Blog
Hospice Vulnerability Management: Best Practices to Protect PHI and Meet HIPAA
Secure hospice PHI with HIPAA vulnerability management: training, risk assessments, vendor BAAs, ...
MOLST Form and HIPAA: What You Need to Know About Privacy, Access, and Sharing
Learn how a MOLST form interacts with HIPAA, who can access it, and how to protect confidentialit...
FWA Reporting Checklist for Healthcare Organizations: Steps, Contacts, and Timelines
Compliance with Regulations. Build your FWA reporting framework on clear, current rules. Align p...
Fraud, Waste, and Abuse Explained: Definitions, Examples, and HIPAA Compliance
Fraud, waste, and abuse undermine care quality, drain limited resources, and expose organizations...
Healthcare Fraud, Waste, and Abuse: Definitions, Risks, and Prevention Best Practices
Fraud Definition and Characteristics. What is fraud?. Healthcare fraud is an intentional decept...
Define Fraud, Waste, and Abuse: A HIPAA-Aligned Guide for Organizations
This guide defines fraud, waste, and abuse in healthcare and explains how you can align controls ...
FWA Reporting Methods Explained: Internal Hotlines, OIG, CMS, Anonymous Options
If you suspect fraud, waste, or abuse (FWA), you have multiple, clearly defined channels to repor...
Best Practices for Reporting FWA: Examples, Documentation, and Escalation Requirements
Strong FWA Compliance Best Practices help you detect concerns early, report accurately, and resol...
How to Prevent and Report Fraud, Waste, and Abuse: Best Practices
You can significantly reduce risk by combining strong internal controls, modern technology, and a...
Fraud, Waste, and Abuse in Healthcare: Definitions, Examples, and Requirements
Fraud, waste, and abuse in healthcare drain resources, erode trust, and expose organizations to s...
Avoid Penalties: EHR Incentive Program Security Risk Assessment Explained
Completing an EHR Incentive Program Security Risk Assessment is central to HIPAA Compliance and t...
Examples and Templates for EHR Incentive Program Security Risk Assessments
You can streamline EHR Incentive Program compliance by pairing clear examples with ready-to-use t...
HIPAA Data Security Risk Assessment Program: Requirements, Steps, and Examples
HIPAA Risk Assessment Requirements. A HIPAA Data Security Risk Assessment Program ensures you pe...
How to Build a HIPAA-Compliant Data Security Risk Assessment Program
Understanding HIPAA Security Rule Requirements. Building a HIPAA-compliant data security risk as...
Working from Home and maintaining HIPAA Compliance
Ensuring Security in Remote Environments. In the age of the COVID-19 pandemic, more and more empl...
Read full article
Why Choose Accountable's HIPAA Training
Join thousands of organizations that trust Accountable to manage their compliance needs.
-
Fast and effective - Complete your training in minimal time
-
Engaging video content - No boring slides, just clear and practical lessons
-
Compliance-focused - Covers all key HIPAA regulations for privacy and security