Blog
Hospice Vulnerability Management: Best Practices to Protect PHI and Meet HIPAA
Secure hospice PHI with HIPAA vulnerability management: training, risk assessments, vendor BAAs, ...
MOLST Form and HIPAA: What You Need to Know About Privacy, Access, and Sharing
Learn how a MOLST form interacts with HIPAA, who can access it, and how to protect confidentialit...
HIPAA and Augmented Reality in Surgery: Compliance Requirements, Patient Privacy, and Best Practices
Augmented reality (AR) can superimpose patient-specific imaging, instrumentation guides, and deci...
Hemophilia Telehealth Privacy: What Patients and Providers Need to Know
Hemophilia care often involves lifelong treatment plans, specialty pharmacy coordination, genetic...
Endpoint Security Best Practices for Nursing Homes: A Practical HIPAA-Compliant Guide
HIPAA Compliance Requirements. What HIPAA Expects of Endpoints. Nursing homes are Covered Entit...
How to Conduct a HIPAA Risk Assessment for Your Urology Practice
A HIPAA risk assessment helps your urology practice systematically uncover and reduce threats to ...
Medical Practice Vulnerability Management: How to Identify, Prioritize, and Fix Security Risks
Strong security in healthcare starts with protecting Electronic Health Record (EHR) Security and ...
What Is Information Blocking in Healthcare? Definition, Examples, and Penalties
Definition of Information Blocking. Core concept. Information blocking in healthcare is a pract...
When to Notify the Media of a Breach: HIPAA’s 500+ Rule and 60‑Day Deadline
HIPAA Breach Notification Requirements. HIPAA’s Breach Notification Rule requires you to notify ...
HIPAA Requirements for Midwives: What You Need to Know to Stay Compliant
HIPAA Compliance Determination. Are you a covered entity?. You are a health care provider under...
Healthcare Email Phishing Incident Response: Steps to Take Immediately
When a phishing email targets your organization, minutes matter. This healthcare email phishing i...
Are Problem Lists Protected by HIPAA? What Patients and Providers Need to Know
Problem Lists as Protected Health Information. A problem list is the running summary of a patien...
Insurance Verification HIPAA Compliance: Requirements, Best Practices, and Step-by-Step Checklist
Insurance Verification HIPAA Compliance ensures you confirm eligibility and benefits without expo...
Healthcare Incident Response Trends for 2025: What’s Changing in Cybersecurity, AI, and Compliance
Healthcare incident response in 2025 is being reshaped by faster attacks, smarter defenses, and t...
Working from Home and maintaining HIPAA Compliance
Ensuring Security in Remote Environments. In the age of the COVID-19 pandemic, more and more empl...
Read full article
Why Choose Accountable's HIPAA Training
Join thousands of organizations that trust Accountable to manage their compliance needs.
-
Fast and effective - Complete your training in minimal time
-
Engaging video content - No boring slides, just clear and practical lessons
-
Compliance-focused - Covers all key HIPAA regulations for privacy and security