Blog
Hospice Vulnerability Management: Best Practices to Protect PHI and Meet HIPAA
Secure hospice PHI with HIPAA vulnerability management: training, risk assessments, vendor BAAs, ...
MOLST Form and HIPAA: What You Need to Know About Privacy, Access, and Sharing
Learn how a MOLST form interacts with HIPAA, who can access it, and how to protect confidentialit...
HIPAA Considerations for Parkinson’s Disease Support Groups: What Organizers and Members Need to Know
HIPAA Applicability in Support Groups. HIPAA protects the privacy and security of Protected Heal...
Common HIPAA Violations Dietitians Should Know and How to Avoid Them
Unauthorized Access to Patient Records. What this violation looks like. Unauthorized access hap...
OIG vs. SAM Exclusion Screening: What’s the Difference and When to Check Each
OIG Exclusion List Overview. The OIG exclusion list—formally the List of Excluded Individuals an...
How Often Is OIG Exclusion Screening Required? Why Monthly Checks Are the Standard
You’re responsible for preventing payments to excluded parties and proving you did so. In practic...
HIPAA Breach Prevention for Medical Device Manufacturers: Best Practices and Compliance Guide
Medical devices increasingly collect, process, and transmit Protected Health Information (PHI), i...
How to Implement Access Control for Digital Health Companies: A HIPAA-Compliant Step-by-Step Guide
Role-Based Access Control Implementation. Map systems and ePHI. Start by inventorying every sys...
Hardware Token vs Software Token in Healthcare: Security, HIPAA Compliance, and Cost Compared
Choosing between hardware and software tokens affects how you protect patient data, satisfy the H...
HIPAA Guidelines for Practice Managers: Compliance Requirements, Checklists, and Best Practices
Understanding HIPAA Compliance Overview. As a practice manager, you are the operational steward ...
Medical Device Patching: Best Practices, Risk Management, and Compliance
Importance of Medical Device Patching. Medical device patching safeguards patient safety, clinic...
The Complete HIPAA Compliance Checklist for Endodontic Practices
HIPAA Compliance Importance. HIPAA compliance protects your patients’ trust and your practice’s ...
HIPAA and Purchasing: What Procurement Teams Need to Know to Stay Compliant
Validate the input components (main keyword, secondary keywords, and outline) provided. Stru...
Is Twitter HIPAA Compliant? Rules, Risks, and Best Practices
Short answer: no. Twitter (also known as X) does not provide Business Associate Agreements, so yo...
Working from Home and maintaining HIPAA Compliance
Ensuring Security in Remote Environments. In the age of the COVID-19 pandemic, more and more empl...
Read full article
Why Choose Accountable's HIPAA Training
Join thousands of organizations that trust Accountable to manage their compliance needs.
-
Fast and effective - Complete your training in minimal time
-
Engaging video content - No boring slides, just clear and practical lessons
-
Compliance-focused - Covers all key HIPAA regulations for privacy and security