Blog
Hospice Vulnerability Management: Best Practices to Protect PHI and Meet HIPAA
Secure hospice PHI with HIPAA vulnerability management: training, risk assessments, vendor BAAs, ...
MOLST Form and HIPAA: What You Need to Know About Privacy, Access, and Sharing
Learn how a MOLST form interacts with HIPAA, who can access it, and how to protect confidentialit...
PHI and Minimum Necessary: Two Common HIPAA Privacy Rule Terms, Examples and Best Practices
Protected Health Information Overview. What counts as PHI. Protected Health Information (PHI) i...
What Is GRC and Why Does It Matter?
In today’s fast-paced business world, organizations face constant challenges from mounting regula...
HIPAA Privacy Rule Basics: PHI and Business Associates, Definitions and Requirements
The HIPAA Privacy Rule sets national standards for how Protected Health Information (PHI) is used...
HIPAA Privacy Rule Compliance: The 5 Violations We See Most
Across compliance assessments, the same pitfalls derail HIPAA Privacy Rule compliance. Knowing wh...
HIPAA Privacy Requirements for Oral PHI: Best Practices, Risks, and Examples
Protecting patient privacy is not limited to electronic records and paper files. HIPAA Privacy Re...
Two Essential HIPAA Privacy Rule Terms: PHI and Covered Entities Explained
The HIPAA Privacy Rule revolves around two pillars: Protected Health Information (PHI) and covere...
HIPAA Oral Disclosures Explained: Practical Guidelines, Sample Language, and Incident Prevention
HIPAA Privacy Rule Applicability. HIPAA allows oral disclosures of protected health information ...
HIPAA Privacy Rule and Oral Communications: Requirements, Examples, and Safeguards
The HIPAA Privacy Rule protects Protected Health Information in every form—electronic, paper, and...
Oral Communications Under HIPAA: What’s Permitted, Minimum Necessary, and Compliance
HIPAA Coverage of Oral Communications. HIPAA protects oral exchanges that include Protected Heal...
How to Handle Oral PHI Under the HIPAA Privacy Rule
Knowing how to handle oral PHI under the HIPAA Privacy Rule helps you protect patient privacy whi...
Top 5 Most Common HIPAA Privacy Rule Violations, Explained
The HIPAA Privacy Rule exists to protect the confidentiality of Protected Health Information (PHI...
Avoid These Five Common HIPAA Privacy Rule Violations: Compliance Checklist
The HIPAA Privacy Rule sets national standards for how you use, disclose, and safeguard Protected...
Working from Home and maintaining HIPAA Compliance
Ensuring Security in Remote Environments. In the age of the COVID-19 pandemic, more and more empl...
Read full article
Why Choose Accountable's HIPAA Training
Join thousands of organizations that trust Accountable to manage their compliance needs.
-
Fast and effective - Complete your training in minimal time
-
Engaging video content - No boring slides, just clear and practical lessons
-
Compliance-focused - Covers all key HIPAA regulations for privacy and security