Blog
Hospice Vulnerability Management: Best Practices to Protect PHI and Meet HIPAA
Secure hospice PHI with HIPAA vulnerability management: training, risk assessments, vendor BAAs, ...
MOLST Form and HIPAA: What You Need to Know About Privacy, Access, and Sharing
Learn how a MOLST form interacts with HIPAA, who can access it, and how to protect confidentialit...
Ensuring Tuberculosis Patient Portal Security: HIPAA Compliance, Encryption, and Access Controls
Protecting electronic protected health information in a tuberculosis (TB) patient portal is non‑n...
Dental Implant Consent and HIPAA Compliance: What You Need to Know
HIPAA Privacy Rule Overview. The HIPAA Privacy Rule sets national standards for how covered enti...
Patient Portal Security: Best Practices to Protect PHI and Ensure HIPAA Compliance
Patient portal security is the front line for safeguarding Electronic Protected Health Informatio...
Is Patient Satisfaction Data HIPAA-Protected? What Counts as PHI and How to Protect It
Patient Satisfaction Data and HIPAA. When patient satisfaction data is HIPAA-protected. Patient...
Getting Started with HIPAA: What It Is, Key Requirements, and How to Comply
Understanding HIPAA Overview. HIPAA, the Health Insurance Portability and Accountability Act, se...
HIPAA Compliance for Foreign Medical Graduates (IMGs): What You Need to Know for U.S. Clinical Training and Practice
If you are an international medical graduate (IMG) entering U.S. clinical environments, HIPAA com...
Oncology Practice Cybersecurity Checklist: Essential Steps to Protect PHI and Stay HIPAA-Compliant
Oncology practices handle high-value clinical data across EHRs, imaging systems, genomics, and tr...
How to Implement Zero Trust Network Access (ZTNA) in Healthcare: Architecture, Best Practices, and HIPAA Compliance
Implementing Zero Trust Network Access (ZTNA) in healthcare replaces implicit trust with continuo...
End of Year HIPAA Compliance Checklist: Essential Tasks to Complete Before December 31
Use this end of year HIPAA compliance checklist to close gaps before December 31. Each task below...
HIPAA Considerations for Crohn’s Disease Support Groups: What Organizers and Members Need to Know
Crohn’s disease communities thrive on trust. This guide explains how HIPAA intersects with suppor...
Diabetes Clinical Trial Data Protection: HIPAA/GDPR Compliance and Security Best Practices
Protecting participant data in diabetes clinical trials demands a security program that satisfies...
eClinicalWorks Business Associate Agreement (BAA): How to Get It and What It Covers
BAA Availability. The eClinicalWorks Business Associate Agreement is the Legal Binding Agreement...
Working from Home and maintaining HIPAA Compliance
Ensuring Security in Remote Environments. In the age of the COVID-19 pandemic, more and more empl...
Read full article
Why Choose Accountable's HIPAA Training
Join thousands of organizations that trust Accountable to manage their compliance needs.
-
Fast and effective - Complete your training in minimal time
-
Engaging video content - No boring slides, just clear and practical lessons
-
Compliance-focused - Covers all key HIPAA regulations for privacy and security