HIPAA Compliance Checklist for Patient Navigators: A Step-by-Step Guide to Protecting PHI

Product Pricing
Ready to get started? Book a demo with our team
Talk to an expert

HIPAA Compliance Checklist for Patient Navigators: A Step-by-Step Guide to Protecting PHI

Kevin Henry

HIPAA

April 16, 2026

6 minutes read
Share this article
HIPAA Compliance Checklist for Patient Navigators: A Step-by-Step Guide to Protecting PHI

As a patient navigator, you sit at the intersection of care coordination and privacy protection. This step-by-step HIPAA Compliance Checklist helps you prevent Unauthorized Disclosure, uphold the HIPAA Privacy Rule and HIPAA Security Rule, and safeguard Protected Health Information (PHI) every day.

Understanding HIPAA Compliance

What patient navigators must know

  • HIPAA Privacy Rule: Governs how PHI may be used and disclosed, and grants patients rights to access and amend records.
  • HIPAA Security Rule: Requires administrative, physical, and technical safeguards to protect electronic PHI (ePHI).
  • Breach Notification: Mandates timely notification to affected individuals and regulators after certain security incidents.

Core principles to apply

  • Minimum necessary: Access, use, and share only the PHI needed to perform your task.
  • Identity verification: Confirm patient identity using two identifiers before discussing PHI.
  • Authorized pathways: Share PHI for treatment, payment, and healthcare operations, or with valid patient authorization.
  • Document everything: Keep records of disclosures, authorizations, and your role-specific procedures.

Securing Protected Health Information

Administrative safeguards

  • Complete role-based risk assessments to identify where you touch PHI and how to reduce exposure.
  • Follow written policies for data handling, remote work, Bring Your Own Device (BYOD), and vendor management.
  • Use approved tools only; never store PHI in personal email, notes, or cloud drives.

Physical safeguards

  • Clean desk: Lock paper files, use privacy screens, and keep visitor-access areas free of PHI.
  • Secure printing and faxing: Use cover sheets, verify numbers, and retrieve documents immediately.
  • Device security: Do not leave laptops or smartphones unattended; enable auto-lock and tracking.

Technical safeguards

  • Encryption Standards: Use device encryption (e.g., AES-256 at rest) and encrypted channels (e.g., TLS 1.2+ in transit).
  • Endpoint hygiene: Keep systems patched; use anti-malware/EDR and disable risky browser extensions.
  • Backups: Ensure PHI stored in approved systems is backed up and recoverable.

Daily checklist

  • Access PHI only through your organization’s secure applications.
  • Confirm recipient identity and contact details before sending PHI.
  • Log out or lock your screen whenever stepping away.

Implementing Secure Communication

Email and portals

  • Prefer patient portals or secure messaging for PHI. If emailing, use approved encryption and limit content to the minimum necessary.
  • Double-check recipients, especially auto-complete; add a verification step for external addresses.

Text, chat, and collaboration tools

  • Use only sanctioned, encrypted messaging platforms with audit trails; avoid standard SMS for PHI.
  • Never paste PHI into public or unapproved chat channels.

Phone and voicemail

  • Authenticate with two identifiers before discussing PHI.
  • Leave minimal voicemail details; request a call-back to a verified number for specifics.

Telehealth and video

  • Use HIPAA-ready video platforms with encryption and access controls.
  • Conduct calls in private spaces and confirm who can overhear on both ends.

Conducting Regular Training

Compliance Training essentials

  • Onboarding: Complete Privacy and Security fundamentals before accessing PHI.
  • Annual refreshers: Reinforce the HIPAA Privacy Rule, HIPAA Security Rule, and current threat patterns.
  • Role-based scenarios: Practice real workflows (referrals, benefits checks, transportation) to reduce errors.

Measuring effectiveness

  • Track attendance, quiz results, and policy attestations.
  • Run phishing simulations and spot checks on physical security.
  • Update training after technology changes or incidents.

Managing Incident Response

Recognize and report quickly

  • Report any suspected Unauthorized Disclosure, lost device, misdirected message, or suspicious email immediately.
  • Do not delete evidence; preserve emails, logs, and files.

Contain, investigate, and assess

  • Contain exposure (e.g., recall email, remote-wipe a device, disable compromised accounts).
  • Document the four-factor risk assessment: data sensitivity, unauthorized recipient, whether PHI was actually viewed, and mitigation steps taken.

Breach Notification steps

  • Coordinate with privacy/security officers to determine if notification is required.
  • If required, notify affected individuals without unreasonable delay and no later than the regulatory deadline; follow regulator and media notice rules based on impact size.
  • Provide clear guidance to affected individuals and offer support resources where appropriate.

Post-incident improvements

  • Identify root causes, update procedures, and deliver targeted retraining.
  • Monitor for recurrence and verify that corrective actions are effective.

Enforcing Access Controls

Role-based access and least privilege

  • Request only the permissions needed for your duties; avoid shared accounts.
  • Use “break-glass” emergency access only with documented justification and automatic auditing.

Authentication and session management

Monitoring and reviews

  • Review access rights regularly and remove access immediately when roles change.
  • Check audit logs for unusual activity and report anomalies promptly.

Ensuring Proper PHI Disposal

Paper records

  • Use locked shred bins and cross-cut shredding; never place PHI in regular trash or recycling.
  • Confirm retention requirements before destroying records; document destruction dates.

Electronic media

  • Follow approved wipe or sanitization procedures before reusing or disposing of devices.
  • Physically destroy media when required and obtain certificates of destruction from vendors.

Operational controls

  • Remove PHI from whiteboards and shared spaces after use.
  • Clear downloads and local caches that may store PHI temporarily.

Summary

By applying the minimum necessary standard, secure communication practices, strong access controls, and timely Breach Notification, patient navigators can consistently protect PHI. Pair these controls with ongoing Compliance Training, documented procedures, and vigilant incident response to maintain a reliable HIPAA compliance posture.

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

FAQs

What are the key HIPAA requirements for patient navigators?

Focus on the HIPAA Privacy Rule for permitted uses/disclosures of PHI, the HIPAA Security Rule for safeguarding ePHI, and Breach Notification obligations after qualifying incidents. In daily work, verify identities, apply the minimum necessary standard, use approved secure systems, and document disclosures and authorizations.

How can patient navigators secure electronic PHI?

Access ePHI only through approved applications; use MFA, strong passwords, and device encryption aligned with organizational Encryption Standards. Keep systems patched, avoid unapproved storage, verify recipients before sending PHI, and prefer secure portals or encrypted messaging over email or SMS.

What steps should be taken after a HIPAA breach?

Report immediately, contain exposure (remote wipe, recall messages, disable accounts), and support the organization’s risk assessment. If notification is required, coordinate timely Breach Notification to affected individuals and regulators, then implement corrective actions and targeted training to prevent recurrence.

Share this article

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Related Articles