Compliance Checklist for HIPAA Covered Entities Performing Multiple Functions

Check out the new compliance progress tracker


Product Pricing Demo Video Free HIPAA Training
LATEST
video thumbnail
Admin Dashboard Walkthrough Jake guides you step-by-step through the process of achieving HIPAA compliance
Ready to get started? Book a demo with our team
Talk to an expert

Compliance Checklist for HIPAA Covered Entities Performing Multiple Functions

Kevin Henry

HIPAA

January 01, 2025

8 minutes read
Share this article
Compliance Checklist for HIPAA Covered Entities Performing Multiple Functions

If you perform more than one HIPAA-covered role—such as a health plan and a provider—use this compliance checklist to structure controls that protect Protected Health Information across all operations. It aligns your policies with the HIPAA Privacy Rule, Security requirements for Electronic PHI, and practical oversight steps like Business Associate Agreement management and ongoing Risk Assessment.

Hybrid Entity Designation

What it means

A hybrid entity is a single organization that performs both covered and non‑covered functions and formally designates its “covered components.” Only those components—and the workforce supporting them—may create, receive, maintain, or transmit PHI. You must document the designation, define boundaries, and control how PHI flows between covered and non‑covered sides.

Checklist

  • Inventory all functions and decide which are covered, business associate, and non‑covered.
  • Formally designate covered components in writing and keep the record current.
  • Define workforce members who support covered components and bring them under HIPAA obligations.
  • Map PHI and Electronic PHI systems; segregate networks, applications, and data stores as needed.
  • Implement access controls and “firewalls” so non‑covered functions cannot use PHI beyond permitted purposes.
  • Train staff on component boundaries, permissible uses/disclosures, and the Minimum Necessary Standard.
  • Review designations during reorganizations, system changes, or new service lines.

Common pitfalls

  • Letting shared services (IT, HR, finance) access PHI without bringing them under the covered component.
  • Informal designations with no documentation or outdated org charts.
  • Cross‑selling, marketing, or analytics by non‑covered units using PHI without authorization.

Compliance Requirements for Multiple Functions

How to manage overlapping roles

When you operate in multiple HIPAA roles, apply requirements based on the hat you’re wearing at each moment. For example, provider activities follow provider privacy practices, while health plan activities follow plan rules. If you also act as a business associate for another entity, you must satisfy business associate obligations for that work in addition to your covered entity duties.

Checklist

  • Map each function (provider, plan, clearinghouse, business associate) and its data flows.
  • Issue role‑specific policies and Notices of Privacy Practices when required.
  • Segment systems, APIs, and analytics so each function accesses only what it needs.
  • Establish separate approval paths for marketing, research, fundraising, and plan‑sponsor activities.
  • Train staff on scenario‑based decisions (treatment vs. payment vs. operations vs. authorization).
  • Maintain unified breach response with role‑aware notification templates and timelines.

Examples

  • University health system operating a student health clinic and a group health plan.
  • County government with a behavioral health provider and a third‑party administrator service.
  • Integrated delivery network that runs a provider group and a health plan under one umbrella.

Affiliated Covered Entities

What an ACE allows

Legally separate covered entities under common ownership or control may designate as an Affiliated Covered Entity (ACE) and be treated as a single covered entity for HIPAA. This permits sharing PHI for healthcare operations across the affiliates while maintaining coordinated privacy and security governance.

Checklist

  • Confirm common ownership or control and adopt a written ACE designation.
  • List participating entities, scope of affiliation, and shared compliance functions.
  • Harmonize policies, training, sanctions, and breach response across the ACE.
  • Decide whether to provide a single Notice of Privacy Practices and keep it consistent system‑wide.
  • Align identity and access management so workforce access matches affiliate duties.
  • Ensure Business Associate Agreements reflect the ACE structure where vendors serve multiple affiliates.

Governance tips

  • Use an enterprise privacy committee to handle cross‑affiliate issues and approvals.
  • Maintain an ACE data‑sharing register describing permissible operations disclosures.

Privacy Rule Applicability

Scope and permissions

The HIPAA Privacy Rule protects PHI in any form—paper, oral, or electronic. It permits uses and disclosures for treatment, payment, and healthcare operations; certain public interest purposes; and as authorized by the individual. It also grants individual rights, including access, amendments, restrictions in specific cases, confidential communications, and an accounting of certain disclosures.

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Operational controls

  • Publish and distribute an accurate Notice of Privacy Practices for each applicable function.
  • Set intake and fulfillment processes for access and amendment requests within required timeframes.
  • Standardize authorization forms and verify identity before releasing information.
  • Adopt de‑identification or limited data set methods when full PHI is not required.
  • Apply the Minimum Necessary Standard to routine operations and non‑treatment disclosures.
  • Log disclosures that require accounting and maintain records as required.

Hybrid and ACE nuances

  • In a hybrid entity, Privacy Rule duties apply to covered components and support staff designated under them.
  • In an ACE, affiliates may share PHI for operations under unified policies; other disclosures still require the usual checks.

Business Associate Agreements

When BAAs are required

A Business Associate Agreement is required when a vendor or partner creates, receives, maintains, or transmits PHI for your covered functions. This includes cloud hosting, EHR and billing platforms, transcription, claims administration, data analytics, and subcontractors handling PHI. BAAs are not required for your workforce or for provider‑to‑provider treatment disclosures.

What a solid BAA includes

  • Permitted uses/disclosures and prohibition on non‑permitted uses (including marketing without authorization).
  • Safeguards for Electronic PHI, incident reporting, and breach notification duties.
  • Flow‑down requirements to subcontractors that handle PHI.
  • Minimum Necessary obligations and access controls.
  • Return or secure destruction of PHI at termination when feasible.
  • Right to audit or receive attestations; cooperation with investigations.

Checklist

  • Inventory all vendors and shared‑services units; flag those that interact with PHI.
  • Execute BAAs before granting access to PHI or Electronic PHI.
  • Use standardized templates with risk‑based addenda for higher‑risk services.
  • Track effective dates, renewals, and evidence of security controls.
  • Verify subcontractor BAAs and data‑flow diagrams during onboarding.
  • Document due diligence and ongoing monitoring activities.

Edge cases to review

  • Parent or sibling companies providing IT or analytics to covered components.
  • Data storage or backup providers who “cannot view” data—still business associates.
  • Plan sponsors and brokers—ensure proper plan documents rather than a BAA when applicable.

Minimum Necessary Standard

How it works

The Minimum Necessary Standard requires you to limit access, uses, and disclosures of PHI to what is reasonably necessary to accomplish the purpose. It applies to payment and operations and most non‑routine disclosures. It does not apply to treatment, disclosures to the individual, or uses/disclosures required by law.

Checklist

  • Define role‑based access with documented job‑related need‑to‑know.
  • Create protocols for routine disclosures and a review process for non‑routine requests.
  • Configure system views, data masking, and query templates that reveal only needed data.
  • Use de‑identification or limited data sets with data use agreements when feasible.
  • Audit access logs and implement corrective actions for over‑access.
  • Train staff with practical scenarios (call centers, claims reviews, research requests).

Practical examples

  • Claims staff view diagnosis and procedure codes but not full clinical notes.
  • Analytics receives a limited data set without direct identifiers for trend reporting.
  • Customer service accesses last four digits of SSN and recent encounters to verify identity.

Risk Assessments and Documentation

Security risk analysis essentials

Conduct an enterprise‑wide Risk Assessment focused on Electronic PHI to identify threats, vulnerabilities, and control gaps. Use the results to drive risk management plans, including technical, administrative, and physical safeguards. Reassess at least annually and after major changes to systems, affiliates, or workflows.

Documentation you must maintain

  • Hybrid entity and ACE designations, data‑flow maps, and system inventories.
  • Policies, procedures, training materials, and workforce attestation records.
  • Risk Assessment reports, remediation plans, and evidence of implemented controls.
  • Incident response plans, breach logs, and post‑incident analyses.
  • Business Associate Agreements, vendor due‑diligence records, and monitoring reports.
  • Contingency plans (backup, disaster recovery, emergency operations) and test results.
  • Disclosure logs, authorization forms, and Notices of Privacy Practices.

Checklist

  • Scope all locations of Electronic PHI, including cloud, mobile, APIs, and backups.
  • Identify risks, rank them, and assign owners and deadlines for mitigation.
  • Implement encryption, authentication, monitoring, and physical safeguards proportionate to risk.
  • Test incident response and disaster recovery; update based on lessons learned.
  • Retain documentation for required periods and ensure it’s retrievable during audits.

Conclusion

By clearly designating covered components, aligning policies to each function, controlling vendor access with strong Business Associate Agreements, enforcing the Minimum Necessary Standard, and driving improvements through a rigorous Risk Assessment, you create a defensible, scalable program that protects PHI and Electronic PHI across your enterprise.

FAQs

What is a hybrid entity under HIPAA?

A hybrid entity is an organization that performs both HIPAA‑covered and non‑covered functions and formally designates which parts are “covered components.” Only those components—and their supporting workforce—handle PHI under HIPAA, with controls preventing non‑covered functions from accessing it.

How do covered entities manage multiple functions?

They map roles and data flows, issue role‑specific policies and notices, segment systems and access, train staff on purpose‑based decisions, and coordinate breach response and governance across all functions while honoring the Minimum Necessary Standard.

When are business associate agreements required?

A BAA is required whenever a vendor or partner creates, receives, maintains, or transmits PHI for your covered functions, including cloud services, EHRs, billing, analytics, and subcontractors. BAAs are not needed for your workforce or provider‑to‑provider treatment disclosures.

What are the key components of a HIPAA compliance checklist?

Core elements include hybrid or ACE designations, Privacy Rule processes, Business Associate Agreement management, Minimum Necessary controls, Security Risk Assessment and mitigation, workforce training and sanctions, contingency planning, disclosure tracking, and comprehensive documentation and review.

Share this article

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Related Articles