HIPAA Policies and Procedures Requirements Explained for Covered Entities and Business Associates

Check out the new compliance progress tracker


Product Pricing Demo Video Free HIPAA Training
LATEST
video thumbnail
Admin Dashboard Walkthrough Jake guides you step-by-step through the process of achieving HIPAA compliance
Ready to get started? Book a demo with our team
Talk to an expert

HIPAA Policies and Procedures Requirements Explained for Covered Entities and Business Associates

Kevin Henry

HIPAA

April 27, 2024

6 minutes read
Share this article
HIPAA Policies and Procedures Requirements Explained for Covered Entities and Business Associates

Understanding Covered Entities

Covered entities include health care providers that transmit standard transactions, health plans, and health care clearinghouses. If you fall into one of these categories, HIPAA applies to how you create, receive, maintain, and transmit Protected Health Information (PHI).

Your responsibilities span Privacy Rule Compliance and the Breach Notification Requirements. You must appoint a privacy official, develop written policies and procedures, apply the minimum necessary standard, and honor individual rights such as access, amendment, and accounting of disclosures.

Who qualifies as a covered entity

  • Health care providers (e.g., clinics, hospitals, telehealth practices) engaging in standard electronic transactions.
  • Health plans (group health plans, insurers, HMOs, government programs).
  • Health care clearinghouses that process nonstandard health information into standard formats.

Core obligations for PHI

Defining Business Associates

Business associates are vendors or partners that create, receive, maintain, or transmit PHI on your behalf. Typical examples include billing services, IT and cloud providers, EHR vendors, revenue cycle firms, TPAs, and legal or consulting firms with PHI access.

Business associates must implement Security Rule safeguards for ePHI, comply with specific Privacy Rule provisions in their Business Associate Agreements, and flow down requirements to subcontractors. They must also support incident response and report potential breaches.

When a vendor becomes a business associate

  • They can view or handle PHI or ePHI beyond incidental exposure.
  • They host or store PHI (even if encrypted) or provide managed services that can access it.
  • They analyze, process, or transmit PHI for your operations.

Developing Privacy Policies and Procedures

Effective HIPAA policies translate legal requirements into day-to-day routines. Start by mapping where PHI enters your organization, who uses it, and where it flows outside. Then codify permissible uses, disclosures, and authorization workflows.

Essential policy topics

  • Permitted uses/disclosures, minimum necessary, and de-identification rules.
  • Individual rights: access, amendment, restrictions, confidential communications, and accounting of disclosures.
  • Notice of Privacy Practices content, distribution, and acknowledgment processes.
  • Privacy complaints, investigations, and sanctions for noncompliance.
  • Breach Notification Requirements and incident response steps.

Documentation discipline

  • Version control, approval signatures, effective dates, and review cycles.
  • Role-based procedures and checklists for front desk, billing, IT, and clinical staff.
  • Retention of policies, acknowledgments, and Workforce Training Records.

Establishing Business Associate Agreements

Before sharing PHI, execute written Business Associate Agreements (BAAs). The BAA defines how PHI may be used and disclosed, the safeguards required, and breach reporting duties. Without a BAA, sharing PHI with a vendor generally violates HIPAA.

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Required BAA elements

  • Permitted and required uses/disclosures of PHI by the business associate.
  • Security Rule compliance for ePHI and risk management expectations.
  • Obligation to report security incidents and possible breaches without unreasonable delay.
  • Subcontractor flow-down terms binding them to the same restrictions.
  • Access, amendment, and accounting support to help you meet individual rights.
  • Return or secure destruction of PHI at termination, or continued protections if not feasible.
  • Right to terminate for cause and allow HHS access to relevant records.

Conducting Risk Analysis and Management

A risk analysis is an accurate, thorough assessment of risks and vulnerabilities to the confidentiality, integrity, and availability of ePHI. It covers systems, applications, devices, data flows, and third parties that handle ePHI.

How to perform a risk analysis

  • Inventory where ePHI is created, received, maintained, or transmitted.
  • Identify threats (e.g., ransomware, insider misuse, device theft) and vulnerabilities.
  • Estimate likelihood and impact to determine risk levels and prioritize remediation.
  • Document findings, decisions, and supporting evidence.

From analysis to Risk Management Plans

  • Translate findings into a Risk Management Plan with owners, timelines, and measures of effectiveness.
  • Implement controls such as encryption, access controls, audit logging, and backup/restore testing.
  • Reassess risks periodically and when trigger events occur (new systems, major changes, incidents, or mergers).

Ensuring Security Rule Compliance

The Security Rule sets flexible, scalable safeguards for ePHI. You must implement administrative, physical, and technical measures that are reasonable and appropriate for your size, complexity, and risk profile.

Administrative safeguards

  • Security management process: risk analysis, risk management, sanctions policy, and activity reviews.
  • Assigned security official and workforce security processes.
  • Security awareness training and periodic updates.
  • Contingency planning: data backup, disaster recovery, and emergency mode operations.
  • Evaluation and management of Business Associate Agreements.

Physical safeguards

  • Facility access controls and visitor management.
  • Workstation use and security standards for on-site and remote work.
  • Device and media controls, including secure disposal and reuse procedures.

Technical safeguards

  • Unique user IDs, role-based access, and multi-factor authentication where feasible.
  • Audit controls and regular log reviews.
  • Integrity controls to prevent improper alteration or destruction of ePHI.
  • Transmission security; strong encryption is an addressable safeguard that is widely expected in practice.

Operational recordkeeping

  • Maintain security policies, risk analyses, Risk Management Plans, system inventories, and change records.
  • Retain documentation and Workforce Training Records consistent with HIPAA retention requirements.

Implementing Training and Sanctions

Train your workforce on HIPAA policies as appropriate for their roles, within a reasonable time after hire, and when material changes occur. Reinforce privacy practices, incident reporting, and practical do’s and don’ts for PHI and ePHI.

Keep Workforce Training Records with dates, topics, delivery methods, and attendees. Apply fair, consistent sanctions for violations—ranging from coaching to termination—and document actions taken to demonstrate enforcement.

Conclusion

To comply with HIPAA, identify your role, define vendor responsibilities, formalize Privacy Rule Compliance, and ensure Security Rule safeguards for ePHI. Use risk analysis to drive prioritized Risk Management Plans, execute robust Business Associate Agreements, train your workforce, and document everything—including Breach Notification Requirements—so you can prove what you practice.

FAQs

What are the key elements of HIPAA policies and procedures?

They should address permitted uses and disclosures of PHI, minimum necessary standards, individual rights, Notice of Privacy Practices, incident response and Breach Notification Requirements, workforce roles and sanctions, Security Rule safeguards for ePHI, vendor oversight via Business Associate Agreements, and documentation controls including Workforce Training Records and retention.

How often must risk analyses be conducted under HIPAA?

HIPAA requires an ongoing, periodic risk analysis—not a fixed annual cadence. You should reassess regularly and whenever significant changes occur, such as new systems, major process changes, facility moves, mergers, or security incidents, and update your Risk Management Plans accordingly.

What are the obligations of business associates in reporting PHI breaches?

Business associates must notify the covered entity without unreasonable delay and no later than 60 days after discovery, providing details about what happened, the PHI involved, affected individuals, mitigation steps, and corrective actions. They must also cooperate in fulfillment of Breach Notification Requirements and ensure subcontractors report to them under the same terms.

Share this article

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Related Articles