HIPAA Compliance for Midwives: Requirements, Best Practices, and Step-by-Step Checklist

Check out the new compliance progress tracker


Product Pricing Demo Video Free HIPAA Training
LATEST
video thumbnail
Admin Dashboard Walkthrough Jake guides you step-by-step through the process of achieving HIPAA compliance
Ready to get started? Book a demo with our team
Talk to an expert

HIPAA Compliance for Midwives: Requirements, Best Practices, and Step-by-Step Checklist

Kevin Henry

HIPAA

March 25, 2026

8 minutes read
Share this article
HIPAA Compliance for Midwives: Requirements, Best Practices, and Step-by-Step Checklist

Whether you run a home-birth practice, a birth center, or provide midwifery services within a clinic, HIPAA compliance protects your clients and your business. This guide clarifies what “covered entity” means for midwives, how to safeguard Protected Health Information (PHI), and the practical steps to build, run, and document a compliant privacy and security program.

You will learn how to decide your status under HIPAA, draft the right policies, conduct a Risk Assessment, implement access controls and Encryption Standards, manage Business Associate Agreements (BAAs), honor client rights, and meet Breach Notification Requirements with confidence.

HIPAA Overview and Covered Entity Status

HIPAA applies differently depending on your role. A midwifery practice is typically a covered entity if it transmits standard electronic transactions—such as claims, eligibility checks, or remittance advice—directly or through a vendor or clearinghouse. If you do not conduct these transactions but perform services for another covered entity that involve PHI, you may be a business associate.

Protected Health Information (PHI) includes any individually identifiable health information about a client’s past, present, or future health or care, in any format (paper, verbal, or electronic). Understanding where PHI flows in your practice is the foundation for every control you put in place.

Step-by-Step Checklist

  • List how you get paid and bill: paper, portal, EHR, clearinghouse. Confirm whether you send standard electronic transactions.
  • Decide your role: covered entity, business associate, or hybrid. Document the rationale and date of review.
  • Map PHI flows across intake, care, referrals, billing, telehealth, texting, and records release.
  • Identify vendors that touch PHI and determine which require a Business Associate Agreement (BAA).

Privacy and Security Policy Development

Build a written program that covers both the Privacy Rule (how PHI may be used or disclosed) and the Security Rule (how you protect electronic PHI). Your privacy policies should address minimum necessary use, client authorizations, required disclosures, the Notice of Privacy Practices (NPP), and procedures for client rights requests.

Security policies should establish administrative, physical, and technical safeguards: governance roles, workforce responsibilities, facility protections, device management, access controls, audit logging, encryption, and incident response. Align every policy with a procedure that shows exactly how you carry it out day to day.

Step-by-Step Checklist

  • Appoint a Privacy Officer and a Security Officer; define responsibilities and authority.
  • Draft core policies: NPP, uses/disclosures, minimum necessary, authorizations, sanctions, records retention, device use, access control, encryption, incident response, and breach notification.
  • Create matching procedures and forms (e.g., authorization, access request, amendment request).
  • Version-control your manual, train staff, and review at least annually or after major changes.

Conducting Risk Assessments

A Risk Assessment identifies where ePHI resides, the threats and vulnerabilities it faces, the likelihood and impact of those threats, and the safeguards you need. For small midwifery practices, keep the process practical, repeatable, and evidence-based so improvements are clear and trackable.

Step-by-Step Checklist

  1. Inventory assets and data: EHR, laptops, phones, tablets, scanners, e-fax, email, backups, cloud storage, paper files.
  2. Map PHI workflows end to end: intake, charting, labs, referrals/consults, billing, client communications, releases, archiving.
  3. Identify threats (device loss/theft, phishing, misdirected email, ransomware, fire/flood) and vulnerabilities (no MFA, shared logins, open paper storage).
  4. Score likelihood and impact; rank risks to create a prioritized remediation plan with owners and deadlines.
  5. Select safeguards: technical (MFA, encryption, audit logs), administrative (training, sanctions), and physical (locks, visitor controls).
  6. Document results, decisions, and timelines; re-run after incidents, new systems, or major workflow changes.

Focus on midwifery-specific realities: on-call mobile devices, home visits, photos shared for clinical review, and after-hours texting. Where risk is highest, implement controls first and verify they work.

Implementing Access Controls and Encryption

Access controls enforce the minimum necessary principle. Use unique user IDs, strong authentication (preferably MFA), role-based access, automatic logoff, and routine audit log review. Never share logins. Limit administrator privileges and promptly deactivate access when someone leaves.

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Encryption Standards

  • Encryption in transit: use modern TLS for portals, email gateways, and telehealth platforms.
  • Encryption at rest: enable full‑disk encryption on laptops, tablets, and smartphones; encrypt server and cloud storage hosting ePHI.
  • Key management: restrict who can decrypt, rotate keys periodically, and back up keys securely.
  • Backups: encrypt, test restores regularly, and store at least one copy offline or logically isolated.
  • Media handling: securely wipe or destroy devices and drives before reuse or disposal.

Step-by-Step Checklist

  • Select an EHR and secure messaging/telehealth platforms that support MFA, audit logs, and robust encryption.
  • Define roles (e.g., midwife, admin/billing, student/assistant) and grant only the access each role needs.
  • Enable full‑disk encryption and automatic screen lock on every device that may hold or access ePHI.
  • Use an email security gateway or client portal for transmitting PHI; disable auto-forwarding that could expose ePHI.
  • Centralize password management, require MFA, and review access logs and alerts monthly.

Staff Training and Business Associate Agreements

Train all workforce members—employees, contractors, students, and volunteers—on HIPAA basics, your policies, phishing awareness, safe texting, and incident reporting. Provide training at onboarding, when roles change, and periodically thereafter. Keep attendance logs and signed acknowledgments of the policies.

A Business Associate Agreement (BAA) is required before sharing PHI with a vendor that creates, receives, maintains, or transmits PHI on your behalf. Common business associates for midwives include EHR vendors, billing services, cloud storage providers, e-fax and secure messaging platforms, IT support, transcription, and answering services. Ensure BAAs address permitted uses, safeguards, breach reporting, subcontractors, and termination.

Step-by-Step Checklist

  • Publish a training plan: topics, frequency, and measurement (e.g., phishing simulations and policy quizzes).
  • Build a vendor list; mark which vendors are business associates and obtain signed BAAs before sharing PHI.
  • Retain BAAs, training records, and policy acknowledgments for your HIPAA retention period.

Client Rights and Secure Communication

Provide a clear Notice of Privacy Practices (NPP) at the first visit and upon request, and make it readily available in your office or electronically. Create simple processes to honor client rights: access to records, amendments, restrictions, confidential communications (e.g., alternate addresses), and an accounting of certain disclosures.

Use secure channels for PHI: patient portals or encrypted email/messaging. If a client prefers unencrypted email or texting, explain the risks and document the client’s preference. Verify identity before releasing records, apply minimum necessary to routine communications, and avoid leaving detailed PHI on voicemail.

Step-by-Step Checklist

  • Present the NPP and document acknowledgment; keep the current version on display and in your intake packet.
  • Provide easy request paths: access, amendment, restriction, confidential communications, and authorization forms.
  • Capture client communication preferences and apply them consistently across staff and systems.
  • Standardize scripts for phone, text, and portal messages to reduce over-disclosure of PHI.

Breach Notification and Documentation Practices

A breach is an impermissible use or disclosure of unsecured PHI that compromises privacy or security. Assess incidents using a structured, four-factor risk analysis (nature of PHI, who received it, whether it was actually viewed/acquired, and mitigation). Certain limited exceptions may apply, but document your reasoning either way.

Breach Notification Requirements include notifying affected individuals without unreasonable delay and no later than the outer federal deadline. For large incidents (500 or more individuals in a state or jurisdiction), you must also notify regulators and, when required, the media. For smaller breaches, maintain a log and submit the annual report as required. Always check whether state law imposes shorter timelines or additional elements for the notice.

Maintain an incident response plan that covers containment, investigation, decision-making, notification content, remediation, and lessons learned. Preserve logs and evidence, apply sanctions when warranted, and update training and controls to prevent recurrence.

Step-by-Step Checklist

  • Contain: secure systems, disable compromised accounts, and recover misdirected messages when possible.
  • Investigate: document what happened, when, who was involved, systems affected, and PHI elements exposed.
  • Analyze: complete a risk assessment to determine if notification is required and to whom.
  • Notify: send timely, complete notices to individuals and applicable authorities; track dates and content.
  • Remediate: close control gaps, retrain staff, and monitor for recurrence; record all actions taken.
  • Retain: keep incident and breach documentation, policies, and logs for the required retention period.

Conclusion

Effective HIPAA compliance for midwives rests on clear roles, right-sized policies, a living Risk Assessment, strong access controls with encryption, disciplined training and BAAs, client-centered communication, and decisive breach response. Build these elements into daily workflows, prove them with documentation, and review them regularly to keep clients safe and your practice resilient.

FAQs

What are the HIPAA requirements for midwives?

Determine whether you are a covered entity, map PHI, and implement written privacy and security policies. Conduct a Risk Assessment, enforce access controls and Encryption Standards, train your workforce, and execute BAAs with vendors that handle PHI. Provide a Notice of Privacy Practices, honor client rights requests, and meet Breach Notification Requirements with documented timelines, decisions, and actions.

How do midwives handle client PHI securely?

Use an EHR and communication tools that support MFA, audit logs, and encryption in transit and at rest. Apply minimum necessary access, unique logins, and automatic logoff; encrypt and lock all mobile devices; and verify identity before releasing records. Standardize secure texting/portal use, sign BAAs with applicable vendors, review logs, train staff, and dispose of media securely.

When must midwives notify about a data breach?

After investigating an incident and confirming a breach of unsecured PHI, notify affected individuals without unreasonable delay and within the applicable federal deadline; for large breaches, notify regulators (and, when required, the media). For smaller breaches, log and submit the annual report as required. Always check state law in case it imposes shorter timelines or additional notice elements.

Share this article

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Related Articles