Blog
HIPAA Compliance for Connected Medical Devices: Requirements and Best Practices
Learn how to achieve HIPAA compliance for connected medical devices: map PHI, run SRAs, enforce e...
Is Emma HIPAA Compliant? What You Need to Know
Understand Emma HIPAA compliance risks and why Emma is not HIPAA compliant for PHI; learn its sec...
HIPAA Protects a Category of Information: Protected Health Information (PHI)
Overview of Protected Health Information. Protected Health Information (PHI) is the centerpiece ...
Healthcare LMS Software for HIPAA‑Compliant Staff Training and Certification
Healthcare LMS software for HIPAA‑compliant staff training and certification helps you deliver ro...
Health and Safety in Dental Practice: Compliance & Best Practices Guide
This Health and Safety in Dental Practice: Compliance & Best Practices Guide gives you a prac...
Which Is Not Considered an Identifier Under the HIPAA Privacy Rule?
Overview of HIPAA Identifiers. Under the HIPAA Privacy Rule, information becomes Protected Healt...
What Business Associates Are Not Permitted to Do Under HIPAA
Business associates are vendors and service providers that create, receive, maintain, or transmit...
Risk Assessment in Health Care: A Step-by-Step Guide with Methods, Tools, and Examples
Identify Hazards in Health Care. Effective risk assessment in health care starts by systematical...
How to Make Google Drive HIPAA Compliant: Step-by-Step Guide to BAA, Settings, and Sharing Controls
Making Google Drive HIPAA compliant is less about a single switch and more about a coordinated pr...
Outpatient Clinics HIPAA Compliance Checklist: Step-by-Step Guide to Stay Compliant and Protect PHI
Use this outpatient clinics HIPAA compliance checklist to operationalize the HIPAA Security Rule,...
What Are the 4 Methods of Compliance with the Bloodborne Pathogens Standard?
The Bloodborne Pathogens Standard protects workers from occupational exposure to blood and other ...
HIPAA-Compliant Website Checklist: Step-by-Step Requirements, Security Controls, and Best Practices
This HIPAA-compliant website checklist gives you a practical, step-by-step path to protect electr...
HIPAA OCR Audit Protocol: What It Is, Requirements, and How to Prepare
The HIPAA OCR Audit Protocol is the structured set of questions, evidence requests, and testing s...
HIPAA Penetration Testing: Requirements, Frequency, and Compliance Checklist
HIPAA Penetration Testing Requirements. HIPAA’s Security Rule is risk-based. It does not explici...
Working from Home and maintaining HIPAA Compliance
Ensuring Security in Remote Environments. In the age of the COVID-19 pandemic, more and more empl...
Read full article
Why Choose Accountable's HIPAA Training
Join thousands of organizations that trust Accountable to manage their compliance needs.
-
Fast and effective - Complete your training in minimal time
-
Engaging video content - No boring slides, just clear and practical lessons
-
Compliance-focused - Covers all key HIPAA regulations for privacy and security