Church Health Ministries HIPAA Checklist: A Step-by-Step Compliance Guide

Product Pricing Demo Video Free HIPAA Training
LATEST
video thumbnail
Admin Dashboard Walkthrough Jake guides you step-by-step through the process of achieving HIPAA compliance
Ready to get started? Book a demo with our team
Talk to an expert

Church Health Ministries HIPAA Checklist: A Step-by-Step Compliance Guide

Kevin Henry

HIPAA

February 16, 2026

8 minutes read
Share this article
Church Health Ministries HIPAA Checklist: A Step-by-Step Compliance Guide

If your church operates a clinic, counseling program with licensed providers, screenings, or outreach that handles Protected Health Information (PHI), you need a practical way to manage HIPAA. This step-by-step Church Health Ministries HIPAA Checklist shows you how to assess applicability, build policies, train your team, secure communications, handle disclosures to clergy, and sustain Privacy Rule Compliance.

Work through each section in order. You will document decisions, adopt Security Rule Safeguards, execute Business Associate Agreements, and embed the Minimum Necessary Standard into daily practice.

HIPAA Applicability Assessment

Decide your status

Start by deciding whether your ministry is a covered entity, a business associate, a hybrid entity, or outside HIPAA. Your status drives every policy you implement and the scope of your Risk Assessment.

  • Covered entity: You provide health care and transmit standard electronic transactions (claims, eligibility, referrals, remittance) tied to insurance.
  • Business associate: You perform services for a covered entity (scheduling, data processing, EHR support, billing) that involve PHI.
  • Hybrid entity: Your church performs both covered and non‑covered functions; designate the health care component in writing.
  • Neither: If you do not conduct HIPAA transactions and are not a BA, HIPAA may not apply—but confidentiality and ethical duties still do.

Step-by-step checklist

  • Inventory all services (clinics, counseling, screenings, telehealth, care coordination, benefit enrollment).
  • Map PHI flows: intake forms, EHR, spreadsheets, email, texting, paper files, volunteer notes, prayer requests.
  • Identify payers and transactions; confirm any standard electronic transactions with vendors.
  • List vendors touching PHI; preliminarily flag who needs Business Associate Agreements.
  • Document a written determination of HIPAA status and review annually or upon service changes.

Privacy Policy Development

Build for Privacy Rule Compliance

Write clear policies that explain how you use and disclose PHI, apply the Minimum Necessary Standard, and honor individual rights. Tailor language to your ministry’s services and workforce (including volunteers).

  • Notice of Privacy Practices (NPP) for covered providers or health plans; provide and post as required.
  • Permitted uses/disclosures: treatment, payment, and health care operations; public health; required by law.
  • Authorizations: obtain written authorization for marketing, fundraising beyond limited data, public prayer lists, and disclosures not otherwise permitted.
  • Individual rights: access within required timelines, amendments, restrictions, confidential communications, and an accounting of disclosures.
  • Minimum Necessary Standard: define role‑based access and routine disclosure limits.
  • Retention: keep HIPAA-required documentation and NPP versions for at least six years from creation or last effective date.

Implementation steps

  • Draft policies/procedures aligned to operations; include forms and scripts for front-line staff.
  • Route for leadership and counsel review; finalize version control.
  • Distribute policies to workforce; capture acknowledgments.
  • Embed privacy checks into intake, referrals, and outreach workflows.

Staff Training Implementation

Design role-based training

Every workforce member—employees, clergy on duty, students, and volunteers—needs training appropriate to their role. Blend Privacy Rule, Security Rule, and breach response content with scenarios your team actually faces.

  • Onboarding: core concepts (PHI, permitted uses, Minimum Necessary Standard, incident reporting, sanctions).
  • Annual refreshers: updates, common pitfalls (social media, photography, texting, remote work).
  • Security awareness: phishing, password hygiene, multi-factor authentication, device safeguards.
  • Role-specific modules: front desk, counselors, clergy, IT, outreach teams, and finance.
  • Documentation: training dates, curricula, attendance, quizzes, and remediation plans.

Secure Communication Practices

Apply Security Rule Safeguards to every channel

Protect ePHI wherever it moves—email, texting, telehealth, EHR portals, and cloud storage. Your Risk Assessment should drive the controls you implement and verify.

  • Email and portals: use encryption; enable automatic TLS; route patients to secure portals for results and messaging.
  • Texting: approve a secure messaging app with audit trails; prohibit native SMS for PHI.
  • Phones and voicemail: verify identity; avoid detailed PHI on voicemail unless authorized; use callback procedures.
  • Access controls: unique IDs, least privilege, timeouts, mobile device management, and multi-factor authentication.
  • Data handling: lockable storage, clean desk, shredding, secure printing/scanning, and verified fax numbers.
  • Vendor management: ensure Business Associate Agreements with EHR, telehealth, cloud, email, texting, and billing vendors.
  • Backups and recovery: encrypt, test restores, and document business continuity and disaster recovery plans.

Health Information Disclosure to Clergy

Honor faith practice while safeguarding privacy

When your ministry is a covered entity, you may disclose limited information to clergy in specific circumstances—such as directory information and involvement in a person’s care—provided the individual is informed and given a chance to agree or object. For non‑workforce clergy, obtain authorization when a disclosure is not otherwise permitted.

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

  • Workforce clergy: grant access only when duties require it; apply the Minimum Necessary Standard.
  • Facility directory and involvement in care: if you maintain a directory, disclose limited info (e.g., location, general condition, religious affiliation) when the individual has not objected.
  • Prayer lists and public requests: obtain written authorization before sharing PHI beyond permitted directory details.
  • Documentation: record patient preferences and any restrictions; provide easy opt‑out and revocation processes.
  • External clergy or partner congregations: treat as third parties; require authorization unless another permitted disclosure applies.

Governance and Role Assignment

Establish accountability

Clear governance keeps compliance moving after launch. Assign leaders, define decision rights, and ensure board or senior pastor oversight of privacy and security risk.

  • Appoint a Privacy Officer and a Security Officer; publish their contact information internally.
  • For hybrid entities, formally designate the covered health care component and define firewalls to non‑covered functions.
  • Create a privacy and security committee to review incidents, audits, and Risk Assessment outcomes.
  • Define workforce roles, sanctions, and escalation paths; include volunteers and students.
  • Set reporting cadences to leadership and maintain meeting minutes.

Policies and Agreements Adoption

Execute the paperwork that makes controls real

Policies set expectations; agreements make them enforceable across vendors and partners. Keep an organized repository and track expirations and updates.

  • Business Associate Agreements with all vendors handling PHI (EHR, billing, cloud storage, messaging, IT support).
  • Notice of Privacy Practices, authorizations, consent forms, and confidential communication requests.
  • Access, amendment, and restriction procedures; identity verification scripts and forms.
  • Incident response and Breach Notification policy; sanctions and workforce confidentiality agreements.
  • Data retention and disposal policy; de-identification/re-identification procedures when applicable.

Safeguards and Documentation

Implement and prove your controls

Security Rule Safeguards span administrative, physical, and technical measures. Documentation demonstrates due diligence and supports investigations, audits, and leadership decisions.

  • Administrative: Risk Assessment, risk management plan, training logs, vendor due diligence, contingency planning.
  • Physical: facility access controls, visitor logs, workstation positioning, secure storage, device disposal.
  • Technical: encryption at rest and in transit, access controls, audit logs, integrity monitoring, and MFA.
  • Evidence: policy versions, screenshots of settings, device inventories, audit reports, and remediation tickets.
  • Retention: maintain required records for at least six years; schedule periodic documentation reviews.

Breach Notification Procedures

Respond quickly and consistently

Not every incident is a breach, but every incident deserves a documented review. Use a standardized decision tree rooted in HIPAA’s risk-of-compromise analysis and your state law overlay.

  • Contain and investigate: secure systems, preserve evidence, and interview involved staff.
  • Risk Assessment: evaluate PHI sensitivity, who received it, whether it was actually viewed/acquired, and mitigation steps.
  • Determine if breach: apply exceptions (e.g., unintentional, good-faith workforce error with no further disclosure).
  • Notify individuals without unreasonable delay and within required timelines; include content elements and remediation offers.
  • Regulatory reporting: report to HHS as required and, for large breaches, to prominent media; log smaller breaches and submit annually.
  • Business associates: require prompt incident notice and cooperation under your Business Associate Agreements.
  • After-action: update policies, training, and technical controls based on root cause.

Continuous Compliance Improvement

Make compliance part of ministry operations

Compliance is not a one-time project. Build rhythms that keep Privacy Rule Compliance strong as your services and technologies evolve.

  • Review and update your Risk Assessment annually or when services, vendors, or systems change.
  • Run tabletop exercises for incidents and Breach Notification; track metrics and lessons learned.
  • Audit access logs, minimum-necessary role designs, and user provisioning/deprovisioning.
  • Reassess vendors and Business Associate Agreements; verify ongoing Security Rule Safeguards.
  • Measure effectiveness: training completion, phishing resilience, incident frequency, and remediation cycle time.

Conclusion

By working this checklist—from applicability and policy drafting to training, secure communications, clergy disclosures, and ongoing oversight—you embed the Minimum Necessary Standard, strengthen Security Rule Safeguards, and prepare for decisive Breach Notification. The result is a church health ministry that protects PHI while serving congregants with excellence.

FAQs.

How do church health ministries determine if HIPAA applies?

Decide whether you are a covered entity (you deliver health care and use standard electronic transactions), a business associate (you support a covered entity and handle PHI), a hybrid entity (both covered and non‑covered functions), or outside HIPAA. Confirm transactions with vendors, map PHI flows, and document your determination; revisit it whenever services or technology change.

What are the key privacy policies required for compliance?

At minimum, adopt an NPP (if you are a covered provider or plan), permitted uses/disclosures, authorizations, Minimum Necessary Standard and role-based access, individual rights procedures (access, amendment, restrictions, confidential communications, accounting), vendor management with Business Associate Agreements, and incident response with Breach Notification. Keep all versions and related forms for at least six years.

How should staff be trained on HIPAA requirements?

Provide role-based onboarding and annual refreshers covering PHI handling, Privacy Rule basics, Security Rule awareness, Minimum Necessary, and incident reporting. Include realistic scenarios (texting, prayer requests, social media, remote work), document attendance and testing, and remediate knowledge gaps promptly.

What steps must be taken after a data breach?

Contain the incident, perform a documented Risk Assessment, decide if a breach occurred under HIPAA, and notify affected individuals without unreasonable delay within required timelines. Report to HHS (and media, when applicable), coordinate with business associates, offer mitigation where appropriate, and fix root causes through policy, training, and technical improvements.

Share this article

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Related Articles