Blog
Hospice Vulnerability Management: Best Practices to Protect PHI and Meet HIPAA
Secure hospice PHI with HIPAA vulnerability management: training, risk assessments, vendor BAAs, ...
MOLST Form and HIPAA: What You Need to Know About Privacy, Access, and Sharing
Learn how a MOLST form interacts with HIPAA, who can access it, and how to protect confidentialit...
Transplant Surgery Patient Portal Security Guide: HIPAA-Compliant Best Practices
Encryption Standards for Patient Data. Strong encryption is the backbone of PHI Protection in a ...
Interventional Radiology EHR Security Considerations: Risks, Compliance, and Best Practices
EHR Security Risks in Interventional Radiology. Interventional radiology (IR) combines time‑crit...
HIPAA Best Practices for Podiatrists: Practical Compliance Guide & Checklist
HIPAA Compliance Overview. HIPAA sets the baseline rules for how you handle protected health inf...
Pediatric Practice Cloud Security Policy: How to Create a HIPAA-Compliant Plan (Template + Checklist)
A strong cloud security policy protects your pediatric patients and keeps your practice compliant...
Is Algolia HIPAA Compliant? BAA, PHI, and Security Explained
Algolia Compliance Programs. Whether a cloud service can be used in a HIPAA-regulated environmen...
Federally Qualified Medical Practice Cybersecurity: FQHC Compliance, Risks, and Best Practices
Cybersecurity Threats to FQHCs. Federally Qualified Health Centers operate high-volume, mission-...
Indiana Telehealth Regulations: Laws, Licensing, Prescribing, and Coverage Explained
Telehealth Definition and Compliance. How Indiana defines “telehealth”. Indiana law defines tel...
Dentrix BAA: How to Request a HIPAA Business Associate Agreement and What It Covers
Accessing the Dentrix BAA Document. A Dentrix BAA (Business Associate Agreement) formalizes how ...
Discharge Planning Data Security: HIPAA‑Compliant Best Practices
HIPAA Compliance in Discharge Planning. Discharge planning data security protects Protected Heal...
How the Mental Health Parity Act (MHPAEA) Overlaps with HIPAA: Coverage, Privacy, and Compliance
Understanding how the Mental Health Parity and Addiction Equity Act (MHPAEA) intersects with the ...
OIG Exclusion Screening for Your Therapy Practice: Requirements, Frequency, and Step-by-Step Compliance Guide
Initial Employee and Vendor Screening. Begin exclusion screening before day one. You should scre...
California OIG Exclusion Screening: Requirements, State Lists & How to Comply
Federal Exclusion Lists Overview. California OIG exclusion screening starts with the federal bas...
Working from Home and maintaining HIPAA Compliance
Ensuring Security in Remote Environments. In the age of the COVID-19 pandemic, more and more empl...
Read full article
Why Choose Accountable's HIPAA Training
Join thousands of organizations that trust Accountable to manage their compliance needs.
-
Fast and effective - Complete your training in minimal time
-
Engaging video content - No boring slides, just clear and practical lessons
-
Compliance-focused - Covers all key HIPAA regulations for privacy and security