HIPAA Policies for ACOs: Required Policies, Procedures, and Compliance Checklist

Product Pricing
Ready to get started? Book a demo with our team
Talk to an expert

HIPAA Policies for ACOs: Required Policies, Procedures, and Compliance Checklist

Kevin Henry

HIPAA

March 21, 2026

8 minutes read
Share this article
HIPAA Policies for ACOs: Required Policies, Procedures, and Compliance Checklist

Accountable Care Organizations (ACOs) handle large volumes of protected health information (PHI) across multiple participants and vendors. HIPAA sets the baseline for safeguarding that data. This guide turns HIPAA Policies for ACOs into an actionable program you can implement today—complete with required policies, procedures, and a practical compliance checklist.

You’ll learn how to structure governance, document privacy and security controls, operationalize safeguards, prepare for incidents, and continuously audit performance so your ACO can demonstrate compliance with confidence.

HIPAA Compliance Program Elements

A strong compliance program anchors every other control. It defines accountability, standardizes processes, and proves diligence through records you can produce on demand.

Governance and Accountability

  • Make a clear compliance officer designation (Privacy Officer and Security Officer; one person may hold both if resourced appropriately).
  • Establish a compliance committee to review risks, incidents, audits, and remediation plans.
  • Adopt a code of conduct, sanctions policy, and non-retaliation policy for good-faith reporting.

Core Documentation and Processes

  • Written privacy and security policies and procedures covering all HIPAA rules and ACO workflows.
  • Comprehensive risk assessment documentation: risk analysis, risk register, and prioritized risk management plan.
  • Inventory and maintain Business Associate Agreements (BAAs) for every vendor handling PHI, including subcontractors.
  • Role-based training curriculum and attestation tracking for workforce and leadership.
  • Defined complaints process, hotline or portal, and issue-tracking from intake to closure.

Program Checklist

  • Appoint officers and form a committee with a published charter and meeting cadence.
  • Approve, publish, and version-control policies; review at least annually.
  • Complete enterprise-wide risk analysis; document mitigation and acceptance decisions.
  • Centralize BAAs and vendor risk reviews; map data flows for each service.
  • Launch training, acknowledgments, and a sanctions matrix aligned to policy violations.

Privacy Policies and Procedures

Privacy rules govern how you use, disclose, and protect PHI while honoring patient rights. Your policies must fit coordinated-care realities without weakening safeguards.

Uses, Disclosures, and Minimum Necessary

  • Define permitted uses and disclosures for treatment, payment, and health care operations.
  • Apply the minimum necessary standard to routine operations and data-sharing across ACO participants.
  • Document pathways for authorizations, revocations, and restrictions.

Individual Rights

  • Access, amendments, and accounting of disclosures with clear turnaround times.
  • Confidential communications and restrictions when patients request them and conditions are met.
  • Notice of Privacy Practices distribution and availability.

Operational Controls

  • Data classification and data-sharing rules for registries, quality reporting, analytics, and care coordination.
  • Workforce onboarding/offboarding checklists tied to privacy training and attestations.
  • Routine documentation reviews to keep procedures aligned with current workflows.

Privacy Checklist

  • Map disclosures and apply minimum necessary by scenario.
  • Publish patient rights procedures and response timelines.
  • Capture attestations for privacy training; retain records per retention policy.

Administrative Safeguards

Administrative safeguards translate HIPAA’s Security Rule into day-to-day management practices your ACO can sustain.

Security Management Process

  • Risk analysis and ongoing risk management with measurable mitigation actions.
  • Sanctions for security violations and documented investigations.
  • Information system activity review—scheduled review of logs and reports.

Workforce Security and Training

  • Role-based access approvals, background checks where appropriate, and least-privilege assignments.
  • Security awareness, phishing simulations, and annual refreshers with targeted modules for high-risk roles.

Access Management and Change Control

  • Joiner-mover-leaver workflows with timely access provisioning and revocation.
  • Change management for systems impacting ePHI, including testing and backout plans.

Security Incident Procedures

  • Defined triage, escalation, investigation, containment, and evidence preservation steps.
  • Clear criteria for when an incident becomes a breach and who makes that determination.

Contingency Planning

  • Data backup, disaster recovery, and emergency mode operations plans with tested RTO/RPO targets.
  • Tabletop exercises and after-action reports to close gaps.

Administrative Checklist

  • Complete and update risk analysis; track remediation to closure.
  • Run quarterly access reviews and terminate stale accounts.
  • Publish security incident procedures and conduct drills.
  • Formalize contingency planning and test at least annually.

Physical Safeguards

Physical controls protect facilities, workstations, and media that store or access ePHI across the ACO footprint.

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Facility Access Controls

  • Badge or key control, visitor management, and area-specific restrictions for server rooms.
  • Emergency access plans and records of maintenance and repairs.

Workstation Use and Security

  • Clean desk, privacy screens, automatic lock, and prohibited software/use rules.
  • Mobile device management for laptops, tablets, and smartphones with remote wipe.

Device and Media Controls

  • Secure disposal, media reuse procedures, and chain-of-custody tracking.
  • Backup and restore testing for critical systems and removable media.

Physical Checklist

  • Document facility controls and visitor logs; review quarterly.
  • Harden workstations; verify auto-lock and screen protections.
  • Enforce media disposal and reuse with audit records.

Technical Safeguards

Technical safeguards enforce who can access ePHI, what they can do, and how activity is recorded and protected.

Access Controls

  • Unique user IDs, strong authentication (including MFA), and automatic logoff.
  • Emergency access procedures tested for downtime and disaster scenarios.

Encryption Requirements

  • Encrypt ePHI in transit and at rest, including backups and removable media.
  • Protect encryption keys; document key rotation and storage.

Audit Controls

  • Log access, queries, exports, configuration changes, and administrative actions.
  • Centralize logs, define retention, and review alerts for anomalous behavior.

Integrity and Authentication

  • Safeguards against improper alteration or destruction of ePHI, with validation checks.
  • Mechanisms to authenticate users and systems before granting access.

Transmission Security

  • Use secure protocols for APIs, file transfer, and messaging; block insecure alternatives.
  • Network segmentation and intrusion detection/prevention tuned for PHI systems.

Technical Checklist

  • Apply role-based access with MFA and automatic logoff.
  • Meet documented encryption requirements for all ePHI repositories and channels.
  • Enable comprehensive audit controls with routine reviews and escalation paths.

Data Breach Preparedness

Preparation speeds containment, reduces harm, and ensures notifications are accurate and timely.

Incident Versus Breach

  • Not every security incident is a breach; apply a documented four-factor risk assessment to determine probability of compromise.
  • Maintain decision records, mitigation steps, and rationale for each case.

Notification Requirements

  • Notify affected individuals without unreasonable delay and no later than 60 days after discovery, when a breach is confirmed.
  • Notify HHS (and media when 500+ individuals in a state/jurisdiction are affected) per rule requirements; monitor stricter state timelines.

Playbooks and Communications

  • Preapproved templates for individual notices, regulator submissions, and internal updates.
  • War-room logistics, decision trees, and law-enforcement coordination procedures.

Post-Incident Improvement

  • Root-cause analysis, corrective actions, and targeted re-training.
  • Control enhancements prioritized by risk and validated by testing.

Breach Preparedness Checklist

  • Maintain and rehearse the incident response plan and security incident procedures.
  • Document the breach risk assessment and notification decisions.
  • Track remediation to completion with executive oversight.

Regular Monitoring and Auditing

Ongoing oversight proves that controls are working and that you act quickly when they are not.

Planned Audits and Reviews

  • Annual internal audits covering privacy, administrative, physical, and technical safeguards.
  • Quarterly user access reviews for critical systems and high-risk data flows.
  • Vendor monitoring for BAA compliance and security performance.

Operational Metrics and Evidence

  • Key indicators: training completion, incident MTTR, patch and backup success, failed login trends, and audit log review completion.
  • Maintain evidence repositories: policies, risk assessment documentation, BAAs, reports, and signoffs.

Monitoring Checklist

  • Schedule and complete periodic audits; escalate findings to leadership with deadlines.
  • Continuously review logs via defined audit controls and tune alerts to reduce noise.
  • Refresh risk analysis after major changes and at least annually.

Conclusion

When you combine clear governance, robust privacy practices, disciplined safeguards, rehearsed incident playbooks, and continuous auditing, HIPAA Policies for ACOs become practical daily routines. Use the checklists above to prioritize work, close gaps, and show measurable, sustainable compliance.

FAQs.

What policies are essential for HIPAA compliance in ACOs?

Core policies include privacy uses/disclosures and minimum necessary; patient rights; sanctions; workforce training; access management; security incident procedures; risk analysis and risk management; contingency planning; device/media handling; encryption and key management; logging and audit controls; vendor oversight with Business Associate Agreements; and documentation management with clear compliance officer designation.

How often should HIPAA risk assessments be conducted?

Perform an enterprise-wide risk analysis at least annually, and again whenever major changes occur—such as new systems, integrations, locations, or vendors—or after significant incidents. Update the risk assessment documentation as you implement mitigations and accept residual risks.

What are the requirements for Business Associate Agreements?

BAAs must define permitted and required uses/disclosures of PHI; require safeguards aligned to the Security Rule (including practical encryption requirements and access controls); mandate incident and breach reporting; bind subcontractors to the same terms; enable access, amendment, and accounting support; specify return or destruction of PHI at termination when feasible; and allow audits or attestations demonstrating compliance.

How should ACOs handle HIPAA data breaches?

Act quickly to contain the event, preserve evidence, and run your risk assessment to determine if a breach occurred. If confirmed, issue required notices without unreasonable delay and no later than 60 days, notify regulators and media when thresholds are met, offer mitigation where appropriate, and complete corrective actions. Document every step—from investigation to remediation—to demonstrate due diligence.

Share this article

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Related Articles