Blog
Hospice Vulnerability Management: Best Practices to Protect PHI and Meet HIPAA
Secure hospice PHI with HIPAA vulnerability management: training, risk assessments, vendor BAAs, ...
MOLST Form and HIPAA: What You Need to Know About Privacy, Access, and Sharing
Learn how a MOLST form interacts with HIPAA, who can access it, and how to protect confidentialit...
How to Vet a Cloud Storage Vendor for HIPAA Compliance
Choosing a cloud storage partner for ePHI is high stakes. Use this guide to vet vendors methodica...
HIPAA Training Reminder System: Automate Employee Compliance Notifications and Tracking
A HIPAA training reminder system helps you automate who needs training, when they need it, and ho...
Is Mailchimp HIPAA Compliant? BAA, PHI, and Safer Alternatives Explained
If you work in a covered entity or as a business associate, you’ve likely asked, “Is Mailchimp HI...
Are Text Messages HIPAA Compliant? What You Can and Can’t Do Under HIPAA
Overview of HIPAA Compliance for Text Messaging. HIPAA does not ban texting, but it requires you...
Audit Trails in Healthcare: What They Are, HIPAA Requirements, and Best Practices
Definition of Audit Trails. Audit trails in healthcare are chronological records that show who a...
Annual Risk Assessment: A Practical Guide with Steps, Examples, and Template
Preparation and Scope Definition. Set objectives and context. Clarify why you are performing an...
Risk Management and Quality Management in Healthcare: How They Work Together to Improve Patient Safety and Outcomes
Risk management and quality management in healthcare are complementary disciplines that, when ali...
Infectious Disease EHR Security Considerations: Compliance and Best Practices
Protecting infectious disease data in an electronic health record (EHR) requires you to balance c...
HIPAA Breach Risk Assessment Tool: Determine If an Incident Is a Reportable Breach
Overview of HIPAA Breach Risk Assessment Tools. A HIPAA Breach Risk Assessment Tool helps you de...
How to Complete Your MIPS Security Risk Analysis: HIPAA Requirements, Steps, and Checklist
MIPS Security Risk Analysis Requirement. To earn credit in the Promoting Interoperability catego...
Is MetroFax HIPAA Compliant? BAA, Security Features, and What You Need to Know
Overview of MetroFax. MetroFax is an online fax service designed to let you send and receive fax...
How Attorneys Request Medical Records: Step-by-Step Guide, HIPAA Requirements, and a Sample Letter
When you represent a client, getting a complete, timely medical records release is foundational t...
Working from Home and maintaining HIPAA Compliance
Ensuring Security in Remote Environments. In the age of the COVID-19 pandemic, more and more empl...
Read full article
Why Choose Accountable's HIPAA Training
Join thousands of organizations that trust Accountable to manage their compliance needs.
-
Fast and effective - Complete your training in minimal time
-
Engaging video content - No boring slides, just clear and practical lessons
-
Compliance-focused - Covers all key HIPAA regulations for privacy and security