Direct Primary Care HIPAA Compliance: Requirements, Best Practices, and Checklist

Product Pricing
Ready to get started? Book a demo with our team
Talk to an expert

Direct Primary Care HIPAA Compliance: Requirements, Best Practices, and Checklist

Kevin Henry

HIPAA

March 28, 2026

8 minutes read
Share this article
Direct Primary Care HIPAA Compliance: Requirements, Best Practices, and Checklist

Direct Primary Care (DPC) thrives on simplicity and trust, yet you still handle highly sensitive Protected Health Information. This guide explains how to approach Direct Primary Care HIPAA compliance across the Privacy Rule, Security Rule, risk analysis, Business Associate Agreements, breach response, and staff training—culminating in a practical checklist you can act on today.

HIPAA Covered Entity Status in DPC

A DPC practice is a HIPAA covered entity when it electronically transmits health information in connection with specific standard transactions with a health plan (for example, claims, eligibility checks, claim status, or prior authorization). If you never conduct these transactions, you may not be a covered entity under HIPAA, even though you still steward patient data.

To determine your status, inventory how you exchange data with third parties. If you submit claims or eligibility inquiries to a health plan using standard electronic formats, treat your practice as a covered entity. If you operate as cash-pay only and avoid standard transactions, you may still choose to align with HIPAA to meet patient expectations and streamline relationships with vendors who support Electronic Protected Health Information (ePHI).

Also assess whether you serve as a business associate to a health plan or other covered entity. If you perform services for a covered entity that involve PHI, you must meet business associate obligations even if your DPC practice otherwise avoids plan billing.

Privacy Rule Compliance

The Privacy Rule governs how you use, disclose, and safeguard PHI. Start by issuing a clear, patient-friendly Notice of Privacy Practices that reflects your direct-pay model, routine disclosures for treatment and operations, and how patients can exercise their rights.

Core requirements to operationalize

  • Define permissible uses and disclosures for treatment, payment, and health care operations; obtain authorization for marketing or other non-routine purposes.
  • Apply the minimum necessary standard to routine disclosures, limiting PHI to what is reasonably needed.
  • Honor patient rights: access, amendments, confidential communications, restrictions (when feasible), and an accounting of certain disclosures.
  • Designate a privacy officer, maintain policies and procedures, and document all required actions and decisions.

DPC-specific considerations

  • Tailor your Notice of Privacy Practices to clarify how membership payments and out-of-network status affect disclosures.
  • Map your typical disclosures (e.g., labs for treatment, care coordination) and ensure they are consistent with the Privacy Rule.
  • Implement straightforward intake and portal processes so patients can easily request access to their records within required timelines.

Security Rule Safeguards

The Security Rule focuses on ePHI and requires a risk-based program of Administrative Safeguards, Physical Safeguards, and Technical Safeguards. Your approach must be scalable to your size yet thorough enough to reduce real-world risks.

Administrative Safeguards

  • Conduct and document a Risk Assessment; implement a risk management plan with prioritized remediation.
  • Assign a security officer; define workforce security, onboarding/offboarding, and a sanctions policy.
  • Adopt policies for access management, incident response, contingency planning, and vendor oversight.
  • Provide role-based security awareness and phishing-resistant training at hire and periodically thereafter.

Physical Safeguards

  • Control facility access; secure server/network closets and lock file areas containing PHI.
  • Harden workstations: privacy screens, automatic logoff, and clean-desk protocols.
  • Manage device lifecycle: inventory assets, encrypt portable devices, and document secure media disposal.

Technical Safeguards

  • Enforce unique user IDs, least-privilege access, multi-factor authentication, and automatic session timeouts.
  • Enable audit controls: comprehensive logging, alerts for anomalous access, and periodic log review.
  • Protect transmission security with TLS; encrypt ePHI at rest where feasible and manage keys securely.
  • Implement backups, tested restores, and ransomware-resilient recovery (immutable or offsite copies).

Conducting Risk Assessments

A Risk Assessment identifies threats and vulnerabilities to ePHI and informs your mitigation plan. Make it methodical, documented, and repeatable so it can guide budget, technology choices, and workflow changes.

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Practical step-by-step approach

  • Define scope: systems, devices, cloud apps, and data flows touching ePHI.
  • Inventory assets: EHR, patient portal, e-fax, messaging tools, mobile devices, and backups.
  • Identify threats and vulnerabilities: unauthorized access, misconfiguration, phishing, lost devices, and vendor failures.
  • Evaluate likelihood and impact; rate risks and map each to Administrative, Physical, or Technical Safeguards.
  • Create a remediation plan with owners, timelines, and success criteria; track to completion.
  • Reassess periodically and whenever you introduce major changes such as a new EHR or telehealth platform.

Establishing Business Associate Agreements

If you are a covered entity, you must execute a Business Associate Agreement with any vendor that creates, receives, maintains, or transmits PHI on your behalf. This commonly includes your cloud EHR, patient messaging tools, e-fax services, IT support, and data destruction providers.

Clarifying who needs a BAA

  • Vendors performing services for your practice that involve PHI require a BAA.
  • Disclosures to another covered entity for treatment (e.g., a laboratory) generally do not require a BAA.
  • If your DPC practice is not a covered entity, you cannot create “BAAs” by law, but you should require HIPAA-aligned privacy and security terms contractually.

What to include in the agreement

  • Permitted uses and disclosures and a prohibition on unauthorized use.
  • Administrative, Physical, and Technical Safeguards proportionate to risk.
  • Prompt breach reporting and cooperation under the Breach Notification Rule.
  • Subcontractor flow-down requirements and the right to audit or receive attestations.
  • Termination for cause and secure return or destruction of PHI at contract end.

Breach Notification Procedures

A “breach” is generally an impermissible use or disclosure of unsecured PHI that compromises privacy or security. When an incident occurs, act quickly and apply the four-factor risk assessment to determine if notification is required.

Immediate response workflow

  • Contain: isolate affected systems, revoke access, and preserve evidence.
  • Investigate: determine what PHI was involved, who gained access, whether it was actually viewed, and mitigation performed.
  • Decide: if there is not a low probability of compromise, treat it as a breach.

Required notifications and timing

  • Notify affected individuals without unreasonable delay and no later than 60 days from discovery.
  • For fewer than 500 affected individuals in a state/jurisdiction, report to HHS within 60 days after the end of the calendar year; for 500 or more, notify HHS contemporaneously and local media.
  • Business associates must notify the covered entity of breaches they discover so the covered entity can complete notifications.
  • Document all decisions, notifications, and corrective actions; strengthen controls to prevent recurrence.

Staff Training and Documentation

Your workforce is the front line of Direct Primary Care HIPAA compliance. Well-constructed training and meticulous records prove due diligence and help prevent incidents before they happen.

Training essentials

  • Provide HIPAA Privacy and Security training at hire and periodically; add role-specific modules for front desk, clinicians, and IT support.
  • Run phishing simulations and periodic security reminders; emphasize reporting of suspicious events.
  • Document attendance, materials used, and competency checks.

Documentation to maintain

  • Policies and procedures, Risk Assessment reports, and your risk management plan.
  • Executed Business Associate Agreements and vendor due diligence records.
  • Incident and breach logs, access audits, and contingency test results.
  • Notices of Privacy Practices and patient acknowledgments, where applicable.

DPC HIPAA Compliance Checklist

  • Confirm covered entity or business associate status and document the rationale.
  • Publish and maintain an up-to-date Notice of Privacy Practices.
  • Complete a comprehensive Risk Assessment and implement prioritized remediation.
  • Establish Administrative, Physical, and Technical Safeguards for ePHI.
  • Execute and track each required Business Associate Agreement.
  • Implement access controls, MFA, encryption, audit logging, and secure backups.
  • Adopt incident response and Breach Notification Rule procedures with clear timelines.
  • Provide initial and periodic workforce training with documented attendance.
  • Maintain a records inventory, retention schedule, and secure disposal process.
  • Review your program at least annually and after significant operational or technology changes.

Conclusion

Direct Primary Care HIPAA compliance is about building a right-sized, risk-based program that protects PHI while keeping your model efficient. By clarifying covered entity status, executing the Privacy and Security Rules, formalizing BAAs, preparing for breaches, and training your team, you create a resilient practice that patients can trust.

FAQs

What makes a DPC practice a HIPAA-covered entity?

Your practice becomes a covered entity if it electronically transmits health information in connection with standard HIPAA transactions with a health plan (such as claims, eligibility, claim status, or authorizations). If you avoid these transactions, you may not be a covered entity, though you should still protect PHI and may adopt HIPAA-aligned controls.

How should DPC practices handle PHI breaches?

Act immediately: contain the event, investigate, and apply the four-factor risk assessment. If there is not a low probability of compromise, notify affected individuals without unreasonable delay and within 60 days, follow the Breach Notification Rule for HHS and media when applicable, and document all steps and corrective actions.

What are the key security requirements for DPC practices?

Implement Administrative Safeguards (risk analysis, policies, training), Physical Safeguards (facility and device controls), and Technical Safeguards (access management, MFA, encryption, audit logs, transmission security). Maintain tested backups and a contingency plan, and manage vendors that handle ePHI.

How often must risk assessments be conducted for HIPAA compliance?

HIPAA requires periodic risk analysis. Best practice is to perform a comprehensive Risk Assessment at least annually and whenever you adopt new systems, change workflows significantly, or experience a security incident, updating your remediation plan as risks evolve.

Share this article

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Related Articles