HIPAA for Group Health Plans: Compliance Checklist from Employee Benefits Counsel
You oversee a group health plan and need a practical, counsel-level roadmap to achieve and sustain HIPAA compliance. Use this compliance checklist to align your plan with the Privacy Rule, Security Rule, and Breach Notification Rule while protecting Protected Health Information (PHI) and reducing enforcement risk.
HIPAA Applicability to Group Health Plans
HIPAA applies to group health plans that provide or pay for medical care, including self-insured plans, health FSAs, HRAs, and most EAPs that offer medical services. Dental and vision plans are covered if they provide medical care and are not excepted benefits under separate rules. Life insurance, disability, and workers’ compensation programs are not HIPAA-covered entities.
If your plan is fully insured and you do not receive PHI beyond enrollment/disenrollment and limited summary health information, your obligations are narrower. You still remain a covered entity, must ensure Privacy Rule Compliance for plan administration, and must implement plan “firewalls” that prevent PHI from being used for employment decisions.
Key actions
- Confirm which benefits are HIPAA-covered and which are excepted.
- Amend plan documents to permit PHI use/disclosure for plan administration.
- Designate workforce members who can access PHI and separate them from HR and management functions.
Appoint Privacy Officer
Designate a Privacy Officer to oversee Privacy Rule Compliance. This role owns policies governing uses and disclosures, minimum necessary standards, individual rights (access, amendment, accounting), complaints handling, and mitigation of improper disclosures.
Responsibilities
- Maintain and update privacy policies, forms, and Notice of Privacy Practices (NPP).
- Manage participant requests and complaints; track responses and deadlines.
- Coordinate with plan sponsor leadership to ensure PHI is not used for employment actions.
Appoint Security Officer
Designate a Security Officer to lead Security Rule Compliance for electronic PHI (ePHI). This role coordinates administrative, physical, and technical safeguards; monitors vendors; and oversees the Risk Management Plan.
Responsibilities
- Implement role-based access, authentication, encryption, and audit logging for ePHI systems.
- Establish device/media controls and secure data transmission and storage.
- Coordinate security incident response and remediation.
Conduct Risk Analysis and Management
Perform an enterprise-wide risk analysis tailored to your group health plan’s PHI environment and use the findings to drive a documented Risk Management Plan. Reassess when systems, vendors, or business processes change.
Risk analysis steps
- Inventory PHI: where it is created, received, maintained, or transmitted (TPAs, brokers, cloud platforms).
- Map data flows and identify threats/vulnerabilities; rate likelihood and impact.
- Prioritize risks and assign mitigation owners and deadlines.
Risk management actions
- Apply controls (encryption, segregation, logging, training, vendor requirements).
- Track remediation progress, acceptance of residual risk, and validation testing.
- Review at least annually and after significant changes or incidents.
Develop Policies and Procedures
Written policies and procedures operationalize compliance and guide your workforce. Keep them role-based, concise, and actionable.
Core policy set
- Uses/disclosures, minimum necessary, and workforce access standards.
- Individual rights: access, amendment, restrictions, confidential communications, and accounting.
- Security safeguards: access control, encryption, logging, contingency planning, device/media handling.
- Breach response, complaint handling, sanctions, and vendor management.
- Prohibition on using PHI for employment or benefits eligibility decisions.
Implement Training Program
Provide initial and periodic, role-based training that covers both privacy and security practices. Training should be practical and scenario-driven.
- Train new workforce members before they access PHI; deliver refreshers at least annually and after material policy changes.
- Document attendance, materials, assessments, and completion dates.
- Reinforce minimum necessary, secure handling of ePHI, incident reporting, and Nondiscrimination Requirements.
Establish Business Associate Agreements
Execute Business Associate Agreements (BAAs) with vendors that create, receive, maintain, or transmit PHI on your behalf (e.g., TPAs, COBRA administrators, wellness vendors, cloud platforms). No PHI should flow until a BAA is signed.
Ready to simplify HIPAA compliance?
Join thousands of organizations that trust Accountable to manage their compliance needs.
BAA essentials
- Permitted and required uses/disclosures; minimum necessary.
- Security Rule compliance and safeguards for ePHI.
- Subcontractor flow-down obligations.
- Prompt reporting of incidents and suspected breaches.
- Breach investigation and cooperation duties.
- Return/secure destruction of PHI at termination and continued protections if destruction is infeasible.
- Right to audit/verify and termination for material breach.
Distribute Notice of Privacy Practices
Provide an NPP that describes permitted uses/disclosures, participant rights, plan duties, and complaint options. Deliver at enrollment and upon material revisions; at least every three years, remind participants that the NPP is available on request. If your plan maintains a website that describes benefits, post the current NPP there.
If fully insured and you do not receive PHI (beyond enrollment and summary information), coordinate with the insurer. You must still maintain an NPP and provide it upon request.
Implement Access Control
Limit PHI access to authorized personnel who need it to administer the plan. Enforce the minimum necessary standard and implement layered controls.
- Role-based access, unique user IDs, strong authentication, and timely termination of access.
- Audit logs and periodic access reviews; automatic logoff where feasible.
- Encryption of ePHI in transit and at rest; secure remote access and mobile device protections.
- Administrative “firewalls” separating plan administration from employment decisions.
Establish Breach Notification Procedures
Adopt procedures aligned with the Breach Notification Rule for impermissible uses/disclosures of unsecured PHI. Presume breach unless a documented risk assessment shows a low probability of compromise.
Notification framework
- Notify affected individuals without unreasonable delay and no later than 60 calendar days after discovery.
- Notify HHS: for 500+ affected in a state or jurisdiction, contemporaneous notice; for fewer than 500, report within 60 days after year-end.
- Notify prominent media if a breach affects 500+ residents of a state or jurisdiction.
- Coordinate with business associates; maintain incident logs and investigation records.
Maintain Documentation and Record Keeping
Maintain all HIPAA-related documentation for at least six years from the later of creation or last effective date. Organized records demonstrate compliance and speed audit responses.
- Policies, procedures, NPP versions, plan document amendments, and workforce designations.
- Risk analyses, the Risk Management Plan, remediation evidence, and security assessments.
- Training rosters, materials, and test results.
- BAAs and vendor due diligence files.
- Access reviews, incident reports, breach determinations, and notifications.
Conduct Periodic Audits and Reviews
Schedule privacy and security audits to verify that controls operate as intended. Use results to update your Risk Management Plan and training content.
- Sample uses/disclosures for minimum necessary compliance.
- Review user access, system configurations, and audit logs.
- Test contingency and incident response plans via tabletop exercises.
- Assess vendor performance against BAA obligations.
Ensure Nondiscrimination Compliance
Implement Nondiscrimination Requirements applicable to group health plans. Do not vary eligibility, benefits, premiums, or contributions based on health status or claims history. Avoid collecting genetic information for underwriting, and ensure wellness program designs comply with applicable limits.
The Privacy Rule also prohibits intimidation or retaliation against individuals who exercise HIPAA rights or file complaints. Provide accessible communications and reasonable accommodations for participants who need them.
Enforce Sanctions for Non-Compliance
Adopt and apply a consistent sanctions policy for workforce members who violate HIPAA policies. Clear consequences drive accountability and culture.
- Use progressive discipline proportionate to the violation and impact.
- Document investigations, decisions, corrective actions, and retraining.
- Carve out protections for good-faith reporting and whistleblowing.
Conclusion
By clarifying applicability, appointing accountable officers, executing a rigorous risk analysis, and operationalizing policies, training, BAAs, access controls, and breach response, you build a durable HIPAA compliance program. Maintain thorough records, audit regularly, and uphold nondiscrimination to protect participants and the plan.
FAQs.
What are the HIPAA requirements for group health plans?
You must comply with the Privacy Rule, Security Rule, and Breach Notification Rule. Practically, that means limiting PHI uses/disclosures, safeguarding ePHI, honoring participant rights, executing Business Associate Agreements, issuing an NPP, training your workforce, documenting everything for six years, and following defined breach investigation and notification procedures.
Who must be appointed as privacy and security officers under HIPAA?
Your plan must designate a Privacy Officer to manage Privacy Rule Compliance and a Security Officer to lead Security Rule Compliance for ePHI. In smaller organizations, one qualified individual may hold both roles, but responsibilities must be clearly defined and executed.
How often should risk analyses and audits be conducted for HIPAA compliance?
Conduct a comprehensive risk analysis at least annually and whenever you introduce new systems, vendors, or processes that affect PHI. Perform periodic privacy and security audits throughout the year, review access quarterly, and run incident response and contingency plan exercises at least annually.
What are the key components of business associate agreements under HIPAA?
Effective BAAs define permitted uses/disclosures, require safeguards and Security Rule compliance, mandate subcontractor flow-down, set deadlines for incident and breach reporting, outline cooperation in investigations, require return or destruction of PHI at termination, and provide audit and termination rights for material breach.
Table of Contents
- HIPAA Applicability to Group Health Plans
- Appoint Privacy Officer
- Appoint Security Officer
- Conduct Risk Analysis and Management
- Develop Policies and Procedures
- Implement Training Program
- Establish Business Associate Agreements
- Distribute Notice of Privacy Practices
- Implement Access Control
- Establish Breach Notification Procedures
- Maintain Documentation and Record Keeping
- Conduct Periodic Audits and Reviews
- Ensure Nondiscrimination Compliance
- Enforce Sanctions for Non-Compliance
- FAQs.
Ready to simplify HIPAA compliance?
Join thousands of organizations that trust Accountable to manage their compliance needs.