HIPAA Compliance Requirements for Small Business: A Practical Checklist

Check out the new compliance progress tracker


Product Pricing Demo Video Free HIPAA Training
LATEST
video thumbnail
Admin Dashboard Walkthrough Jake guides you step-by-step through the process of achieving HIPAA compliance
Ready to get started? Book a demo with our team
Talk to an expert

HIPAA Compliance Requirements for Small Business: A Practical Checklist

Kevin Henry

HIPAA

February 07, 2024

9 minutes read
Share this article
HIPAA Compliance Requirements for Small Business: A Practical Checklist

HIPAA compliance requirements for small business hinge on what you do with health data, not how many people you employ. If you create, receive, maintain, or transmit Protected Health Information (PHI) or Electronic Protected Health Information (ePHI), you must implement the HIPAA Privacy, Security, and Breach Notification Rules. Use this practical checklist to determine applicability, close gaps, and keep evidence that your program works.

HIPAA Applicability for Small Businesses

HIPAA applies to covered entities (health care providers that bill electronically, health plans, and health care clearinghouses) and to business associates that handle PHI/ePHI for them. Many small clinics, billing shops, IT providers, and digital health startups fall squarely within scope.

How to confirm you are in scope

  • You handle PHI/ePHI on behalf of a covered entity (e.g., claims, billing, IT support, cloud hosting, transcription, analytics).
  • You are a provider submitting standard transactions electronically (eligibility checks, billing, remittance advice).
  • Your staff or systems can access PHI, even incidentally (remote support, data migrations, backups).
  • You contract with subcontractors who may touch PHI/ePHI; they must also comply via flow‑down terms.

Quick checklist

  • Identify whether you are a covered entity, business associate, or both (hybrid roles are common).
  • Define PHI/ePHI for your operations and list example data elements you handle.
  • Map where PHI/ePHI flows, who touches it, and which systems store or transmit it.
  • Apply the “minimum necessary” standard to every use, disclosure, and data exchange.

Conducting Annual Risk Assessments

Risk Analysis is the foundation of HIPAA Security Rule Controls. At least annually—and whenever technology, vendors, or processes change—you should analyze threats and vulnerabilities to ePHI and document how you will reduce risks to a reasonable and appropriate level.

Risk Analysis steps

  • Inventory assets containing ePHI: laptops, servers, EHRs, cloud apps, mobile devices, backups, and integrations.
  • Diagram data flows, including remote access and third-party connections.
  • Identify threats (loss, theft, ransomware, misdelivery) and vulnerabilities (weak authentication, unpatched systems).
  • Rate likelihood and impact, then prioritize risks by level.
  • Select administrative, physical, and technical controls; record what is “required” versus “addressable” and your rationale.
  • Produce a risk management plan with owners, milestones, and target dates.

What to document

  • Methodology, scope, findings, chosen safeguards, and residual risk.
  • Evidence of implementation (configs, screenshots, tickets) and periodic status updates.
  • Triggers for interim assessments (new systems, major incidents, vendor changes).

Developing Policies and Procedures

Written policies translate HIPAA requirements into day-to-day practices your team can follow. Tailor them to your size and risks while covering the Privacy Rule, Security Rule, and Breach Notification Rule.

Core policy set

  • Governance: scope, definitions, roles, and Compliance Officer Responsibilities.
  • Privacy: permitted uses/disclosures, minimum necessary, individual rights, authorizations, and complaint handling.
  • Security (HIPAA Security Rule Controls): risk management, access control, authentication/MFA, auditing/logging, integrity, transmission security, encryption (addressable), and automatic logoff.
  • Physical: facility access, workstation use, device/media controls, secure disposal and reuse.
  • Operational: sanction policy, workforce clearance, change management, incident response, contingency/backup, vendor management.
  • Breach response: assessment, notification content and timelines, and documentation.

Make them actionable

  • Assign control owners and due dates; keep procedures short with step-by-step tasks.
  • Version policies, record approvals, and cross-reference training and audits.

Employee Training and Documentation

Your workforce is your front line. Provide timely, role-based training so people know how to protect PHI/ePHI and what to do when something goes wrong.

Training program

  • New-hire training before or at start of access; refresher training at least annually.
  • Role-specific modules (front desk, billing, IT, clinicians) aligned to real tasks.
  • Security awareness: phishing, strong authentication, secure messaging, mobile/laptop safeguards, clean desk, and reporting.
  • Sanction policy communication so expectations and consequences are clear.

Documentation to keep

  • Training curricula, attendance records, completion dates, and acknowledgments.
  • Competency checks (quizzes, simulations) and remediation actions.
  • Six-year retention of training records aligned to policy retention.

Establishing Business Associate Agreements

Whenever a vendor or subcontractor will access PHI/ePHI on your behalf, you must execute Business Associate Agreements (BAAs) before sharing data. BAAs bind vendors to safeguard PHI and to follow the Breach Notification Rule.

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

When a BAA is required

  • Services involving storage, processing, transmission, or support that exposes PHI/ePHI (cloud hosting, EHRs, billing, IT support).
  • Analytics, transcription, mailing, shredding, or backup providers with potential PHI access.
  • Downstream subcontractors who will also handle PHI must sign flow‑down BAAs.

Required elements of BAAs

  • Permitted and required uses/disclosures of PHI and prohibition of unauthorized uses.
  • Safeguards for PHI/ePHI and compliance with HIPAA Security Rule Controls.
  • Prompt breach and incident reporting to you, including content and timelines.
  • Subcontractor compliance obligations and flow‑down requirements.
  • Access, amendment, and accounting support where applicable.
  • Return or secure destruction of PHI upon termination, if feasible.
  • Right to audit/receive compliance attestations and termination for cause.

Vendor management checklist

  • Maintain a vendor inventory noting PHI exposure, data elements, and systems touched.
  • Collect security questionnaires/evidence and align contract terms to your policies.
  • Review BAAs and vendor controls at least annually or upon material changes.

Implementing Physical Safeguards

Physical controls protect offices, workstations, and devices where PHI/ePHI could be viewed or stored. Right-size measures for your footprint and remote workforce.

Small-office controls

  • Facility access: keys/badges, visitor logs, escort rules, and prompt key/access revocation.
  • Workstations: privacy screens, screen-lock timeouts, clean desk policy, and secured printers/fax areas.
  • Device/media: inventory, cable locks, secure storage, encrypted drives, and documented destruction (shred, wipe, degauss).
  • Environmental resilience: surge protection, UPS for critical systems, and secure offsite backups.
  • Remote work: dedicated workspace, locked storage, no shared family use of devices with ePHI, and safe disposal options.

Managing Breach Notification and Reporting

Not every security incident is a breach, but you must evaluate each event. Apply the four-factor risk assessment and, if a breach is confirmed, follow the Breach Notification Rule promptly.

First 24 hours

  • Contain the issue (isolate systems, recover devices, change credentials) and preserve logs/evidence.
  • Notify your Compliance Officer and, if relevant, affected business associates or covered entities.
  • Start the documented risk assessment and track decisions and timestamps.

Notification obligations

  • Individuals: notify without unreasonable delay and no later than 60 calendar days after discovery; include required content and plain-language guidance.
  • HHS: for 500+ affected in a breach, report without unreasonable delay and within 60 days; for fewer than 500, log and report within 60 days after the end of the calendar year.
  • Media: if 500+ residents of a state/jurisdiction are affected, notify prominent media outlets.
  • Business associates: follow BAA timelines to notify covered entities so they can meet deadlines.

What to include in notices

  • What happened (dates, discovery), the types of PHI involved, and whether the information was viewed or acquired.
  • Steps individuals should take to protect themselves and what you are doing to mitigate harm.
  • Contact information for questions and assistance.

Maintaining Compliance Documentation

HIPAA expects you to “show your work.” Keep complete, organized evidence that your program is implemented and effective, and retain it for at least six years from the later of creation or last effective date.

Documentation essentials

  • Risk assessments, risk management plans, and status updates.
  • All policies, procedures, approvals, and version histories.
  • Training materials, rosters, acknowledgments, and test results.
  • BAAs, vendor due diligence, and audit artifacts.
  • Incident and breach files, assessments, and copies of notifications.
  • Access reviews, audit logs or samples, backup/restore test results, and asset inventories.

Organization tips

  • Centralize documents, restrict access, and index by control area and year.
  • Maintain a compliance calendar to drive reviews, renewals, and audits.

Designating a Compliance Officer

Assign a Privacy Officer and a Security Officer; in small businesses, one person can fulfill both roles. Empower them to make decisions, escalate issues, and align leadership on priorities.

Compliance Officer Responsibilities

  • Own the HIPAA program: policies, procedures, Risk Analysis, and risk management.
  • Lead training, awareness, and sanction processes.
  • Oversee incident response, breach assessment, and notifications.
  • Direct vendor management and BAA compliance.
  • Coordinate audits, metrics, and leadership reporting.
  • Monitor regulatory changes and update controls accordingly.

Conducting Regular Compliance Audits

Audits verify that what’s on paper is happening in practice. Keep them lightweight but continuous so gaps are found early and corrected quickly.

Audit scope and cadence

  • Quarterly spot checks of access, minimum necessary, and disclosure logs.
  • Technical reviews: vulnerability scans, patch cadence, MFA coverage, and log integrity.
  • Backup and disaster recovery tests, including restore drills.
  • Physical walk-throughs: workstation placement, door controls, and device/media handling.
  • Vendor audits: BAA terms, incident reporting performance, and security attestations.

Close the loop

  • Record findings, assign owners, set due dates, and retest for effectiveness.
  • Summarize results for leadership and feed lessons learned into training and policy updates.

In summary, HIPAA compliance requirements for small business center on knowing where PHI/ePHI lives, performing Risk Analysis, implementing right-sized Security Rule controls, training people, managing vendors with strong BAAs, and keeping solid documentation. Make these activities routine, and your program will stay audit-ready and resilient.

FAQs.

What entities are considered small businesses under HIPAA?

HIPAA does not define “small business.” Applicability depends on your role and data. If you are a covered entity (like a clinic that bills electronically) or a business associate that handles PHI/ePHI for covered entities, you must comply—regardless of headcount or revenue.

How often should risk assessments be conducted for HIPAA compliance?

Perform a formal Risk Analysis at least annually and whenever there are significant changes—such as new systems, vendors, locations, or incidents. Keep interim updates and track remediation in your risk management plan.

What are the required elements of Business Associate Agreements?

BAAs must define permitted uses/disclosures of PHI, require safeguards (including HIPAA Security Rule Controls for ePHI), mandate prompt breach reporting, flow down obligations to subcontractors, support required access/accounting, provide for return or destruction of PHI, and allow termination for material breach.

How should a small business handle a HIPAA breach notification?

Immediately contain the incident, preserve evidence, and complete a documented risk assessment. If a breach is confirmed, notify affected individuals without unreasonable delay and within 60 days, include all required details, and meet HHS and media reporting thresholds. Coordinate with covered entities and follow BAA timelines, then document all actions and mitigation steps.

Share this article

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Related Articles