Blog
Hospice Vulnerability Management: Best Practices to Protect PHI and Meet HIPAA
Secure hospice PHI with HIPAA vulnerability management: training, risk assessments, vendor BAAs, ...
MOLST Form and HIPAA: What You Need to Know About Privacy, Access, and Sharing
Learn how a MOLST form interacts with HIPAA, who can access it, and how to protect confidentialit...
Dialysis Consent and HIPAA: What Patients and Providers Need to Know
Dialysis care involves sensitive medical decisions and extensive data exchange. Understanding how...
HIPAA and Data Localization: Do You Need to Keep PHI in the U.S.?
HIPAA Requirements for PHI Protection. HIPAA protects the confidentiality, integrity, and availa...
HIPAA Compliance for Interventional Radiology Suites: Requirements, Checklist, and Best Practices
HIPAA Compliance in Interventional Radiology. Interventional radiology (IR) suites blend high-ac...
HIPAA Requirements for Contact Lens Providers: A Practical Compliance Checklist
As a contact lens provider, you handle Protected Health Information every day—from prescriptions ...
Federal Exclusion Screening and HIPAA Compliance: Requirements and Best Practices
Federal Exclusion Screening Requirements. Federal exclusion screening verifies that your workfor...
Disaster Recovery Best Practices for Clinics: Protect Patient Care and Keep Operations Running
Ransomware, storms, and outages should never stop patient care. By applying disaster recovery bes...
How Many People Are on the OIG Exclusion List (LEIE)?
OIG Exclusion List Overview. The List of Excluded Individuals and Entities (LEIE) is the federal...
Is Cerebral HIPAA Compliant? Privacy and Security Explained
Overview of HIPAA Compliance. When you ask, “Is Cerebral HIPAA compliant?” remember that HIPAA c...
How to Do a HIPAA Risk Assessment for Health Coaches: Step-by-Step Guide + Checklist
Define Scope of ePHI Systems. Start by defining what’s in scope under the HIPAA Security Rule. L...
Home Health Patient Scheduling: How to Stay HIPAA-Compliant
When you coordinate home health patient scheduling, you handle Protected Health Information every...
Healthcare Incident Response Checklist: HIPAA-Compliant Steps for PHI Breaches and Cybersecurity Incidents
When Protected Health Information (PHI) is at risk, speed and precision matter. Use this HIPAA-al...
Pain Medicine Data Security Requirements: HIPAA, 42 CFR Part 2, and PDMP Compliance
Protecting patient information in pain medicine requires harmonizing HIPAA rules, 42 CFR Part 2 c...
Working from Home and maintaining HIPAA Compliance
Ensuring Security in Remote Environments. In the age of the COVID-19 pandemic, more and more empl...
Read full article
Why Choose Accountable's HIPAA Training
Join thousands of organizations that trust Accountable to manage their compliance needs.
-
Fast and effective - Complete your training in minimal time
-
Engaging video content - No boring slides, just clear and practical lessons
-
Compliance-focused - Covers all key HIPAA regulations for privacy and security