Blog
Hospice Vulnerability Management: Best Practices to Protect PHI and Meet HIPAA
Secure hospice PHI with HIPAA vulnerability management: training, risk assessments, vendor BAAs, ...
MOLST Form and HIPAA: What You Need to Know About Privacy, Access, and Sharing
Learn how a MOLST form interacts with HIPAA, who can access it, and how to protect confidentialit...
HIPAA-Compliant Website Checklist: Step-by-Step Requirements, Security Controls, and Best Practices
This HIPAA-compliant website checklist gives you a practical, step-by-step path to protect electr...
HIPAA OCR Audit Protocol: What It Is, Requirements, and How to Prepare
The HIPAA OCR Audit Protocol is the structured set of questions, evidence requests, and testing s...
HIPAA Penetration Testing: Requirements, Frequency, and Compliance Checklist
HIPAA Penetration Testing Requirements. HIPAA’s Security Rule is risk-based. It does not explici...
Notice of Privacy Practices: Definition and HIPAA Requirements
Overview of Notice of Privacy Practices. The Notice of Privacy Practices (NPP) explains how a co...
Is HIPAA Universal? Where It Applies and Where It Doesn't
HIPAA Applicability to Covered Entities. HIPAA is a U.S. federal law that applies to specific or...
What Should a Needlestick Prevention Program Include? Essential Elements, OSHA Requirements, and Best Practices
A comprehensive needlestick prevention program protects you from occupational exposure to bloodbo...
How to Secure an Addiction Medicine Patient Portal: HIPAA & 42 CFR Part 2 Best Practices
Implement Role-Based Access Controls. You safeguard sensitive health data by granting the minimu...
What Is the OIG Exclusion Statute (42 U.S.C. § 1320a‑7) in Healthcare?
The OIG Exclusion Statute, codified at 42 U.S.C. § 1320a‑7, authorizes the Department of Health a...
Quality and Risk Management in Healthcare: Best Practices, Frameworks, and Tools to Improve Patient Safety and Compliance
Quality and risk management in healthcare aligns culture, process, data, and technology to preven...
HIPAA Compliance for Healthcare Incubators: Requirements, Checklist, and Best Practices
HIPAA Compliance Requirements. Healthcare incubators sit at the crossroads of innovation and car...
Are Phone Calls HIPAA Compliant? What the Rules Say and How to Comply
Yes—phone calls can be HIPAA compliant when you handle Protected Health Information (PHI) using a...
All the Following Are Examples of a Business Associate—Except: Who Does Not Qualify Under HIPAA
Business Associate Definition. A business associate is any person or organization, other than a ...
Working from Home and maintaining HIPAA Compliance
Ensuring Security in Remote Environments. In the age of the COVID-19 pandemic, more and more empl...
Read full article
Why Choose Accountable's HIPAA Training
Join thousands of organizations that trust Accountable to manage their compliance needs.
-
Fast and effective - Complete your training in minimal time
-
Engaging video content - No boring slides, just clear and practical lessons
-
Compliance-focused - Covers all key HIPAA regulations for privacy and security