HIPAA for IT Service Providers: Compliance Requirements & Checklist

Product Pricing Demo Video Free HIPAA Training
LATEST
video thumbnail
Admin Dashboard Walkthrough Jake guides you step-by-step through the process of achieving HIPAA compliance
Ready to get started? Book a demo with our team
Talk to an expert

HIPAA for IT Service Providers: Compliance Requirements & Checklist

Kevin Henry

HIPAA

May 25, 2025

6 minutes read
Share this article
HIPAA for IT Service Providers: Compliance Requirements & Checklist

When you deliver managed services, cloud hosting, or support to healthcare organizations, you are likely a Business Associate under HIPAA. That status brings obligations to safeguard Protected Health Information across people, processes, and technology, and to prove what you did through clear documentation.

This guide breaks down the core requirements into a practical checklist you can execute. You will validate risk, formalize policies, manage Business Associate Agreements, prepare Security Incident Procedures, and implement the physical, technical, and administrative safeguards that demonstrate compliance.

Conduct Risk Assessments

Objectives

  • Identify where ePHI is created, received, maintained, or transmitted across your environments, vendors, and data flows.
  • Evaluate threats, vulnerabilities, likelihood, and impact to determine risk levels and prioritize mitigation.
  • Produce Risk Analysis Documentation that supports decisions and drives your remediation roadmap.

How to execute

  • Define scope: systems, applications, networks, endpoints, backups, and third-party services that touch PHI.
  • Map data: inventory repositories, integrations, and transmission paths; include shadow IT and remote work scenarios.
  • Identify threats and vulnerabilities: misconfigurations, access gaps, unpatched software, supply-chain risks, and insider error.
  • Analyze risk: rate likelihood and impact; record assumptions; select controls that reduce risk to acceptable levels.
  • Plan remediation: assign owners, timelines, and validation steps; verify completion with evidence.

Cadence and triggers

  • Establish a recurring assessment cycle; many providers run a full analysis annually with targeted updates quarterly.
  • Reassess after significant changes: new systems, mergers, migrations, incidents, or regulatory updates.

Evidence to retain

Develop Security Policies and Procedures

What to include

  • Access Control Mechanisms: role-based access, least privilege, unique IDs, MFA, emergency access, and account lifecycle.
  • Encryption Standards: requirements for data at rest and in transit, key management, and handling of portable media.
  • Change and configuration management: baseline hardening, patching SLAs, vulnerability management, and secure builds.
  • Security Incident Procedures: reporting channels, triage criteria, escalation, evidence handling, and post-incident reviews.
  • Acceptable use, data classification, secure development, vendor risk management, logging, monitoring, and retention.
  • Workforce obligations: onboarding, confidentiality, sanctions, and periodic acknowledgments.

Documentation to keep

  • Version-controlled policies with approval records, distribution logs, and Compliance Training Records.
  • Procedures, playbooks, and checklists that operationalize each policy.

Establish Business Associate Agreements

Scope and responsibilities

Execute a Business Associate Agreement with every covered entity you serve and each subcontractor that handles PHI on your behalf. Ensure obligations flow down to all applicable downstream vendors.

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

What your BAA must cover

  • Permitted uses and disclosures of PHI and the minimum necessary standard.
  • Administrative, physical, and technical safeguards you agree to implement.
  • Reporting duties for incidents and breaches, including cooperation and timelines.
  • Subcontractor requirements to meet the same protections and terms.
  • Return or destruction of PHI at termination and provisions for continued protections if destruction is infeasible.
  • Right to audit, monitor, or request documentation demonstrating compliance.

Ongoing oversight

  • Perform Business Associate Agreement Audits: contract reviews, evidence sampling, and vendor attestations to verify obligations are met.
  • Track BAA expirations, amendments, and sign-offs; store signed agreements centrally.

Implement Incident Response Plans

Build actionable Security Incident Procedures

  • Detect and triage: define what constitutes a security incident versus a HIPAA breach and who must be engaged.
  • Contain and eradicate: isolate affected assets, revoke access, patch, and remove malware while preserving evidence.
  • Investigate: determine whether PHI was compromised, using a structured risk-of-compromise assessment.
  • Coordinate notifications: work with the covered entity to meet contractual and legal requirements without unreasonable delay.
  • Recover and improve: restore services, validate controls, and implement corrective actions.

Artifacts to maintain

  • Runbooks, contact trees, chain-of-custody logs, investigation notes, and lessons-learned reports.

Preventive controls that help

  • Encryption Standards for stored and transmitted data, strong authentication, and effective monitoring reduce breach likelihood and impact.

Apply Physical Safeguards

Facilities and equipment

  • Facility access controls: badges, visitor logs, escorts, and cabinet locks for on-premises gear.
  • Workstation security: screen locks, privacy filters, secure docking areas, and clear-desk expectations.
  • Device and media controls: inventory, secure storage, transport procedures, and verified destruction or sanitization.
  • Environmental protections: power continuity, fire suppression, and temperature/humidity monitoring for server rooms.

Evidence to retain

  • Access logs, camera footage retention policies, asset inventories, and destruction certificates for media handling PHI.

Enforce Technical Safeguards

Access and authentication

  • Implement Access Control Mechanisms: least privilege, MFA, just-in-time elevation, and automatic session timeouts.
  • Centralize identity with conditional access and continuous access evaluation for high-risk sessions.

Encryption and transmission security

  • Apply Encryption Standards for data in transit and at rest; manage keys securely and rotate them on a defined schedule.
  • Segment networks, restrict remote access, and protect APIs and integrations moving PHI.

Auditability and integrity

  • Enable audit controls: log collection, retention, alerting, and immutable storage for security-relevant events.
  • Use integrity controls: hashing, code signing, and EDR to detect tampering and malicious activity.

Operational hygiene

  • Harden configurations, patch promptly, scan for vulnerabilities, and remediate based on risk.

Maintain Administrative Safeguards

Program foundations

  • Assign security responsibility and establish governance to approve policies and track risk remediation.
  • Workforce security: background checks where appropriate, onboarding/offboarding, and defined sanction policies.
  • Security awareness and role-based training with auditable Compliance Training Records.
  • Information access management aligned to job duties and the minimum necessary standard.
  • Contingency planning: backups, disaster recovery, and emergency-mode operations with periodic testing.
  • Ongoing evaluations: measure control effectiveness and update based on Risk Analysis Documentation.
  • Vendor risk management integrated with BAAs and Business Associate Agreement Audits.

Documentation you should have

  • Policies and procedures, training curricula and Compliance Training Records, risk register, remediation plans, and audit findings.

Conclusion

HIPAA compliance for IT service providers is a continuous program: assess risk, codify policies, manage BAAs, respond to incidents, and enforce physical, technical, and administrative safeguards. Maintain strong evidence—especially Risk Analysis Documentation and training records—to demonstrate due diligence and accountability.

FAQs

What are the key HIPAA compliance requirements for IT service providers?

You must conduct risk assessments, implement administrative, physical, and technical safeguards, maintain written policies and Security Incident Procedures, train your workforce and keep Compliance Training Records, and execute and oversee Business Associate Agreements with customers and subcontractors. Document everything you implement and verify that controls operate as intended.

How often should risk assessments be conducted under HIPAA?

Perform a comprehensive baseline assessment, review it on a defined cadence (many organizations use an annual cycle), and repeat whenever major changes occur—such as new systems, migrations, incidents, or vendor shifts. Update your Risk Analysis Documentation each time and track remediation to completion.

What must be included in a Business Associate Agreement?

A BAA should define permitted uses and disclosures of PHI, required safeguards, reporting and cooperation obligations for incidents and breaches, subcontractor flow-down terms, return or destruction of PHI at termination, and audit or documentation rights. Maintain signed copies and perform periodic Business Associate Agreement Audits to verify adherence.

How should IT providers respond to a HIPAA breach?

Follow your Security Incident Procedures: contain the event, preserve evidence, investigate scope and root cause, assess the risk to PHI, and coordinate notifications with the covered entity according to contractual and legal timelines. Remediate gaps, verify recovery, and document lessons learned to prevent recurrence.

Share this article

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Related Articles