HIPAA ePHI Security Guidelines: Practical Checklist for Covered Entities and Business Associates
If you create, receive, maintain, or transmit electronic protected health information (ePHI), this practical checklist will help you turn HIPAA ePHI Security Guidelines into day-to-day actions. Use it to demonstrate Security Rule Compliance, reduce risk, and prepare for audits across administrative, physical, and technical safeguards.
Conduct Annual Risk Assessments
Perform a documented, organization-wide risk analysis at least annually and whenever systems, vendors, or processes change. Build a repeatable Risk Assessment Framework that traces how ePHI flows, where it is stored, and which threats and vulnerabilities could impact confidentiality, integrity, or availability.
- Define scope: all systems, apps, medical devices, and vendors that create or touch ePHI.
- Map data flows and maintain an asset inventory with owners and criticality.
- Identify threats and vulnerabilities, then rate likelihood and impact to form a risk register.
- Evaluate existing controls, pinpoint gaps, and prioritize remediation with due dates and owners.
- Document risk acceptance decisions and track completion evidence for audits.
- Reassess after major changes, incidents, or acquisitions; keep versioned reports.
Develop and Update Security Policies
Adopt clear, enforceable policies that align to the Security Rule and are reviewed and approved at least annually. Translate policy into procedures, standards, and training so staff can execute consistently.
- Publish access control, authentication, remote access, and encryption requirements.
- Define Workstation Use Policies, acceptable use, clean desk, and remote work expectations.
- Establish change and patch management, configuration baselines, and vulnerability handling.
- Document incident response and breach notification steps with roles and contact trees.
- Set data classification, backup/retention, and disposal rules that cover ePHI lifecycle.
- Include vendor risk management requirements and onboarding/offboarding checklists.
- Maintain version control, approvals, and workforce attestation for all policy updates.
Establish Business Associate Agreements
Before sharing ePHI, execute written agreements that define Business Associate Agreement Requirements. Verify that each business associate and its subcontractors implement safeguards and report incidents promptly.
- Specify permitted uses/disclosures, minimum necessary standards, and required safeguards.
- Require prompt security incident and breach reporting with defined timelines and contacts.
- Flow down obligations to subcontractors and require proof on request.
- Grant reasonable audit/assessment rights and ongoing security reporting.
- Detail termination actions: return or destroy ePHI and certify completion.
- Align with your risk allocation (e.g., insurance, indemnification) and service-specific security addenda.
- Track BAAs in a central register and review during vendor performance assessments.
Implement Facility Access Controls
Apply Physical Access Controls to protect locations where ePHI systems reside, including clinics, data rooms, and any space housing networking or backup media. Limit entry to authorized personnel and preserve evidence.
- Use badged entry with unique IDs, visitor sign-in, escorts, and automated logs.
- Secure server/network rooms with locked racks, surveillance, and door alarms.
- Protect against environmental hazards with fire suppression, HVAC monitoring, and power backup.
- Define procedures for lost badges, tailgating prevention, and after-hours access.
- Review access lists regularly and revoke promptly upon role changes or termination.
- Document inspections and control tests with remediation tracking.
Enforce Workstation Security Policies
Standardize endpoint settings to reduce exposure at the point of care and in administrative areas. Your Workstation Use Policies should prevent unauthorized viewing, tampering, and data leakage.
Ready to assess your HIPAA security risks?
Join thousands of organizations that use Accountable to identify and fix their security gaps.
Take the Free Risk Assessment- Require auto-lock, short inactivity timeouts, and secure login banners.
- Mandate full-disk encryption, EDR/anti-malware, and restricted local admin rights.
- Prohibit storing ePHI locally unless encrypted and justified by business need.
- Use privacy screens in public or shared spaces and secure printing/pickup.
- Control remote access via VPN or secure gateways; block risky networks and USB usage as needed.
- Manage BYOD with mobile device management, containerization, and remote wipe.
Manage Device and Media Controls
Implement end-to-end Media Sanitization Procedures and custody tracking for devices and removable media that store ePHI. Treat the entire hardware lifecycle as part of your control environment.
- Maintain an accurate asset inventory with ownership, location, and encryption status.
- Encrypt storage media and manage keys securely; disable ports when not required.
- Define standardized sanitization steps (clear, purge, destroy) with documented results.
- Use tamper-evident transport, locked containers, and approved couriers for media movement.
- Wipe or destroy media prior to reuse, return, maintenance, or disposal; retain certificates.
- Reconcile assets during audits; investigate discrepancies promptly.
Control Access to ePHI
Apply Technical Access Controls that enforce least privilege and traceability across clinical and business systems. Automate provisioning, reviews, and deprovisioning to reduce human error.
- Issue unique user IDs and require multifactor authentication for sensitive access.
- Use role-based access control with documented role-to-privilege mappings.
- Run periodic access reviews and promptly remove dormant or transferred users.
- Implement emergency “break-glass” access with just-in-time elevation, alerts, and post-review.
- Set session timeouts, reauthentication for high-risk actions, and IP/network restrictions.
- Segment networks and applications to minimize lateral movement and limit ePHI exposure.
Utilize Audit Controls
Collect and monitor Audit Trail Mechanisms across EHRs, applications, databases, and networks. Protect logs from tampering and analyze them to detect misuse or compromise.
- Log authentication events, access to ePHI, queries/exports, changes, and administrative actions.
- Centralize logs, synchronize system time, and restrict log access to need-to-know staff.
- Alert on anomalies such as mass downloads, odd hours, or access to VIP records.
- Preserve log integrity with append-only or tamper-evident storage.
- Retain required documentation for at least six years and keep critical logs per your risk analysis.
- Review samples routinely and document follow-up, findings, and corrective actions.
Ensure ePHI Integrity
Protect data from unauthorized alteration or destruction with layered Data Integrity Safeguards. Validate data at input, during processing, and at rest, and be able to prove its correctness when challenged.
- Use checksums, hashing, or digital signatures to detect unauthorized changes.
- Apply application controls: input validation, referential integrity, and change approval workflows.
- Back up ePHI securely, test restores regularly, and keep at least one offline or immutable copy.
- Harden systems, patch promptly, and deploy anti-malware and configuration baselines.
- Monitor for corruption or ransomware indicators and trigger rapid containment.
Secure ePHI Transmission
Encrypt data in transit using Transmission Encryption Standards that are appropriate for the channel and recipients. Block or restrict insecure protocols and document exceptions with compensating controls.
- Enforce TLS 1.2+ for web portals, APIs, and integrations; disable legacy ciphers and protocols.
- Use secure email options (such as S/MIME or portal-based delivery) when sending ePHI externally.
- Tunnel site-to-site traffic and remote administration through VPN or IPsec.
- Adopt secure clinical messaging; avoid SMS for ePHI and set retention consistent with policy.
- Manage certificates and keys throughout their lifecycle and enable HSTS where applicable.
- Verify recipient identity, apply minimum necessary, and deploy DLP for outbound channels.
- Document network diagrams and approved cryptographic configurations with review dates.
Bringing these steps together gives you a defensible, auditable program for HIPAA ePHI Security Guidelines. Treat the checklist as a living system: measure control effectiveness, remediate gaps quickly, and update documentation so you can demonstrate governance, risk management, and continuous improvement.
FAQs
What are the key components of the HIPAA Security Rule?
The Security Rule centers on administrative, physical, and technical safeguards, supported by organizational requirements (like BAAs), policies and procedures, and documentation. In practice, that means risk analysis and management, workforce training, Physical Access Controls, Technical Access Controls, Audit Trail Mechanisms, incident response, and evidence that you operate these controls consistently.
How often should risk assessments be conducted for ePHI?
Conduct a comprehensive assessment at least annually and whenever significant changes occur—such as new systems, integrations, vendors, mergers, locations, or after security incidents. Risk analysis is ongoing, so update the risk register as your environment and threats evolve, and track remediation to closure.
What are the requirements for business associate agreements under HIPAA?
BAAs must define permitted uses and disclosures, require appropriate safeguards, mandate security incident and breach reporting, and flow obligations to subcontractors. They should address access to ePHI, audit/assessment rights, termination and data return/destruction, and other Business Associate Agreement Requirements that reflect your risk posture and services provided.
How can covered entities secure transmission of ePHI?
Use strong encryption for all external transmissions (for example, TLS for portals and APIs and secure email or portals for messaging), authenticate endpoints, and restrict legacy protocols. Verify recipients, apply minimum necessary, monitor with DLP, and ensure your vendors handling communications meet Transmission Encryption Standards and have current BAAs in place.
Table of Contents
- Conduct Annual Risk Assessments
- Develop and Update Security Policies
- Establish Business Associate Agreements
- Implement Facility Access Controls
- Enforce Workstation Security Policies
- Manage Device and Media Controls
- Control Access to ePHI
- Utilize Audit Controls
- Ensure ePHI Integrity
- Secure ePHI Transmission
- FAQs
Ready to assess your HIPAA security risks?
Join thousands of organizations that use Accountable to identify and fix their security gaps.
Take the Free Risk Assessment