Blog
Medical Office Physical Security: Best Practices and HIPAA Compliance Checklist
Strengthen ePHI protection and meet HIPAA: practical steps to harden facilities, secure workstati...
Employee Training Best Practices for Telehealth Companies: Onboarding, Compliance, and Virtual Care Quality
Design and deliver role based telehealth training that accelerates onboarding, ensures HIPAA comp...
HIPAA Risk Analysis Checklist for Small Employer Covered Entities: Encryption Best Practices
HIPAA Security Rule Compliance Requirements. As a small employer covered entity, you handle elec...
Small Employer Covered Entity Guide: HIPAA Risk Analysis and Encryption
HIPAA Risk Analysis Requirements. Purpose and scope for small employers. Your first obligation ...
Covered Entities Under HIPAA: Healthcare Providers, Health Plans, Clearinghouses Explained
Understanding who HIPAA applies to is the first step in building a compliant privacy and security...
HIPAA Privacy Rule Covered Entities: Requirements, Responsibilities, and Compliance Best Practices
Covered Entities Definition. Under the HIPAA Privacy Rule, covered entities are the organization...
Under the HIPAA Privacy Rule, Covered Entities Explained: Definition and Examples
Definition of Covered Entities. Under the HIPAA Privacy Rule, a covered entity is an organizatio...
HIPAA Risk Analysis Best Practices: Reduce Exposure, Document Compliance, Pass Audits
Conduct Mandatory Risk Analysis. Define scope and map ePHI. You begin by defining scope across ...
How to Conduct HIPAA Risk Analysis and Implement Encryption for Small Employers
Small employers that create, receive, maintain, or transmit electronic protected health informati...
Under HIPAA, What Counts as a Covered Entity? Practical Guide
Under HIPAA, a “covered entity” is any organization that must comply with federal rules for using...
How to Perform a HIPAA-Compliant Risk Analysis for Covered Entities
If you handle electronic protected health information, you must know how to perform a HIPAA-compl...
HIPAA Requires a Risk Analysis: Step-by-Step Guide for Covered Entities
HIPAA’s Security Rule requires covered entities to perform an accurate and thorough security risk...
Are You a Covered Entity Under HIPAA? Quick Compliance Checklist
Covered Entity Definition. If you are a health plan, a health care clearinghouse, or a health ca...
HIPAA Security Rule Risk Analysis Explained: Checklist, Examples, and Common Gaps
A HIPAA Security Rule risk analysis is the foundation of your security program. It identifies how...
Working from Home and maintaining HIPAA Compliance
Ensuring Security in Remote Environments. In the age of the COVID-19 pandemic, more and more empl...
Read full article
Why Choose Accountable's HIPAA Training
Join thousands of organizations that trust Accountable to manage their compliance needs.
-
Fast and effective - Complete your training in minimal time
-
Engaging video content - No boring slides, just clear and practical lessons
-
Compliance-focused - Covers all key HIPAA regulations for privacy and security