HIPAA Compliance Checklist for Employers: Personnel Records, PHI, and Legal Risks

Check out the new compliance progress tracker


Product Pricing Demo Video Free HIPAA Training
LATEST
video thumbnail
Admin Dashboard Walkthrough Jake guides you step-by-step through the process of achieving HIPAA compliance
Ready to get started? Book a demo with our team
Talk to an expert

HIPAA Compliance Checklist for Employers: Personnel Records, PHI, and Legal Risks

Kevin Henry

HIPAA

December 01, 2024

7 minutes read
Share this article
HIPAA Compliance Checklist for Employers: Personnel Records, PHI, and Legal Risks

This HIPAA compliance checklist for employers clarifies when the law applies, how to handle protected health information (PHI), and where legal risks live inside personnel processes. Use it to separate employment records from plan-related PHI and build practical controls that stand up to audits and incidents.

HIPAA Applicability to Employers

Most employers are not HIPAA covered entities in their role as employers. HIPAA usually applies when you sponsor a group health plan, health FSA, HRA, EAP, on-site clinic, or similar benefit that is a covered entity. In that case, the plan—not your entire company—is covered, and you act as the plan sponsor.

Large organizations often operate as a hybrid entity—sometimes informally called a partial covered entity—by designating specific covered components (for example, the group health plan) and firewalling them from non-covered business units. Personnel records you keep as an employer (e.g., FMLA notes, drug tests, ADA accommodations) are employment records, not PHI under HIPAA, though other laws still protect them.

  • Confirm whether your organization is a hybrid/partial covered entity and formally designate covered components.
  • Amend plan documents to permit limited PHI sharing with the plan sponsor and implement HIPAA “firewalls.”
  • Limit uses and disclosures to plan administration; prohibit use of PHI for employment decisions.
  • Identify all business associates and put a business associate agreement in place before any PHI flows.

Handling of Protected Health Information

Map where PHI enters, moves, and is stored across enrollment, eligibility, claims support, COBRA, and vendor portals. Keep plan PHI separate from personnel files and other HR systems. Apply the minimum necessary standard and use role-based access for workforce members who support plan operations.

Implement administrative, technical safeguards, and physical safeguards that match your risk profile. Encrypt PHI at rest and in transit, control remote access, and monitor for unauthorized viewing or downloads. De-identify or aggregate data whenever possible to reduce exposure.

  • Create a PHI data map covering intake, storage, transmission, and disposal.
  • Apply role-based access, strong authentication, and session timeouts; log and review access.
  • Encrypt laptops, mobile devices, backups, and cloud storage; use secure file transfer for vendors.
  • Segregate plan PHI from general HR/personnel records; restrict print, scan, and mail workflows.
  • Execute and manage each business associate agreement (TPAs, brokers, benefits tech, COBRA, PBMs).
  • Harden facilities with badge access, visitor controls, clean-desk practices, and secure shredding.

Risk Assessment and Management

Conduct a formal Security Rule risk analysis to identify threats to the confidentiality, integrity, and availability of ePHI. Use the results to prioritize remediation and track progress in a living risk management plan aligned to your budget and resources.

  • Inventory systems handling ePHI (email, HRIS integrations, SFTP sites, vendor portals, archives).
  • Evaluate vulnerabilities (phishing, misconfiguration, overbroad access, legacy devices, shadow IT).
  • Score likelihood and impact, then document and assign remediation owners and target dates.
  • Implement controls: patching, configuration baselines, DLP, MDM, encryption, and backup testing.
  • Test incident response with tabletop exercises; incorporate lessons learned into the plan.
  • Reassess at least annually and at major changes (vendor onboarding, system migrations, mergers).

Employee Training and Awareness

Train workforce members who handle plan PHI on privacy, security, and acceptable use. Emphasize the difference between employment records and PHI, the minimum necessary standard, and how to escalate suspected incidents quickly.

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

  • Deliver role-based training at hire and annually; add refreshers for high-risk roles and vendors.
  • Cover phishing awareness, secure data handling, approved tools, and sanction policies.
  • Practice verification before disclosing PHI (identity checks, authorization validation).
  • Provide clear, simple reporting channels for privacy or security incidents 24/7.

Documentation and Record Keeping

Documentation is both a compliance requirement and your best evidence in an investigation. Maintain current policies, procedures, risk analyses, risk management plan, training rosters, sanction records, incident logs, and executed business associate agreements.

Keep employment records separate from plan PHI. For the plan, maintain a Notice of Privacy Practices, accounting of disclosures where required, and retention schedules that reflect federal and state requirements.

  • Maintain written privacy/security policies, procedures, and a current risk management plan.
  • Retain BAAs, plan amendments, NPP, access logs, audits, and incident/breach documentation.
  • Use version control and documented approvals; archive superseded policies per retention rules.
  • Periodically test that documentation matches reality through internal audits.

Breach Notification Requirements

The breach notification rule requires notice following a breach of unsecured PHI. After containing an incident, perform a risk assessment to determine the probability that PHI was compromised. If notification is required, inform affected individuals without unreasonable delay and no later than 60 calendar days after discovery.

For incidents affecting 500 or more residents of a state or jurisdiction, you must also notify regulators and prominent media; for fewer than 500, you record the event and submit a yearly log. Business associates must notify the covered entity so required notices can go out on time.

  • Activate incident response: contain, preserve evidence, and begin risk assessment.
  • Decide if safe-harbor applies (e.g., strong encryption) or if an exception fits; otherwise notify.
  • Prepare notices with required content and send within statutory timelines; document decisions.
  • Coordinate with vendors under your business associate agreement and update your breach log.
  • Implement corrective actions to prevent recurrence and improve controls.

Penalties for Non-Compliance

Regulators assess civil monetary penalties on a tiered scale based on culpability (from reasonable cause to willful neglect) and may impose corrective action plans. Criminal penalties can apply for certain wrongful disclosures. State attorneys general, contractual claims, and reputational harm add significant risk beyond federal enforcement.

  • Lower enforcement risk by maintaining accurate documentation, timely breach responses, and complete BAAs.
  • Demonstrate due diligence with current risk analyses, a funded risk management plan, and tested incident response.
  • Sustain technical safeguards and physical safeguards that match evolving threats and business changes.

Conclusion

HIPAA applies to the plan, not your entire business. Keep plan PHI separate from personnel records, lock down vendors with BAAs, implement administrative, technical, and physical safeguards, and document everything. Following this HIPAA compliance checklist for employers reduces legal exposure and builds trust with your workforce.

FAQs.

When does HIPAA apply to employers?

HIPAA applies when you operate or sponsor a covered health plan or component (e.g., group health plan, HRA, health FSA, EAP, on-site clinic). In that context, the plan is the covered entity and the employer acts as plan sponsor, often within a hybrid/partial covered entity structure. Routine personnel records you hold as an employer are not PHI under HIPAA.

How should employers protect employee PHI?

Map PHI flows, separate plan PHI from personnel files, limit access by role, and apply administrative, technical safeguards, and physical safeguards. Encrypt data, monitor access, train staff, and execute a business associate agreement with each vendor that handles PHI for your plan.

What are the consequences of HIPAA non-compliance?

Consequences include tiered civil monetary penalties, corrective action plans, potential criminal exposure for certain wrongful disclosures, state enforcement, contractual liability with vendors, and reputational damage. Poor documentation and delayed notifications increase penalty risk.

How do breach notification requirements affect employers?

If unsecured PHI is breached, you must investigate promptly and, when required, notify affected individuals without unreasonable delay and within 60 days of discovery. Incidents affecting 500 or more residents also trigger regulator and media notices; smaller incidents are logged and reported annually. Business associates must notify your plan so you can meet these deadlines.

Share this article

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Related Articles