42 U.S.C. HITECH Act Checklist: Safeguards, Risk Analysis, and Reporting
The 42 U.S.C. HITECH Act strengthens HIPAA Security Rule compliance by sharpening expectations for how you protect electronic protected health information (ePHI), evaluate risks, and meet breach notification requirements. This checklist guides covered entities and business associates through core safeguards, risk analysis steps, risk management strategies, and Department of Health and Human Services reporting.
Use these sections to validate your program, close gaps, and improve security incident documentation. Each area maps to practical actions you can assign, track, and audit across your organization and vendors.
Implementing Administrative Safeguards
Governance and accountability
Start with clear ownership. Appoint a security official with authority to make decisions, approve budgets, and enforce policies across clinical, IT, and vendor teams. Embed HIPAA Security Rule compliance into leadership reviews and performance goals.
- Designate a security and privacy leadership team with defined charters.
- Publish security and privacy policies; review and approve them at least annually.
- Execute and maintain Business Associate Agreements (BAAs) that assign responsibilities for ePHI protection.
- Define an incident response plan that spells out roles, escalation paths, and documentation requirements.
- Establish sanctions for workforce violations and a process to track corrective actions.
Workforce, vendors, and documentation
Train your workforce to handle ePHI correctly and recognize threats. Vet vendors early, then monitor them with risk-based reviews tied to contract terms and SLAs. Keep records to show what you did and why.
- Provide role-based training at hire and at least annually; include phishing, secure use of devices, and reporting obligations.
- Run background checks and maintain least-privilege access approvals.
- Perform vendor due diligence, including security questionnaires and evidence reviews.
- Document policy exceptions, risk decisions, and incident investigations for audit readiness.
- Test and document contingency plans for downtime, backups, and disaster recovery.
Applying Physical Safeguards
Facilities and access control
Limit physical access to locations where ePHI is stored or processed. Your objective is to prevent unauthorized entry while ensuring availability during emergencies.
- Use badges, visitor logs, cameras, and locked rooms or cages for critical systems.
- Maintain facility maintenance records and escort procedures for vendors and technicians.
- Define emergency access procedures and test them during drills.
Workstations, devices, and media
Protect endpoints and removable media from loss, theft, or improper reuse. Standardize configuration baselines and sanitization methods across the enterprise.
- Position screens to reduce shoulder surfing; enforce automatic screen lockouts.
- Apply mobile device management, full-disk encryption, and remote wipe.
- Keep an asset inventory; track chain of custody for devices handling ePHI.
- Sanitize or destroy media before reuse or disposal; document the process.
Enforcing Technical Safeguards
Access control and authentication
Grant the least access necessary and prove each person is who they claim to be. Unique IDs and strong authentication reduce misuse and speed investigations.
- Use unique user IDs, multi-factor authentication, and emergency break-glass access with monitoring.
- Enforce automatic logoff on endpoints and applications that access ePHI.
- Apply role-based access control and periodic access reviews for privileged accounts.
Encryption, transmission, and integrity
Protect ePHI wherever it moves or rests. Make encryption and integrity controls standard so data cannot be read or altered if intercepted or stolen.
- Encrypt ePHI in transit (e.g., TLS/VPN) and at rest on servers, databases, and backups.
- Use integrity controls (e.g., hashing, digital signatures, file integrity monitoring) for critical repositories.
- Implement email and data loss prevention rules for ePHI, including automatic encryption based on content triggers.
Audit controls and monitoring
Comprehensive logging powers your security incident documentation. Centralize logs, correlate events, and alert on suspicious access patterns.
- Capture application, database, system, and network logs tied to unique user IDs.
- Retain logs for a defined period and protect them from tampering.
- Use alerting and case management to track investigation steps and outcomes.
Conducting Risk Analysis
Scope and inventory
Cover all systems, locations, and processes that create, receive, maintain, or transmit ePHI, including cloud services and mobile apps. Map data flows end to end.
- Inventory assets and repositories that store or process ePHI.
- Identify users, vendors, interfaces, and third-party connections.
- Catalog regulatory, contractual, and organizational obligations that affect risk.
Method and evaluation
Assess threats and vulnerabilities, then rate likelihood and impact for each reasonably anticipated risk. Explain the basis for each rating so decisions are defensible.
- Identify threats (human, environmental, technical) and specific vulnerabilities.
- Evaluate inherent risk, existing controls, and residual risk after controls.
- Document assumptions, evidence, and compensating controls.
Deliverables and maintenance
Produce a risk register with prioritized issues and owners. Risk analysis is not one-and-done; update it when environments, technologies, or threats change.
Ready to assess your HIPAA security risks?
Join thousands of organizations that use Accountable to identify and fix their security gaps.
Take the Free Risk Assessment- Create a remediation roadmap with timelines and budget estimates.
- Review at least annually and after major system or vendor changes.
- Store all artifacts to support audits and leadership decisions.
Managing Risk Mitigation Strategies
Prioritization and treatment
Address the highest residual risks first. Choose treatment options aligned to business needs: avoid, mitigate, transfer, or accept, with explicit approval where applicable.
- Define acceptance criteria and escalation for high-risk findings.
- Track actions in a plan of action and milestones (POA&M) with named owners.
- Integrate remediation milestones into project and budget planning.
Execution and continuous improvement
Make improvements measurable. Tie controls to outcomes such as reduced incident rates, faster detection, and fewer policy exceptions.
- Implement patching, configuration baselines, segmentation, and backup resilience testing.
- Strengthen vendor oversight with security metrics and attestation schedules.
- Publish dashboards that show progress against risk management strategies.
Establishing Breach Notification Procedures
Detection and assessment
Define how you detect, triage, and investigate potential breaches. Apply a consistent assessment to decide whether there is a low probability that ePHI has been compromised.
- Use a documented decision tree and require peer or legal review for close calls.
- Preserve evidence and maintain a complete incident timeline for audit purposes.
Individuals, media, and Department of Health and Human Services reporting
Notify affected individuals without unreasonable delay and no later than 60 days after discovery. For incidents affecting 500 or more individuals in a state or jurisdiction, notify prominent media and report to HHS within the same 60-day outer limit.
- For breaches affecting fewer than 500 individuals, log them and submit the annual report to HHS within the required timeline.
- Ensure notices describe what happened, types of ePHI involved, steps individuals should take, actions you are taking, and contact information.
- If law enforcement requests a delay, document the request and pause notifications as permitted.
Security incident documentation
Maintain a complete record for every incident, regardless of notification outcome. Strong documentation proves diligence and supports learning across teams.
- Record the facts, risk assessment factors, decisions, and notification details.
- Retain incident and policy records for the required period and align with your records management schedule.
- Capture post-incident lessons and track improvements to closure.
Utilizing Security Risk Assessment Tools
Tool categories and capabilities
Leverage tools to accelerate analysis and evidence collection, but pair them with expert judgment. Combine questionnaires, automated scans, and reporting to create a defensible record.
- Use structured SRA questionnaires to cover administrative, physical, and technical safeguards.
- Run vulnerability and configuration scans across servers, endpoints, and cloud services.
- Adopt ticketing or GRC systems to track risks, owners, and due dates.
Effective use and limitations
Tools surface issues; your program resolves them. Calibrate scoring to your environment, validate results, and link findings directly to remediation tasks.
- Tailor control mappings to your policies and BAAs with covered entities and business associates.
- Store outputs as part of your security incident documentation and audit trail.
- Schedule periodic reassessments to reflect system changes, threats, and lessons learned.
Conclusion
This HITECH Act checklist helps you operationalize HIPAA Security Rule compliance by implementing safeguards, performing thorough risk analysis, executing risk management strategies, and meeting breach notification requirements, including Department of Health and Human Services reporting. Consistent documentation and continuous improvement keep ePHI protected and your program audit-ready.
FAQs
What are the key safeguards required under the HITECH Act?
You must implement administrative, physical, and technical safeguards that protect ePHI. In practice, that means governance and workforce controls, facility and device protections, and access, encryption, logging, and monitoring measures that together reduce risk to a reasonable and appropriate level.
How often must a risk analysis be conducted?
Conduct risk analysis regularly and update it whenever technology, vendors, locations, or processes change. Many organizations perform a comprehensive assessment at least annually, then run targeted reassessments after significant changes or notable incidents.
Who must report a data breach under the HITECH Act?
Covered entities are responsible for notifying affected individuals and reporting to HHS as required. Business associates must notify the covered entity without unreasonable delay and provide the information needed to complete notifications and regulatory reporting.
What tools are available for compliance with HITECH Act requirements?
Security risk assessment questionnaires, vulnerability and configuration scanners, endpoint and cloud security platforms, and governance/risk/compliance systems help identify issues, collect evidence, and track remediation. Use tools to inform decisions, not replace expert analysis or documented risk acceptance.
Ready to assess your HIPAA security risks?
Join thousands of organizations that use Accountable to identify and fix their security gaps.
Take the Free Risk Assessment