Blog
HIPAA Compliance for Connected Medical Devices: Requirements and Best Practices
Learn how to achieve HIPAA compliance for connected medical devices: map PHI, run SRAs, enforce e...
Is Emma HIPAA Compliant? What You Need to Know
Understand Emma HIPAA compliance risks and why Emma is not HIPAA compliant for PHI; learn its sec...
EDI 834 Eligibility File: What It Is, Format, and Examples
Overview of EDI 834 Eligibility File. The EDI 834 eligibility file—formally the Benefit Enrollme...
HIPAA Business Associate Compliance Checklist: How to Meet Requirements and Get Audit-Ready
Use this HIPAA Business Associate compliance checklist to build a defensible, audit-ready program...
ADA and HIPAA Compliance Guide: Key Requirements and Best Practices for Healthcare Organizations
This ADA and HIPAA compliance guide translates legal obligations into practical steps you can app...
Best Practices for Securing Physical Access to Patient Data
Protecting patient information starts at the door. By hardening facilities with layered Physical ...
How to Vet a Cloud Storage Vendor for HIPAA Compliance
Choosing a cloud storage partner for ePHI is high stakes. Use this guide to vet vendors methodica...
Is Mailchimp HIPAA Compliant? BAA, PHI, and Safer Alternatives Explained
If you work in a covered entity or as a business associate, you’ve likely asked, “Is Mailchimp HI...
Are Text Messages HIPAA Compliant? What You Can and Can’t Do Under HIPAA
Overview of HIPAA Compliance for Text Messaging. HIPAA does not ban texting, but it requires you...
Audit Trails in Healthcare: What They Are, HIPAA Requirements, and Best Practices
Definition of Audit Trails. Audit trails in healthcare are chronological records that show who a...
Annual Risk Assessment: A Practical Guide with Steps, Examples, and Template
Preparation and Scope Definition. Set objectives and context. Clarify why you are performing an...
Risk Management and Quality Management in Healthcare: How They Work Together to Improve Patient Safety and Outcomes
Risk management and quality management in healthcare are complementary disciplines that, when ali...
Infectious Disease EHR Security Considerations: Compliance and Best Practices
Protecting infectious disease data in an electronic health record (EHR) requires you to balance c...
HIPAA Breach Risk Assessment Tool: Determine If an Incident Is a Reportable Breach
Overview of HIPAA Breach Risk Assessment Tools. A HIPAA Breach Risk Assessment Tool helps you de...
Working from Home and maintaining HIPAA Compliance
Ensuring Security in Remote Environments. In the age of the COVID-19 pandemic, more and more empl...
Read full article
Why Choose Accountable's HIPAA Training
Join thousands of organizations that trust Accountable to manage their compliance needs.
-
Fast and effective - Complete your training in minimal time
-
Engaging video content - No boring slides, just clear and practical lessons
-
Compliance-focused - Covers all key HIPAA regulations for privacy and security