HIPAA Compliance Checklist for Gynecologists (OB/GYN Practices)

Check out the new compliance progress tracker


Product Pricing Demo Video Free HIPAA Training
LATEST
video thumbnail
Admin Dashboard Walkthrough Jake guides you step-by-step through the process of achieving HIPAA compliance
Ready to get started? Book a demo with our team
Talk to an expert

HIPAA Compliance Checklist for Gynecologists (OB/GYN Practices)

Kevin Henry

HIPAA

March 12, 2026

8 minutes read
Share this article
HIPAA Compliance Checklist for Gynecologists (OB/GYN Practices)

Use this HIPAA compliance checklist to build a practical, defensible program tailored to gynecology and obstetrics. It aligns daily workflows with HIPAA Privacy Rule Compliance, Security Safeguards Implementation, and Breach Notification Procedures while protecting Electronic Protected Health Information (ePHI) across your clinic, ultrasound suites, and on-call workflows.

Each section below translates regulatory expectations into concrete actions for scheduling, imaging, lab coordination, patient portal use, telehealth, and care coordination unique to OB/GYN services.

Conduct Comprehensive Risk Assessments

Scope your environment

  • Map where ePHI lives and moves: EHR, patient portal, ultrasound machines/PACS, fetal monitoring systems, billing/clearinghouses, secure texting, email, cloud storage, removable media, and telehealth platforms.
  • Include high-risk touchpoints: check-in kiosks, waiting-room conversations, faxing lab orders, third-party imaging, after-hours smartphone use, and vendor remote support.

Use a repeatable Risk Assessment Methodology

  • Inventory assets → identify threats and vulnerabilities → estimate likelihood and impact → assign risk ratings → document controls and residual risk.
  • Record evidence (network diagrams, device lists, encryption states, MFA coverage, audit log settings) to support findings and demonstrate ePHI Security due diligence.

Create and execute a risk management plan

  • Prioritize remediation by risk level; assign owners and due dates; track to closure with status notes and validation steps.
  • Reassess at least annually and whenever material changes occur (new EHR module, ultrasound device replacement, office move, telehealth rollout).

Develop and Document Policies and Procedures

Formal policies translate risk findings into everyday rules staff can follow. Keep them concise, role-based, and cross-referenced to procedures and forms.

  • Core set: privacy, minimum necessary, patient authorizations and marketing, sanctions, workforce security, acceptable use, password/MFA, bring-your-own-device, remote work/on-call, secure texting, email, faxing, social media/photography in clinic.
  • Security procedures: access provisioning/deprovisioning, audit log review, vulnerability/patch management, incident and Breach Notification Procedures, device and media controls, backup/restore testing, contingency and emergency operations.
  • Clinic operations: release of information, ultrasound image handling, lab result workflows, referral coordination, interpreter services, and front-desk privacy.
  • Version control every document, record approvals, list effective dates, and schedule annual reviews to maintain HIPAA Privacy Rule Compliance.

Provide Annual Staff Training and Maintain Documentation

Training must be organization-wide, role-specific, and scenario-driven so staff can apply policies under pressure.

  • Onboarding before system access; annual refreshers; targeted modules for front desk, MAs/sonographers, clinicians, billing, and IT.
  • Focus areas: minimum necessary disclosures, identity verification by phone, safe texting and portal messaging, photography during visits, social media pitfalls, ePHI on mobile devices, and secure handling of ultrasound images.
  • Security awareness: phishing simulations, reporting suspicious activity, clean desk, locking screens, recognizing ransomware precursors.
  • Maintain signed attestations, training rosters/LMS records, and quiz results; tie training to the sanctions policy for accountability.

Ensure Business Associate Agreements and Vendor Compliance

Vendors that create, receive, maintain, or transmit ePHI for your practice must have Business Associate Agreements (BAAs) and demonstrate safeguards.

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Business Associate Agreement Requirements

  • Permitted uses/disclosures, safeguard obligations, incident and breach notification timeframes, subcontractor flow-down, right to audit, and termination/data return or destruction.
  • Clarify encryption, MFA, logging, and data location; require prompt notice of security events and meaningful visibility into remediation.

Risk-based vendor management

  • Collect security questionnaires and evidence (e.g., SOC 2 summaries, penetration test letters, HIPAA attestations) proportional to data exposure.
  • Inventory all vendors: EHR/portal, billing and RCM, clearinghouse, secure messaging, telehealth, cloud PACS, transcription, shredding, IT support, and backup providers.
  • Renew BAAs and re-evaluate vendor controls annually or upon service changes.

Establish Incident Response and Breach Management Plans

When something goes wrong, speed and structure protect patients and your practice. Define roles for a Privacy Officer and Security Officer with alternates.

Incident response lifecycle

  • Detect and triage; contain (isolate a device, disable an account); preserve evidence (logs, screenshots, email headers); eradicate the cause; recover operations; and communicate.
  • Document facts, timelines, and decisions in an incident log. Keep all artifacts with your case file for retention.

Breach Notification Procedures

  • Conduct a breach risk assessment considering nature of ePHI, unauthorized person, whether data was acquired or viewed, and mitigation.
  • If notification is required, prepare accurate patient letters, notify regulators as applicable, and coordinate media notices when thresholds are met.
  • Implement corrective actions (policy updates, re-training, technical hardening) and verify effectiveness.

Maintain and Distribute Updated Notice of Privacy Practices

  • Provide the Notice of Privacy Practices (NPP) at the first visit; post it prominently in the office and make it easily available via your patient-facing channels.
  • Capture patient acknowledgments or document good-faith efforts; maintain versions with effective dates and summaries of changes.
  • Ensure readability, multilingual access as needed, and accessible formats for patients with disabilities.

Implement Patient Rights Management Procedures

Codify how your team handles Patient Rights to Access Records and other Privacy Rule rights with clear timelines and forms.

  • Access: provide records in the requested format when readily producible (electronic when feasible), verify identity, and maintain request/response logs.
  • Fees: apply only reasonable, cost-based fees for copies; publish your fee schedule and train staff to explain it.
  • Amendment: define how providers review and respond to amendment requests and how accepted amendments are appended to the record.
  • Restrictions and confidential communications: accommodate reasonable requests (e.g., alternate address/phone) and flag charts appropriately.
  • Special scenarios: proxies for minors, sensitive reproductive health information, and handling of imaging files and photos captured during care.

Apply Administrative Physical and Technical Security Safeguards

Administrative safeguards

  • Assign security responsibility; implement role-based access; review access quarterly; promptly deprovision terminated staff and graduates.
  • Run vulnerability and patch management, backup/restore testing, and documented change management for EHR updates and device replacements.

Physical safeguards

  • Control facility access; secure server/network rooms; use privacy filters in registration areas; position ultrasound monitors to limit incidental viewing.
  • Apply device and media controls: asset tags, encrypted drives, secure disposal with certificates of destruction, and procedures for wiping ultrasound and portable devices.

Technical safeguards

  • Unique user IDs, strong passwords, and multi-factor authentication for EHR, portal admin, email, VPN, and remote access.
  • Encrypt ePHI in transit and at rest; enable automatic logoff and session timeouts on workstations and ultrasound machines.
  • Centralized logging and alerting; review audit logs routinely; deploy endpoint protection and mobile device management with remote wipe.
  • Segment networks for clinical devices; restrict USB; secure email with transport encryption and enforce secure messaging for PHI.

Maintain Documentation and Record Retention Protocols

  • Keep risk analyses and management plans, policies and procedures, BAAs, training records, incident/breach files, access reviews, and audit logs.
  • Retain required HIPAA documentation for at least six years from creation or last effective date; apply longer periods if state law or payer rules require.
  • Use secure, tamper-evident storage with permissions, versioning, and reliable backups; catalog where each record type is stored and who can access it.

Perform Continuous Monitoring and Compliance Updates

  • Review security alerts and audit logs; conduct quarterly user access reviews and periodic phishing tests; validate backups and restores.
  • Re-evaluate vendors annually; update BAAs as services change; confirm subcontractor flow-down.
  • Run an annual risk assessment and policy review; track corrective actions to completion with measurable outcomes.
  • Measure and report: training completion rates, incident mean time to contain, patch cadence, encryption/MFA coverage, and open risk items.

Conclusion

This HIPAA compliance checklist equips OB/GYN practices with a clear, actionable path to HIPAA Privacy Rule Compliance, robust Security Safeguards Implementation, and reliable Breach Notification Procedures. By operationalizing policies, training your team, governing vendors, and monitoring continuously, you protect patients and sustain a resilient, audit-ready program.

FAQs.

What are the key HIPAA requirements for gynecologists?

Focus on three pillars: safeguard ePHI (administrative, physical, and technical controls), uphold privacy rights (minimum necessary, authorizations, and Patient Rights to Access Records), and maintain Breach Notification Procedures. Support everything with documented policies, workforce training, vendor BAAs, and consistent monitoring.

How often should risk assessments be conducted in OB/GYN practices?

Perform a comprehensive assessment at least annually and whenever you introduce significant changes—new ultrasound equipment, EHR modules, telehealth, office moves, or vendor shifts. Update the risk register and remediation plan as controls evolve and new threats emerge.

What training is required annually for staff under HIPAA?

Provide organization-wide privacy and security training with role-specific modules, onboarding before system access, and yearly refreshers. Include phishing awareness, secure texting/portal use, release-of-information workflows, identity verification, and sanctions policy acknowledgment, with completion records retained.

How should incidents and breaches be documented and reported?

Log the timeline, systems involved, ePHI affected, containment steps, investigation results, and corrective actions. Conduct a breach risk assessment to determine notification duties, follow defined Breach Notification Procedures and internal escalation paths, and retain all evidence and communications for the required period.

Share this article

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Related Articles