HIPAA Compliance Checklist for Ultrasound Clinics: Step-by-Step Guide

Product Pricing
Ready to get started? Book a demo with our team
Talk to an expert

HIPAA Compliance Checklist for Ultrasound Clinics: Step-by-Step Guide

Kevin Henry

HIPAA

February 10, 2026

8 minutes read
Share this article
HIPAA Compliance Checklist for Ultrasound Clinics: Step-by-Step Guide

Running an ultrasound clinic means you handle sensitive Protected Health Information (PHI) every day—from scheduling and intake to imaging, reporting, and billing. This HIPAA Compliance Checklist for Ultrasound Clinics: Step-by-Step Guide walks you through practical actions that align with Administrative Safeguards, Physical Safeguards, and Technical Safeguards so you can reduce risk and demonstrate compliance.

Use these steps to build a living program you can audit, measure, and improve. The guidance is educational and should be adapted with your compliance counsel to match your state laws, payer rules, and technologies.

Conduct Risk Assessment

Map PHI and Data Flows

List where PHI is created, received, maintained, and transmitted: front desk, ultrasound machines, PACS, reporting tools, EHR, billing, email, texting, backup media, and third-party services. Diagram how data moves between systems, people, and locations, including remote reads and portable carts.

Identify Threats and Vulnerabilities

Assess operational, physical, and cyber threats: misdirected results, unlocked workstations, lost media, ransomware, phishing, unsecured Wi‑Fi, tailgating, and improper disposal. Note vulnerabilities such as shared logins, outdated firmware on scanners, or missing encryption.

Evaluate Likelihood and Impact

Score each risk by probability and potential harm to patients and your organization. Consider volume of records, the sensitivity of imaging notes, and downstream effects like service disruption or reputational damage.

Prioritize and Plan Risk Management

Create a Risk Management plan that pairs top risks with controls, owners, budgets, and deadlines. Choose safeguards that are feasible for your clinic size but still meet the HIPAA Security Rule’s reasonable and appropriate standard.

Document, Review, and Repeat

Record methods, findings, and decisions. Review at least annually and whenever you add new equipment, change vendors, remodel facilities, or experience an incident. Keep versions to show progress during audits.

Implement Policies and Procedures

Build on Administrative Safeguards

Assign a Privacy Officer and Security Officer. Define governance, oversight cadence, and escalation paths. Write clear policies tailored to ultrasound workflows—registration, imaging, reporting, release of information, remote reads, and after-hours access.

Privacy Practices and Minimum Necessary

Set rules for who may access PHI and for what purpose. Limit screen visibility at check-in, use private spaces for patient discussions, and restrict printing. Define how you verify patient identity before disclosures.

Access Management, Sanctions, and Lifecycle

Standardize onboarding, role-based access, periodic access reviews, and prompt termination. Include sanctions for noncompliance and a process to correct behavior through coaching or discipline.

Incident Response and Breach Notification Rule

Document a step-by-step playbook: detect, contain, investigate, and assess risk; decide if a Breach Notification Rule trigger applies; notify affected individuals without unreasonable delay and no later than 60 days from discovery; report to regulators and, when applicable, media; and implement corrective actions.

Documentation and Retention

Maintain policy versions, training logs, risk assessments, BAAs, system inventories, audits, and incident records for required retention periods. Consistent documentation is essential evidence of compliance.

Ensure Staff Training

Role-Based Onboarding

Train every new hire on HIPAA basics, your privacy practices, secure workstation use, and how to report concerns. Add role-specific modules—sonographers, radiologists, front desk, billing, and IT—focused on real clinic scenarios.

Annual and Just-in-Time Refreshers

Provide annual refreshers covering policy updates and recent incidents. Reinforce learning with short, targeted reminders at the moment of need, such as secure texting tips before rolling out a new app.

Phishing, Social Engineering, and Clean Desk

Run simulations to build muscle memory for suspicious emails and calls. Teach staff to verify caller identity before discussing PHI and to keep desks clear of patient lists when leaving workstations.

Drills and Attestations

Conduct breach tabletop exercises and downtime drills. Collect signed attestations that staff understand policies. Track completion to demonstrate compliance during audits or payer reviews.

Establish Business Associate Agreements

Identify Your Business Associates

Inventory vendors that create, receive, maintain, or transmit PHI: cloud PACS providers, reporting platforms, offsite backup, billing and clearinghouses, IT support, transcription, secure messaging, and shredding services.

Core Terms in a Business Associate Agreement

Each Business Associate Agreement must define permitted uses and disclosures, require appropriate Administrative, Physical, and Technical Safeguards, mandate breach reporting timelines and cooperation, flow down obligations to subcontractors, and outline return or destruction of PHI at termination.

Due Diligence and Ongoing Oversight

Evaluate vendor security practices before signing. Keep a BAA inventory, review SOC reports or security attestations annually, and monitor performance against service and security expectations.

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Apply Physical Safeguards

Facility Access Controls

Secure imaging rooms, reading areas, and records storage with keys or badges. Use visitor sign-in and escorts in restricted spaces. Position waiting areas to reduce overheard conversations.

Workstation and Screen Security

Place check-in and technologist stations away from public view. Use privacy screens and automatic logoff. Prohibit shared generic logins; each user must have a unique ID.

Device and Media Controls

Track ultrasound machines, portable tablets, and removable media. Encrypt or securely wipe devices before reuse or disposal. Document chain of custody when moving equipment between sites.

Environmental and After-Hours Protections

Lock doors after hours, control cleaning crew access, and store printed schedules in secured cabinets. Ensure backup power for critical imaging systems and alarms for unauthorized entry.

Deploy Technical Safeguards

Access Controls and Authentication

Enforce role-based access, unique user IDs, strong passwords, and multi-factor authentication for remote access and cloud services. Remove or disable dormant accounts promptly.

Encryption and Secure Storage

Encrypt PHI at rest on servers, laptops, and portable media. Use TLS for data in transit—between scanners, PACS, reporting tools, and portals. Avoid storing PHI locally on workstations when network storage is available.

Audit Controls and Monitoring

Enable detailed audit logging on EHR, PACS, and imaging workstations. Review access for anomalies such as after-hours spikes or VIP snooping. Document investigations and outcomes.

Integrity and Transmission Security

Use checksums or hashing to detect tampering of images and reports. Segment networks (e.g., separate guest Wi‑Fi from clinical systems) and restrict inbound ports to reduce attack surface.

Contingency Planning and Backups

Back up critical systems and test restorations on a schedule. Maintain an emergency mode operations plan so you can register patients and capture images during outages, then reconcile data afterward.

Patch and Vulnerability Management

Keep operating systems, ultrasound device firmware, antivirus, and applications updated. Scan regularly for vulnerabilities and remediate based on risk, documenting exceptions with compensating controls.

Use Secure Communication

Patient Messaging and Reminders

Use secure portals or encrypted messaging for scheduling, prep instructions, and results. Verify phone numbers and consent preferences. Apply the minimum necessary rule to all outbound messages.

Image and Report Sharing

Transmit DICOM studies and finalized reports over encrypted channels. Avoid consumer email for PHI; if email is necessary, use encryption and verify recipients before sending.

Telemedicine and Remote Reads

Protect remote access with VPN and MFA. Limit local downloads, and prohibit saving PHI to personal devices. Log remote sessions and review them periodically.

eFax, Voicemail, and Texting

Route eFax to secure inboxes, not shared printers. Keep voicemails limited to call-back information unless the patient has authorized more detail. Use approved secure texting platforms with retention and auditing.

Documentation and Continuous Improvement

Record communication policies, system settings, and user training. Test fail-safes like address verification and bounced-message alerts. Update procedures after incidents or technology changes.

Conclusion

By executing a thorough risk assessment, enforcing fit-for-purpose policies, training your team, managing Business Associate Agreements, and layering Physical and Technical Safeguards with secure communication, you build a defensible, efficient HIPAA program tailored to ultrasound care.

FAQs.

What are the key components of HIPAA compliance for ultrasound clinics?

Core components include a documented risk assessment and Risk Management plan; Administrative Safeguards such as policies, governance, and access controls; Physical Safeguards for facilities, devices, and workstations; Technical Safeguards including authentication, encryption, logging, and backups; staff training; Business Associate Agreements for vendors handling PHI; and an incident response process aligned with the Breach Notification Rule.

How often should risk assessments be conducted for HIPAA?

Perform a comprehensive assessment at least annually and whenever you introduce new systems, remodel facilities, change vendors, expand services, or experience a security incident. Treat it as a continuous process by tracking risks, implementing mitigations, and reviewing progress throughout the year.

What types of safeguards are required to protect PHI?

HIPAA requires Administrative Safeguards (policies, workforce management, risk processes), Physical Safeguards (facility controls, workstation security, device/media handling), and Technical Safeguards (access control, encryption, audit logs, integrity and transmission protections). Use a layered approach so that if one control fails, others still protect PHI.

How should breaches of patient data be reported?

Activate your incident response plan immediately: contain the issue, investigate, and conduct a risk assessment. If the event meets the Breach Notification Rule threshold, notify affected individuals without unreasonable delay and no later than 60 days from discovery, report to regulators, and to the media if a large breach affects a jurisdiction. Document decisions, corrective actions, and lessons learned.

Share this article

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Related Articles