HIPAA Compliance Checklist for Small Business: Step-by-Step Guide to Protect Patient Data

Check out the new compliance progress tracker


Product Pricing Demo Video Free HIPAA Training
LATEST
video thumbnail
Admin Dashboard Walkthrough Jake guides you step-by-step through the process of achieving HIPAA compliance
Ready to get started? Book a demo with our team
Talk to an expert

HIPAA Compliance Checklist for Small Business: Step-by-Step Guide to Protect Patient Data

Kevin Henry

HIPAA

February 24, 2024

7 minutes read
Share this article
HIPAA Compliance Checklist for Small Business: Step-by-Step Guide to Protect Patient Data

This step-by-step HIPAA compliance checklist for small business owners shows you how to protect Protected Health Information (PHI) with practical actions you can implement right away. Use it to build strong Compliance Documentation and a sustainable program that fits your size and risk profile.

The guidance below focuses on clear procedures, accountability, and continuous improvement. Adapt each step to your workflows, technologies, and partners so policies translate into daily practice.

Conduct Annual Risk Assessments

A structured risk assessment reveals where PHI is created, received, maintained, or transmitted and which threats matter most. Treat it as the engine of your security and privacy program, not a one‑time task.

Define scope and assets

Map every place PHI lives—EHRs, billing systems, email, cloud storage, mobile devices, paper files, and third‑party platforms. Note data flows, user roles, and business processes touching PHI.

Apply a Risk Assessment Protocol

Identify threats and vulnerabilities, evaluate likelihood and impact, and record existing controls. Rate each risk, select treatments (mitigate, transfer, accept), and assign owners and due dates.

Document and prioritize

Create a risk register, remediation plan, and executive summary as core Compliance Documentation. Prioritize quick, high‑value fixes such as access cleanup, patching, and configuration hardening.

Reassess after change

Update the assessment whenever you adopt new systems, change vendors, move offices, or experience incidents. Continuous reassessment keeps controls aligned with real‑world operations.

Develop Policies and Procedures

Policies set expectations; procedures convert them into repeatable steps. Keep them concise, role‑based, and easy to follow during busy clinic or office operations.

Build the core policy set

  • Privacy, minimum necessary, and patient rights.
  • Access management, authentication, and sanctions.
  • Device and media handling, retention, and disposal.
  • Contingency planning, backup, and restoration.
  • Data Breach Notification procedures and incident reporting.

Make policies operational

Provide checklists, forms, and job aids for common tasks such as onboarding, offboarding, permission changes, and vendor intake. Require sign‑offs to prove understanding.

Control versions and evidence

Record approvals, effective dates, and review cycles. Store signed acknowledgments and change logs with your Compliance Documentation for audit‑ready proof.

Provide Employee Training

People protect PHI when training is practical, memorable, and relevant to daily work. Deliver short, role‑based modules and reinforce them regularly.

Cover essential topics

  • What counts as Protected Health Information and the “minimum necessary” standard.
  • Passwords, phishing awareness, secure messaging, and workstation use.
  • Physical Security Controls, device and media handling, and remote work practices.
  • Incident reporting steps and Data Breach Notification awareness.

Measure and reinforce

Track completion, quiz results, and phishing simulations. Coach managers to model good behavior, and refresh training when systems, policies, or risks change.

Keep training records

Maintain rosters, curricula, dates, and scores as Compliance Documentation. These artifacts demonstrate due diligence during audits or investigations.

Establish Business Associate Agreements

Any vendor that creates, receives, maintains, or transmits PHI on your behalf must sign a Business Associate Agreement (BAA) before work begins. Inventory these partners and standardize your intake process.

Know when a BAA is required

Examples include EHR and billing platforms, cloud storage, IT support, shredding services, and outsourced transcription. If in doubt, perform a quick risk screening and request assurances.

Include the right protections

  • Permitted uses and disclosures of PHI.
  • Security obligations and Technical Safeguards expectations.
  • Subcontractor flow‑down requirements.
  • Incident reporting and Data Breach Notification responsibilities.
  • Return or secure destruction of PHI at termination.
  • Audit rights and cooperation during investigations.

Perform vendor due diligence

Evaluate security controls, insurance, and independent assessments. Record findings and decisions in your Compliance Documentation, and re‑review vendors on a defined cadence.

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Implement Security Measures

Layer Administrative, Physical, and Technical Safeguards to reduce the likelihood and impact of threats. Choose controls that are effective, affordable, and realistic for your team.

Administrative safeguards

  • Account and access lifecycle: provisioning, changes, and timely deprovisioning.
  • Risk management: track remediation to closure and verify results.
  • Vendor management: BAA enforcement and security reviews.
  • Contingency plans: backups, alternative workflows, and communication trees.

Physical Security Controls

  • Facility access controls, visitor logs, and workstation positioning.
  • Locked storage for paper PHI and portable media.
  • Screen locks, privacy filters, and clean‑desk practices.
  • Secure device disposal with certificates of destruction.

Technical Safeguards

  • Strong authentication, least‑privilege access, and role‑based permissions.
  • Encryption for data in transit and at rest; automatic logoff on shared devices.
  • Endpoint protection, patch management, and configuration baselines.
  • Audit logging, integrity monitoring, and alerts for suspicious activity.
  • Reliable, tested backups with secure storage and restoration drills.

Practical small‑business moves

  • Use vetted cloud services that support HIPAA requirements and BAAs.
  • Standardize devices, automate updates, and centralize security settings.
  • Adopt secure email and messaging for PHI, with safeguards against mis‑send.
  • Harden mobile access with screen locks, encryption, and remote wipe.

Maintain Incident Response Plan

An incident response plan turns chaos into a coordinated effort. Define roles, decision criteria, and communication channels before you need them.

Follow a clear lifecycle

Prepare, identify, contain, eradicate, recover, and conduct lessons learned. Document timelines, actions taken, and approvals to preserve evidence and accountability.

Coordinate Data Breach Notification

Determine whether unsecured PHI was compromised, record your risk analysis, and carry out notifications to affected individuals and other parties as required. Keep templates, FAQs, and talking points ready.

Practice and improve

Run tabletop exercises using realistic scenarios like lost devices, misdirected email, or ransomware. Update playbooks and contact trees after each exercise or real event.

Perform Regular Audits and Reviews

Audits verify that policies are working as intended and reveal drift before it becomes risk. Plan reviews on a recurring schedule and tie results to leadership reporting.

Monitor systems and access

Review access rights, audit logs, and alerts for unusual behavior. Validate that terminated users lose access promptly and that shared accounts are avoided.

Refresh policies and training

Revisit documents and courses regularly or when technology, regulations, or business processes change. Track completion and effectiveness with metrics, not just checkboxes.

Assess vendors and agreements

Confirm each Business Associate Agreement remains current and reflects reality. Request updated security attestations and verify subcontractor compliance where applicable.

Measure and report

Use practical indicators—training completion, patching rates, backup success, incident closure times—to guide investments and demonstrate progress to leadership.

Summary and next steps

Start with a thorough risk assessment, formalize policies and training, secure vendor relationships with a strong Business Associate Agreement, implement layered safeguards, and keep an exercised incident plan. Reinforce everything with audits and solid Compliance Documentation.

FAQs

What are the essential steps for HIPAA compliance?

Begin with a risk assessment, then publish clear policies and procedures, train your workforce, execute Business Associate Agreements with vendors handling PHI, implement Administrative, Physical, and Technical Safeguards, maintain an incident response plan with Data Breach Notification workflows, and perform ongoing audits with thorough Compliance Documentation.

How often should small businesses conduct risk assessments?

Most small organizations perform a formal assessment annually and whenever there are significant changes—such as new systems, new vendors, office moves, or security incidents—to keep controls aligned with real risks.

What should be included in employee HIPAA training?

Cover what constitutes Protected Health Information, minimum necessary use, secure access and passwords, phishing and social engineering, Physical Security Controls, device and media handling, secure communication, incident reporting steps, and awareness of Data Breach Notification responsibilities relevant to each role.

How do business associate agreements protect patient data?

A Business Associate Agreement contractually requires vendors to safeguard PHI, restricts how it can be used or disclosed, extends protections to subcontractors, mandates prompt incident reporting and Data Breach Notification, and sets expectations for returning or destroying PHI—creating enforceable accountability beyond your organization.

Share this article

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Related Articles