Blog
HIPAA Compliance for Connected Medical Devices: Requirements and Best Practices
Learn how to achieve HIPAA compliance for connected medical devices: map PHI, run SRAs, enforce e...
Is Emma HIPAA Compliant? What You Need to Know
Understand Emma HIPAA compliance risks and why Emma is not HIPAA compliant for PHI; learn its sec...
HIPAA Rules for Pediatricians: Key Guidelines on Minors’ Privacy, Parental Access, and Compliance
HIPAA sets a national baseline for protecting a minor patient’s protected health information (PHI...
Healthcare Employee Offboarding Best Practices: A HIPAA-Compliant Checklist for Security and Continuity
Assess Offboarding Risks. Healthcare carries unique offboarding risks: exposure of ePHI, patient...
EHR User Authentication: Best Practices for Secure, HIPAA‑Compliant Access with MFA and SSO
HIPAA Compliance and Authentication Requirements. EHR user authentication safeguards electronic ...
HIPAA Training Program for Behavioral Health Providers: Comprehensive, Role-Based Compliance Course
A high-impact HIPAA training program equips your behavioral health team to protect sensitive info...
HIPAA Compliance for Remote Patient Monitoring: A Practical Guide
Remote patient monitoring (RPM) extends care into the home while generating continuous Protected ...
Monkeypox Patient Portal Security: HIPAA-Compliant Best Practices for Safe Access
HIPAA Compliance for Patient Portals. Monkeypox patient portal security starts with aligning eve...
Physical Security Best Practices for Pharmacies: How to Prevent Theft and Stay Compliant
Pharmacies face unique risks: high-value medications, strict oversight, and constant public acces...
How to Perform HIPAA-Compliant Vulnerability Scanning on Medical Devices
HIPAA Vulnerability Scanning Requirements. To meet the HIPAA Security Rule, you must show that v...
HIPAA Penetration Test Findings: What to Do Next (Remediation & Compliance Checklist)
When HIPAA penetration test findings land on your desk, you need a clear, defensible path from is...
HIPAA-Compliant Penetration Testing for Ophthalmology Practices
HIPAA Security Rule Requirements. The HIPAA Security Rule requires Covered Entities and Business...
How to Do OIG Exclusion Screening for Your Telehealth Company
OIG Exclusion Screening Requirements. OIG exclusion screening ensures you do not employ or contr...
Healthcare Tap-to-Authenticate: Fast, Secure Badge Tap Sign-In for EHRs
Tap-to-authenticate brings one-touch access to clinical applications by replacing typed passwords...
Working from Home and maintaining HIPAA Compliance
Ensuring Security in Remote Environments. In the age of the COVID-19 pandemic, more and more empl...
Read full article
Why Choose Accountable's HIPAA Training
Join thousands of organizations that trust Accountable to manage their compliance needs.
-
Fast and effective - Complete your training in minimal time
-
Engaging video content - No boring slides, just clear and practical lessons
-
Compliance-focused - Covers all key HIPAA regulations for privacy and security