Electronic Health Records and the HIPAA Privacy Rule: Compliance Checklist

Check out the new compliance progress tracker


Product Pricing Demo Video Free HIPAA Training
LATEST
video thumbnail
Admin Dashboard Walkthrough Jake guides you step-by-step through the process of achieving HIPAA compliance
Ready to get started? Book a demo with our team
Talk to an expert

Electronic Health Records and the HIPAA Privacy Rule: Compliance Checklist

Kevin Henry

HIPAA

February 24, 2025

7 minutes read
Share this article
Electronic Health Records and the HIPAA Privacy Rule: Compliance Checklist

HIPAA Privacy Rule Overview

The HIPAA Privacy Rule sets national standards for how you use, disclose, and safeguard Protected Health Information (PHI) across your Electronic Health Records (EHR) ecosystem. It requires “minimum necessary” access, clear policies, and patient rights such as access, amendment, and accounting of certain disclosures.

Because Electronic Health Records (EHR) systems centralize data flows, privacy obligations must be embedded in system design: role-based access, auditability, and processes for authorizations beyond treatment, payment, and health care operations. Align your privacy policies with day-to-day EHR workflows to prevent gaps.

Checklist

  • Appoint a Privacy Officer and document HIPAA privacy policies and procedures.
  • Map PHI flows across EHR, patient portals, messaging, and interfaces; enforce the minimum necessary standard.
  • Publish and maintain a Notice of Privacy Practices and a process for handling patient rights requests.
  • Require valid authorizations for non-routine uses/disclosures and maintain an authorization log.
  • Establish an accounting-of-disclosures process for non-TPO disclosures.
  • Integrate privacy reviews into change management for EHR configuration and new integrations.

Covered Entities and Business Associates

Covered entities include health plans, health care clearinghouses, and health care providers that conduct standard electronic transactions. Business associates are vendors or partners that create, receive, maintain, or transmit PHI on your behalf, including EHR vendors, cloud hosting providers, billing services, and analytics firms.

You must execute Business Associate Agreements (BAAs) that define permitted uses and disclosures, required safeguards, breach reporting duties, subcontractor flow-downs, and termination/return-or-destruction terms. Vet each business associate for security maturity before connecting to your EHR.

Checklist

  • Inventory all business associates and subcontractors that touch PHI/ePHI.
  • Execute and maintain BAAs; track effective dates and renewal cycles.
  • Require documented administrative safeguards and technical safeguards in BAAs.
  • Limit vendor access to least privilege; review access routinely.
  • Establish breach escalation paths from business associates to your Privacy/Security Officers.

Electronic Protected Health Information (ePHI)

Electronic Protected Health Information is PHI transmitted by or maintained in electronic media. In practice, ePHI spans EHR databases, backups, imaging, e-prescribing, secure email, patient portals, mobile apps, integration engines, logs, and cloud storage—often referred to as electronic personal health information in everyday usage.

Managing ePHI requires precise data mapping, consistent encryption, and strict access management. Treat non-production copies—reports, extracts, test and training environments—as sensitive ePHI, not harmless data.

Where ePHI lives

  • EHR and ancillary systems (LIS/RIS/PACS), integration engines, and interfaces.
  • Endpoint devices, messaging tools, file shares, collaboration spaces, and backups.
  • Vendor platforms and cloud services connected via APIs or SFTP.

Checklist

  • Document all systems and repositories that store or transmit ePHI.
  • Encrypt ePHI in transit and at rest; enforce multi-factor authentication for remote and privileged access.
  • Segregate environments; mask or de-identify data in testing and analytics where feasible.
  • Enable audit logging for access, changes, and exports; review alerts routinely.
  • Implement secure mobile and endpoint management (screen lock, remote wipe, storage encryption).

Risk Assessment and Management

A formal risk assessment identifies where ePHI resides, what could go wrong, and how you will apply risk assessment and mitigation. Evaluate threats, vulnerabilities, likelihood, and impact, then prioritize controls with clear owners and timelines.

Risk management is continuous. Integrate it with governance, change management, vendor oversight, and incident response so new integrations and EHR updates don’t introduce unmanaged risk.

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Run the risk analysis

  • Inventory ePHI locations and data flows end-to-end.
  • Identify threats (e.g., ransomware, misconfiguration, data exfiltration) and vulnerabilities.
  • Score likelihood and impact; document risk ratings and acceptance/mitigation decisions.
  • Create a remediation plan with milestones; track to closure and reassess at least annually or after major changes.

Administrative safeguards

  • Policies, procedures, sanctions, and role-based training aligned to EHR workflows.
  • Vendor risk management and Business Associate oversight.
  • Contingency planning: data backup, disaster recovery, and emergency operations.
  • Change control and secure configuration standards for EHR and connected systems.

Technical safeguards

  • Unique user IDs, least-privilege access, and multi-factor authentication.
  • Automatic logoff, session timeouts, and access re-certifications.
  • Encryption in transit and at rest; secure key management.
  • Audit logging, integrity controls, vulnerability management, and timely patching.

Physical safeguards

  • Facility access controls and visitor management for data centers and clinics.
  • Workstation security, device/media controls, and secure disposal.
  • Environmental protections and hardware inventory tracking.

Breach Notification Rule Compliance

A breach is an impermissible use or disclosure of unsecured PHI that compromises privacy or security. Conduct a risk assessment to determine the probability of compromise by considering the type of information, who received it, whether it was actually viewed/acquired, and mitigation steps taken.

If a breach occurred, you must notify affected individuals without unreasonable delay and no later than 60 calendar days after discovery. For incidents involving 500 or more residents of a state or jurisdiction, also notify HHS and prominent media; for smaller breaches, log and report to HHS annually. Business associates must promptly notify the covered entity.

Checklist

  • Maintain written breach notification policies and incident response playbooks.
  • Define roles for detection, containment, forensics, legal review, and communications.
  • Prepare notification templates describing the incident, data involved, protective steps, remediation, and contacts.
  • Leverage encryption to qualify for “unsecured PHI” safe harbor when properly implemented.
  • Test the plan with tabletop exercises and document lessons learned.

Employee Training and Awareness

Your workforce is the front line for EHR privacy and security. Provide role-based, scenario-driven training that covers acceptable use, phishing, secure messaging, remote work, and handling of ePHI across clinical and administrative functions.

Reinforce learning with regular communications, just-in-time guidance inside the EHR, and targeted refreshers after incidents or system changes. Track completion and effectiveness metrics.

Checklist

  • Deliver onboarding training before Protected Health Information (PHI) access; require annual refreshers.
  • Provide specialized modules for high-risk roles (superusers, IT admins, billing, HIM).
  • Run phishing simulations and report/response drills.
  • Obtain policy attestations and maintain training records.
  • Apply sanctions consistently for violations to reinforce accountability.

Documentation and Record-Keeping

HIPAA requires you to document policies, procedures, risk analyses, and actions taken, and to retain them for at least six years from creation or last effective date. Keep a clear trail of decisions, approvals, and system changes tied to your EHR.

Maintain logs for access, disclosures (where required), incidents, and sanctions. Retain BAAs, training rosters, asset inventories, data flow diagrams, and backup/restore tests. Medical record retention periods may also be governed by state law in addition to HIPAA documentation requirements.

Checklist

  • Centralize HIPAA policies/procedures, risk assessments, and remediation plans.
  • Maintain a complete BAA repository and vendor due-diligence records.
  • Archive audit logs, access reviews, and configuration baselines for EHR and integrations.
  • Track workforce training, attestations, complaints, investigations, and sanctions.
  • Keep breach logs, incident reports, and notifications as part of breach notification policies.

Conclusion

Embedding HIPAA privacy requirements into everyday EHR operations—supported by solid risk assessment and mitigation, strong administrative and technical safeguards, and disciplined documentation—turns compliance into a repeatable habit. Use this compliance checklist to close gaps, verify controls, and sustain trust with every patient encounter.

FAQs

What are the key safeguards required under the HIPAA Privacy Rule?

HIPAA relies on three core safeguard families—administrative, physical, and technical—to protect PHI and ePHI. In practice, that means documented policies and training, facility and device protections, and controls like least-privilege access, multi-factor authentication, encryption, and audit logging. The Privacy Rule also imposes the minimum necessary standard and processes for authorizations and disclosures.

How does HIPAA define electronic protected health information?

Electronic protected health information (ePHI) is any PHI that is created, received, maintained, or transmitted in electronic form. It includes EHR entries, images, lab results, e-prescriptions, secure messages, backups, and data in connected systems and cloud services.

Who must comply with HIPAA regulations regarding EHRs?

Covered entities—health plans, health care clearinghouses, and health care providers conducting standard electronic transactions—must comply, as must business associates that handle PHI/ePHI on their behalf. Subcontractors of business associates are also bound through flow-down obligations in Business Associate Agreements.

What steps should be taken after an ePHI breach?

Immediately contain the incident, preserve evidence, and conduct a breach risk assessment. Notify affected individuals without unreasonable delay and no later than 60 days if a breach is confirmed, and notify HHS (and media for large breaches) per thresholds. Offer mitigation (e.g., credit monitoring if appropriate), correct root causes, update breach notification policies, and document all actions taken.

Share this article

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Related Articles