HIPAA Policies for Skilled Nursing Facilities: Complete Compliance Guide and Checklist

Product Pricing
Ready to get started? Book a demo with our team
Talk to an expert

HIPAA Policies for Skilled Nursing Facilities: Complete Compliance Guide and Checklist

Kevin Henry

HIPAA

December 17, 2025

8 minutes read
Share this article
HIPAA Policies for Skilled Nursing Facilities: Complete Compliance Guide and Checklist

HIPAA Compliance in Skilled Nursing Facilities

Skilled nursing facilities (SNFs) are covered entities when they transmit electronic transactions and handle residents’ protected health information (PHI). You must meet the HIPAA Privacy, Security, and Breach Notification Rules while balancing a high-contact care environment that includes visitors, contractors, and multidisciplinary teams.

Build your program on governance, risk, and accountability. Assign a Privacy Officer and Security Officer, set a cross-functional compliance committee, perform regular risk assessments, and maintain written policies, procedures, and documentation that reflect how care is actually delivered on your units.

Checklist

  • Appoint Privacy and Security Officers and define decision authority.
  • Map PHI/ePHI flows across admissions, clinical care, billing, and discharge.
  • Complete risk assessments and prioritize remediation tasks.
  • Publish policies and procedures for privacy, security, and breach response.
  • Execute and track business associate agreements (BAAs).
  • Provide workforce training, monitoring, and sanctions where needed.
  • Audit routinely and maintain compliance documentation for at least six years.

Protected Health Information Management

Protected health information management spans the PHI life cycle—creation, use, disclosure, storage, transmission, retention, and disposal. Apply the minimum necessary standard for routine operations, and use resident authorizations when uses or disclosures fall outside treatment, payment, or healthcare operations (TPO).

Control access with role-based permissions and identity verification for residents, personal representatives, and family involved in care. In the SNF setting, manage verbal and paper PHI carefully—whiteboards, hallway conversations, printers, med carts, and fax machines can all leak information without simple safeguards.

Checklist

  • Maintain an inventory of PHI repositories (EHR, paper charts, images, reports).
  • Standardize release-of-information workflows and log disclosures.
  • Apply the minimum necessary standard to all non-TPO requests.
  • Use privacy screens, secure print release, and locked bins for disposal.
  • Set retention schedules and document secure destruction of media.
  • Prohibit unsecured texting; use approved secure messaging for PHI.

Privacy Rule Adherence

Provide a Notice of Privacy Practices (NPP) at admission and make it available on request. Honor resident rights: access to records generally within 30 days (with one permissible 30-day extension), request for amendments, accounting of disclosures, restrictions, and confidential communications.

Apply minimum necessary to routine non-TPO uses, verify identities before disclosure, and manage facility directories and involvement of family or friends consistent with resident preferences. Reduce incidental disclosures through practical steps such as speaking quietly and pulling curtains during bedside discussions.

Checklist

  • Distribute and document NPP acknowledgment at intake.
  • Standardize authorization, restriction, and confidential communication forms.
  • Verify identity before any disclosure; log as required.
  • Conduct privacy rounds to spot issues with whiteboards and shared spaces.
  • Enforce a social media and photography policy for staff and visitors.

Business Associate Agreements

Business associates include vendors that handle PHI for your facility—EHR and billing vendors, pharmacies, labs, therapy providers, IT managed service providers, shredding companies, cloud hosts, and telehealth platforms. You must execute BAAs before sharing PHI.

BAAs should specify permitted uses/disclosures, administrative, physical, and technical safeguards, breach notification duties, subcontractor flow-down, access to PHI, termination rights, and return or destruction of PHI at contract end. Pair BAAs with vendor risk management.

Checklist

  • Inventory vendors and classify which are business associates.
  • Use a standard BAA template and negotiate critical security clauses.
  • Collect due-diligence artifacts (e.g., security questionnaires, audit reports).
  • Track BAA status, renewal dates, and points of contact.
  • Require subcontractor compliance and prompt breach reporting.
  • Offboard vendors with verified PHI return or destruction.

Administrative Safeguards

Administrative safeguards operationalize the Security Rule: risk analysis and risk management, assigned security responsibility, workforce security, information access management, security awareness and training, incident response, contingency planning, evaluation, and BAA oversight.

Translate these into SNF-friendly controls: structured onboarding/offboarding, role-based access, sanctions, phishing awareness, and downtime procedures for power or network outages. Test your contingency plans so clinical operations continue safely when systems are offline.

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Checklist

  • Perform risk assessments annually and after major changes.
  • Document access authorization, modification, and termination steps.
  • Run security awareness training and phishing simulations.
  • Maintain an incident response plan with clear escalation paths.
  • Develop and test backups, disaster recovery, and emergency mode operations.
  • Schedule periodic evaluations and management reviews.

Physical Safeguards

Control facility access to areas where PHI is stored or discussed. In shared environments like nurse stations, position workstations to limit shoulder surfing, and use privacy screens. Limit visitor access and maintain logs for sensitive areas such as records rooms and server closets.

Protect devices and media through secure storage, labeling, and chain-of-custody. Establish procedures for secure disposal and re-use of drives, copiers, and other media to prevent data remanence.

Checklist

  • Use badge-controlled doors and visitor sign-in for restricted zones.
  • Place workstations away from public view; enable automatic logoff.
  • Lock med carts and chart rooms; keep fax/printers in supervised areas.
  • Provide locked bins and certified shredding for paper PHI.
  • Track devices and sanitize or destroy media before disposal or re-use.

Technical Safeguards

Implement access controls with unique user IDs, role-based access, multi-factor authentication, and automatic session timeouts. Encrypt ePHI at rest and in transit to reduce the risk of compromise and support safe harbor when feasible.

Enable audit controls to log user activity, queries, and disclosures in the EHR and supporting systems. Maintain integrity with anti-malware, patching, allowlisting where appropriate, and secure configuration baselines. Protect transmissions via TLS, VPN, and secure messaging; manage endpoints with MDM and remote wipe.

Checklist

  • Enforce MFA for remote and privileged access.
  • Review access logs and alerts; investigate anomalies promptly.
  • Keep systems patched and backed up with encrypted media.
  • Use TLS for email transport and encrypt messages containing PHI.
  • Deploy endpoint protection, MDM, and device inventory tracking.

Employee Training

Train all workforce members—including per diem, volunteers, and students—on privacy, security, and protected health information management. Provide role-based modules for nursing, therapy, social work, admissions, billing, and environmental services to address real workflows and risks.

Offer new-hire orientation before system access, annual refreshers, and just-in-time updates after policy changes or incidents. Measure comprehension, keep attendance records, and apply sanctions consistently to reinforce expectations.

Checklist

  • Deliver onboarding training prior to PHI access.
  • Provide annual HIPAA refreshers with role-specific scenarios.
  • Run phishing drills and microlearning on emerging threats.
  • Track completion, test scores, and acknowledgments.
  • Document and communicate policy changes promptly.

Breach Notification Policies

A breach is an impermissible use or disclosure of unsecured PHI unless a documented risk assessment shows a low probability of compromise. Evaluate four factors: the nature and extent of PHI, the unauthorized person, whether PHI was actually acquired or viewed, and the extent of mitigation. Encryption can provide safe harbor when properly applied.

Notify affected individuals without unreasonable delay and no later than 60 calendar days after discovery. For 500 or more affected individuals, include notice to HHS and local media; for fewer than 500, log and report to HHS annually. Business associates must notify you promptly with details needed for resident notices.

Checklist

  • Activate incident response and contain the event immediately.
  • Complete the four-factor risk assessment and document the outcome.
  • Use standard notice templates with required content.
  • Maintain a contact database and translation resources for mailings.
  • Track deadlines and submissions to HHS; preserve all evidence and decisions.

Compliance Documentation

Keep written policies, procedures, risk assessments, training logs, BAAs, system inventories, audit results, and incident records. Retain documentation for at least six years from the date of creation or last effective date, whichever is later.

Use version control with owners, effective dates, and review cycles. Monitor compliance through internal audits, privacy rounds, and key metrics such as access provisioning times, training completion rates, and incident closure intervals.

Conclusion

Effective HIPAA compliance in an SNF ties everyday workflows to clear policies, practical safeguards, and disciplined documentation. With solid risk assessments, right-sized controls, strong business associate agreements, and continuous training, you reduce risk, protect residents’ privacy, and sustain trustworthy, compliant care.

FAQs.

What are the key administrative safeguards for HIPAA compliance in skilled nursing facilities?

The essentials include documented risk assessments and risk management, assigned security responsibility, workforce security and sanctions, information access management, security awareness training, incident response procedures, contingency plans (backups, disaster recovery, emergency mode), periodic evaluations, and oversight of business associate agreements.

How should skilled nursing facilities manage protected health information access?

Use role-based access tied to job duties, unique user IDs with multi-factor authentication where possible, identity verification before disclosure, and the minimum necessary standard for non-TPO uses. Log access and disclosures, review audits routinely, and adjust permissions promptly during onboarding, role changes, and offboarding.

What steps must be taken for breach notification under HIPAA?

Immediately contain the incident, investigate, and complete the four-factor risk assessment. If a breach of unsecured PHI occurred, notify affected individuals without unreasonable delay and within 60 days, include required content, and document mitigation. Report to HHS (and media if 500 or more individuals are affected) and retain all records.

How often should HIPAA training be conducted for staff in skilled nursing facilities?

Provide training at hire before PHI access, refresh annually for all staff, and deliver targeted updates whenever policies, systems, or risks change. Reinforce with periodic awareness activities such as phishing simulations and brief microlearning modules.

Share this article

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Related Articles