HIPAA Compliance for Direct Primary Care Practices: Complete Guide and Checklist

Check out the new compliance progress tracker


Product Pricing Demo Video Free HIPAA Training
LATEST
video thumbnail
Admin Dashboard Walkthrough Jake guides you step-by-step through the process of achieving HIPAA compliance
Ready to get started? Book a demo with our team
Talk to an expert

HIPAA Compliance for Direct Primary Care Practices: Complete Guide and Checklist

Kevin Henry

HIPAA

March 08, 2026

10 minutes read
Share this article
HIPAA Compliance for Direct Primary Care Practices: Complete Guide and Checklist

HIPAA Applicability to DPC Practices

HIPAA compliance for direct primary care practices depends on whether your clinic is a covered entity. The core question is whether you transmit health information electronically in connection with a HIPAA standard transaction. Your decision drives which rules apply and how deeply you must implement safeguards around Protected Health Information (PHI).

Covered Entity Determination

You are a covered health care provider if you (or a billing service on your behalf) conduct any HIPAA standard transactions electronically. Common triggers include:

  • Submitting electronic claims or encounters to health plans or clearinghouses.
  • Checking eligibility/benefits or claim status electronically.
  • Receiving electronic remittance advice (ERA) or EFT with health plan addenda.
  • Requesting prior authorizations via standard electronic transactions.

Using an EHR, ordering labs, or e-prescribing alone does not automatically make you a covered entity. Those activities involve PHI, but they are not, by themselves, HIPAA standard transactions.

If You Do Not Meet Covered Entity Criteria

Some DPC clinics never transmit standard transactions and therefore may not be covered entities. Even then, patients expect HIPAA-grade privacy. Adopting HIPAA-aligned controls protects trust, supports referrals, and simplifies partnerships with organizations that require strong privacy practices.

Notice of Privacy Practices

If you are a covered entity, you must provide and post a Notice of Privacy Practices (NPP), obtain acknowledgment of receipt when practical, and maintain records of distribution. If you are not a covered entity, a plain-language privacy notice is still recommended to set expectations clearly.

Common DPC Scenarios

  • Membership-only, no claims: typically not a covered entity, unless you conduct any standard transactions through a vendor.
  • Occasional out-of-network claims via a clearinghouse: you are a covered entity.
  • Providing patients with superbills only: patients submit, not you—evaluate whether you or a vendor ever perform standard transactions.

HIPAA Compliance Checklist for DPC

Use this practical checklist to stand up or strengthen HIPAA compliance for direct primary care practices. It integrates Administrative Safeguards, Technical Safeguards, and Physical Safeguards in a streamlined sequence.

Governance and Policies (Administrative Safeguards)

  • Designate a Privacy Officer and a Security Officer (same person if necessary in small clinics).
  • Adopt written policies: privacy, security, minimum necessary, access control, password, device/BYOD, media disposal, sanctions, incident response, and contingency planning.
  • Provide role-based training at hire and annually; track completion and sanctions for violations.
  • Maintain a current inventory of systems, devices, applications, and vendors that store or access PHI.

Patient Rights and Notice of Privacy Practices

  • Issue and post your Notice of Privacy Practices; capture acknowledgment of receipt.
  • Implement processes for access to records, amendments, restrictions, confidential communications, and accounting of disclosures.
  • Define turnaround times and verification steps for identity before releasing PHI.

Technical Safeguards

  • Access controls: unique IDs, role-based permissions, and multifactor authentication for ePHI systems.
  • Encryption: enable encryption at rest on servers and devices; require TLS for data in transit; encrypt email containing PHI or use secure messaging.
  • Audit controls: log access and changes to records; review audit trails routinely.
  • Integrity and transmission security: anti-malware, patching, secure configurations, and automatic logoff/lock.
  • Mobile and BYOD: device encryption, remote wipe, screen locks, and restricted local storage of PHI.

Physical Safeguards

  • Workstation positioning and screen privacy; clean desk policy; locked areas after hours.
  • Visitor management and escort procedures; secure network closets.
  • Media controls: secure storage, tracking, and certified destruction of drives and paper.

Contingency Planning

  • Backups: automate, encrypt, and test restorations on a defined schedule.
  • Downtime procedures: paper workflows for check-in, orders, and prescribing during outages.
  • Disaster recovery and emergency-mode operations plans tailored to your clinic size.

Vendors and Business Associates

  • Inventory vendors; determine Business Associate status; execute a Business Associate Agreement (BAA) where required.
  • Conduct due diligence: security questionnaires, assurances on encryption, breach reporting, and subcontractor controls.
  • Configure vendor platforms for minimum necessary access and logging.

Incident Response and Breach Notification

  • Define how staff report incidents; triage promptly; preserve evidence.
  • Perform a breach risk assessment; document decisions; send required notifications when needed.
  • Conduct root-cause analysis and implement corrective actions.

Ongoing Monitoring and Audits

  • Schedule periodic access reviews, policy updates, and training refreshers.
  • Perform a Security Risk Assessment at least annually and after major changes.
  • Track remediation tasks to closure with clear owners and due dates.

HIPAA Compliance Resources for DPC

You can build a right-sized program using internal tools, vendor materials, and professional education designed for small practices. Focus on resources that convert requirements into checklists, templates, and how-to guides.

Internal Resources

  • Policy and procedure templates tailored to DPC workflows.
  • Compliance calendar covering training, access reviews, backup tests, and audits.
  • Risk register to track findings from each Security Risk Assessment and remediation.

Vendor-Supplied Materials

  • Platform security summaries, configuration guides, and audit trail reports from your EHR, telehealth, messaging, and cloud storage providers.
  • Sample Business Associate Agreement language and administrative setup checklists.

Training and Awareness

  • New-hire onboarding modules plus short, recurring refreshers.
  • Phishing and social engineering awareness campaigns scaled for small teams.

HIPAA Compliance Forms for DPC

Standardized forms make compliance repeatable, auditable, and fast. Maintain them centrally and keep version histories.

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Patient-Facing Forms

  • Notice of Privacy Practices (NPP) and Acknowledgment of Receipt.
  • Authorization to Use or Disclose PHI (purpose, scope, expiration, and revocation).
  • Request for Access to Records; Request for Amendment of PHI.
  • Request for Restrictions; Request for Confidential Communications.
  • Accounting of Disclosures request form.
  • Telehealth Informed Consent referencing security and privacy expectations.
  • Proxy/guardian access and minor consent forms, as applicable.

Workforce and Vendor Forms

  • Workforce confidentiality agreement and sanctions acknowledgment.
  • Security awareness and HIPAA training attestations.
  • Access request/approval and termination checklists.
  • Business Associate Agreement template and vendor due diligence questionnaire.

Operational and Security Forms

  • Security Risk Assessment report and risk management plan.
  • Device and media inventory; backup verification logs.
  • Audit trail review log; access review sign-offs.
  • Incident and breach log; breach risk assessment worksheet.
  • Media destruction certificates and disposal records.
  • Downtime and disaster recovery test records.

Conducting Security Risk Assessments

A Security Risk Assessment (SRA) is the engine of HIPAA Security Rule compliance. Use it to identify where ePHI lives, how it flows, and how to reduce risk to a reasonable and appropriate level for your practice.

1) Define Scope and Inventory Assets

  • List systems, apps, endpoints, cloud services, and paper processes that store or touch ePHI.
  • Include personal devices used for work under BYOD rules.

2) Map PHI Data Flows

  • Diagram how PHI enters, moves through, and leaves your clinic (intake, labs, e-prescribing, referrals, messaging).
  • Mark vendors, storage locations, and points of transmission.

3) Identify Threats and Vulnerabilities

  • Consider human error, lost devices, misconfigurations, phishing, ransomware, disasters, and third-party failures.
  • Note gaps in Administrative, Technical, and Physical Safeguards.

4) Evaluate Existing Controls

  • Assess access controls, encryption, logging, training, device security, and contingency plans.
  • Confirm minimum necessary access across roles.

5) Analyze Risk

  • Score likelihood and impact for each threat/vulnerability pair.
  • Rank risks to prioritize remediation work.

6) Create a Risk Management Plan

  • Decide to mitigate, accept, transfer, or avoid each risk.
  • Assign owners, budgets, and target dates; capture expected risk reduction.

7) Implement and Validate Controls

  • Roll out encryption, MFA, patching, email security, and backup improvements.
  • Test restorations, incident drills, and access reviews to confirm effectiveness.

8) Document Everything

  • Retain the SRA report, supporting evidence, and approval of the risk plan.
  • Update documentation when systems, vendors, or workflows change.

9) Reassess on a Schedule

  • Perform an SRA at least annually and after significant changes or incidents.
  • Feed lessons learned back into policies and training.

Establishing Business Associate Agreements

A Business Associate Agreement defines how vendors protect PHI they handle for you. In DPC, this often includes your EHR, telehealth, secure messaging, cloud storage/backup, answering services, and certain analytics or marketing providers that use PHI on your behalf.

Identify Business Associates

  • Any vendor that creates, receives, maintains, or transmits PHI for your clinic is a Business Associate.
  • Disclosures for treatment to another covered entity (for example, a lab or pharmacy) generally do not require a BAA.
  • Payment processors performing standard banking services typically are not Business Associates.

Perform Vendor Due Diligence

  • Request security summaries, encryption details, breach reporting practices, and subcontractor oversight.
  • Confirm data residency, backup practices, and incident response capabilities.

Key BAA Terms to Include

  • Permitted uses/disclosures and minimum necessary standards.
  • Administrative, Technical, and Physical Safeguards commitments.
  • Security incident and breach notification timelines and content.
  • Subcontractor flow-down, access/accounting support, and data return/destruction.
  • Termination rights and remedies for material breach; indemnification as appropriate.

Operationalize the BAA

  • Store signed BAAs centrally with renewal dates tracked.
  • Configure vendor access by role; review logs; remove access promptly at termination.

Maintaining Proof of Compliance

HIPAA expects you to do the work and to prove you did the work. Maintain organized evidence so you can demonstrate compliance at any time.

Documentation and Retention

  • Retain HIPAA policies, procedures, and revisions for at least six years from creation or last effective date.
  • Keep training rosters, acknowledgments, sanctions, and meeting minutes.
  • Archive SRAs, risk plans, audit logs, access reviews, backup tests, and incident reports.
  • Store BAAs, vendor reviews, device inventories, and media destruction records.

Operational Evidence

  • Periodic screenshots or exports of system settings (MFA on, encryption enabled, logging active).
  • Signed access approvals, removal tickets, and least-privilege justifications.
  • Downtime drill results, restoration test logs, and corrective action verification.

Oversight and Continuous Improvement

  • Use a compliance calendar to trigger reviews, audits, and renewals.
  • Maintain a living risk register and close items on time with documented validation.
  • Report status to ownership or leadership on a regular cadence.

Summary

For direct primary care practices, HIPAA compliance rests on accurate covered entity determination, disciplined execution of Administrative and Technical Safeguards, and rigorous documentation. Build around a recurring Security Risk Assessment, strong Business Associate Agreements, and a clear Notice of Privacy Practices to keep patient trust and regulatory risk in check.

FAQs.

When Does HIPAA Apply to Direct Primary Care Practices?

HIPAA applies when your practice is a covered health care provider—meaning you transmit health information electronically in connection with HIPAA standard transactions such as claims, eligibility checks, or remittance advice. If you never conduct those transactions, you may not be a covered entity, but adopting HIPAA-grade controls remains prudent to protect PHI and meet partner expectations.

What Are the Key Steps for HIPAA Compliance in DPC?

Start with a Security Risk Assessment, then implement written policies, train your workforce, and enforce Administrative, Technical, and Physical Safeguards. Provide a Notice of Privacy Practices, manage patient rights, inventory vendors, execute a Business Associate Agreement where required, test backups, monitor access, and document everything you do.

How Do Business Associate Agreements Impact DPC Practices?

BAAs contractually require vendors that handle PHI on your behalf to implement safeguards, report incidents, and support your compliance. They reduce third-party risk, clarify roles, and give you rights to audit, limit, or terminate a vendor that fails to protect PHI.

What Are the Common HIPAA Compliance Challenges for DPC Providers?

Typical pain points include determining covered entity status, right-sizing security on limited budgets, managing BYOD and texting, keeping BAAs current, sustaining encryption and MFA across all systems, performing meaningful audit reviews, and maintaining proof of compliance over time.

Share this article

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Related Articles