Blog
HIPAA Audit Preparation for Clinical Laboratories: Checklist and Best Practices
HIPAA audit preparation: practical steps to secure ePHI, validate controls, compile audit-ready e...
Revenue Cycle Director HIPAA Compliance Duties: Key Responsibilities and Best Practices
Protect patients and revenue: revenue cycle director HIPAA compliance guide to map PHI, enforce c...
What Does a HIPAA Designated Record Set Consist Of? Definition & Examples
Definition of Designated Record Set. A HIPAA designated record set (DRS) is the group of records...
How to Secure Mobile Devices in Healthcare: HIPAA-Compliant Best Practices and MDM Strategies
Mobile Device Management in Healthcare. Mobile devices accelerate care, but they also expand you...
HIPAA Text Messaging Policy: Requirements, Compliance Checklist & Sample Language
Texting can accelerate care coordination, but it must be done within a HIPAA-compliant framework....
Parents Denied Access to a Child’s Medical Records? Your Rights and Next Steps
Understanding Parental Rights Under HIPAA. If you are a parent or legal guardian, the Health Ins...
HITRUST Certification Requirements for Mental Health Software: Scope, Controls, and Steps to Get Certified
HITRUST certification gives mental health software providers a rigorous, repeatable way to protec...
HIPAA Security Rule: How It Addresses Covered Entities' Infrastructure
General Requirements for ePHI Security. The HIPAA Security Rule sets a risk-based framework for ...
Can You Go to Jail for Violating HIPAA? When It Leads to Criminal Charges and Penalties
Overview of HIPAA Violations. HIPAA protects the privacy and security of Protected Health Inform...
ASC X12 Version 5010: What It Is, Requirements, and Key HIPAA EDI Transactions
Overview of ASC X12 Version 5010. ASC X12 Version 5010 is the HIPAA-adopted standard for exchang...
California Medical Records Law: Access, Privacy, and Your Rights Under CMIA and HIPAA
Confidentiality of Medical Information Act Protections. California’s Confidentiality of Medical ...
Healthcare Vendor Risk: What It Is, Why It Matters, and How to Manage It
Definition of Healthcare Vendor Risk. What it is. Healthcare vendor risk is the exposure your o...
HIPAA SRA Tool: Complete Your Security Risk Assessment—Steps, Templates, and Checklist
Overview of HIPAA Security Risk Assessment Tool. The HIPAA SRA Tool helps you perform a structur...
What Does "Electronically Protected" Mean? Definition, HIPAA, and Examples
Definition of ePHI. Electronically protected health information (ePHI) is Individually Identifia...
Working from Home and maintaining HIPAA Compliance
Ensuring Security in Remote Environments. In the age of the COVID-19 pandemic, more and more empl...
Read full article
Why Choose Accountable's HIPAA Training
Join thousands of organizations that trust Accountable to manage their compliance needs.
-
Fast and effective - Complete your training in minimal time
-
Engaging video content - No boring slides, just clear and practical lessons
-
Compliance-focused - Covers all key HIPAA regulations for privacy and security