Blog
Is Patient Satisfaction Data HIPAA-Protected? What Counts as PHI and How to Protect It
Learn when patient satisfaction data is HIPAA-protected, how to de-identify surveys, and practica...
Getting Started with HIPAA: What It Is, Key Requirements, and How to Comply
Practical HIPAA compliance guide to protect PHI, run risk assessments, manage breaches, and secur...
Ophthalmology EHR Security Considerations: A Practical HIPAA Checklist for Eye Care Practices
HIPAA Security Rule Overview. Protecting electronic Protected Health Information (ePHI) in ophth...
OIG Exclusion Screening for Rural Healthcare Practices: A Step-by-Step Compliance Guide
Overview of OIG Exclusion Screening. OIG exclusion screening is the process of checking your wor...
How to Run HIPAA-Compliant Vulnerability Scans in a Home Health Agency
Running vulnerability scans the right way safeguards ePHI protection, supports your HIPAA Securit...
HIPAA Pen Test Results Explained in Plain English
If you’ve just received HIPAA penetration testing results, this guide explains what they mean, wh...
OIG Exclusion List Monthly Check Requirement: What You Need to Know
Monthly screening against the Office of Inspector General’s List of Excluded Individuals and Enti...
HIPAA Policies for Faith-Based Health Organizations: A Practical Compliance Guide
HIPAA Applicability to Faith-Based Organizations. When HIPAA applies. HIPAA applies when your f...
Securing HEDIS Reporting in Healthcare: Best Practices to Protect PHI and Ensure Compliance
Accurate HEDIS reporting depends on timely flows of clinical and claims data, but those same flow...
How Much Does HIPAA Compliance Cost for a Small Practice? Breakdown and Budget Tips
Budgeting for HIPAA is less about guessing and more about mapping clear line items to your risks....
Dermatology Practice Email Security: How to Stay HIPAA-Compliant and Protect Patient Data
Email is indispensable in dermatology, but it can expose protected health information (PHI) if no...
USB Malware Incident Response in Healthcare: Step-by-Step Guide
USB-borne threats can disrupt clinical workflows and expose protected health information (PHI). T...
HIPAA Media Disposal Policy: Requirements, Checklist & Template
A HIPAA Media Disposal Policy protects electronic protected health information (ePHI) from exposu...
Pediatric Practice Mobile Device Policy: Template & HIPAA-Compliant Guidelines
A well-governed pediatric practice needs a mobile device policy that protects electronic protecte...
Working from Home and maintaining HIPAA Compliance
Ensuring Security in Remote Environments. In the age of the COVID-19 pandemic, more and more empl...
Read full article
Why Choose Accountable's HIPAA Training
Join thousands of organizations that trust Accountable to manage their compliance needs.
-
Fast and effective - Complete your training in minimal time
-
Engaging video content - No boring slides, just clear and practical lessons
-
Compliance-focused - Covers all key HIPAA regulations for privacy and security