Blog
Hospice Vulnerability Management: Best Practices to Protect PHI and Meet HIPAA
Secure hospice PHI with HIPAA vulnerability management: training, risk assessments, vendor BAAs, ...
MOLST Form and HIPAA: What You Need to Know About Privacy, Access, and Sharing
Learn how a MOLST form interacts with HIPAA, who can access it, and how to protect confidentialit...
HIPAA-Compliant Language Services for Healthcare: Secure Medical Translation & Interpretation
Overview of HIPAA Compliance. When your organization delivers care across languages, every trans...
Hospital Audits: A Complete Guide to Types, Compliance, and Preparation
Hospital audits protect revenue, safeguard patients, and prove compliance with payer and regulato...
HIPAA Protects a Category of Information: Protected Health Information (PHI)
Overview of Protected Health Information. Protected Health Information (PHI) is the centerpiece ...
Healthcare LMS Software for HIPAA‑Compliant Staff Training and Certification
Healthcare LMS software for HIPAA‑compliant staff training and certification helps you deliver ro...
Health and Safety in Dental Practice: Compliance & Best Practices Guide
This Health and Safety in Dental Practice: Compliance & Best Practices Guide gives you a prac...
Which Is Not Considered an Identifier Under the HIPAA Privacy Rule?
Overview of HIPAA Identifiers. Under the HIPAA Privacy Rule, information becomes Protected Healt...
HIPAA Breach Notification Audit: Requirements, Timeline, and Compliance Checklist
Breach Definition in HIPAA. A HIPAA breach is the acquisition, access, use, or disclosure of Pro...
What Business Associates Are Not Permitted to Do Under HIPAA
Business associates are vendors and service providers that create, receive, maintain, or transmit...
Risk Assessment in Health Care: A Step-by-Step Guide with Methods, Tools, and Examples
Identify Hazards in Health Care. Effective risk assessment in health care starts by systematical...
How to Make Google Drive HIPAA Compliant: Step-by-Step Guide to BAA, Settings, and Sharing Controls
Making Google Drive HIPAA compliant is less about a single switch and more about a coordinated pr...
Outpatient Clinics HIPAA Compliance Checklist: Step-by-Step Guide to Stay Compliant and Protect PHI
Use this outpatient clinics HIPAA compliance checklist to operationalize the HIPAA Security Rule,...
What Are the 4 Methods of Compliance with the Bloodborne Pathogens Standard?
The Bloodborne Pathogens Standard protects workers from occupational exposure to blood and other ...
Working from Home and maintaining HIPAA Compliance
Ensuring Security in Remote Environments. In the age of the COVID-19 pandemic, more and more empl...
Read full article
Why Choose Accountable's HIPAA Training
Join thousands of organizations that trust Accountable to manage their compliance needs.
-
Fast and effective - Complete your training in minimal time
-
Engaging video content - No boring slides, just clear and practical lessons
-
Compliance-focused - Covers all key HIPAA regulations for privacy and security