HIPAA Checklist for Health Coaches: Step-by-Step Guide to Compliance

Product Pricing
Ready to get started? Book a demo with our team
Talk to an expert

HIPAA Checklist for Health Coaches: Step-by-Step Guide to Compliance

Kevin Henry

HIPAA

January 06, 2026

8 minutes read
Share this article
HIPAA Checklist for Health Coaches: Step-by-Step Guide to Compliance

HIPAA Compliance Overview

HIPAA applies when you create, receive, maintain, or transmit Protected Health Information PHI on behalf of a covered entity (like a physician, clinic, or insurer) or as a covered entity yourself. Many health coaches are business associates when they work under a provider’s direction; others may be outside HIPAA if they never handle PHI. Clarify your role first.

HIPAA is anchored by three pillars: the HIPAA Privacy Rule (rights and permitted uses of PHI), the HIPAA Security Rule (protections for electronic PHI), and the Breach Notification Rule (what to do if PHI is compromised). Your compliance program should cover all three.

Quick-start checklist

  • Determine your status: covered entity, business associate, or neither; document the basis.
  • Map how PHI enters, flows through, and leaves your practice and vendors.
  • Complete a security risk assessment and mitigate identified risks.
  • Adopt written policies and procedures; train your workforce and contractors.
  • Execute a Business Associate Agreement BAA with each vendor that handles PHI.
  • Prepare breach response steps and documentation practices.

Privacy Rule Requirements

The HIPAA Privacy Rule governs when you may use or disclose PHI and the rights individuals have over their information. Apply the minimum necessary standard—access, use, and disclose only the least PHI needed for the task.

Permitted uses and authorizations

  • Treatment, payment, and health care operations are generally permitted without authorization; marketing typically is not and often requires written authorization.
  • Obtain and retain valid authorizations for any uses outside permitted purposes; track and honor revocations.
  • De-identify data when feasible to reduce compliance obligations.

Individual rights

  • Right of access: provide timely access to PHI in the requested format when reasonable; keep fulfillment logs.
  • Right to amend, request restrictions, and request confidential communications; document decisions and accommodations.
  • Accounting of disclosures: maintain a record of non-routine disclosures when applicable.

Operational safeguards

  • Limit workforce PHI access by role; verify identity before disclosures.
  • Use secure channels for email and messaging; apply encryption and warn clients of residual risks when they request unencrypted communications.
  • If you are a business associate, follow the BAA and support the covered entity’s Privacy Rule commitments.

Security Rule Requirements

The HIPAA Security Rule requires reasonable and appropriate protections for electronic PHI through Administrative Safeguards, Physical Safeguards, and Technical Safeguards. Tailor controls to your size, complexity, and risk profile—and document your reasoning.

Administrative Safeguards

  • Assign a security official responsible for the program and oversight.
  • Conduct a risk analysis; implement risk management plans and sanctions for violations.
  • Provide security awareness training, including phishing and secure device practices.
  • Develop incident response and contingency plans (backup, disaster recovery, emergency operations).
  • Evaluate and manage vendor risks; ensure subcontractors agree to equivalent protections.

Physical Safeguards

  • Control facility and home-office access; secure cabinets and work areas handling PHI.
  • Define workstation use and security; enable auto-lock screens and privacy filters where needed.
  • Implement device and media controls: inventory, secure storage, and verified disposal (shred, wipe, or destroy).

Technical Safeguards

  • Access controls: unique user IDs, strong passwords, and multi-factor authentication.
  • Encryption for data at rest and in transit to protect ePHI on devices and in cloud services.
  • Audit controls: enable logging on EHR, email, and file systems; review logs routinely.
  • Integrity and transmission security: use secure protocols, automatic logoff, and anti-malware/EDR tools.

Risk Assessment

A HIPAA risk assessment identifies where ePHI resides, the threats and vulnerabilities it faces, and the likelihood and impact of those risks. The result guides your mitigation plan and justifies chosen safeguards.

How to perform it

  1. Scope: list systems, apps, devices, networks, and vendors that create, receive, maintain, or transmit ePHI.
  2. Data flows: diagram how PHI is collected, stored, shared, and disposed.
  3. Threats and vulnerabilities: consider human error, loss/theft, phishing, misconfiguration, and vendor failures.
  4. Risk rating: estimate likelihood and impact; prioritize high risks for remediation.
  5. Mitigation: assign owners, actions, timelines, and success criteria; track to completion.

What to document

  • Asset inventory, data flow maps, risk register, mitigation plan, and residual risk rationale.
  • Evidence of implemented controls and periodic reviews.

Reassess at least annually, after major changes (new platform, remote-work shift), and after security incidents.

Policies and Procedures

Written policies translate HIPAA requirements into day-to-day rules. Keep them practical, role-based, and version-controlled; review at least annually and whenever regulations, technology, or workflows change.

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Core policy set

  • Privacy: minimum necessary, authorizations, client rights, and marketing communications.
  • Security: access control, encryption, password/MFA, remote work, and secure messaging.
  • Device and media: BYOD/MDM, backups, storage, and disposal.
  • Incident response and breach procedures; sanctions for non-compliance.
  • Vendor management and Business Associate Agreement BAA administration.
  • Data retention and record keeping (including six-year retention for HIPAA-required documents).

Staff Training

Train all workforce members—including contractors—on the HIPAA Privacy Rule, HIPAA Security Rule, and your internal policies. New hires should be trained promptly, with refresher training at least annually.

Effective training program

  • Role-based modules: what each role can access, how to handle requests, and escalation paths.
  • Security awareness: phishing simulations, secure device setup, and safe sharing practices.
  • Assessments and acknowledgments: quizzes, attestations, and remediation for missed items.
  • Training logs: date, content, trainer, attendee, and outcomes kept for compliance evidence.

Business Associate Agreements

A Business Associate Agreement BAA is required with any vendor that creates, receives, maintains, or transmits PHI for you. Common examples include EHR/CRM platforms, cloud storage, e-fax, telehealth tools, email services, and billing providers.

BAA essentials

  • Permitted and required uses/disclosures of PHI and the minimum necessary standard.
  • Safeguards, reporting timelines for incidents, and cooperation during investigations.
  • Downstream obligations for subcontractors handling PHI.
  • Termination, return, or destruction of PHI upon contract end.

Do not store PHI with a vendor unwilling to sign a BAA. Maintain a current inventory of vendors and their agreements.

Breach Notification Procedures

The Breach Notification Rule requires prompt action when PHI is compromised. Treat any suspected loss, theft, misdirected email, or unauthorized access as an incident until assessed.

Response steps

  1. Identify and contain: secure accounts/devices, change credentials, and preserve logs.
  2. Conduct a breach risk assessment using the four-factor test: nature/extent of PHI, unauthorized person, whether PHI was actually acquired/viewed, and the extent to which risk was mitigated.
  3. If a breach occurred, notify affected individuals without unreasonable delay and no later than 60 calendar days after discovery; include required content (what happened, types of PHI, steps patients should take, what you’re doing, contact info).
  4. Notify HHS: for 500+ individuals, within 60 days of discovery; for fewer than 500, within 60 days after the end of the calendar year. Notify media if 500+ residents of a state/jurisdiction are affected.
  5. Document decisions, notifications, and corrective actions; update policies and training based on lessons learned.

Documentation and Record Keeping

Maintain HIPAA-required documentation for at least six years from creation or last effective date. Organize a compliance repository—digital or physical—with access controls and routine backups.

What to keep

  • Risk assessments, mitigation plans, and evidence of implemented safeguards.
  • Policies, procedures, versions, approvals, and review records.
  • Training curricula, attendance logs, quizzes, and acknowledgments.
  • BAA inventory and signed agreements for all relevant vendors and subcontractors.
  • Incident/breach logs, notifications, investigation notes, and corrective actions.
  • Client rights requests (access, amendments, restrictions) and your responses.

Conclusion

This HIPAA checklist for health coaches helps you determine your role, protect PHI with appropriate safeguards, manage vendors through BAAs, prepare for incidents, and prove compliance through thorough documentation. Build these practices into daily operations so privacy and security are consistent, auditable, and client-centered.

FAQs

What is a Business Associate Agreement for health coaches?

A Business Associate Agreement BAA is a contract that requires a vendor—or a health coach acting for a covered entity—to protect PHI, report incidents, and follow HIPAA obligations. You must have a signed BAA before a vendor creates, receives, maintains, or transmits PHI on your behalf.

How often should health coaches conduct a HIPAA risk assessment?

Perform a comprehensive risk assessment at least annually, and whenever you introduce new systems, change workflows, add vendors, shift to remote work, or experience a security incident. Update the risk register and mitigation plan each time.

What are the key steps in developing HIPAA-compliant policies and procedures?

Map PHI flows; align policies with the HIPAA Privacy Rule and HIPAA Security Rule; define role-based access, encryption, incident response, and client rights processes; integrate vendor/BAA management; train staff; and review, approve, and version-control policies with documented annual updates.

How should health coaches handle a PHI breach notification?

Immediately contain the issue, conduct the four-factor risk assessment, and if a breach occurred, notify affected individuals without unreasonable delay and no later than 60 days. Include required details, notify HHS (and media if 500+ residents are affected), document everything, and implement corrective actions.

Share this article

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Related Articles