Blog
HIPAA Compliance for Connected Medical Devices: Requirements and Best Practices
Learn how to achieve HIPAA compliance for connected medical devices: map PHI, run SRAs, enforce e...
Hospice Employee Security Training: HIPAA Security Rule & Cybersecurity Awareness Course
Start HIPAA Security Rule training for hospice teams to protect PHI, stop breaches, and meet comp...
HIPAA Privacy Audit Checklist: Step-by-Step Guide to Privacy Rule Compliance
Designate a HIPAA Privacy Officer. Your HIPAA Privacy Audit Checklist starts with leadership. De...
HIPAA Vulnerability Scanning in Florida: Ensure Compliance and Protect ePHI
Florida healthcare organizations and their business associates handle large volumes of electronic...
What Counts as a HIPAA Penetration Test? Requirements, Scope, and Proof of Compliance
HIPAA Penetration Testing Definition. A HIPAA penetration test is a goal-driven, time-bound form...
HIPAA Web Application Penetration Testing: Secure PHI and Achieve Compliance
Web applications now handle the majority of Protected Health Information (PHI)—from patient porta...
OIG Exclusion Screening for Skilled Nursing Facilities: Requirements, Frequency, and Best Practices
OIG exclusion screening for skilled nursing facilities is a core safeguard for Medicare and Medic...
Pharmacy School HIPAA Requirements: What Students Need to Know
HIPAA Training Requirement. Pharmacy school HIPAA requirements ensure you can safely handle Prot...
HIPAA Requirements for Dermatologists: What Your Practice Needs to Stay Compliant
HIPAA Compliance for Dermatologists. Dermatology practices handle a high volume of images, lab r...
Common HIPAA Compliance Misconceptions (and the Facts You Need to Know)
HIPAA Applicability and Coverage. One of the most common HIPAA compliance misconceptions is that...
How Occupational Therapists Can Avoid HIPAA Violations: Practical Tips and a Compliance Checklist
Protecting patient privacy is central to your role as an occupational therapist. HIPAA sets speci...
Best Practices for Patient Privacy in Geriatric Medicine
Patient Privacy Principles. Protecting privacy in geriatric medicine begins with honoring patien...
PHI in Mobile Apps: HIPAA Compliance and Security Best Practices
Data Encryption Techniques. Protecting PHI in mobile apps starts with strong, well-implemented c...
Amazing Charts BAA: How to Request a Business Associate Agreement and What It Includes
Contact Amazing Charts Support. Start your Business Associate Agreement request by reaching out ...
Working from Home and maintaining HIPAA Compliance
Ensuring Security in Remote Environments. In the age of the COVID-19 pandemic, more and more empl...
Read full article
Why Choose Accountable's HIPAA Training
Join thousands of organizations that trust Accountable to manage their compliance needs.
-
Fast and effective - Complete your training in minimal time
-
Engaging video content - No boring slides, just clear and practical lessons
-
Compliance-focused - Covers all key HIPAA regulations for privacy and security