HIPAA for Small Businesses: Employee Responsibilities, Do’s and Don’ts Explained
HIPAA Applicability to Employers
HIPAA applies to your organization based on the role you play. If you sponsor a group health plan for employees or operate a clinic that bills electronically, you (or your plan) are subject to HIPAA requirements for Protected Health Information (PHI). In these roles, you must follow the Privacy Rule for how PHI is used and disclosed and the Security Rule for how electronic PHI (ePHI) is protected.
HIPAA does not generally apply to your routine HR files. Employment records—like sick notes provided to a manager, drug test results kept by HR, or ADA accommodation forms—are typically not PHI. However, the same data can become PHI when handled by your group health plan or a plan administrator. Keep plan PHI and employment records strictly separate.
Key terms to anchor your scope: “covered entity” (your group health plan or provider operations), “business associate” (a vendor handling PHI for you), and PHI itself (any individually identifiable health information about health status, care, or payment). Map where PHI lives, who touches it, and why.
When HIPAA applies in small businesses
- You sponsor a self-funded or insured group health plan and access plan PHI for plan administration.
- You operate an on-site clinic that bills insurers electronically.
- Your vendors receive PHI on your behalf, making them business associates.
When HIPAA does not apply
- General HR records not created or kept by the group health plan.
- Health information gathered for workplace safety or leave decisions outside plan operations.
Employee Responsibilities under HIPAA
Employees with access to PHI must follow the “minimum necessary” standard and your policies at all times. Actions are judged by need-to-know. If a task does not require PHI, do not access it. If a disclosure is not authorized or required, do not make it.
Do’s
- Use PHI only for assigned duties and only the minimum necessary.
- Verify identity and authority before sharing PHI with anyone.
- Protect PHI in any form—lock screens, clear desks, and secure paper files.
- Use approved, encrypted tools for email, messaging, and storage of ePHI.
- Create strong passwords; never reuse or share them.
- Report suspected incidents immediately so Breach Notification timelines can be met.
Don’ts
- Don’t access a coworker’s or your own PHI out of curiosity.
- Don’t discuss PHI in public areas or over unsecured channels.
- Don’t store PHI on personal devices, USB drives, or unauthorized cloud apps.
- Don’t dispose of paper PHI in regular trash; follow secure destruction steps.
- Don’t bypass role-based restrictions or share user credentials.
Practical examples
- If a broker asks for a census with diagnoses, send only what your policy allows, and only after confirming a Business Associate Agreement is in place.
- If you misdirect PHI by email, alert your Privacy Officer at once; do not try to fix it quietly.
Employer Obligations for HIPAA Compliance
Your program should designate leaders, create rules, manage risks, and prove what you did through documentation. Small businesses can keep this lean and still effective by focusing on the essentials below.
Governance and roles
- Appoint a Privacy Officer to oversee permissible uses/disclosures and manage complaints.
- Appoint a Security Officer to oversee safeguards for ePHI and security incident response. One person can hold both roles if appropriate.
Policies, procedures, and documentation
- Publish clear policies on access, disclosures, minimum necessary, and individual rights.
- Define sanctions for violations and a step-by-step Breach Notification plan.
- Document training, risk decisions, and incident investigations.
Safeguards for ePHI
- Administrative: role-based access, Workforce Training, vendor due diligence, contingency planning.
- Physical: locked storage, device controls, screen privacy, secure work areas.
- Technical: unique user IDs, multifactor authentication, encryption, and audit logs.
Risk Assessment and improvement
- Conduct a periodic Risk Assessment to identify threats to confidentiality, integrity, and availability of ePHI.
- Prioritize fixes that reduce the most risk—patch systems, tighten access, and harden email.
Vendors and contracts
- Identify all vendors touching PHI and execute a Business Associate Agreement before sharing.
- Ensure subcontractors of your vendors also agree to HIPAA obligations.
Incident response and Breach Notification
- Escalate suspected incidents immediately to your Privacy Officer or Security Officer.
- Investigate, perform a risk-of-harm assessment, mitigate, and notify affected parties as required.
Handling of Employee Health Information
Separate plan PHI from HR files physically and logically. Restrict plan PHI access to a small, named team performing plan administration. Keep an inventory of where PHI is stored, how it flows, and who can see it.
Ready to simplify HIPAA compliance?
Join thousands of organizations that trust Accountable to manage their compliance needs.
Collection and use
- Collect only what you need for claims, payment, or health plan operations.
- Apply the minimum necessary standard to each request or disclosure.
Storage and transmission
- Store paper PHI in locked cabinets; store ePHI on approved, encrypted systems.
- Use secure email or portals for external sharing; verify recipients before sending.
Individual rights
- Employees (as plan members) may request access to or amendments of plan PHI through defined channels.
- Track and honor restrictions or confidential communications where applicable.
Retention and disposal
- Retain plan PHI and documentation for the periods required by policy.
- Shred or otherwise irreversibly destroy PHI when retention ends.
Importance of Compliance for Small Businesses
Strong HIPAA practices protect your people and your business. Breaches lead to fines, remediation costs, lost productivity, and reputational harm. Solid controls build employee trust and reduce the chance of disruptive incidents.
High-impact, low-effort wins
- Designate your Privacy Officer and Security Officer and empower them to act.
- Complete a quick Risk Assessment and fix top issues like email security and access sprawl.
- Roll out concise Workforce Training with practical do’s and don’ts.
- Sign a Business Associate Agreement with each vendor that handles PHI.
Role of Business Associates
Business associates are service providers that create, receive, maintain, or transmit PHI for you. Common examples include TPAs, benefits brokers, cloud storage providers, IT support firms, and shredding vendors that handle PHI.
Managing business associates
- Execute a Business Associate Agreement before any PHI is shared.
- Limit PHI shared to the minimum necessary for the service.
- Require security controls, prompt incident reporting, and flow-down obligations to subcontractors.
- Maintain an inventory of all business associates and review agreements periodically.
Training and Sanctions for Employees
Workforce Training should be role-based, practical, and recurring. Focus on real scenarios employees face—misdirected email, sharing with vendors, and conversations in open areas—and reinforce minimum necessary and secure handling.
Training essentials
- New-hire training before access to PHI and refresher sessions thereafter.
- Job-specific modules for HR, benefits staff, and IT administrators.
- Quick microlearning updates after policy changes or incidents.
- Attendance logs and comprehension checks to verify learning.
Sanctions and accountability
- Use a graduated discipline model—from coaching to termination—aligned to risk and intent.
- Apply sanctions consistently and document decisions.
- Do not retaliate against good-faith reporting of concerns.
Conclusion
Keep HIPAA simple and effective: know where PHI lives, limit who can see it, train your team, manage vendors with a Business Associate Agreement, and respond fast to issues. With clear roles, a living Risk Assessment, and practical safeguards, you can protect PHI and your business.
FAQs
What are employee responsibilities under HIPAA for small businesses?
Employees must access and disclose only the minimum necessary PHI to do their jobs, follow policies for secure handling, use approved systems, keep credentials private, and report suspected incidents immediately so Breach Notification requirements can be met. Curiosity viewing, casual conversations about PHI, and storing PHI on personal devices are prohibited.
How must employers handle employee health information under HIPAA?
Handle plan PHI separately from HR records, restrict access to a small need-to-know team, and safeguard ePHI with administrative, physical, and technical controls. Provide avenues for plan members to access or amend PHI, retain records per policy, and use Business Associate Agreements with any vendor that handles PHI on your behalf.
What are the consequences of HIPAA non-compliance for small businesses?
Consequences include regulatory penalties, notification and remediation costs, potential litigation, operational disruption, and loss of employee trust. Effective governance, Workforce Training, a current Risk Assessment, and timely Breach Notification minimize these risks and demonstrate good-faith compliance.
Ready to simplify HIPAA compliance?
Join thousands of organizations that trust Accountable to manage their compliance needs.