Blog
HIPAA Compliance for Connected Medical Devices: Requirements and Best Practices
Learn how to achieve HIPAA compliance for connected medical devices: map PHI, run SRAs, enforce e...
Is Emma HIPAA Compliant? What You Need to Know
Understand Emma HIPAA compliance risks and why Emma is not HIPAA compliant for PHI; learn its sec...
Is Microsoft Outlook HIPAA Compliant? Requirements, Encryption, and Setup Steps
Short answer: yes—Microsoft Outlook can be used in a HIPAA-compliant manner when you implement re...
How Paramedics Can Avoid HIPAA Violations: Practical Tips for the Field
HIPAA Compliance for Paramedics. What HIPAA means in the field. As a paramedic, you are part of...
Examples of Physical Safeguards in HIPAA-Compliant Clinics
Facility Access Controls. To protect Electronic Protected Health Information (ePHI), you need la...
How Physical and Digital Safeguards Work Together in HIPAA
Integration of Safeguards. HIPAA’s Security Rule expects you to protect electronic protected hea...
GDPR and HIPAA: What’s the Difference, Where They Overlap, and How to Stay Compliant
GDPR and HIPAA protect privacy in different but complementary ways. GDPR governs personal data br...
Security Rule Compliance Steps: From Risk Assessment to Ongoing Monitoring
Conduct Risk Assessment. Define Scope and Critical Assets. You begin Security Rule compliance b...
HIPAA and Child Immunization Records: What Parents and Schools Need to Know
HIPAA Applicability to Schools. Most student immunization records kept by K–12 schools are not g...
Healthcare Compliance Auditing: A Practical Guide to Requirements, Checklist, and Best Practices
Healthcare Compliance Auditing Overview. Healthcare compliance auditing is a structured, evidenc...
Healthcare Compliance Checklist: A Step-by-Step Guide to HIPAA, OSHA & CMS Requirements
Use this healthcare compliance checklist to align daily operations with HIPAA, OSHA, and CMS obli...
HITRUST Certified: What “High Trust” Certification Means and How to Get It
Overview of HITRUST Common Security Framework. HITRUST CSF is a certifiable, risk-based control ...
APD HIPAA Basics: What Providers Need to Know About PHI, Privacy, and Security
APD HIPAA Basics equips you to handle protected health information (PHI) responsibly, reduce risk...
HIPAA Screen Lock Requirements Explained: Auto-Lock Timeouts and Best Practices
HIPAA Security Rule Requirements. HIPAA’s Security Rule is risk-based. It requires you to implem...
Working from Home and maintaining HIPAA Compliance
Ensuring Security in Remote Environments. In the age of the COVID-19 pandemic, more and more empl...
Read full article
Why Choose Accountable's HIPAA Training
Join thousands of organizations that trust Accountable to manage their compliance needs.
-
Fast and effective - Complete your training in minimal time
-
Engaging video content - No boring slides, just clear and practical lessons
-
Compliance-focused - Covers all key HIPAA regulations for privacy and security