HIPAA Amendments Checklist: Action Items Under the Latest Legislation

Product Pricing Demo Video Free HIPAA Training
LATEST
video thumbnail
Admin Dashboard Walkthrough Jake guides you step-by-step through the process of achieving HIPAA compliance
Ready to get started? Book a demo with our team
Talk to an expert

HIPAA Amendments Checklist: Action Items Under the Latest Legislation

Kevin Henry

HIPAA

February 19, 2025

6 minutes read
Share this article
HIPAA Amendments Checklist: Action Items Under the Latest Legislation

Updating Privacy Notices for Reproductive Health Information

Review and revise your Notice of Privacy Practices to reflect new limits on using or disclosing reproductive health information. State plainly when such information may be used for treatment, payment, and operations, and when it may not be disclosed—especially for investigations or proceedings related to lawful reproductive health care. Explain how requests from law enforcement or other officials are verified and documented before any disclosure.

Define “reproductive health information” in practical terms for patients, describe your minimum necessary standard, and include clear contact information for your Privacy Officer. Update distribution workflows: post the new notice on your website and at points of service, provide it to new patients, and ensure translated versions and accessible formats are available where needed. Train front-desk and release-of-information teams on the updated language and acknowledgement process.

Implementing Enhanced Security Measures

Strengthen protections for electronic protected health information by prioritizing layered, risk-based controls. Implement multifactor authentication for remote access and all privileged accounts, enforce least-privilege access, and maintain strong password and session management. Encrypt ePHI in transit and at rest, and apply device controls to laptops, mobile devices, and removable media.

Operationalize security with endpoint detection and response, timely patching, vulnerability management, and network segmentation. Enable comprehensive audit controls and log retention to trace access to reproductive health information. Validate backups with periodic restoration tests and maintain an incident response plan that covers data exfiltration, ransomware, and suspected impermissible disclosures.

Revising Business Associate Agreements

Update Business Associate Agreements to reflect new use and disclosure restrictions for reproductive health information privacy. Require business associates to verify and document lawful basis and any necessary attestations before responding to requests tied to reproductive health care. Flow down these obligations to subcontractors and confirm that disclosures are limited to the minimum necessary.

Set explicit security expectations—encryption, multifactor authentication, audit logging, and timely patching—and define breach notification timelines and escalation paths. Add audit rights, evidence requirements (such as logs and risk assessments), data return or destruction terms at contract end, and insurance/indemnity provisions appropriate to the sensitivity of ePHI handled.

Conducting Comprehensive Risk Assessments

Perform a holistic risk assessment that maps where reproductive health information is created, received, maintained, or transmitted across systems and vendors. Evaluate threats, vulnerabilities, and impacts, then document likelihood, severity, and recommended controls. Include scenarios involving subpoenas, court orders, or investigatory requests and how your processes ensure compliance with disclosure restrictions.

Incorporate third-party risk, data loss prevention, secure software development, and insider threat considerations. Use the findings to update your risk register, set remediation priorities and timelines, and align administrative, physical, and technical safeguards. Reassess after major system changes, incidents, or regulatory updates, and retain evidence of your methodology and decisions.

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Scheduling HIPAA Training and Awareness

Deliver role-based training that explains updated rules for reproductive health information, verification steps for legal requests, and how to escalate unusual or urgent inquiries. Include practical scripts for staff who receive requests at the front desk or by phone, emphasizing identity verification and minimum necessary disclosure.

Augment annual training with phishing simulations, tabletop exercises, and just-in-time micro-lessons on topics like multifactor authentication fatigue, secure messaging, and handling ePHI outside the EHR. Track completion rates and comprehension, and tie your sanction policy to measurable behaviors (for example, unencrypted transmission of ePHI or failure to follow disclosure procedures).

Establishing Breach Reporting Procedures

Codify a step-by-step process under the HIPAA Breach Notification Rule: immediate triage, containment, and a documented risk assessment to determine if there is a low probability that ePHI has been compromised. Use the four-factor analysis refined by the HIPAA Omnibus Rule—nature and extent of data, the unauthorized person, whether data was actually acquired or viewed, and mitigation success—to guide decisions and record your rationale.

Set clear timelines for notifying affected individuals and, when applicable, the media and the Department of Health and Human Services. Ensure Business Associates understand their rapid notification duties to you and provide the information you need to complete notices. Maintain templates for individual notices, public statements, and regulator submissions, and rehearse the process with periodic drills.

Monitoring and Auditing Compliance Posture

Adopt continuous monitoring to validate that policies are working as intended. Review access logs for ePHI, especially any “break-glass” events, unusual query patterns, or high-risk exports. Audit a sample of disclosure decisions tied to reproductive health information and confirm the presence of required documentation and attestations.

Track key indicators—training completion, time to revoke access for terminated users, patching cadence, failed MFA attempts, and vendor risk ratings. Report results to leadership, remediate gaps on defined timelines, and re-test. Use post-incident reviews and audit findings to refine policies, the risk assessment, and staff training so improvements are sustained over time.

In summary, align your Notice of Privacy Practices, security controls, Business Associate Agreements, risk assessment, training, breach notification procedures, and monitoring program to the latest HIPAA amendments. Document decisions, verify disclosures rigorously, and operationalize safeguards so reproductive health information privacy is protected end to end.

FAQs.

What are the key changes to the HIPAA privacy rules under the latest legislation?

The latest changes focus on reproductive health information privacy: tighter limits on using or disclosing PHI for investigations or proceedings related to lawful reproductive care, standardized verification and documentation (including attestations where applicable) before certain disclosures, and required updates to the Notice of Privacy Practices. They also reinforce recordkeeping, training, and minimum necessary principles.

How must organizations update their Privacy Notices for reproductive health information?

Revise the Notice of Privacy Practices to define reproductive health information, describe permitted uses and disclosures, and state that the organization will not use or disclose PHI for prohibited purposes. Explain how legal requests are vetted, identify who to contact with questions or complaints, and update distribution methods so patients see the current notice online and at points of care.

What security measures are now mandated by HIPAA amendments?

HIPAA remains risk-based, requiring appropriate administrative, physical, and technical safeguards for electronic protected health information. In practice, regulators expect strong access controls, encryption, audit logging, vulnerability and patch management, and multifactor authentication for remote and privileged access. Organizations should document these controls in their risk assessment and enforce them consistently.

How do the amendments affect business associate agreements?

BAAs should incorporate the new disclosure restrictions around reproductive health information, require verification and documentation before responding to certain requests, and flow these obligations to subcontractors. They should also set clear breach notification timelines, define security expectations (encryption, MFA, logging), provide audit rights, and specify data return or destruction at contract termination.

Share this article

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Related Articles