organization’s values with enforceable controls, redu...
HIPAA-Compliant Language Services for Healthcare: Secure Medical Translation & Interpretation
Overview of HIPAA Compliance. When your organization delivers care across languages, every trans...
Hospital Audits: A Complete Guide to Types, Compliance, and Preparation
Hospital audits protect revenue, safeguard patients, and prove compliance with payer and regulato...
HIPAA Protects a Category of Information: Protected Health Information (PHI)
Overview of Protected Health Information. Protected Health Information (PHI) is the centerpiece ...
Healthcare LMS Software for HIPAA‑Compliant Staff Training and Certification
Healthcare LMS software for HIPAA‑compliant staff training and certification helps you deliver ro...
Health and Safety in Dental Practice: Compliance & Best Practices Guide
This Health and Safety in Dental Practice: Compliance & Best Practices Guide gives you a prac...
Which Is Not Considered an Identifier Under the HIPAA Privacy Rule?
Overview of HIPAA Identifiers. Under the HIPAA Privacy Rule, information becomes Protected Healt...
What Business Associates Are Not Permitted to Do Under HIPAA
Business associates are vendors and service providers that create, receive, maintain, or transmit...
Risk Assessment in Health Care: A Step-by-Step Guide with Methods, Tools, and Examples
Identify Hazards in Health Care. Effective risk assessment in health care starts by systematical...
Working from Home and maintaining HIPAA Compliance
Ensuring Security in Remote Environments. In the age of the COVID-19 pandemic, more and more empl...
Read full article
Why Choose Accountable's HIPAA Training
Join thousands of organizations that trust Accountable to manage their compliance needs.
-
Fast and effective - Complete your training in minimal time
-
Engaging video content - No boring slides, just clear and practical lessons
-
Compliance-focused - Covers all key HIPAA regulations for privacy and security