HIPAA Compliance During a Merger or Acquisition: Due Diligence Checklist & Best Practices

Product Pricing
Ready to get started? Book a demo with our team
Talk to an expert

HIPAA Compliance During a Merger or Acquisition: Due Diligence Checklist & Best Practices

Kevin Henry

HIPAA

January 20, 2026

8 minutes read
Share this article
HIPAA Compliance During a Merger or Acquisition: Due Diligence Checklist & Best Practices

Mergers and acquisitions in healthcare compress risk into tight timelines. Getting HIPAA right protects patients, preserves deal value, and prevents costly remediation after close. Use this practical guide to plan and execute a defensible due diligence process, map Electronic Protected Health Information (ePHI), and standardize controls for a smooth integration.

Across each section you’ll find checklists and best practices anchored in core HIPAA obligations and supported by a Risk Management Plan and a tested Incident Response Plan. Terms such as Protected Health Information (PHI), Business Associate Agreement (BAA), Affiliated Covered Entity (ACE), and Organized Health Care Arrangement (OHCA) are used exactly as they apply during M&A.

Conducting Due Diligence Reviews

Objectives and scope

Define what you will review and why. Focus on HIPAA Privacy, Security, and Breach Notification requirements, current PHI uses and disclosures, and operational readiness. Establish “clean team” rules so pre-close information sharing follows the minimum necessary standard and avoids impermissible disclosures of PHI.

Artifacts to request

  • Most recent HIPAA security risk analysis, Risk Management Plan, and corrective action tracker.
  • Privacy and security policies, workforce training records, and sanctions history.
  • System inventory containing ePHI, data flow diagrams, and third-party/vendor list.
  • Incident Response Plan, last 24–36 months of incident logs, and post-incident reviews.
  • All BAAs (active, expired, pending), plus subcontractor lists and cloud service addenda.
  • Designations such as ACE or OHCA, plus Notices of Privacy Practices and patient forms.

Interviews and walkthroughs

  • Meet the Privacy Officer, Security Officer, compliance lead, and key system owners.
  • Observe user provisioning, termination, and access reviews for systems with ePHI.
  • Walk through a recent security incident from detection through containment and lessons learned.

Testing and validation

  • Spot-check access logs for minimum-necessary adherence and anomalous patterns.
  • Verify encryption status for data at rest and in transit on high-risk systems.
  • Reconcile vendor inventory to executed BAAs; sample subcontractor coverage.

Red flags

  • No documented Risk Management Plan or recurring gaps without remediation dates.
  • BAAs missing, outdated, or silent on subcontractors and breach reporting.
  • Unmapped data flows, shadow IT, or broad workforce access to PHI.

Deliverables

  • Issue log with severity, business impact, and owner; integration “Day 1” risk controls.
  • Deal-level compliance representation and warranty inputs and remediation budget.

Mapping Electronic Protected Health Information

Build a complete ePHI inventory

Identify every location where ePHI resides or transits. Use short workshops and system questionnaires to document assets, owners, and data classifications. Tie each entry to a designated system of record and an accountable steward.

  • Common sources: EHR/EMR, patient portals, billing/RCM, imaging/PACS, labs, CRM, care management, claims clearinghouses, file shares, SFTP, backups, and analytics platforms.
  • Attributes to capture: PHI types, volume, sensitivity, user roles, retention, encryption, and related BAAs.

Map end-to-end data flows

  • Diagram collection, processing, storage, sharing, and disposal for PHI and ePHI.
  • Mark cross-entity flows (target ↔ acquirer), cross-border paths, and third-party endpoints.
  • Flag risky patterns: bulk exports, unencrypted transfers, shared service accounts.

Apply minimum necessary and lifecycle controls

  • Right-size access via role-based access control; document exceptions and approvals.
  • Define retention and secure disposal aligned to clinical, legal, and operational needs.
  • For analytics, consider de-identification or limited data sets with data use agreements.

Assessing Cybersecurity Measures

Foundational safeguards

  • Asset management: up-to-date inventory, ownership, and criticality ratings.
  • Identity and access management: MFA, least privilege, privileged access monitoring, and periodic certifications.
  • Network security: segmentation for ePHI systems, secure remote access, and hardened configurations.

Data protection and resilience

  • Encryption for data at rest/in transit; key management with separation of duties.
  • Backups: immutable copies, tested restores, and recovery time objectives for clinical systems.
  • Data loss prevention covering email, endpoints, and cloud storage handling PHI.

Detection and response

  • Centralized logging, alerting, and 24x7 monitoring for high-risk assets.
  • Documented Incident Response Plan with roles, runbooks, tabletop exercises, and forensics readiness.
  • Third-party breach escalation path aligned with BAA obligations.

Assurance and evidence

  • Vulnerability scanning cadence, patch SLAs, and recent penetration test results with remediation proof.
  • Security exceptions register with compensating controls and risk acceptance approvals.

Cyber red flags

  • No MFA for remote or admin access; flat networks connecting clinical and office systems.
  • Unmonitored logs, unsupported software, or untested backups for ePHI systems.

Evaluating Business Associate Agreements

Inventory and rationalize

Create a single source of truth for all Business Associate Agreements, including subcontractors and cloud platforms that create, receive, maintain, or transmit PHI. Map each BAA to the systems and data flows it covers.

Ready to assess your HIPAA security risks?

Join thousands of organizations that use Accountable to identify and fix their security gaps.

Take the Free Risk Assessment

Key clauses to review

  • Permitted uses/disclosures; minimum necessary; de-identification and limited data sets.
  • Safeguards aligned to HIPAA Security Rule; audit and right-to-inspect provisions.
  • Breach and incident notification triggers, timeframes, cooperation, and forensics access.
  • Subcontractor flow-down, indemnification, insurance, termination, and PHI return/destruction.

ACE and OHCA implications

  • Affiliated Covered Entity (ACE): combine certain covered entities for HIPAA compliance; evaluate whether ACE status simplifies internal data sharing and notice obligations.
  • Organized Health Care Arrangement (OHCA): coordinate clinically integrated activities while maintaining separate covered entities; ensure BAAs and notices reflect OHCA participation.

Remediation playbook

  • Close gaps with BAA amendments; add subcontractor and cloud-specific language.
  • Prioritize vendors by PHI volume, sensitivity, and business criticality.
  • Embed BAA checkpoints in procurement, onboarding, and periodic vendor reviews.

Implementing Privacy Frameworks

Choose and align frameworks

Select a privacy and security framework to operationalize HIPAA controls across both organizations. Common choices include NIST-based mappings, HITRUST, 405(d) HICP, and ISO/IEC 27001/27701. Map each control to HIPAA requirements and your Risk Management Plan.

Governance and accountability

  • Designate a Privacy Officer and Security Officer; define an escalation path to compliance and the board.
  • Establish a cross-entity compliance steering committee to track remediation and integration risks.
  • Publish a RACI for policy ownership, access reviews, incident handling, and vendor oversight.

Process enablement

  • Maintain a unified policy library and evidence repository for audits and inquiries.
  • Deliver role-based training and annual attestation; track completion and effectiveness.
  • Embed privacy by design in change management and system development life cycles.

Metrics and assurance

  • Define KPIs/KRIs: access review timeliness, incident MTTR, BAA coverage, and remediation burn-down.
  • Schedule internal audits and control testing; refresh the Risk Management Plan at set intervals.

Planning Post-Merger Integration

Pre-close vs. post-close boundaries

Before close, share only the minimum necessary PHI and use clean-room processes. After close, determine whether ACE or OHCA designations are appropriate to enable compliant data sharing and coordinated care.

Day 1 readiness checklist

  • Confirm named Privacy and Security Officers and a staffed incident bridge.
  • Freeze non-essential changes on critical ePHI systems; verify backups and monitoring.
  • Publish data-sharing principles, ticketing paths, and contact points for urgent decisions.

30-60-90 day integration plan

  • Identity: consolidate directories, enforce MFA, and align role definitions.
  • Data: migrate ePHI only after mapping and BAA coverage are verified; phase high-risk moves.
  • Applications: rationalize EHR and ancillary tools; segment until security baselines match.
  • Operations: unify incident management, change control, and vulnerability management cadences.
  • Governance: update the Risk Management Plan with new risks and owners at each milestone.

Clinical and business continuity

  • Maintain secure interfaces and data feeds to avoid care disruption.
  • Track accounting of disclosures during transitions to preserve patient rights.

Updating Compliance Policies

Harmonize and publish

  • Map both organizations’ policies; adopt the strongest requirements where they differ.
  • Update the Notice of Privacy Practices if ACE or OHCA participation changes patient rights or data sharing.
  • Align minimum necessary, role-based access, and sanction policies across entities.

Strengthen operational policies

  • Vendor management: require BAAs before PHI onboarding; schedule annual reviews.
  • Incident Response Plan: add joint escalation roles, legal review, and coordinated communications.
  • Retention and disposal: publish records schedules and secure destruction procedures for PHI.
  • Monitoring and auditing: define control owners, evidence, and monitoring frequency.

Training and attestation

  • Deliver targeted post-merger training for high-risk roles (registration, billing, IT admins, research).
  • Capture acknowledgments; remediate low scores with coaching and follow-up testing.

Conclusion

Effective HIPAA compliance during M&A hinges on disciplined due diligence, precise ePHI mapping, and consistent controls backed by a living Risk Management Plan and Incident Response Plan. With clear governance and strong BAAs, you reduce uncertainty, speed integration, and protect patients and enterprise value.

FAQs

What are the key steps in HIPAA due diligence during a merger?

Set scope and clean-team rules, gather core artifacts (risk analyses, policies, BAAs, incident history), interview control owners, validate with sampling and technical tests, identify red flags, and publish an issue log tied to a Risk Management Plan and Day 1 controls. Close with a prioritized remediation roadmap and executive brief.

How do Business Associate Agreements impact HIPAA compliance in acquisitions?

BAAs define how partners safeguard PHI, report incidents, and flow down obligations to subcontractors. During acquisitions, reconcile all BAAs to actual data flows, amend gaps, and ensure coverage for cloud and downstream vendors. ACE or OHCA decisions may change which relationships need BAAs or updated notices.

What cybersecurity assessments are necessary for HIPAA compliance during mergers?

Assess identity and access management, network segmentation, encryption, logging and monitoring, vulnerability and patch management, backup and recovery, endpoint protection, and third‑party risk. Review the Incident Response Plan, test restores, and validate controls on a sample of high-risk ePHI systems.

How should organizations handle post-merger HIPAA policy integration?

Adopt the strongest existing requirements, unify the policy library, and update procedures for access, incidents, vendor oversight, and retention. If ACE or OHCA status changes, revise the Notice of Privacy Practices. Train the workforce, collect attestations, and embed metrics and audits to verify effectiveness.

Share this article

Ready to assess your HIPAA security risks?

Join thousands of organizations that use Accountable to identify and fix their security gaps.

Take the Free Risk Assessment

Related Articles