HIPAA Omnibus Rule Mandate Checklist: Key Updates, Deadlines, and Compliance Steps

Check out the new compliance progress tracker


Product Pricing Demo Video Free HIPAA Training
LATEST
video thumbnail
Admin Dashboard Walkthrough Jake guides you step-by-step through the process of achieving HIPAA compliance
Ready to get started? Book a demo with our team
Talk to an expert

HIPAA Omnibus Rule Mandate Checklist: Key Updates, Deadlines, and Compliance Steps

Kevin Henry

HIPAA

August 23, 2024

8 minutes read
Share this article
HIPAA Omnibus Rule Mandate Checklist: Key Updates, Deadlines, and Compliance Steps

Use this HIPAA Omnibus Rule mandate checklist to translate regulatory changes into an actionable program. You’ll see the key updates, compliance deadlines, and step-by-step tasks across Business Associate Agreements, Breach Notification Standards, Notice of Privacy Practices, Risk Assessment, Encryption Standards for Protected Health Information, and ongoing compliance reviewing.

Key dates: Final Rule published January 25, 2013; effective March 26, 2013; compliance deadline September 23, 2013 (with a limited transition for certain Business Associate Agreements through September 22, 2014).

Business Associate Agreement Updates

What changed and why it matters

The Omnibus Rule made Business Associates directly liable for compliance with the Security Rule and certain Privacy Rule provisions. It also extended obligations downstream to subcontractors that create, receive, maintain, or transmit Protected Health Information (PHI). Your Business Associate Agreements (BAAs) must reflect these expanded duties and breach reporting expectations.

Required clauses to include

  • Scope of permitted and required uses/disclosures of PHI, expressly limiting uses to the minimum necessary.
  • Direct obligation to implement administrative, physical, and technical safeguards under the Security Rule.
  • Incident and breach reporting duties, including timelines, content of notices, and cooperation on risk assessments.
  • Flow-down provisions requiring subcontractors to agree to the same restrictions and conditions.
  • Prohibition on sale of PHI and limits on marketing without valid authorization, as applicable.
  • Return or secure destruction of PHI upon termination, or documentation of infeasibility.
  • Rights to audit/inspect, mitigation assistance, and sanctions for material breach.

Compliance deadlines and transition

  • General BAA compliance deadline: September 23, 2013.
  • Transition provision: Certain BAAs in effect before January 25, 2013 (and not renewed or modified between March 26, 2013 and September 23, 2013) had until September 22, 2014 to be updated.

Action checklist

  • Inventory all Business Associates and subcontractors; verify PHI/ePHI touchpoints.
  • Adopt a standard BAA template aligned to the Omnibus Rule; update legacy agreements.
  • Track signatures and expirations; integrate renewal alerts in your contract system.
  • Map breach/incident reporting paths and contact points for each Business Associate.

Breach Notification Policy Revisions

Definition and risk assessment

The Omnibus Rule presumes a breach of unsecured PHI unless you can demonstrate a low probability that PHI has been compromised. Your determination must consider: (1) the nature and extent of PHI involved, (2) the unauthorized person who used the PHI or to whom the disclosure was made, (3) whether PHI was actually acquired or viewed, and (4) the extent to which the risk has been mitigated.

Notification standards and timelines

  • Individuals: Without unreasonable delay and no later than 60 calendar days after discovery.
  • Media: For breaches affecting 500+ residents of a state or jurisdiction, notify prominent media without unreasonable delay and within 60 days.
  • HHS notice: For 500+ individuals, notify contemporaneously (within 60 days). For fewer than 500, log and submit to HHS within 60 days after the end of the calendar year.

Action checklist

  • Document a written breach response plan aligned to Breach Notification Standards.
  • Adopt a four-factor risk assessment template; preserve evidence for each incident.
  • Create notification templates (individual, media, and HHS) and a 60-day countdown workflow.
  • Test escalation pathways with Business Associates and ensure contractually defined timelines.

Notice of Privacy Practices Amendments

Required content updates

  • Statement of your duty to notify individuals following a breach of unsecured PHI.
  • Clarifications that most uses/disclosures of PHI for marketing and any sale of PHI require prior authorization.
  • Right to restrict certain disclosures to a health plan when an individual pays in full out of pocket.
  • If applicable, fundraising communications and the individual’s right to opt out.

Distribution and posting

  • Providers: Post the revised Notice of Privacy Practices (NPP) in a prominent location at service sites, make it available upon request, and post it online if you maintain a website.
  • Health plans: Distribute the revised NPP to new enrollees and include it in the next annual mailing to members after the effective date.

Action checklist

  • Redraft your NPP to reflect Omnibus Rule requirements; review readability and translation needs.
  • Update website and point-of-care postings simultaneously; archive prior versions with effective dates.
  • Train front-desk staff on distribution, acknowledgment processes, and FAQs from patients.

Employee Training Requirements

Scope and timing

Train all workforce members whose functions are affected by material policy or procedure changes. Provide training within a reasonable period after the change, document completion, and maintain training records.

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Curriculum essentials

  • Privacy Rule updates: NPP changes, authorizations for marketing/sale of PHI, and minimum necessary.
  • Security Rule priorities: access controls, secure configurations, and reporting security incidents.
  • Breach response: incident spotting, four-factor risk assessment, and 60-day notification clock.
  • Role-based scenarios: real workflows for front office, clinical staff, billing, and IT.

Action checklist

  • Create role-based modules; require attestations and maintain logs (content, date, trainer, attendees).
  • Introduce short refreshers and phishing simulations; reinforce sanctions for non-compliance.
  • Extend training to Business Associates where contractually appropriate (e.g., shared processes).

Risk Assessment Procedures

Security Rule risk analysis vs. breach risk assessment

Perform a comprehensive Security Rule risk analysis to identify risks and vulnerabilities to the confidentiality, integrity, and availability of ePHI across systems and vendors. Separately, use the four-factor analysis for incident-specific breach determinations.

Security risk analysis steps

  • Define scope: all locations, systems, apps, devices, and vendors that create, receive, maintain, or transmit ePHI.
  • Inventory data flows and trust boundaries; map Protected Health Information storage and transmission.
  • Identify threats and vulnerabilities; assess likelihood and impact; assign risk ratings.
  • Prioritize risk treatments; implement safeguards; set owners and due dates.
  • Document methods, findings, and corrective action plans; review at least annually and upon major changes.

Action checklist

  • Adopt a repeatable methodology aligned to recognized frameworks for Risk Assessment.
  • Integrate results into your budget and roadmap; track closure of corrective actions.
  • Include Business Associates in risk reviews where they handle ePHI on your behalf.

PHI Encryption Implementation

Why encryption matters

Encryption reduces breach risk and supports safe harbor for breach notification when PHI is rendered unusable, unreadable, or indecipherable to unauthorized individuals. While “addressable” under the Security Rule, strong encryption has become a de facto expectation for safeguarding PHI.

Encryption standards and controls

  • Data at rest: Use FIPS-validated cryptographic modules and strong algorithms (for example, AES) for servers, databases, endpoints, and backups.
  • Data in transit: Enforce modern transport security (for example, TLS 1.2 or higher) for web, email gateways, APIs, and VPNs.
  • Key management: Centralize key generation, rotation, storage, and revocation; restrict access on a need-to-know basis.
  • Endpoint and mobile: Apply full-disk encryption, secure boot, and remote wipe on laptops and mobile devices with PHI access.
  • Cloud services: Confirm encryption controls and responsibilities in your BAA; verify segregation, logging, and incident response.

Action checklist

  • Classify PHI repositories and data flows; set minimum Encryption Standards by data type and system.
  • Harden configurations, disable legacy ciphers, and enforce certificate management.
  • Test restoration of encrypted backups; monitor for encryption failures and unauthorized decryption attempts.

Regular Compliance Reviewing

Governance cadence

  • Conduct formal compliance reviews at least annually and after significant changes (systems, mergers, new vendors, or incidents).
  • Run internal audits against policies, BAAs, access controls, and breach-response readiness.
  • Evaluate metrics: incident counts, training completion, access anomalies, and corrective action closure rates.
  • Schedule third-party assessments periodically to validate program effectiveness.

Compliance calendar essentials

  • BAA inventory and updates: review annually; verify new subcontractors are covered.
  • Risk analysis and penetration testing: complete annually and after major changes.
  • NPP review: confirm current language and posting/distribution practices.
  • Training: initial, role-based refreshers, and event-driven modules after material changes.
  • Breach drills: tabletop exercises to test the 60-day notification workflow.

Summary

This HIPAA Omnibus Rule mandate checklist centers on the fundamentals: modernize BAAs, tighten breach notification procedures, update your Notice of Privacy Practices, train people, execute rigorous Risk Assessment, encrypt PHI, and review regularly. By assigning owners, dates, and objective evidence for each task, you turn compliance deadlines into a sustainable, auditable program.

FAQs

What is the HIPAA Omnibus Rule mandate?

The HIPAA Omnibus Rule is a comprehensive 2013 final rule that strengthened Privacy, Security, and Breach Notification requirements under HIPAA and HITECH. It expanded direct liability to Business Associates and their subcontractors, refined breach notification standards, tightened rules for marketing and sale of PHI, and required updates to Notices of Privacy Practices, training, and risk management practices.

When is the compliance deadline for the HIPAA Omnibus Rule?

The effective date was March 26, 2013, and the primary compliance deadline was September 23, 2013. A limited transition allowed certain grandfathered Business Associate Agreements (in place before January 25, 2013 and not renewed or modified during March 26–September 23, 2013) to be updated by September 22, 2014.

How should Business Associate Agreements be updated?

Update BAAs to add direct Security Rule obligations, breach and incident reporting requirements, downstream subcontractor flow-downs, limits on marketing and sale of PHI without authorization, return/destruction terms, and audit/inspection rights. Maintain an inventory, standardize your BAA template, and track renewals and signatures to ensure all Business Associates and subcontractors are covered.

What are the key steps for HIPAA breach notification compliance?

Establish an incident intake process, apply the four-factor risk assessment to every event involving unsecured PHI, and issue notifications without unreasonable delay and within 60 days where a breach is confirmed. Prepare templates for individual, media (if 500+ in a jurisdiction), and HHS reporting; coordinate with Business Associates; and document decisions, evidence, and timelines to demonstrate compliance.

Share this article

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Related Articles