Blog
Medical Office Physical Security: Best Practices and HIPAA Compliance Checklist
Strengthen ePHI protection and meet HIPAA: practical steps to harden facilities, secure workstati...
Employee Training Best Practices for Telehealth Companies: Onboarding, Compliance, and Virtual Care Quality
Design and deliver role based telehealth training that accelerates onboarding, ensures HIPAA comp...
Kaiser HIPAA Authorization Form: Access or Share Your Medical Records
Purpose of HIPAA Authorization. The Kaiser HIPAA Authorization Form—often titled Authorization f...
What Is PHI Under HIPAA? Protected Health Information, Examples, and Compliance Basics
Definition of PHI under HIPAA. Under the HIPAA Privacy Rule, Protected Health Information (PHI) ...
Data Breach Response Plan: Key Elements
In today's digital age, having a solid data breach response plan is not just a security best prac...
New HIPAA Security Rule: Key Changes, Deadlines, and Compliance Steps
Mandatory Implementation Specifications. Core access and encryption controls. The new HIPAA Sec...
How to Mail Medical Records to a Patient: A HIPAA-Compliant Guide
Mailing medical records to a patient is permissible under HIPAA when you apply reasonable safegua...
HIPAA-Compliant Text Messaging App for Secure Patient Communication
Overview of HIPAA Compliance in Text Messaging. A HIPAA-compliant text messaging app enables you...
Google Workspace HIPAA Compliance: BAA Requirements and Setup Guide
Sign a Business Associate Agreement. Why the BAA matters. A Business Associate Agreement is the...
Is DocuSign HIPAA Compliant? Requirements, BAA, and Best Practices
HIPAA Compliance Overview. HIPAA sets national standards for safeguarding Protected Health Infor...
Information Blocking and HIPAA Explained: Rules, Exceptions, and How to Stay Compliant
Information Blocking Definition. The Information Blocking Rule prohibits practices by certain “a...
HIPAA Firewall Requirements Explained: What the Security Rule Expects and How to Meet Them
Technical Safeguards in HIPAA Security Rule. The HIPAA Security Rule is technology-neutral and r...
Adobe HIPAA Compliance: Which Services Are Covered and How to Get a BAA
Adobe HIPAA-Ready Services Overview. What “HIPAA-ready” means. Adobe uses “HIPAA-ready” to desc...
Is Fax HIPAA Compliant? What You Need to Know to Send PHI Safely
Faxing can be HIPAA compliant when you apply the right administrative, technical, and physical sa...
Working from Home and maintaining HIPAA Compliance
Ensuring Security in Remote Environments. In the age of the COVID-19 pandemic, more and more empl...
Read full article
Why Choose Accountable's HIPAA Training
Join thousands of organizations that trust Accountable to manage their compliance needs.
-
Fast and effective - Complete your training in minimal time
-
Engaging video content - No boring slides, just clear and practical lessons
-
Compliance-focused - Covers all key HIPAA regulations for privacy and security