Blog
Best Practices for Patient Privacy in Geriatric Medicine
Improve patient privacy in geriatric care with practical protocols, consent strategies, EHR safeg...
PHI in Mobile Apps: HIPAA Compliance and Security Best Practices
Protect PHI with HIPAA mobile app security: encryption, access control, secure transport, audits,...
Risk Management Tools in Healthcare: Top Solutions, Examples, and How to Choose
Effective risk management tools in healthcare protect patients, clinicians, and organizations by ...
Electronic Medical Records Security: Best Practices to Protect Patient Data and Stay HIPAA-Compliant
Strong electronic medical records security helps you protect electronic protected health informat...
Electronic Health Record (EHR) Audit Trails Explained: What They Are, What They Track, and Why They Matter
Electronic Health Record (EHR) audit trails are tamper-evident logs that chronologically record w...
OIG Compliance Program Guidance for Pharmaceutical Manufacturers: Key Requirements and How to Comply
The OIG Compliance Program Guidance for Pharmaceutical Manufacturers outlines practical expectati...
HIPAA Encryption: Requirements, Best Practices, and Compliance Checklist
HIPAA Encryption Requirements. What the Security Rule requires. Under the HIPAA Security Rule, ...
How to Properly Dispose of Biohazard Waste According to OSHA
Managing biohazard waste correctly protects your team, patients, and the public while keeping you...
Is OneDrive HIPAA Compliant? BAA, Requirements, and Best Practices
If you manage Protected Health Information (PHI), the core question is not just “Is OneDrive HIPA...
How to Write an Incident Statement: Step-by-Step Guide with Examples and Template
Writing a clear, defensible incident statement protects people, preserves facts, and speeds resol...
Which Federal Laws Address Healthcare Fraud and Abuse? False Claims Act, Anti‑Kickback Statute, Stark Law, and More
Several federal statutes work together to prevent, detect, and punish healthcare fraud and abuse....
Subpoena for Medical Records: What It Is, HIPAA Requirements, and How to Respond
Understanding Subpoenas for Medical Records. A subpoena for medical records compels a healthcare...
Unified Program Integrity Contractor (UPIC): What It Is, How It Works, and What Providers Should Expect
Overview of UPIC Roles. Unified Program Integrity Contractors (UPICs) are specialized entities e...
Health Care Clearinghouse Definition (HIPAA): What It Is and Examples
Definition of Health Care Clearinghouse. A health care clearinghouse, under HIPAA, is a public o...
Working from Home and maintaining HIPAA Compliance
Ensuring Security in Remote Environments. In the age of the COVID-19 pandemic, more and more empl...
Read full article
Why Choose Accountable's HIPAA Training
Join thousands of organizations that trust Accountable to manage their compliance needs.
-
Fast and effective - Complete your training in minimal time
-
Engaging video content - No boring slides, just clear and practical lessons
-
Compliance-focused - Covers all key HIPAA regulations for privacy and security