HIPAA Compliance for Radiology Practices: Requirements, Best Practices, and Checklist

Check out the new compliance progress tracker


Product Pricing Demo Video Free HIPAA Training
LATEST
video thumbnail
Admin Dashboard Walkthrough Jake guides you step-by-step through the process of achieving HIPAA compliance
Ready to get started? Book a demo with our team
Talk to an expert

HIPAA Compliance for Radiology Practices: Requirements, Best Practices, and Checklist

Kevin Henry

HIPAA

March 07, 2026

9 minutes read
Share this article
HIPAA Compliance for Radiology Practices: Requirements, Best Practices, and Checklist

HIPAA Compliance Requirements

HIPAA compliance for radiology practices hinges on understanding what counts as Protected Health Information (PHI), how it flows across imaging systems, and which safeguards you must implement. Your obligations span people, processes, and technology—and must be documented, trained, and tested.

Core rules and scope

Radiology practices are covered entities that create, receive, maintain, and transmit electronic PHI (ePHI). You must comply with the HIPAA Privacy Rule, the Security Rule, and the Breach Notification Rule, and ensure every vendor that handles PHI signs a Business Associate Agreement.

Administrative Safeguards

  • Perform formal Risk Assessments and maintain a risk management plan with prioritized remediation.
  • Designate privacy and security officers and define role-based access aligned to job duties.
  • Adopt policies for workforce onboarding, training, sanctions, and termination.
  • Plan for incident response, breach handling, and business continuity/disaster recovery.
  • Execute and manage each Business Associate Agreement, including vendor due diligence.

Physical Safeguards

  • Control facility access to reading rooms, server rooms, and imaging suites.
  • Secure workstations with privacy screens, auto-lock, and location-based placement.
  • Track, encrypt, and sanitize media and devices before reuse or disposal.

Technical Safeguards

  • Enforce unique user IDs, least-privilege access, and multi-factor authentication for remote access.
  • Enable audit controls and log aggregation for RIS/PACS, viewers, and VPNs.
  • Use strong encryption for ePHI at rest and in transit, including DICOM TLS where supported.
  • Implement integrity controls, anti-malware, and secure configuration baselines.

Policies, documentation, and training

Maintain written policies, proof of training, and records of decisions that implement the Minimum Necessary Standard. Update documents when systems, vendors, or workflows change, and review them at least annually.

HIPAA compliance checklist

  • Complete an annual HIPAA Security Risk Assessment and document remediation.
  • Inventory PHI systems (RIS, PACS, modalities, dictation, cloud storage, VoIP, portals).
  • Map PHI data flows across ordering, acquisition, reporting, and distribution.
  • Sign a Business Associate Agreement with every vendor that handles PHI.
  • Implement role-based access, MFA, and automatic session timeouts.
  • Encrypt ePHI at rest and in transit, including backups and removable media.
  • Harden DICOM, disable unused services, and restrict AE Title communications by IP/port.
  • Enable centralized logging and routine audit review for RIS/PACS and VPNs.
  • Train staff initially and annually on Privacy Rule and Security Rule requirements.
  • Adopt a breach response plan with escalation, documentation, and notification steps.
  • Test data restores, failover procedures, and downtime workflows.
  • Apply device and OS patching, vulnerability scanning, and endpoint protection.
  • Control physical access to reading rooms and server closets; secure workstations.
  • Implement secure image exchange and de-identification for research/teaching.
  • Protect call recordings/voicemail (VoIP) that may contain PHI, or disable them.
  • Validate “minimum necessary” settings for worklists, reports, and disclosures.

Best Practices for Securing Patient Data

Strong security in radiology depends on layered defenses across governance, endpoints, networks, and applications. Prioritize quick wins that reduce risk immediately while you mature your program.

Governance and workforce

  • Define data owners and system owners who approve access and changes.
  • Use least privilege and periodic access recertification, especially for teleradiology.
  • Deliver scenario-based training (misdirected images, wrong-patient dictation, phishing).

Network and endpoint security

  • Segment imaging networks; restrict modality-to-PACS traffic and admin interfaces.
  • Require VPN with MFA for remote reading; prohibit split tunneling for PHI access.
  • Deploy EDR, disk encryption, secure configurations, and automated patching.

Application and data controls

  • Harden RIS/PACS: TLS 1.2+, modern ciphers, strong passwords/passkeys, and account lockouts.
  • Enable audit trails for image views, downloads, anonymization, and “break glass.”
  • Implement DLP for attachments, screen capture controls where feasible, and watermarking.

Third parties and cloud

  • Assess vendors with security questionnaires; verify encryption, access logs, and data location.
  • Ensure Business Associate Agreements cover subcontractors and breach obligations.
  • Set retention and deletion schedules for images, metadata, and call recordings.

Resilience and response

  • Maintain immutable/offline backups and validate restore times that meet clinical needs.
  • Run tabletop exercises for ransomware, PACS outage, and misdirected results.
  • Capture post-incident lessons learned and update controls accordingly.

Consequences of HIPAA Non-Compliance

Non-compliance can lead to regulatory penalties, corrective action plans, and costly breach response obligations. Beyond fines, downtime and reputational harm often exceed the direct regulatory impact.

  • OCR investigations may result in monetary penalties and multi-year corrective action plans.
  • Criminal penalties can apply for intentional misuse or wrongful disclosures of PHI.
  • State attorneys general may bring actions, and patients may pursue civil claims under state laws.
  • Contractual liabilities arise from violated Business Associate Agreements and payer contracts.
  • Operational effects include diversion of studies, delayed care, and revenue cycle disruption.

Common radiology failure points

  • Unsecured image sharing portals or open DICOM services on the internet.
  • Lost unencrypted laptops or portable drives containing ePHI and images.
  • Misdirected results, wrong-patient merges, or report faxes to incorrect recipients.
  • VoIP recordings capturing PHI without encryption, access controls, or retention limits.

HIPAA Compliance in Radiology Services

Radiology spans ordering, acquisition, interpretation, and results distribution—often across multiple organizations. You must align policies and technical safeguards everywhere PHI travels, including teleradiology groups and cloud PACS vendors.

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Operational focus areas

  • Scheduling and intake: verify patient identity, apply the Minimum Necessary Standard to intake forms.
  • Acquisition: protect modalities with strong credentials, timeouts, and restricted network paths.
  • Interpretation: secure dictation/transcription workflows; protect temporary audio files.
  • Distribution: validate recipient identity for providers/patients; use secure portals and encryption.
  • Remote reading: enforce VPN + MFA, session isolation, and secure home-office setups.

Vendor and partner coordination

  • Execute Business Associate Agreements with teleradiology, cloud storage, billing, and transcription.
  • Define breach notification responsibilities and data return/destruction on contract termination.
  • Test image exchange with referral sites; verify de-identification for teaching or research.

Protected Health Information in Imaging Workflows

PHI lives in more than report text. It is embedded in DICOM headers, overlays, voice files, worklists, and even pixel data (burned-in annotations). Map each touchpoint to ensure controls are effective.

Where PHI appears

  • Orders and eligibility: patient demographics, insurance, and clinical indications.
  • Modality consoles and DICOM headers: names, MRNs, accession numbers, dates of birth.
  • Burned-in annotations and scout images: names or IDs rendered in pixel data.
  • Worklists, hanging protocols, and reading notes: PHI on shared screens or secondary monitors.
  • Dictation audio and drafts: PHI in temporary files and speech engine caches.
  • Image exchange: CDs, USBs, secure links, and HIE gateways.

Applying the Minimum Necessary Standard

  • Limit displayed identifiers on worklists and exported images to what readers truly need.
  • Use de-identification or pseudonymization for teaching, QA, and research datasets.
  • Scrub burned-in text before sharing; verify anonymization scripts against sample studies.

HIPAA Privacy Rule Controls for Radiology Practices

The Privacy Rule governs how you use and disclose PHI and the rights you must honor. Radiology must balance timely care with tight control of identifiers across images and reports.

Use and disclosure

  • Treatment, payment, and operations (TPO) uses are permitted; still apply Minimum Necessary where required.
  • Obtain patient authorization for non-TPO disclosures, marketing, or research without a waiver.
  • Validate identity before releasing images or reports to patients or third parties.

Patient rights

  • Provide access to images and reports in the requested format when feasible.
  • Support amendments to reports where clinically appropriate with addenda, not silent changes.
  • Offer confidential communication options and capture disclosure accounting where applicable.

Program controls

  • Publish and distribute a clear Notice of Privacy Practices.
  • Train staff on PHI handling at check-in, in reading rooms, and on phone calls.
  • Document privacy complaints and resolutions; feed trends into training and risk management.

Best Practices for Using VoIP and PACS Systems

VoIP and PACS are core to modern radiology and frequently handle PHI. Configure them with security-first defaults, tight access controls, and well-defined retention.

VoIP

  • Sign a Business Associate Agreement with your VoIP provider if calls, voicemails, or transcripts may contain PHI.
  • Encrypt signaling and media; require secure apps for softphones and disable SMS for PHI.
  • Control access to call recordings; enforce least privilege and short retention periods.
  • Mask caller ID on patient outreach when appropriate and verify recipient identity before sharing results.
  • Document scripts to avoid over-disclosure; route escalations through verified secure channels.

PACS

  • Use DICOM over TLS, restrict AE Titles by IP and port, and disable unauthenticated services.
  • Enable SSO with MFA, session timeouts, and encrypted local caches on viewers.
  • Centralize audit logs for study access, export, and anonymization; review routinely.
  • Apply retention, tiered storage, and lifecycle policies aligned to clinical and legal needs.
  • Test vendor patches in a staging environment before production deployment.

Integration and continuity

  • Validate interface security for HL7/FHIR and RIS/EHR integrations.
  • Prepare downtime workflows for modality routing and report availability.
  • Document image exchange procedures with referral partners and patient portals.

Conclusion

By aligning Risk Assessments with Administrative, Technical, and Physical Safeguards—and enforcing the Minimum Necessary Standard—you can reduce risk without slowing care. Treat vendors as extensions of your environment and hold them to the same bar via a solid Business Associate Agreement.

Build from the checklist, verify controls in VoIP and PACS, and rehearse incident response. This steady, evidence-driven approach keeps HIPAA compliance for radiology practices practical and resilient.

FAQs.

What are the key HIPAA requirements for radiology practices?

You must comply with the Privacy, Security, and Breach Notification Rules; conduct documented Risk Assessments; implement Administrative, Technical, and Physical Safeguards; apply the Minimum Necessary Standard; train staff regularly; and maintain Business Associate Agreements with all vendors handling PHI.

How can radiology practices secure patient data effectively?

Segment imaging networks, require VPN plus MFA for remote reading, encrypt ePHI at rest and in transit, harden RIS/PACS with modern TLS and audit logs, restrict AE Titles, centralize logging, run regular patching and vulnerability scans, and validate vendor security through BAAs and due diligence.

What penalties apply for HIPAA non-compliance in radiology?

Penalties range from corrective action plans and civil fines to potential criminal charges for intentional misuse. You may also face state actions, contractual liabilities, breach notification costs, operational downtime, and reputational harm.

How does HIPAA privacy rule affect radiology workflows?

The Privacy Rule governs how you use and disclose PHI across ordering, imaging, interpretation, and results sharing. It requires honoring patient rights, limiting disclosures to the Minimum Necessary, securing identity verification before release, and documenting policies and staff training throughout imaging workflows.

Share this article

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Related Articles