HIPAA Compliance Timeline: 30-60-90 Day Plan, Key Deadlines, and Ongoing Requirements

Product Pricing
Ready to get started? Book a demo with our team
Talk to an expert

HIPAA Compliance Timeline: 30-60-90 Day Plan, Key Deadlines, and Ongoing Requirements

Kevin Henry

HIPAA

September 16, 2025

8 minutes read
Share this article
HIPAA Compliance Timeline: 30-60-90 Day Plan, Key Deadlines, and Ongoing Requirements

A structured HIPAA compliance timeline helps you translate complex rules into clear, time‑bound actions. This 30‑60‑90 day plan shows how to prioritize risk, stand up core safeguards, and document evidence—so you are audit‑ready while sustaining privacy and security.

Use this roadmap whether you’re a covered entity or business associate. You will see concrete steps for Risk Assessment, Security Officer Designation, Vendor Management, Internal HIPAA Audits, Compliance Documentation, Workforce Training, and Policy Review Cycles—plus key deadlines and ongoing requirements.

30-Day Plan Foundation and Triage

Objectives for the first 30 days

  • Establish governance, scope your environment, and launch a rapid Risk Assessment.
  • Stabilize highest risks and protect ePHI where it is most exposed.
  • Create a single source of truth for Compliance Documentation.

Priority actions

  • Security Officer Designation and Privacy Officer assignment; define roles, authority, and escalation paths.
  • Inventory where PHI/ePHI resides (systems, apps, devices, vendors) and map data flows.
  • Kick off a baseline Risk Assessment: identify threats, vulnerabilities, likelihood/impact, and existing controls.
  • Stand up a centralized repository for policies, procedures, rosters, attestations, BAAs, and evidence.
  • Start Vendor Management: list all business associates; confirm BAAs exist or draft them; halt PHI sharing until executed.
  • Launch Workforce Training essentials: privacy basics, minimum necessary, incident reporting, and workstation security.
  • Draft core policies: access management, sanction policy, incident response, breach evaluation, and disposal.

Quick wins (risk triage)

  • Require strong authentication for remote access; disable shared accounts; tighten role‑based access for ePHI.
  • Encrypt laptops and mobile devices; enable device lock and automatic logoff.
  • Patch critical vulnerabilities; remove unsupported software touching ePHI.
  • Turn on audit logging for EHRs and other systems hosting ePHI.

Deliverables by Day 30

  • Named Security and Privacy Officers, RACI or responsibility matrix, and an approved compliance charter.
  • System/data inventory with ePHI locations and data‑flow diagram.
  • Risk Assessment plan with initial findings and a prioritized remediation backlog.
  • BAA inventory and gap list; draft BAAs in progress.
  • Initial Workforce Training completion roster and signed confidentiality acknowledgments.
  • Version‑controlled repository for Compliance Documentation.

60-Day Plan Build and Fortify

Objectives for days 31–60

  • Complete Risk Assessment and launch a risk management plan with owners, timelines, and milestones.
  • Implement administrative, technical, and physical safeguards; finalize policy set and Policy Review Cycles.
  • Deepen Vendor Management and role‑based Workforce Training.

Safeguards to implement and evidence

  • Administrative: formal onboarding/offboarding, unique user IDs, least‑privilege access reviews, sanction enforcement.
  • Technical: encryption in transit and at rest (where feasible), audit controls, automatic logoff, secure configuration baselines.
  • Physical: facility access procedures, visitor logs, media/device handling, secure destruction.

Policies, procedures, and training

  • Finalize privacy and security policies; document approvals; schedule Policy Review Cycles (e.g., annual or on change).
  • Build standard operating procedures for right‑of‑access, authorizations, release‑of‑information, and incident intake.
  • Expand Workforce Training with role‑specific modules (e.g., billing, clinical, IT), plus phishing awareness.

Vendor Management maturation

  • Execute outstanding BAAs; verify minimum necessary data sharing; document vendor security due diligence.
  • Track vendors by risk tier and define monitoring cadence; ensure termination/return‑of‑PHI clauses are present.

Incident response readiness

  • Publish incident response plan and breach risk‑assessment method; run a tabletop exercise and capture lessons learned.
  • Stand up an incident log and decision tree for breach notifications.

Deliverables by Day 60

  • Completed Risk Assessment with documented risks and a funded remediation plan.
  • Approved policy set with version history, effective dates, and attestation records.
  • Vendor risk files (BAAs, questionnaires, evidence) and a current vendor register.
  • Role‑based training rosters and updated sanctions records (if applicable).

90-Day Plan Audit-Ready and Verify

Objectives for days 61–90

  • Verify controls through Internal HIPAA Audits and close priority remediation items.
  • Validate contingency capabilities and assemble audit‑ready evidence.

Internal HIPAA Audits and control testing

  • Scope: access management, audit logging, transmission security, workstation/device controls, privacy workflows.
  • Test: sample user access, provisioning/deprovisioning, ePHI access logs, training attestations, vendor BAAs.
  • Document: test steps, evidence screenshots/reports, findings, and corrective action plans with owners/dates.

Contingency and resilience checks

  • Verify data backup, restoration tests, and emergency operations procedures; record recovery results and timings.
  • Confirm alternate communications, downtime procedures, and incident communications templates.

Evidence packaging

  • Compile an “audit binder” (digital): org chart, policies, Risk Assessment, risk treatment plan, training rosters, BAAs, access reviews, incident log, and breach analysis templates.
  • Prepare executive and board‑level summaries highlighting risk posture and progress.

Deliverables by Day 90

  • Completed Internal HIPAA Audits with findings and remediation plans in motion.
  • Contingency plan test results and improvement actions.
  • Comprehensive, current Compliance Documentation set suitable for regulator or customer due diligence.

Key Deadlines for HIPAA Compliance

  • Right of Access: provide individuals access to their PHI within 30 days of request; one 30‑day extension is permitted with written notice and reason.
  • Request for Amendment: act on requests to amend PHI within 60 days; one 30‑day extension is permitted with written notice.
  • Accounting of Disclosures: respond within 60 days; one 30‑day extension is permitted with written notice.
  • Breach Notification to Individuals: without unreasonable delay and no later than 60 days after discovery.
  • Breach Notification to HHS: for breaches affecting 500+ individuals, notify without unreasonable delay and within 60 days of discovery; for fewer than 500, report within 60 days after the end of the calendar year in which the breach occurred.
  • Breach Notification to Media: if a breach affects more than 500 residents of a state or jurisdiction, notify prominent media without unreasonable delay and within 60 days.
  • Business Associate to Covered Entity (breach): notify without unreasonable delay and no later than 60 days after discovery, including available information on affected individuals.
  • Notice of Privacy Practices: provide at first service encounter (or promptly thereafter if electronic/telehealth), post prominently at service sites, and make available on public websites that describe services.
  • Documentation Retention: retain required policies, procedures, and other Compliance Documentation for at least 6 years from the date of creation or the effective date, whichever is later.

Ongoing HIPAA Compliance Requirements

Governance and Policy Review Cycles

  • Maintain active leadership by Security and Privacy Officers; brief leadership on risk, incidents, and remediation status.
  • Review and update policies at least annually and whenever operations, systems, or laws change; record approvals and effective dates.

Risk management and security monitoring

  • Revisit Risk Assessment periodically and after major changes; track risk treatment to closure with measurable milestones.
  • Run continuous vulnerability management, timely patching, log review, and quarterly user access recertifications.
  • Test backups/restores and contingency plans regularly; update based on lessons learned.

Workforce Training and culture

  • Provide initial and periodic Workforce Training tailored by role; maintain rosters and attestation records.
  • Reinforce minimum necessary, secure messaging, and incident reporting; apply and document sanctions when required.

Vendor Management lifecycle

  • Ensure BAAs are executed before PHI sharing; reassess vendors by risk tier; review security evidence on a set cadence.
  • Validate data minimization, secure transfers, and timely offboarding/return‑of‑PHI at contract termination.

Internal HIPAA Audits and continuous improvement

  • Run scheduled Internal HIPAA Audits (e.g., quarterly thematic reviews) and track corrective actions through completion.
  • Use metrics: training completion, access turnaround, patch timelines, incident mean‑time‑to‑detect/respond, and vendor coverage.

Conclusion

Your HIPAA compliance timeline succeeds when governance, Risk Assessment, controls, and evidence move in lockstep. Use the 30‑60‑90 day plan to stand up safeguards quickly, meet key deadlines reliably, and sustain compliance through disciplined Policy Review Cycles, Vendor Management, Workforce Training, and Internal HIPAA Audits.

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

FAQs

What are the initial steps in a HIPAA compliance timeline?

Begin by designating Security and Privacy Officers, scoping where PHI/ePHI lives, and launching a baseline Risk Assessment. Stand up a documentation repository, inventory business associates and execute BAAs, publish core policies (access, incident, sanctions), and deliver essential Workforce Training. Apply quick‑win controls like device encryption, strong authentication, and audit logging.

How long do covered entities have to comply after HIPAA updates?

Each final rule sets its own effective and compliance dates. Historically, HHS has provided months‑long windows (often around six months) to implement changes. Treat the stated compliance date as immovable, back‑plan with a 30‑60‑90 day schedule, and update policies, training, notices, and vendor terms before that date.

What ongoing activities maintain HIPAA compliance?

Maintain a living risk management program, periodic Policy Review Cycles, regular Workforce Training, Vendor Management with BAAs and due diligence, Internal HIPAA Audits, access reviews, vulnerability/patch management, contingency plan tests, and thorough Compliance Documentation retained for at least six years.

How is a HIPAA internal audit conducted?

Define scope and objectives, select control areas, and create test procedures. Sample records (e.g., access grants, ePHI logs, training attestations, BAAs), gather evidence, and rate findings by risk. Issue a report with corrective actions, owners, and due dates; then verify remediation and archive evidence in your compliance repository.

Share this article

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Related Articles