HIPAA Omnibus Training Checklist: Privacy, Security, and Breach Notification Compliance

Check out the new compliance progress tracker


Product Pricing Demo Video Free HIPAA Training
LATEST
video thumbnail
Admin Dashboard Walkthrough Jake guides you step-by-step through the process of achieving HIPAA compliance
Ready to get started? Book a demo with our team
Talk to an expert

HIPAA Omnibus Training Checklist: Privacy, Security, and Breach Notification Compliance

Kevin Henry

HIPAA

June 30, 2024

7 minutes read
Share this article
HIPAA Omnibus Training Checklist: Privacy, Security, and Breach Notification Compliance

HIPAA Omnibus Rule Overview

The HIPAA Omnibus Rule strengthened privacy and security protections for Protected Health Information (PHI), expanded Business Associate Liability (including subcontractors), and clarified Breach Notification Timelines and standards. It also updated patient rights and Notice of Privacy Practices requirements you must operationalize and document.

Checklist

  • Confirm whether you are a covered entity, business associate, or both; map obligations accordingly.
  • Inventory all business associates and subcontractors handling PHI; maintain current contacts and services.
  • Update Notice of Privacy Practices to reflect marketing/fundraising limits, breach duties, and patient rights.
  • Adopt a documented breach risk assessment method and incident response workflow.
  • Align sanctions, complaint handling, and Workforce Compliance Documentation with Omnibus standards.

Documentation to maintain

  • Current policies, procedures, and training materials reflecting Omnibus changes.
  • BAA repository, change logs, and due‑diligence records.
  • Incident response plan, breach risk assessment template, and decision memos.

Privacy Rule Requirements

The Privacy Rule governs how you use and disclose PHI, emphasizing minimum necessary access and individual rights. You must provide a clear Notice of Privacy Practices and uphold rights such as access, amendment, restrictions, and confidential communications.

Limit non-routine disclosures, obtain valid authorizations for marketing or sale of PHI, and honor requests not to disclose to health plans when services are paid out of pocket. Embed these controls into day‑to‑day workflows and audit them routinely.

Checklist

  • Publish and distribute your Notice of Privacy Practices; ensure it is easy to find and understand.
  • Implement role‑based access and minimum‑necessary decision trees for routine disclosures.
  • Standardize forms for authorizations, restrictions, and confidential communication requests.
  • Verify identity and process patient access requests promptly; track response times.
  • Maintain a disclosure accounting process for required cases.
  • Apply sanctions for violations and record corrective actions.

Documentation to maintain

  • Privacy policies, workforce acknowledgments, training completion records, and audits.
  • Authorization logs, restriction agreements, access request logs, and response evidence.
  • Notice of Privacy Practices versions and distribution records.

Security Rule Requirements

The Security Rule requires safeguards to protect electronic PHI through Administrative Safeguards, Physical Safeguards, and Technical Safeguards. Start with a comprehensive risk analysis, then implement risk‑based controls and continuous monitoring.

Technical Safeguards should include unique user IDs, least‑privilege access, audit controls, integrity protections, authentication, and transmission security. Pair these with training, contingency planning, and vendor oversight.

Checklist

  • Conduct and document a risk analysis covering all ePHI systems and data flows.
  • Assign a security official; define roles and responsibilities.
  • Harden endpoints and servers; enforce patching, encryption, and multi‑factor authentication.
  • Enable audit logs; review for anomalies and retain per policy.
  • Implement backups, disaster recovery, and emergency mode operations testing.
  • Secure facilities, workstations, devices, and media disposal/repurposing.

Documentation to maintain

  • Risk analysis and risk management plan with assigned owners and deadlines.
  • Access control standards, encryption standards, and logging/retention procedures.
  • Contingency plans, test results, and after‑action reports.

Breach Notification Rule Requirements

An impermissible use or disclosure of unsecured PHI is presumed a breach unless a documented assessment shows a low probability of compromise. Evaluate the nature of PHI, the unauthorized recipient, whether PHI was actually viewed/acquired, and mitigation effectiveness.

Follow Breach Notification Timelines: notify affected individuals without unreasonable delay and within required outer limits; notify HHS as mandated by breach size; and notify media when 500+ individuals in a jurisdiction are affected. Notices must include what happened, what information was involved, steps individuals should take, and your remediation.

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Checklist

  • Activate incident response: contain, preserve evidence, and begin the risk assessment.
  • Determine reportability using the four‑factor analysis; document rationale either way.
  • Issue individual notifications, HHS submissions, and media notices when applicable.
  • Offer mitigation (e.g., credit monitoring) when risk warrants; track uptake.
  • Log all incidents and lessons learned; update controls to prevent recurrence.

Documentation to maintain

  • Breach log, risk assessment worksheets, and decision records.
  • Notification templates, mailing/email proofs, and HHS submission confirmations.
  • Post‑incident remediation plans and validation evidence.

Business Associate Agreements Compliance

Business Associate Liability is direct under the Omnibus Rule. You must execute BAAs that bind associates and their subcontractors to safeguard PHI, report incidents, enable individual rights support, and flow down obligations.

Perform risk‑based due diligence before onboarding, set measurable requirements, and monitor performance. Re‑paper legacy agreements and ensure termination assistance includes return or destruction of PHI.

Checklist

  • Identify all services touching PHI; confirm BAA necessity and scope.
  • Use a standard BAA with permitted uses, safeguard standards, breach reporting, and subcontractor flow‑down.
  • Evaluate vendors’ security (e.g., questionnaires, certifications, testing) before contract.
  • Track BA performance and incidents; enforce corrective actions or exit as needed.
  • Review BAAs periodically and upon service or regulation changes.

Documentation to maintain

  • Executed BAAs, addenda, and amendments; renewal schedules.
  • Due‑diligence artifacts, security assessments, and remediation follow‑ups.
  • Vendor monitoring reports and termination letters with PHI disposition evidence.

Employee Training Best Practices

Deliver role‑based HIPAA training at onboarding and regularly thereafter, tailoring content to job duties. Reinforce key topics—Privacy Rule basics, Security Rule controls, incident reporting, and Breach Notification Timelines—using scenarios and microlearning.

Keep Workforce Compliance Documentation current: attendance, scores, acknowledgments, and versioned content. Update training promptly after policy, system, or regulatory changes or after notable incidents.

Checklist

  • Schedule onboarding training before PHI access; provide annual refreshers.
  • Offer role‑specific modules (front desk, clinicians, billing, IT, leadership).
  • Simulate phishing and social engineering; coach on safe handling of PHI.
  • Test comprehension with brief quizzes; require re‑training when needed.
  • Publicize how to report privacy/security incidents and near misses.

Documentation to maintain

  • Training calendar, rosters, completion certificates, and quiz results.
  • Signed policy acknowledgments and confidentiality agreements.
  • Training materials with version control and update history.

Risk Assessment and Management

Use a repeatable method to identify assets, threats, vulnerabilities, and controls affecting PHI. Rate likelihood and impact, prioritize remediation, and track progress to closure with owners and deadlines.

Integrate results into budgeting, technology roadmaps, and vendor oversight. Reassess after major changes, incidents, or at scheduled intervals to keep residual risk within tolerance.

Checklist

  • Build an inventory of systems, apps, vendors, and data flows handling PHI.
  • Map threats (e.g., ransomware, misdelivery, misconfiguration) to vulnerabilities.
  • Evaluate control effectiveness; assign risk ratings and remediation plans.
  • Implement safeguards: encryption, MFA, logging, DLP, backups, and endpoint security.
  • Monitor with KPIs/KRIs; report to leadership and governance bodies.

Documentation to maintain

  • Risk register, Plan of Action and Milestones, and status dashboards.
  • Change management records and security exception approvals.
  • Governance minutes and evidence of control testing.

By operationalizing this HIPAA Omnibus training checklist, you align privacy, security, and breach response practices, strengthen Business Associate oversight, and create verifiable proof of compliance through consistent documentation.

FAQs.

What are the key components of the HIPAA Omnibus Rule?

The Omnibus Rule updates the Privacy, Security, and Breach Notification Rules; extends Business Associate Liability (including subcontractors); enhances individual rights and Notice of Privacy Practices; and intensifies enforcement. It also standardizes breach risk assessment and clarifies marketing, fundraising, and sale‑of‑PHI limitations.

How often should employee HIPAA training be conducted?

Provide training at onboarding before PHI access, then at least annually. Add targeted refreshers whenever policies, systems, or regulations change or after incidents. Use role‑based modules so staff learn the specific privacy and security responsibilities of their jobs.

What are the penalties for non-compliance with the Omnibus Rule?

Penalties follow a tiered structure with per‑violation amounts and annual caps, escalating with the level of culpability. Regulators can also impose corrective action plans and ongoing monitoring, and reputational harm often exceeds the financial impact.

How does the Breach Notification Rule define a reportable breach?

A reportable breach is an impermissible use or disclosure of unsecured PHI that is presumed to be a breach unless a documented four‑factor assessment shows a low probability of compromise. If reportable, you must notify affected individuals and regulatory bodies within applicable timelines and include required content in the notice.

Share this article

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Related Articles