Blog
Kansas Health Data Protection Requirements Explained: HIPAA, State Laws, and Compliance Steps
Secure ePHI and streamline Kansas HIPAA compliance with practical steps to manage HIE, enforce pa...
Healthcare SQL Injection Incident Response: Step-by-Step Playbook and HIPAA Reporting Guide
Act on healthcare SQL injection with step-by-step triage, containment, forensic analysis, HIPAA r...
When It’s Appropriate to Release Patient Information—and to Whom (HIPAA Rules Explained)
Treatment Payment and Healthcare Operations. Under HIPAA, you may use and disclose Protected Hea...
OIG General Compliance Program Guidance (GCPG): Overview, Key Requirements, and Compliance Checklist
Understanding General Compliance Program Guidance. The OIG General Compliance Program Guidance (...
HIPAA Security Rule: What It Requires Covered Entities to Do to Protect ePHI
The HIPAA Security Rule sets national standards for safeguarding Electronic Protected Health Info...
Hospital Policy and Procedure Manual: Complete Guide with Templates, Examples, and Compliance Checklist
Importance of Hospital Policy and Procedure Manuals. A hospital policy and procedure manual sets...
How to Make Your ETL Pipelines HIPAA-Compliant: Requirements, Best Practices, and a Checklist
Making ETL pipelines HIPAA-compliant means engineering every data flow to protect Protected Healt...
HIPAA Photo Violations: Examples, Penalties, and How to Avoid Them
Unauthorized Sharing of Patient Images. Photos created or stored by a covered entity or business...
When Does PII Become PHI in Healthcare? A HIPAA Guide with Examples
Definition of Personally Identifiable Information. Personally Identifiable Information (PII) is ...
Surgery Partners 2020 Data Breach: What Happened, Who Was Affected, and Next Steps for Patients
Overview of the Alleged 2020 Incident. You may have seen references to a “Surgery Partners 2020 ...
What Is the Federal Stark Law? Requirements, Exceptions, and Penalties
Definition of Federal Stark Law. The Federal Stark Law—often called the physician self-referral ...
How to Build a HIPAA Contingency Plan: Requirements, Templates & Step-by-Step Checklist
HIPAA Contingency Plan Requirements. A HIPAA contingency plan is the set of policies and procedu...
HIPAA Security Incident Definition: What It Means, Examples, and Reporting Requirements
HIPAA Security Incident Definition. Under the HIPAA Security Rule, a security incident is any at...
Best HIPAA-Compliant Flash Drives for 2026: Secure, Encrypted USBs for PHI
Choosing the best HIPAA-compliant flash drives for 2026 comes down to verifiable security and pra...
Working from Home and maintaining HIPAA Compliance
Ensuring Security in Remote Environments. In the age of the COVID-19 pandemic, more and more empl...
Read full article
Why Choose Accountable's HIPAA Training
Join thousands of organizations that trust Accountable to manage their compliance needs.
-
Fast and effective - Complete your training in minimal time
-
Engaging video content - No boring slides, just clear and practical lessons
-
Compliance-focused - Covers all key HIPAA regulations for privacy and security