Blog
Kansas Health Data Protection Requirements Explained: HIPAA, State Laws, and Compliance Steps
Secure ePHI and streamline Kansas HIPAA compliance with practical steps to manage HIE, enforce pa...
Healthcare SQL Injection Incident Response: Step-by-Step Playbook and HIPAA Reporting Guide
Act on healthcare SQL injection with step-by-step triage, containment, forensic analysis, HIPAA r...
How to Screen for Medicare Compliance: Step-by-Step Guide and Checklist for Healthcare Providers
Establish Medicare Compliance Program Structure. Build the foundation. Start by appointing a Co...
What Is De-Identified Information? Definition, Examples, and HIPAA Requirements
Definition of De-Identified Information. De-identified information is health data that cannot re...
Healthcare Incident Response: HIPAA‑Compliant Plan, Steps & Best Practices
Incident Response Plan Overview. A healthcare incident response plan (IRP) gives you a repeatabl...
How to Send HIPAA-Compliant Mail: Rules, PHI Protections, and Best Practices
Sending email that contains Protected Health Information (PHI) demands more than basic security—y...
Crohn’s Disease Telehealth Privacy: How to Protect Your Health Data During Virtual Care
Virtual visits make Crohn’s disease care more convenient, but they also raise questions about who...
Stage 1 Meaningful Use Explained: Core Objectives, Measures, and Requirements
Stage 1 Meaningful Use Overview. Stage 1 Meaningful Use is the foundational phase of the EHR Inc...
Is Google Calendar HIPAA Compliant? What to Know About BAA and PHI
You can use Google Calendar in a HIPAA-aligned way, but it is not “HIPAA compliant” by default. C...
How Do You Prevent FWA? Step-by-Step Strategies to Stop Fraud, Waste, and Abuse
Preventing fraud, waste, and abuse (FWA) takes more than one tool. You need a coordinated system ...
Healthcare Policy Software to Streamline Compliance and Audits
Healthcare policy software centralizes policies, automates compliance tasks, and readies your org...
Is Age PHI Under HIPAA? What Counts—and the 90+ Rule Explained
Age as Protected Health Information. If you’ve asked “Is age PHI under HIPAA?”, the answer is: i...
Dental Cyber Security: How to Protect Patient Data and Stay HIPAA Compliant
Cybersecurity Threats in Dental Practices. Dental practices hold a treasure trove of Electronic ...
Is Email PHI? What HIPAA Says, Examples, and Compliance Tips
Email and PHI. Email can contain Protected Health Information (PHI) whenever it includes an iden...
Working from Home and maintaining HIPAA Compliance
Ensuring Security in Remote Environments. In the age of the COVID-19 pandemic, more and more empl...
Read full article
Why Choose Accountable's HIPAA Training
Join thousands of organizations that trust Accountable to manage their compliance needs.
-
Fast and effective - Complete your training in minimal time
-
Engaging video content - No boring slides, just clear and practical lessons
-
Compliance-focused - Covers all key HIPAA regulations for privacy and security