42 U.S.C. HITECH Act Checklist: Safeguards, Risk Analysis, and Reporting

Check out the new compliance progress tracker


Product Pricing Demo Video Free HIPAA Training
LATEST
video thumbnail
Admin Dashboard Walkthrough Jake guides you step-by-step through the process of achieving HIPAA compliance
Ready to get started? Book a demo with our team
Talk to an expert

42 U.S.C. HITECH Act Checklist: Safeguards, Risk Analysis, and Reporting

Kevin Henry

HIPAA

July 21, 2024

8 minutes read
Share this article
42 U.S.C. HITECH Act Checklist: Safeguards, Risk Analysis, and Reporting

The 42 U.S.C. HITECH Act strengthens HIPAA Security Rule compliance by sharpening expectations for how you protect electronic protected health information (ePHI), evaluate risks, and meet breach notification requirements. This checklist guides covered entities and business associates through core safeguards, risk analysis steps, risk management strategies, and Department of Health and Human Services reporting.

Use these sections to validate your program, close gaps, and improve security incident documentation. Each area maps to practical actions you can assign, track, and audit across your organization and vendors.

Implementing Administrative Safeguards

Governance and accountability

Start with clear ownership. Appoint a security official with authority to make decisions, approve budgets, and enforce policies across clinical, IT, and vendor teams. Embed HIPAA Security Rule compliance into leadership reviews and performance goals.

  • Designate a security and privacy leadership team with defined charters.
  • Publish security and privacy policies; review and approve them at least annually.
  • Execute and maintain Business Associate Agreements (BAAs) that assign responsibilities for ePHI protection.
  • Define an incident response plan that spells out roles, escalation paths, and documentation requirements.
  • Establish sanctions for workforce violations and a process to track corrective actions.

Workforce, vendors, and documentation

Train your workforce to handle ePHI correctly and recognize threats. Vet vendors early, then monitor them with risk-based reviews tied to contract terms and SLAs. Keep records to show what you did and why.

  • Provide role-based training at hire and at least annually; include phishing, secure use of devices, and reporting obligations.
  • Run background checks and maintain least-privilege access approvals.
  • Perform vendor due diligence, including security questionnaires and evidence reviews.
  • Document policy exceptions, risk decisions, and incident investigations for audit readiness.
  • Test and document contingency plans for downtime, backups, and disaster recovery.

Applying Physical Safeguards

Facilities and access control

Limit physical access to locations where ePHI is stored or processed. Your objective is to prevent unauthorized entry while ensuring availability during emergencies.

  • Use badges, visitor logs, cameras, and locked rooms or cages for critical systems.
  • Maintain facility maintenance records and escort procedures for vendors and technicians.
  • Define emergency access procedures and test them during drills.

Workstations, devices, and media

Protect endpoints and removable media from loss, theft, or improper reuse. Standardize configuration baselines and sanitization methods across the enterprise.

  • Position screens to reduce shoulder surfing; enforce automatic screen lockouts.
  • Apply mobile device management, full-disk encryption, and remote wipe.
  • Keep an asset inventory; track chain of custody for devices handling ePHI.
  • Sanitize or destroy media before reuse or disposal; document the process.

Enforcing Technical Safeguards

Access control and authentication

Grant the least access necessary and prove each person is who they claim to be. Unique IDs and strong authentication reduce misuse and speed investigations.

  • Use unique user IDs, multi-factor authentication, and emergency break-glass access with monitoring.
  • Enforce automatic logoff on endpoints and applications that access ePHI.
  • Apply role-based access control and periodic access reviews for privileged accounts.

Encryption, transmission, and integrity

Protect ePHI wherever it moves or rests. Make encryption and integrity controls standard so data cannot be read or altered if intercepted or stolen.

  • Encrypt ePHI in transit (e.g., TLS/VPN) and at rest on servers, databases, and backups.
  • Use integrity controls (e.g., hashing, digital signatures, file integrity monitoring) for critical repositories.
  • Implement email and data loss prevention rules for ePHI, including automatic encryption based on content triggers.

Audit controls and monitoring

Comprehensive logging powers your security incident documentation. Centralize logs, correlate events, and alert on suspicious access patterns.

  • Capture application, database, system, and network logs tied to unique user IDs.
  • Retain logs for a defined period and protect them from tampering.
  • Use alerting and case management to track investigation steps and outcomes.

Conducting Risk Analysis

Scope and inventory

Cover all systems, locations, and processes that create, receive, maintain, or transmit ePHI, including cloud services and mobile apps. Map data flows end to end.

  • Inventory assets and repositories that store or process ePHI.
  • Identify users, vendors, interfaces, and third-party connections.
  • Catalog regulatory, contractual, and organizational obligations that affect risk.

Method and evaluation

Assess threats and vulnerabilities, then rate likelihood and impact for each reasonably anticipated risk. Explain the basis for each rating so decisions are defensible.

  • Identify threats (human, environmental, technical) and specific vulnerabilities.
  • Evaluate inherent risk, existing controls, and residual risk after controls.
  • Document assumptions, evidence, and compensating controls.

Deliverables and maintenance

Produce a risk register with prioritized issues and owners. Risk analysis is not one-and-done; update it when environments, technologies, or threats change.

Ready to assess your HIPAA security risks?

Join thousands of organizations that use Accountable to identify and fix their security gaps.

Take the Free Risk Assessment
  • Create a remediation roadmap with timelines and budget estimates.
  • Review at least annually and after major system or vendor changes.
  • Store all artifacts to support audits and leadership decisions.

Managing Risk Mitigation Strategies

Prioritization and treatment

Address the highest residual risks first. Choose treatment options aligned to business needs: avoid, mitigate, transfer, or accept, with explicit approval where applicable.

  • Define acceptance criteria and escalation for high-risk findings.
  • Track actions in a plan of action and milestones (POA&M) with named owners.
  • Integrate remediation milestones into project and budget planning.

Execution and continuous improvement

Make improvements measurable. Tie controls to outcomes such as reduced incident rates, faster detection, and fewer policy exceptions.

  • Implement patching, configuration baselines, segmentation, and backup resilience testing.
  • Strengthen vendor oversight with security metrics and attestation schedules.
  • Publish dashboards that show progress against risk management strategies.

Establishing Breach Notification Procedures

Detection and assessment

Define how you detect, triage, and investigate potential breaches. Apply a consistent assessment to decide whether there is a low probability that ePHI has been compromised.

  • Use a documented decision tree and require peer or legal review for close calls.
  • Preserve evidence and maintain a complete incident timeline for audit purposes.

Individuals, media, and Department of Health and Human Services reporting

Notify affected individuals without unreasonable delay and no later than 60 days after discovery. For incidents affecting 500 or more individuals in a state or jurisdiction, notify prominent media and report to HHS within the same 60-day outer limit.

  • For breaches affecting fewer than 500 individuals, log them and submit the annual report to HHS within the required timeline.
  • Ensure notices describe what happened, types of ePHI involved, steps individuals should take, actions you are taking, and contact information.
  • If law enforcement requests a delay, document the request and pause notifications as permitted.

Security incident documentation

Maintain a complete record for every incident, regardless of notification outcome. Strong documentation proves diligence and supports learning across teams.

  • Record the facts, risk assessment factors, decisions, and notification details.
  • Retain incident and policy records for the required period and align with your records management schedule.
  • Capture post-incident lessons and track improvements to closure.

Utilizing Security Risk Assessment Tools

Tool categories and capabilities

Leverage tools to accelerate analysis and evidence collection, but pair them with expert judgment. Combine questionnaires, automated scans, and reporting to create a defensible record.

  • Use structured SRA questionnaires to cover administrative, physical, and technical safeguards.
  • Run vulnerability and configuration scans across servers, endpoints, and cloud services.
  • Adopt ticketing or GRC systems to track risks, owners, and due dates.

Effective use and limitations

Tools surface issues; your program resolves them. Calibrate scoring to your environment, validate results, and link findings directly to remediation tasks.

  • Tailor control mappings to your policies and BAAs with covered entities and business associates.
  • Store outputs as part of your security incident documentation and audit trail.
  • Schedule periodic reassessments to reflect system changes, threats, and lessons learned.

Conclusion

This HITECH Act checklist helps you operationalize HIPAA Security Rule compliance by implementing safeguards, performing thorough risk analysis, executing risk management strategies, and meeting breach notification requirements, including Department of Health and Human Services reporting. Consistent documentation and continuous improvement keep ePHI protected and your program audit-ready.

FAQs

What are the key safeguards required under the HITECH Act?

You must implement administrative, physical, and technical safeguards that protect ePHI. In practice, that means governance and workforce controls, facility and device protections, and access, encryption, logging, and monitoring measures that together reduce risk to a reasonable and appropriate level.

How often must a risk analysis be conducted?

Conduct risk analysis regularly and update it whenever technology, vendors, locations, or processes change. Many organizations perform a comprehensive assessment at least annually, then run targeted reassessments after significant changes or notable incidents.

Who must report a data breach under the HITECH Act?

Covered entities are responsible for notifying affected individuals and reporting to HHS as required. Business associates must notify the covered entity without unreasonable delay and provide the information needed to complete notifications and regulatory reporting.

What tools are available for compliance with HITECH Act requirements?

Security risk assessment questionnaires, vulnerability and configuration scanners, endpoint and cloud security platforms, and governance/risk/compliance systems help identify issues, collect evidence, and track remediation. Use tools to inform decisions, not replace expert analysis or documented risk acceptance.

Share this article

Ready to assess your HIPAA security risks?

Join thousands of organizations that use Accountable to identify and fix their security gaps.

Take the Free Risk Assessment

Related Articles