Business Associate HIPAA Policies and Procedures Checklist: Build, Implement, Maintain
This practical checklist helps you build, implement, and maintain a compliant program as a business associate that creates, receives, maintains, or transmits Electronic Protected Health Information (ePHI). It aligns your efforts with the HIPAA Security Rule, the Breach Notification Rule, and proven risk management practices while staying focused on outcomes you can evidence during Compliance Audit Procedures.
Conduct Annual Risk Assessments
A formal risk analysis is the foundation of your HIPAA program. Use a Risk Management Framework to identify where ePHI lives, evaluate threats and vulnerabilities, estimate likelihood and impact, and prioritize remediation. Update the assessment at least annually and whenever major changes occur, such as onboarding a new system or vendor.
Checklist
- Map ePHI data flows across systems, users, vendors, and locations.
- Catalog assets handling ePHI (applications, databases, endpoints, cloud services).
- Assess threats/vulnerabilities and rate risks using a consistent methodology.
- Document a risk register with owners, treatments, and due dates.
- Approve residual risk and track exceptions with business justification.
- Trigger reassessment after incidents, architecture changes, or new regulations.
Outputs and Evidence
- Current risk analysis report and risk register.
- Remediation plan linked to budget and timelines.
- Executive sign-off on residual risks and priorities.
Develop HIPAA-Compliant Policies
Policies translate risks into rules people can follow. Build a coherent policy set that covers Administrative Safeguards, physical protections, and technical controls required by the HIPAA Security Rule, and includes procedures supporting the Breach Notification Rule.
Checklist
- Core policies: access control, minimum necessary, authentication/MFA, encryption, media/device, transmission security, and endpoint protection.
- Program policies: risk management, vendor management, sanctions, workforce security, and acceptable use.
- Operational procedures: incident response, breach assessment/notification, logging/monitoring, backup and disaster recovery, change management.
- Governance: policy ownership, version control, review cadence, and acknowledgement tracking.
- Plain-language summaries so staff can apply rules correctly day to day.
Outputs and Evidence
- Approved policies with effective dates, version history, and next-review dates.
- Staff acknowledgements and distribution records.
- Procedural runbooks aligned to each policy requirement.
Ensure Business Associate Agreement Compliance
Every relationship with a covered entity—and with your subcontractors handling ePHI—must be governed by a Business Associate Agreement (BAA). Your operations need to match what the BAA promises, including safeguards and breach reporting duties.
Checklist
- Verify BAAs define permitted uses/disclosures of PHI and require appropriate safeguards for ePHI.
- Include reporting of security incidents and breaches consistent with the Breach Notification Rule (e.g., without unreasonable delay and within agreed timelines).
- Flow down BAA obligations to subcontractors that create or handle PHI for you.
- Specify termination steps: return or secure destruction of PHI and confirmation of completion.
- Maintain a centralized BAA repository with owners, contacts, and key obligations.
- Align service commitments (SLAs) with security requirements and audit cooperation clauses.
Outputs and Evidence
- Executed BAAs for each covered entity and relevant subcontractor.
- Operational controls mapped to BAA requirements.
- Notification playbooks reflecting contract timelines and escalation paths.
Implement Security Safeguards
Translate policies into day-to-day controls protecting ePHI. Balance usability and risk reduction by prioritizing high-impact safeguards and monitoring their effectiveness continually.
Ready to simplify HIPAA compliance?
Join thousands of organizations that trust Accountable to manage their compliance needs.
Administrative Safeguards
- Role-based access, least privilege, and periodic access reviews.
- Workforce onboarding/offboarding with timely provisioning and deprovisioning.
- Vendor due diligence, ongoing monitoring, and contractual security requirements.
- Contingency planning: data backup, disaster recovery, and business continuity testing.
Technical and Physical Controls
- MFA for privileged and remote access; strong authentication for all users.
- Encryption for ePHI in transit and at rest; secure key management.
- Patch and vulnerability management with defined SLAs and exception handling.
- Endpoint protection, mobile device management, and secure configuration baselines.
- Audit logging, centralized monitoring, and alerting for anomalous activity.
- Facility access controls, visitor management, and device/media disposal procedures.
Outputs and Evidence
- Control matrix mapping safeguards to HIPAA Security Rule standards.
- System configurations, test results, and monitoring dashboards.
- Access review records and remediation tickets.
Provide HIPAA Training and Awareness
Training ensures your workforce knows how to protect ePHI and respond to issues. Deliver role-based content before access is granted and provide periodic refreshers thereafter.
Checklist
- Core topics: HIPAA Security Rule principles, minimum necessary, secure handling of ePHI, and incident reporting.
- Include the Breach Notification Rule basics so staff recognize and report potential breaches quickly.
- Role-specific modules for developers, support teams, and executives.
- Ongoing awareness: phishing simulations, micro-learnings, and policy updates.
- Maintain attendance, assessment scores, and acknowledgement records.
Outputs and Evidence
- Annual training plan, curricula, and materials.
- Completion and comprehension records tied to each user.
- Metrics and corrective actions for training gaps.
Establish Breach Notification Procedures
Prepare for the worst with a clear, rehearsed process. Define how you identify, triage, investigate, and contain incidents; perform a breach risk assessment; and notify covered entities in line with the Breach Notification Rule and your BAAs.
Checklist
- Incident response playbook with roles, call tree, and evidence preservation steps.
- Four-factor risk assessment procedure (nature/extent of PHI, unauthorized person, whether data was actually acquired/viewed, and mitigation).
- Decision criteria distinguishing a security incident from a breach.
- Notification workflow to covered entities: contents, timelines, and coordination.
- Root-cause analysis and corrective action planning after containment.
- Integration with legal, privacy, and communications for consistent messaging.
Outputs and Evidence
- Incident and breach logs with investigative artifacts and timelines.
- Completed risk assessments supporting breach determinations.
- Post-incident reports and tracked remediation tasks.
Maintain Documentation and Records
Good records prove good compliance. Maintain policies, analyses, training, incidents, and system artifacts in an organized repository. Retain required documentation for at least six years from creation or last effective date.
Checklist
- Central repository for policies, procedures, risk analyses, BAAs, and training records.
- Evidence binder: access reviews, audit logs, vulnerability scans, backup tests, and disaster recovery exercises.
- Change management tickets and configuration baselines for systems touching ePHI.
- Internal Compliance Audit Procedures: planned audits, sampling, and management responses.
- Versioning and retention controls with periodic integrity checks.
Outputs and Evidence
- Documentation index with owners and review dates.
- Audit reports, findings, and remediation validation.
- Retention schedule and proof of secure disposal when applicable.
Conclusion
By assessing risk, formalizing policies, honoring every Business Associate Agreement, enforcing safeguards, educating your workforce, executing breach procedures, and preserving evidence, you build a durable HIPAA program. Treat this checklist as a living system that adapts as your environment and risks evolve.
FAQs.
What are the key components of HIPAA policies for business associates?
Effective policies cover Administrative Safeguards, technical and physical controls for ePHI, incident response and breach notification, vendor oversight, access management, contingency planning, workforce training, sanctions, and documentation practices aligned to the HIPAA Security Rule and the Breach Notification Rule.
How often should HIPAA policies and procedures be reviewed?
Review at least annually and whenever material changes occur—new systems handling ePHI, organizational changes, incidents, or updated contractual obligations. Tie reviews to your Risk Management Framework and document approvals, updates, and staff acknowledgements.
What is required in a business associate agreement under HIPAA?
A BAA must define permitted uses/disclosures of PHI, require appropriate safeguards for ePHI, mandate reporting of security incidents and breaches, flow down obligations to subcontractors, address access by regulators, and specify termination steps for returning or destroying PHI, along with cooperation during investigations or audits.
How should a business associate respond to a data breach?
Immediately contain the incident, preserve evidence, and investigate. Perform the four-factor risk assessment, determine if a breach occurred, and notify the covered entity without unreasonable delay in accordance with the Breach Notification Rule and your BAA. Execute corrective actions, document everything, and update controls and training to prevent recurrence.
Ready to simplify HIPAA compliance?
Join thousands of organizations that trust Accountable to manage their compliance needs.