Blog
Hospice Vulnerability Management: Best Practices to Protect PHI and Meet HIPAA
Secure hospice PHI with HIPAA vulnerability management: training, risk assessments, vendor BAAs, ...
MOLST Form and HIPAA: What You Need to Know About Privacy, Access, and Sharing
Learn how a MOLST form interacts with HIPAA, who can access it, and how to protect confidentialit...
Types of Incident Reports in Healthcare: Examples and When to File Each One
Effective Patient Safety Reporting starts with knowing which event you are looking at and how qui...
HIPAA Requirements for Data Storage: How to Store ePHI Securely
Storing electronic protected health information (ePHI) safely is central to HIPAA compliance. The...
Is Using a Personal Cell Phone a HIPAA Violation? Rules, Risks, and How to Stay Compliant
Using a personal cell phone is not automatically a HIPAA violation. The risk comes from how you h...
Compliance Monitoring and Reporting: Steps, KPIs, and Templates
Identify Compliance Requirements. Begin by translating regulatory compliance requirements into c...
NPI and DEA Numbers Explained: Differences, Uses, and How to Look Them Up
National Provider Identifier Overview. What the NPI is. The National Provider Identifier (NPI) ...
Dental Sterilization Protocol: Step-by-Step, CDC-Compliant Instrument Reprocessing Guide for Dental Practices
This step-by-step, CDC-compliant instrument reprocessing guide helps you standardize your dental ...
HIPAA and Natural Language Processing: How to Build Compliant NLP Systems in Healthcare
HIPAA Compliance in Healthcare. What HIPAA requires for NLP projects. HIPAA defines Protected H...
New HIPAA Requirements for Healthcare: What’s Changed and How to Comply in 2026
Healthcare privacy and security expectations tightened in 2026. This guide explains what changed,...
Sending Medical Records via Email: A Simple, HIPAA-Compliant Step-by-Step Guide
Understanding HIPAA Compliance for Emailing Medical Records. When you email medical records, you...
Washington State HIPAA Laws Explained: What Patients and Providers Need to Know
Overview of Washington State Privacy Regulations. Washington overlays federal HIPAA with robust ...
Is PHI a Type of CUI? When Protected Health Information Counts as Controlled Unclassified Information
Short answer: sometimes. Protected Health Information (PHI) becomes Controlled Unclassified Infor...
At Minimum, an Effective Compliance Program Includes These 7 Core Elements
An effective compliance program aligns your organization’s values with enforceable controls, redu...
Working from Home and maintaining HIPAA Compliance
Ensuring Security in Remote Environments. In the age of the COVID-19 pandemic, more and more empl...
Read full article
Why Choose Accountable's HIPAA Training
Join thousands of organizations that trust Accountable to manage their compliance needs.
-
Fast and effective - Complete your training in minimal time
-
Engaging video content - No boring slides, just clear and practical lessons
-
Compliance-focused - Covers all key HIPAA regulations for privacy and security