HIPAA Cheat Sheet for Medical Records Clerks: Quick Reference Guide

Check out the new compliance progress tracker


Product Pricing Demo Video Free HIPAA Training
LATEST
video thumbnail
Admin Dashboard Walkthrough Jake guides you step-by-step through the process of achieving HIPAA compliance
Ready to get started? Book a demo with our team
Talk to an expert

HIPAA Cheat Sheet for Medical Records Clerks: Quick Reference Guide

Kevin Henry

HIPAA

March 16, 2026

7 minutes read
Share this article
HIPAA Cheat Sheet for Medical Records Clerks: Quick Reference Guide

This HIPAA cheat sheet gives you a practical, quick reference for daily medical records work. Use it to handle Protected Health Information confidently, reduce risk, and keep your organization aligned with the Privacy Rule, Security Rule, and Breach Notification Rule.

HIPAA Privacy Rule Overview

What counts as Protected Health Information (PHI)

  • Any individually identifiable health information about a person’s past, present, or future health or payment for care.
  • Exists in any form—paper charts, electronic files, images, audio, or verbal discussions.
  • De-identified data (safe harbor identifiers removed or expert-determined) is not PHI.

Permitted uses and disclosures (no authorization needed)

  • Treatment, payment, and healthcare operations (TPO) following the minimum necessary standard when applicable to payment/operations.
  • Other limited circumstances (e.g., public health reporting, as required by law) per policy—escalate uncertain requests to the Privacy Officer.

Minimum necessary standard

Disclose or access only the smallest amount of PHI needed to perform the task. Configure role-based access, use redaction when releasing records, and avoid viewing records unrelated to your assigned work.

Authorizations and special cases

  • Obtain a valid, written authorization for uses/disclosures outside TPO. Verify identity and match the authorization’s scope and expiration.
  • Psychotherapy notes, marketing, and most sales of PHI require explicit authorization.

Notice of Privacy Practices (NPP)

Ensure the NPP is available and provided as required by your policy. Document acknowledgments and file them for Records Retention Compliance.

Business Associate Agreements (BAAs)

Vendors that create, receive, maintain, or transmit PHI need executed Business Associate Agreements before any PHI is shared. Keep copies on file and log vendor access to PHI.

HIPAA Security Rule Requirements

Administrative Safeguards

  • Perform and update a risk analysis; implement risk management plans and policies.
  • Provide workforce security, onboarding/offboarding, and sanctions for violations.
  • Train staff regularly; document attendance and competency.
  • Establish contingency plans (data backup, disaster recovery, emergency mode operations).
  • Execute and manage Business Associate Agreements addressing security obligations.

Physical Safeguards

  • Facility access controls (badges, visitor logs, locked file rooms).
  • Workstation use and security (clear screens, position monitors away from public view).
  • Device and media controls (tracking, secure storage, and proper disposal of paper and media).

Technical Safeguards

  • Access controls: unique user IDs, strong authentication, emergency access, automatic logoff.
  • Audit controls: enable logging and routinely review audit trails for inappropriate access.
  • Integrity: change controls and hashing where applicable to prevent improper alteration.
  • Transmission security: encrypt ePHI in transit; prefer encryption at rest.

Everyday security habits

  • Verify requesters before releasing PHI; never share passwords; lock screens when away.
  • Report suspected incidents immediately; do not delete or alter potential evidence.

Breach Notification Procedures

When an incident becomes a breach

A breach is an impermissible use or disclosure of unsecured PHI that compromises privacy or security. Use the Breach Notification Rule’s risk assessment (type of PHI, to whom disclosed, whether it was actually viewed/acquired, and mitigation) to determine notification obligations.

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Immediate steps for clerks

  • Secure the situation (retrieve misdirected faxes/emails, stop further disclosure).
  • Notify your Privacy/Security Officer at once; document what happened and when.
  • Preserve logs, emails, and copies of implicated records; do not self-notify patients.

Notification basics

  • Individuals: notify without unreasonable delay and no later than 60 calendar days after discovery.
  • 500+ individuals in a state/jurisdiction: notify HHS and prominent media; fewer than 500: log and report to HHS annually.
  • Content elements typically include what happened, what types of PHI were involved, steps individuals should take, what the entity is doing, and contact information.
  • Secured PHI (properly encrypted or destroyed) generally does not require notification.

Patient Rights under HIPAA

Right of access

  • Provide access within 30 days of request (one 30-day extension with written reason). Offer paper or electronic formats as requested when readily producible.
  • Allow a patient-directed disclosure to a third party. Fees must be reasonable and cost-based.

Right to request amendment

Act on amendment requests within 60 days (one 30-day extension if needed). If denying, explain the reason and how the patient can disagree or submit a statement of disagreement.

Right to request restrictions and confidential communications

  • Document requested restrictions; required to honor restrictions to a health plan when the patient pays in full out-of-pocket for the service.
  • Accommodate reasonable requests for confidential communications (e.g., alternate address or phone).

Right to an accounting of disclosures and to an NPP

  • Provide an accounting of certain non-TPO disclosures upon request, within required timelines.
  • Make the Notice of Privacy Practices available and explain key points on request.

Electronic Health Records Compliance

Access control and auditing

  • Implement role-based access aligned to job duties and the minimum necessary standard.
  • Enable and review audit logs for user access, data exports, printing, and edits.

Security-by-design

  • Use encryption for data at rest and in transit, multi-factor authentication, and automatic logoff.
  • Maintain patching, endpoint protection, and mobile device management for any ePHI-capable device.

Data integrity, backups, and downtime

  • Validate scanning/indexing accuracy; verify that images map to the correct patient and encounter.
  • Run scheduled, tested backups; document recovery time objectives; maintain downtime and restoration procedures.

Vendors and interoperability

  • Execute Business Associate Agreements with EHR and ROI vendors before sharing PHI.
  • Use secure exchange standards for releases; avoid unencrypted email unless specifically permitted and documented.

Medical Records Clerks' Responsibilities

Daily release-of-information (ROI) checklist

  • Verify identity and authority of requesters; compare signatures and legal documentation.
  • Confirm the request scope, dates of service, and purpose; apply minimum necessary.
  • Validate authorizations (core elements, expiration, revocation status) before disclosure.
  • Log disclosures when required; retain copies of requests and what was released.
  • Quality-check scans for completeness, legibility, and correct patient indexing.
  • Secure paper charts, fax machines, printers, and workstations; clear PHI from view.

Escalate and document

  • Route subpoenas, court orders, and gray-area requests to the Privacy Officer or legal counsel.
  • Report suspected breaches or misdirected releases immediately and preserve evidence.

Summary

Apply the Privacy Rule’s minimum necessary, the Security Rule’s Administrative, Physical, and Technical Safeguards, and the Breach Notification Rule’s timelines. Keep BAAs current, follow a Records Retention Compliance schedule, and document everything. Consistent, well-documented processes are your strongest protection.

FAQs.

What are the key protections under the HIPAA Privacy Rule?

The Privacy Rule protects Protected Health Information by limiting use/disclosure to TPO or other permitted purposes, requiring valid authorizations for most other uses, enforcing the minimum necessary standard, mandating a Notice of Privacy Practices, and holding covered entities and business associates accountable through policies, training, and sanctions.

How must medical records clerks handle breach notifications?

Secure the incident, notify the Privacy/Security Officer immediately, and document facts. A risk assessment determines if notification under the Breach Notification Rule is required. If it is, individuals must be notified without unreasonable delay and no later than 60 days, with additional reporting to HHS (and media for large breaches). Do not contact patients directly unless instructed by the Privacy Officer.

What rights do patients have regarding their health information?

Patients can access and obtain copies of their records within set timelines, request amendments, ask for restrictions (including paying in full to restrict disclosures to a health plan for that service), request confidential communications, receive an accounting of certain disclosures, and obtain the Notice of Privacy Practices.

How can electronic health records be maintained in compliance with HIPAA?

Use role-based access and unique user IDs, enable robust audit logging, apply encryption in transit and at rest, require multi-factor authentication, keep systems patched, and maintain tested backups and downtime procedures. Ensure Business Associate Agreements with vendors and design ROI workflows that enforce the minimum necessary standard and secure transmission methods.

Share this article

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Related Articles