Blog
Hospice Vulnerability Management: Best Practices to Protect PHI and Meet HIPAA
Secure hospice PHI with HIPAA vulnerability management: training, risk assessments, vendor BAAs, ...
MOLST Form and HIPAA: What You Need to Know About Privacy, Access, and Sharing
Learn how a MOLST form interacts with HIPAA, who can access it, and how to protect confidentialit...
HIPAA-Compliant eSignature Solutions for Healthcare: Secure, Simple, and Audit-Ready
Choosing HIPAA-compliant eSignature solutions for healthcare means balancing airtight security wi...
Shredding Standards Explained: DIN 66399 Security Levels and How to Choose the Right One
When you destroy documents or media, you’re safeguarding customers, employees, and your organizat...
HIPAA Data Aggregation Explained: What’s Allowed, What’s Not, and How to Stay Compliant
Definition of Data Aggregation. Under HIPAA, data aggregation is a service performed by a Busine...
What Was the Purpose of the HITECH Act? Goals and Impact on Electronic Health Records
Accelerated Adoption of Electronic Health Records. The HITECH Act’s core purpose was to speed yo...
What Are Examples of Protected Health Information (PHI)? 18 Identifiers Under HIPAA Explained
Protected Health Information (PHI) is any individually identifiable health information that relat...
Dental Office Sterilization: How It Works, Protocols, and Safety Standards
Dental office sterilization protects every patient and staff member you interact with. It combine...
HIPAA Compliance for Behavioral Assessments: What Providers Need to Know
HIPAA Privacy Rule Overview. Behavioral assessments capture highly sensitive protected health in...
Who Signed HIPAA Into Law? President Bill Clinton (August 21, 1996)
Overview of HIPAA. The Health Insurance Portability and Accountability Act (HIPAA) is a federal ...
What Information Is in the HIPAA Notice of Privacy Practices?
The HIPAA Notice of Privacy Practices explains how a covered entity uses and discloses your Prote...
HIPAA Breach Prevention for Healthcare Startups: Best Practices and Compliance Checklist
Employee Training and Awareness. Build a culture where protecting Protected Health Information (...
How to Determine When the Emergency Access Procedure Is Appropriate (and When It Isn’t)
Purpose of Emergency Access Procedure. The emergency access procedure (often called “break-glass...
LEIE Screening: How to Run OIG Exclusion Checks and Stay Compliant
Understanding the OIG Exclusion List. LEIE screening is a core compliance control for any organi...
Working from Home and maintaining HIPAA Compliance
Ensuring Security in Remote Environments. In the age of the COVID-19 pandemic, more and more empl...
Read full article
Why Choose Accountable's HIPAA Training
Join thousands of organizations that trust Accountable to manage their compliance needs.
-
Fast and effective - Complete your training in minimal time
-
Engaging video content - No boring slides, just clear and practical lessons
-
Compliance-focused - Covers all key HIPAA regulations for privacy and security