Blog
Healthcare Compliance Hotline: What It Is, How It Works, and How to Set One Up
Set up a healthcare compliance hotline to enable anonymous reporting, spot risks early, secure ca...
Is Burp Suite HIPAA Compliant? BAA Availability and Secure Use for Healthcare Teams
See if Burp Suite HIPAA compliant deployment is possible and get practical steps for BAAs, encryp...
Crohn’s Disease Telehealth Privacy: How to Protect Your Health Data During Virtual Care
Virtual visits make Crohn’s disease care more convenient, but they also raise questions about who...
Stage 1 Meaningful Use Explained: Core Objectives, Measures, and Requirements
Stage 1 Meaningful Use Overview. Stage 1 Meaningful Use is the foundational phase of the EHR Inc...
Is Google Calendar HIPAA Compliant? What to Know About BAA and PHI
You can use Google Calendar in a HIPAA-aligned way, but it is not “HIPAA compliant” by default. C...
How Do You Prevent FWA? Step-by-Step Strategies to Stop Fraud, Waste, and Abuse
Preventing fraud, waste, and abuse (FWA) takes more than one tool. You need a coordinated system ...
Healthcare Policy Software to Streamline Compliance and Audits
Healthcare policy software centralizes policies, automates compliance tasks, and readies your org...
Is Age PHI Under HIPAA? What Counts—and the 90+ Rule Explained
Age as Protected Health Information. If you’ve asked “Is age PHI under HIPAA?”, the answer is: i...
Dental Cyber Security: How to Protect Patient Data and Stay HIPAA Compliant
Cybersecurity Threats in Dental Practices. Dental practices hold a treasure trove of Electronic ...
Is Email PHI? What HIPAA Says, Examples, and Compliance Tips
Email and PHI. Email can contain Protected Health Information (PHI) whenever it includes an iden...
OSHA Standards for Dentistry: Bloodborne Pathogens, Hazard Communication, PPE and More
Dental practices operate under several OSHA standards that protect workers from biological, chemi...
Healthcare Email Security Penetration Testing: Safeguard PHI and Stay HIPAA Compliant
Understanding Email Security Risks in Healthcare. Email remains the busiest corridor for Protect...
HIPAA Compliance Timeline: 30-60-90 Day Plan, Key Deadlines, and Ongoing Requirements
A structured HIPAA compliance timeline helps you translate complex rules into clear, time‑bound a...
Can I Email Medical Records? What HIPAA Allows and Safer Ways to Share
HIPAA Compliance for Emailing Medical Records. Emailing medical records is permitted under HIPAA...
Working from Home and maintaining HIPAA Compliance
Ensuring Security in Remote Environments. In the age of the COVID-19 pandemic, more and more empl...
Read full article
Why Choose Accountable's HIPAA Training
Join thousands of organizations that trust Accountable to manage their compliance needs.
-
Fast and effective - Complete your training in minimal time
-
Engaging video content - No boring slides, just clear and practical lessons
-
Compliance-focused - Covers all key HIPAA regulations for privacy and security