HIPAA Omnibus Rule Checklist: Who Must Comply, Documentation, and Penalties
Identifying Covered Entities
Who qualifies as a covered entity
You must comply with the HIPAA Omnibus Rule if you are a health plan, a health care clearinghouse, or a health care provider that transmits health information in connection with standard electronic transactions. Employer-sponsored group health plans and hybrid entities (organizations with both covered and non-covered components) also fall in scope when they handle Protected Health Information.
What counts as PHI
Protected Health Information is individually identifiable health data in any form—oral, paper, or Electronic Protected Health Information (ePHI). De-identified data is outside scope, but re-identification risks must be controlled. Treat member, patient, and plan participant records alike for Privacy Rule Compliance.
Core obligations checklist
- Designate a privacy official and a security official with defined accountability.
- Maintain policies and procedures governing PHI uses, disclosures, and safeguards.
- Train your workforce and apply sanctions for non-compliance.
- Limit PHI access to the minimum necessary for each role.
- Execute and manage Business Associate Agreements with all applicable vendors.
Defining Business Associates
Who is a business associate (BA)
A BA is any third party that creates, receives, maintains, or transmits PHI for or on behalf of a covered entity. This includes billing companies, EHR and cloud service providers, data analytics firms, transcription services, health information exchanges, and similar vendors. BA obligations extend downstream to subcontractors that handle PHI.
Business Associate Agreements (BAAs)
The Omnibus Rule requires written Business Associate Agreements that bind BAs and their subcontractors to HIPAA requirements. A BAA must outline permitted uses and disclosures, mandate Security Rule safeguards for ePHI, require breach reporting, ensure individual access and amendment support, enable audits by the Secretary, and require PHI return or destruction at termination.
Direct liability for BAs
Under the Omnibus Rule, business associates are directly liable for certain Privacy and Security Rule violations, not just for breaching contractual promises. You must verify BA security posture, breach notification processes, and subcontractor management before sharing PHI.
Ensuring Privacy Protections
Minimum necessary and role-based access
Apply the minimum necessary standard to routine disclosures and internal use. Use role-based access to restrict PHI exposure and document justifications for exceptions where full information is required for treatment or law.
Patient Authorization and permissible uses
Use and disclose PHI for treatment, payment, and health care operations without Patient Authorization, subject to safeguards. Obtain explicit, written authorization for most marketing, the sale of PHI, and many research uses unless an exception applies. Authorizations must be specific, time-limited, and revocable.
Notice of Privacy Practices (NPP) updates
Update your Notice of Privacy Practices (NPP) to describe individual rights (including electronic access to ePHI), restrictions on marketing and sale of PHI, fundraising opt-out options, and how to report concerns. Provide the NPP on first service encounter and post it prominently where applicable.
Individual rights strengthened by the Omnibus Rule
- Right to access and obtain copies of ePHI in the requested electronic format when readily producible.
- Right to request restrictions—e.g., to withhold a disclosure to a health plan when the individual pays in full out-of-pocket.
- Right to request amendments and receive an accounting of certain disclosures.
Implementing Security Requirements
Security Rule fundamentals for ePHI
Implement administrative, physical, and technical safeguards for Electronic Protected Health Information. Core controls include unique user identification, access management, audit logging, integrity controls, secure transmission, facility and device protections, and vendor oversight.
Risk Assessment and risk management
Perform an enterprise-wide Risk Assessment to identify threats and vulnerabilities across systems, apps, medical devices, and vendors. Document likelihood and impact, select reasonable and appropriate controls, assign owners, and track remediation to completion.
Ready to simplify HIPAA compliance?
Join thousands of organizations that trust Accountable to manage their compliance needs.
Practical security checklist
- Encrypt ePHI at rest and in transit; manage keys securely.
- Harden endpoints and servers; patch promptly; disable default accounts.
- Implement MFA for remote and privileged access.
- Monitor with audit logs and alerts; review access regularly.
- Create and test backups, disaster recovery, and contingency operations plans.
- Assess third-party risk before onboarding and at regular intervals.
Managing Breach Notification
Presumption of breach and low-probability standard
The Omnibus Rule presumes an impermissible use or disclosure is a breach unless you document a low probability that PHI has been compromised. “Secured” PHI (for example, properly encrypted) is generally not subject to notification.
The four-factor risk assessment
- Nature and extent of PHI involved, including sensitivity and re-identification risk.
- Unauthorized person who used or received the PHI.
- Whether the PHI was actually acquired or viewed.
- Extent to which the risk has been mitigated (e.g., prompt retrieval, confidentiality assurances).
Notification timelines and content
Notify affected individuals without unreasonable delay and no later than 60 days after discovery. For incidents affecting 500 or more individuals in a state or jurisdiction, notify prominent media and the Office for Civil Rights within the same general timeframe. Smaller breaches are reported to the regulator annually. Your notices must explain what happened, what information was involved, steps individuals should take, actions you are taking, and contact information.
Understanding Enforcement and Penalties
How enforcement works
The Office for Civil Rights investigates complaints, breach reports, and patterns of non-compliance. Outcomes range from technical assistance and corrective action plans to civil monetary penalties and resolution agreements with multi-year monitoring.
Penalty tiers and aggravating factors
Civil penalties scale by culpability—from lack of knowledge to willful neglect—and are subject to per-violation amounts and annual caps that are periodically adjusted for inflation. Aggravating factors include the duration of non-compliance, number of individuals affected, absence of a Risk Assessment, and failure to execute BAAs. Knowing misuse of PHI can also trigger criminal exposure under separate statutes.
Common pitfalls to avoid
- No enterprise-wide Risk Assessment or outdated risk register.
- Missing or insufficient Business Associate Agreements.
- Unencrypted portable devices and weak access controls.
- Delayed breach investigations and incomplete notifications.
- Inadequate training, sanctions, and workforce monitoring.
Maintaining Documentation and Compliance
Required documentation
- Privacy and security policies and procedures, with version history.
- Risk Assessment reports, remediation plans, and evidence of control operation.
- Incident and breach response records, including risk analyses and notifications.
- Business Associate Agreements and subcontractor attestations.
- Notices of Privacy Practices and distribution logs.
- Training materials, attendance records, and sanction actions.
Retention and readiness
Retain required documentation for at least six years from the date of creation or last effective date, whichever is later. Maintain an audit-ready repository so you can promptly demonstrate Privacy Rule Compliance and Security Rule implementation during investigations or audits.
Operationalize ongoing compliance
- Embed privacy-by-design reviews into project intake and change management.
- Run tabletop exercises for breach response and disaster recovery.
- Perform periodic access reviews, vendor reassessments, and data mapping updates.
- Measure key risk indicators and report regularly to leadership.
Conclusion
This HIPAA Omnibus Rule checklist clarifies who must comply, what to document, and how penalties arise. By classifying your role, executing strong BAAs, enforcing privacy safeguards, securing ePHI through a rigorous Risk Assessment, and maintaining complete records, you reduce breach risk and demonstrate accountable, sustainable compliance.
FAQs
What entities are classified as covered entities under the HIPAA Omnibus Rule?
Covered entities include health plans (including employer-sponsored group health plans), health care clearinghouses, and health care providers that transmit health information in standard electronic transactions. Hybrid entities must designate covered components when they handle Protected Health Information.
How does the Omnibus Rule affect business associates?
Business associates and their subcontractors are directly liable for certain HIPAA Privacy and Security Rule requirements. They must safeguard ePHI, report breaches, support individual rights, and sign Business Associate Agreements that flow down to subcontractors handling PHI.
What are the penalties for non-compliance with the HIPAA Omnibus Rule?
Penalties range from corrective action plans to civil monetary penalties that scale by culpability and are adjusted for inflation, with potential criminal liability for knowing misuse of PHI. Aggravating factors include absence of a Risk Assessment, willful neglect, and widespread or prolonged violations.
What documentation is required to maintain HIPAA Omnibus Rule compliance?
Maintain privacy and security policies, Risk Assessment results and remediation evidence, incident and breach logs with analyses, executed Business Associate Agreements, updated Notices of Privacy Practices, workforce training records, and related proofs for at least six years.
Ready to simplify HIPAA compliance?
Join thousands of organizations that trust Accountable to manage their compliance needs.