Blog
Securing Microbiome Data in Healthcare: Privacy, Compliance, and Cybersecurity Best Practices
Practical microbiome data security guide: classify, encrypt, de-identify, enforce RBAC and audits...
HIPAA Compliance for Telesurgery: How to Protect Patient Data
Learn HIPAA compliance for telesurgery with actionable steps: map PHI risk, select compliant tech...
Exclusion and Sanction Screening: What It Is, Who to Screen, and How to Stay Compliant
Exclusion and sanction screening protects your organization from hiring, contracting with, or pay...
Breach of Doctor-Patient Confidentiality: What It Is, Examples, and What to Do Next
A breach of doctor-patient confidentiality occurs when Protected Health Information (PHI) is used...
Examples of ePHI: What Counts as Electronic Protected Health Information Under HIPAA
Under the Health Insurance Portability and Accountability Act, electronic protected health inform...
NY State Medicaid Sanctions: OMIG Exclusions, Penalties, and How to Check the List
Overview of OMIG Medicaid Exclusion List. What the list is and why it exists. The New York Stat...
How to Build a Healthcare Vendor Management Program (VMP): Steps, Compliance, and Best Practices
Building a robust healthcare Vendor Management Program (VMP) helps you safeguard Protected Health...
Dialysis Patient Data and HIPAA Compliance: Requirements, Safeguards, and Best Practices
HIPAA Privacy Rule Overview. Dialysis patient data qualifies as Protected Health Information (PH...
Paternity Testing Center Cybersecurity Checklist: Protect PHI, DNA Data, and Chain-of-Custody
Paternity testing centers hold uniquely sensitive assets: Protected Health Information (PHI), gen...
The History Behind HIPAA Legislation
The Health Insurance Portability and Accountability Act (HIPAA) is landmark legislation that tran...
HIPAA and Cell Phone Pictures: What’s Allowed, What Isn’t, and How to Stay Compliant
Mobile cameras can streamline clinical workflows, but they also create high-risk exposure for Pro...
Which PHI Disclosures Require Written Authorization Under HIPAA?
Psychotherapy Notes Disclosure Requirements. Under the HIPAA Privacy Rule, psychotherapy notes r...
Is Telling a Story About a Patient a HIPAA Violation? When It’s OK—and When It’s Not
Telling a patient story can be powerful for education and improvement, but it can also violate th...
What Does a HIPAA Designated Record Set Consist Of? Definition & Examples
Definition of Designated Record Set. A HIPAA designated record set (DRS) is the group of records...
Working from Home and maintaining HIPAA Compliance
Ensuring Security in Remote Environments. In the age of the COVID-19 pandemic, more and more empl...
Read full article
Why Choose Accountable's HIPAA Training
Join thousands of organizations that trust Accountable to manage their compliance needs.
-
Fast and effective - Complete your training in minimal time
-
Engaging video content - No boring slides, just clear and practical lessons
-
Compliance-focused - Covers all key HIPAA regulations for privacy and security