Blog
HIPAA Responsibilities for Insurance Coordinators: Essential Duties and Compliance Checklist
Learn HIPAA responsibilities for insurance coordinators with practical privacy security and breac...
HIPAA Policies and Procedures for Health Tech Companies: A Step-by-Step Compliance Guide
Implement HIPAA compliance requirements for healthtech companies with governance, risk management...
HIPAA Security Incident Definition: What It Means, Examples, and Reporting Requirements
HIPAA Security Incident Definition. Under the HIPAA Security Rule, a security incident is any at...
Best HIPAA-Compliant Flash Drives for 2026: Secure, Encrypted USBs for PHI
Choosing the best HIPAA-compliant flash drives for 2026 comes down to verifiable security and pra...
How to Screen for Medicare Compliance: Step-by-Step Guide and Checklist for Healthcare Providers
Establish Medicare Compliance Program Structure. Build the foundation. Start by appointing a Co...
What Is De-Identified Information? Definition, Examples, and HIPAA Requirements
Definition of De-Identified Information. De-identified information is health data that cannot re...
Healthcare Incident Response: HIPAA‑Compliant Plan, Steps & Best Practices
Incident Response Plan Overview. A healthcare incident response plan (IRP) gives you a repeatabl...
How to Send HIPAA-Compliant Mail: Rules, PHI Protections, and Best Practices
Sending email that contains Protected Health Information (PHI) demands more than basic security—y...
Crohn’s Disease Telehealth Privacy: How to Protect Your Health Data During Virtual Care
Virtual visits make Crohn’s disease care more convenient, but they also raise questions about who...
Stage 1 Meaningful Use Explained: Core Objectives, Measures, and Requirements
Stage 1 Meaningful Use Overview. Stage 1 Meaningful Use is the foundational phase of the EHR Inc...
Is Google Calendar HIPAA Compliant? What to Know About BAA and PHI
You can use Google Calendar in a HIPAA-aligned way, but it is not “HIPAA compliant” by default. C...
How Do You Prevent FWA? Step-by-Step Strategies to Stop Fraud, Waste, and Abuse
Preventing fraud, waste, and abuse (FWA) takes more than one tool. You need a coordinated system ...
Healthcare Policy Software to Streamline Compliance and Audits
Healthcare policy software centralizes policies, automates compliance tasks, and readies your org...
Is Age PHI Under HIPAA? What Counts—and the 90+ Rule Explained
Age as Protected Health Information. If you’ve asked “Is age PHI under HIPAA?”, the answer is: i...
Working from Home and maintaining HIPAA Compliance
Ensuring Security in Remote Environments. In the age of the COVID-19 pandemic, more and more empl...
Read full article
Why Choose Accountable's HIPAA Training
Join thousands of organizations that trust Accountable to manage their compliance needs.
-
Fast and effective - Complete your training in minimal time
-
Engaging video content - No boring slides, just clear and practical lessons
-
Compliance-focused - Covers all key HIPAA regulations for privacy and security