HIPAA Compliance Guide for Small Business: What You Need to Do, Step by Step

Check out the new compliance progress tracker


Product Pricing Demo Video Free HIPAA Training
LATEST
video thumbnail
Admin Dashboard Walkthrough Jake guides you step-by-step through the process of achieving HIPAA compliance
Ready to get started? Book a demo with our team
Talk to an expert

HIPAA Compliance Guide for Small Business: What You Need to Do, Step by Step

Kevin Henry

HIPAA

February 25, 2024

6 minutes read
Share this article
HIPAA Compliance Guide for Small Business: What You Need to Do, Step by Step

If your small business creates, receives, maintains, or transmits Protected Health Information (PHI), you must comply with HIPAA’s Privacy Rule and Security Rule. This guide walks you through the practical steps to get compliant and keep it that way.

Use it as a roadmap to prioritize work, assign accountability, and document proof of compliance. Each section tells you what to do, why it matters, and how to show auditors you did it.

Conduct Risk Assessment

Start with a formal Risk Analysis covering every place PHI lives or moves—EHRs, billing platforms, email, cloud drives, laptops, mobile devices, and paper files. Map data flows, including vendors and remote access, so no system or process is missed.

  • Identify threats and vulnerabilities (e.g., lost devices, misconfigurations, improper sharing).
  • Estimate likelihood and impact, then rate each risk to prioritize mitigation.
  • Select safeguards: administrative, physical, and technical, with owners and due dates.
  • Record results in a risk register and track remediation progress.

Keep artifacts: your methodology, asset and data-flow inventory, findings, decisions, and corrective actions. Review at least annually and whenever you add systems, vendors, or new workflows involving PHI.

Designate HIPAA Compliance Officer

Assign a HIPAA Compliance Officer (in a small shop, this can be a dual Privacy/Security role). Give this person authority, time, and budget to implement and enforce requirements across departments and vendors.

  • Core duties: oversee policies, training, risk management, Incident Response, and breach notification.
  • Run routine audits, manage the compliance calendar, and report metrics to leadership.
  • Serve as the contact for patient privacy requests and workforce questions.

Document the role in a charter that defines responsibilities, decision rights, and escalation paths. Name a backup to ensure continuity.

Develop Policies and Procedures

Write clear, practical policies that reflect how you actually operate. Cover the Privacy Rule (uses/disclosures of PHI, minimum necessary, patient rights) and the Security Rule (access controls, device/media handling, transmission security).

  • Key topics: acceptable use, access management, encryption, passwords/MFA, remote work, patching, backups, disposal, sanctions, and vendor management.
  • Operational procedures: onboarding/offboarding, change management, secure messaging, identity verification, and accounting of disclosures.
  • Retention: keep policies, procedures, and related documentation for six years; review at least annually.

Version-control documents and log approvals. Train staff on what changed and why.

Conduct Employee Training

Provide HIPAA training to all workforce members upon hire, when roles change, and on a regular schedule thereafter. Tailor modules to job functions so people know exactly how to handle PHI in their daily tasks.

  • Cover privacy basics, Security Rule requirements, phishing awareness, secure data handling, and Incident Response reporting.
  • Measure comprehension with short quizzes; capture attendance and dates.
  • Reinforce with periodic refreshers and simulated phishing to build strong habits.

Maintain training records as part of your audit-ready evidence.

Ready to assess your HIPAA security risks?

Join thousands of organizations that use Accountable to identify and fix their security gaps.

Take the Free Risk Assessment

Manage Business Associate Agreements

Identify every vendor that creates, receives, maintains, or transmits PHI on your behalf. Before sharing PHI, execute a Business Associate Agreement (also called a Business Associate Contract) that sets security and privacy obligations.

  • Include permitted uses/disclosures, safeguard requirements, subcontractor flow-downs, prompt breach notification, cooperation with investigations, and termination/return-or-destruction of PHI.
  • Perform due diligence: security questionnaires, SOC 2 or comparable reports, and references.
  • Keep a current inventory of vendors, contracts, and points of contact; calendar renewal and review dates.

Vendors that merely act as conduits (e.g., mail carriers) may not be business associates, but most cloud and IT providers are. When in doubt, assess the service’s actual handling of PHI.

Implement Technical Safeguards

Deploy layered controls that align with the Security Rule while fitting your size and risk profile. Aim for strong baseline protections that are easy to operate and audit.

  • Access control: role-based access, least privilege, unique user IDs, and multi-factor authentication.
  • Encryption: in transit (TLS) and at rest for servers, databases, endpoints, and backups.
  • Endpoint security: automatic updates, EDR/antivirus, disk encryption, and device-loss protections.
  • Network security: secure Wi‑Fi, firewalling, VPN for remote access, and segmentation for sensitive systems.
  • Data integrity and backups: immutable, tested backups; documented restores and recovery times.
  • Audit controls: centralized logging and an Audit Trail that records access, changes, and administrative actions, with regular log review.

Document configurations, exceptions, and monitoring routines so you can demonstrate both design and effectiveness of controls.

Establish Breach Response Plan

Write a step-by-step plan for suspected incidents affecting PHI. Define what staff must do and who to contact the moment something looks wrong (lost device, misdirected email, ransomware, or unusual access).

  • Immediate actions: contain, preserve evidence, and escalate to the Incident Response lead.
  • Investigation: determine what happened, systems and records involved, and whether PHI was acquired or viewed.
  • Breach risk assessment: evaluate the nature/extent of PHI, the unauthorized person, whether the PHI was actually accessed, and mitigation applied.
  • Notification: if a reportable breach occurred, notify affected individuals without unreasonable delay and no later than 60 days after discovery; notify HHS, and for incidents affecting 500 or more residents of a state or jurisdiction, notify prominent media as well.
  • Post-incident: document lessons learned, update safeguards, and retrain as needed.

Keep contact templates, decision logs, and a communications tree ready. Test the plan with tabletop exercises so roles and timelines are clear before an actual event.

In short, assign ownership, document your Risk Analysis, implement right-sized safeguards, train your people, manage vendors with strong contracts, and rehearse your response. Consistent execution and evidence keep your small business compliant and resilient.

FAQs.

What are the initial steps for HIPAA compliance in small businesses?

Confirm whether you’re a covered entity or a business associate, map where PHI resides and flows, appoint a HIPAA Compliance Officer, perform a formal Risk Analysis, draft baseline policies and procedures, inventory vendors and execute Business Associate Agreements, and schedule workforce training and recurring audits.

How often should employee training be conducted for HIPAA?

Train at onboarding, when roles or systems change, and at least annually thereafter. Reinforce with periodic refreshers and phishing simulations, and keep records of dates, attendees, and scores to demonstrate compliance.

What is required in a breach response plan?

Your plan should define incident intake and triage, roles and contact points, containment steps, investigation and risk assessment of PHI exposure, decision criteria for breach notification, timelines and content for notices, documentation requirements, and post-incident improvements. Include call trees, templates, and a schedule for regular testing.

Share this article

Ready to assess your HIPAA security risks?

Join thousands of organizations that use Accountable to identify and fix their security gaps.

Take the Free Risk Assessment

Related Articles