HIPAA Compliance Audit Checklist for Small Businesses: Step-by-Step Guide to Get Audit-Ready

Check out the new compliance progress tracker


Product Pricing Demo Video Free HIPAA Training
LATEST
video thumbnail
Admin Dashboard Walkthrough Jake guides you step-by-step through the process of achieving HIPAA compliance
Ready to get started? Book a demo with our team
Talk to an expert

HIPAA Compliance Audit Checklist for Small Businesses: Step-by-Step Guide to Get Audit-Ready

Kevin Henry

HIPAA

March 09, 2024

7 minutes read
Share this article
HIPAA Compliance Audit Checklist for Small Businesses: Step-by-Step Guide to Get Audit-Ready

Use this practical HIPAA compliance audit checklist to move from uncertainty to audit-ready confidence. You will establish clear ownership, document your safeguards, and produce evidence that shows how you protect PHI and ePHI every day.

Each section below outlines what to do, how to prove it, and where small businesses can streamline without sacrificing security or compliance.

Designate Compliance Officers

Start by assigning accountable leaders. HIPAA expects a Privacy Officer and a Security Officer. In small businesses, one person may fill both roles if they have the authority and time to act.

Roles and responsibilities

  • Privacy Officer designation: oversee Privacy Rule compliance, respond to patient rights requests, and manage complaints.
  • Security Officer: own the Security Rule, risk management, and technical/physical safeguards.
  • Authority and resources: set budget, approve tools, and escalate issues directly to ownership or the board.

Evidence to have on file

  • Signed role descriptions, org chart, and succession plan for backups.
  • Annual objectives, meeting agendas, and compliance calendar.
  • Training records showing officer education and ongoing updates.

Conduct Comprehensive Risk Assessments

A risk analysis is the backbone of your HIPAA program. Inventory where PHI lives, evaluate threats and vulnerabilities, and document how you will reduce risk to a reasonable and appropriate level.

Scope and method

  • Identify assets and data flows: EHR, billing, email, cloud storage, endpoints, paper records, and vendors.
  • Evaluate likelihood and impact for threats such as phishing, ransomware, lost devices, and improper access.
  • Score risks, prioritize remediation, and assign owners and due dates.

Risk assessment documentation

  • Maintain a written report and risk register that maps findings to controls.
  • Track remediation plans, risk acceptance decisions, and verification of fixes.
  • Review at least annually and whenever major changes or incidents occur.

Evidence to present

  • Latest assessment report with methodology, data sources, and approvals.
  • Change logs, vulnerability scans, and penetration test summaries (if performed).
  • Closed tickets proving implemented safeguards and dates completed.

Develop and Update Policies and Procedures

Document what you do and do what you document. Policies translate requirements into repeatable procedures your team can follow and auditors can verify.

Core policy set

  • Privacy, uses/disclosures, minimum necessary, patient rights, and complaint handling.
  • Security: access control, password/MFA, workstation security, encryption, and change management.
  • Incident response, breach notification protocols, and sanction policy.
  • Device and media controls, mobile/BYOD, remote work, and third-party oversight.
  • Contingency planning: backup, disaster recovery, and business continuity.

HIPAA record retention requirements

Retain required HIPAA documentation—policies, risk analyses, training logs, BAAs, and related records—for six years from creation or last effective date, whichever is later. Keep a retention schedule and a documented destruction process.

Evidence to present

  • Version-controlled policy library with approval dates and owners.
  • Procedure checklists and forms aligned to day-to-day operations.
  • Attestations that staff have read and understand current policies.

Implement Staff Training Programs

People are your strongest control when they know what to do. Provide role-based, practical training that is easy to complete and easy to prove.

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Curriculum essentials

  • PHI vs. ePHI, minimum necessary, and acceptable use.
  • Recognizing phishing, social engineering, and suspicious attachments.
  • Secure handling of paper, portable media, and remote work practices.
  • Incident identification and immediate reporting paths.

Cadence and tracking

  • Train new hires promptly and all staff at least annually; provide refreshers after incidents or major changes.
  • Use quizzes, sign-offs, and completion reports; store records to meet HIPAA record retention requirements.
  • Apply and document sanctions for policy violations consistently.

Manage Business Associate Agreements

Vendors that create, receive, maintain, or transmit PHI must meet Business Associate Agreement (BAA) compliance. Know your vendors, contract clearly, and monitor performance.

Identify business associates

  • Examples: EHR and practice management platforms, cloud storage, billing and collections, IT MSPs, shredding, and transcription.
  • Maintain a complete inventory marking who touches PHI and how.

BAA essentials

  • Permitted uses/disclosures, required safeguards, and breach reporting duties.
  • Subcontractor flow-down, right to audit or receive attestations, and termination/return or destruction of PHI.
  • Defined notification time from BA to you for incidents (e.g., within 10 days) to support your timelines.

Ongoing oversight and evidence

  • Due diligence prior to engagement and periodic reviews thereafter.
  • Executed BAAs, security questionnaires, and assurance artifacts on file.
  • Documented process for terminating access and retrieving/destroying PHI.

Establish Breach Notification Processes

Incidents happen. Your goal is to detect quickly, contain effectively, assess consistently, and notify within required timelines with complete information.

Detection, triage, and risk assessment

  • Central intake: hotline, email, and ticketing to capture suspected incidents.
  • Use the four-factor assessment: nature/extent of PHI, unauthorized person, whether PHI was actually acquired/viewed, and mitigation actions.
  • Decide quickly if an incident is a breach and document your rationale.

Breach notification protocols and timelines

  • Notify affected individuals without unreasonable delay and no later than 60 calendar days after discovery.
  • Notify HHS for breaches affecting 500+ individuals without unreasonable delay and within 60 days; for fewer than 500, report to HHS no later than 60 days after the end of the calendar year.
  • If 500+ individuals in a state/jurisdiction are affected, notify prominent media within 60 days.
  • Your BA must notify you per the BAA in a defined timeframe so you can meet your obligations.
  • Use first-class mail or permitted email; include what happened, types of PHI, steps individuals should take, what you are doing, and contact information.

Evidence and improvement

  • Incident logs, investigation notes, copies of notices, and mailing proofs.
  • Root-cause analysis and corrective actions tracked to completion.
  • Tabletop exercises and lessons learned added to policies and training.

Secure Physical and Electronic PHI

Strong safeguards protect data and demonstrate due diligence. Focus on layered controls, verified by logs and reports your auditor can review.

PHI access controls

  • Unique user IDs, role-based access, and least privilege by default.
  • Multi-factor authentication for remote and administrative access.
  • Session timeouts, automatic logoff, and immediate termination of access upon role change.

ePHI encryption standards

  • Encrypt data at rest with AES-256 and in transit with TLS 1.2+.
  • Use full-disk encryption on laptops and mobile devices; enforce mobile device management.
  • Protect and rotate keys; prefer FIPS-validated cryptographic modules when available.

System hardening, monitoring, and resilience

  • Patch operating systems and applications promptly; disable unused services.
  • Endpoint protection and email security with phishing and malware controls.
  • Centralized audit logs with alerts for anomalous access; retain logs per your policy.
  • Backups tested regularly; define RTO/RPO and maintain an offsite copy.

Physical safeguards and media controls

  • Facility access controls, visitor logs, and secured workstations and filing areas.
  • Lockable storage for paper PHI; clean desk expectations.
  • Sanitize or destroy media before reuse or disposal (e.g., shredding, secure wipe aligned to recognized guidelines).

Conclusion

By assigning accountable officers, documenting risks and policies, training your team, governing vendors, preparing breach notification protocols, and enforcing PHI access controls with strong ePHI encryption standards, your small business will be audit-ready and resilient. Keep artifacts organized and current to make your HIPAA compliance audit checklist easy to prove.

FAQs

What are the key components of a HIPAA compliance audit checklist?

Core components include Privacy Officer designation and a named Security Officer, a documented risk assessment and risk management plan, approved policies and procedures, staff training records, Business Associate Agreement (BAA) compliance evidence, breach notification protocols, and technical/physical safeguards such as PHI access controls and encryption. Maintain dated records to satisfy HIPAA record retention requirements.

How often should small businesses conduct HIPAA risk assessments?

Perform a comprehensive assessment at least annually and whenever you introduce new systems, change vendors, experience incidents, or undergo major process changes. Update your risk assessment documentation as you remediate findings and after any significant events.

What policies are essential for maintaining HIPAA compliance in small businesses?

Essential policies cover privacy practices, uses and disclosures, minimum necessary, access control, authentication and MFA, encryption, device and media control, incident response and breach notification, sanctions, vendor/BAA management, backups and disaster recovery, remote work, and data retention aligned to HIPAA record retention requirements.

How should breaches of PHI be reported and managed?

Immediately contain and investigate, apply the four-factor risk assessment, and if a breach occurred, notify affected individuals without unreasonable delay and within 60 days. Report to HHS per thresholds and timelines, notify media for large incidents, and ensure your BA notifies you per the BAA. Document every step and implement corrective actions to prevent recurrence.

Share this article

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Related Articles