HIPAA Privacy Rule and COVID: Checklist for Incident Response and Risk Management

Check out the new compliance progress tracker


Product Pricing Demo Video Free HIPAA Training
LATEST
video thumbnail
Admin Dashboard Walkthrough Jake guides you step-by-step through the process of achieving HIPAA compliance
Ready to get started? Book a demo with our team
Talk to an expert

HIPAA Privacy Rule and COVID: Checklist for Incident Response and Risk Management

Kevin Henry

Risk Management

February 16, 2025

7 minutes read
Share this article
HIPAA Privacy Rule and COVID: Checklist for Incident Response and Risk Management

The HIPAA Privacy Rule still governs how you handle Protected Health Information during COVID-19. While emergencies demand speed, you must balance rapid action with privacy, security, and documentation. This checklist-oriented guide helps you align incident response and risk management with HIPAA while supporting public health needs.

You will find practical steps for preparing, assessing risk, responding to incidents, meeting the Breach Notification Rule, hardening cybersecurity Security Safeguards, and managing third-party exposure across PHI and Electronic PHI (ePHI).

Emergency Preparedness and Response

Effective emergency operations start with clear roles, decision authority, and protocols for urgent disclosures that support Public Health Surveillance. Establish processes that let you share necessary information quickly while honoring the minimum necessary standard and tracking every disclosure.

Plan for surges, remote work, and clinical disruptions. Downtime and contingency procedures must keep care moving without exposing PHI or ePHI, and staff should know exactly when and how to escalate.

  • Define emergency roles: privacy officer, security officer, incident commander, and on-call designees.
  • Maintain verified contacts for health departments and regulators; pre-approve disclosure pathways for surveillance and outbreak reporting.
  • Apply minimum necessary: verify requestor identity, log disclosures, and limit data elements shared.
  • Activate contingency operations: EHR downtime forms, alternate workflows, and secure data reconciliation after restoration.
  • Enable remote operations securely: private spaces for calls, encrypted devices, VPN, and clear rules for home printing and storage.
  • Standardize patient communications: scripts for exposure notifications, language access, and instructions for safeguarding personal data.
  • Train, drill, and capture lessons learned to refine procedures between waves or events.

Risk Assessment and Management

Conduct a security risk analysis that maps where PHI and Electronic PHI reside, how they flow, and which threats could compromise confidentiality, integrity, or availability. Use a repeatable method that scores likelihood and impact, then treat risks with measurable controls.

Translate analysis into a living risk register, align with your risk appetite, and track remediation to closure. Reassess whenever your environment changes, such as new telehealth tools, testing workflows, or remote staffing.

  • Inventory assets: clinical apps, cloud services, endpoints, medical devices, messaging, and data repositories.
  • Map data flows for PHI/ePHI, including temporary COVID-19 processes and data sharing for public health.
  • Identify threats: ransomware, phishing, insider error, supply chain exposure, and misdirected communications.
  • Assess vulnerabilities with configuration reviews, patch status, and access controls.
  • Score risks and select treatments: mitigate, transfer, accept, or avoid; document rationale.
  • Implement layered Security Safeguards: administrative, technical, and physical controls proportionate to risk.
  • Define metrics (time-to-patch, MFA coverage, backup restore success) and review progress with leadership.

Incident Response Planning

A tested Incident Response Plan ensures you can detect, contain, and recover from security events without compounding harm. Clarify severity levels, decision rights, and communication rules before an incident, and rehearse high-risk scenarios that involve PHI or ePHI.

Prepare playbooks for ransomware, phishing leading to mailbox compromise, misdirected messages, lost/stolen devices, and improper disclosures tied to COVID-19 operations.

Ready to assess your HIPAA security risks?

Join thousands of organizations that use Accountable to identify and fix their security gaps.

Take the Free Risk Assessment
  • Define the lifecycle: preparation, identification, containment, eradication, recovery, and lessons learned.
  • Establish triage criteria and on-call rotations; ensure after-hours coverage.
  • Preserve evidence and maintain chain of custody to support investigations and reporting.
  • Coordinate with privacy/compliance to run breach risk assessments in parallel with technical response.
  • Prebuild internal and patient-facing communications to avoid delays and reduce confusion.
  • Test regularly with tabletop exercises; track corrective actions through closure.

Breach Notification Requirements

The HIPAA Breach Notification Rule applies when unsecured PHI is compromised. Use the four-factor risk assessment (data nature/extent, unauthorized recipient, whether data was actually acquired/viewed, and mitigation) to determine whether an incident is a breach requiring notice.

When notification is required, act without unreasonable delay. Maintain templates and contact workflows so you can meet timelines even when staff are remote or operations are strained.

  • Who to notify: affected individuals; for large breaches, designated media; and required federal reporting channels. Business associates must notify covered entities as specified in the BAA.
  • When to notify: as soon as practicable and no later than the timelines set by HIPAA; document any permitted law enforcement delays.
  • What to include: brief description, types of PHI involved, mitigation steps taken, protective steps individuals can take, and contact methods for assistance.
  • How to notify: first-class mail or electronic notice if agreed; provide substitute notice when addresses are insufficient.
  • Documentation: retain your risk assessment, decision rationale, notices sent, and remediation records.
  • COVID-19 considerations: validate addresses, enable secure electronic communications, and build surge capacity for call centers.

Cybersecurity Measures

Strengthen baseline controls to reduce the likelihood and impact of incidents involving PHI and ePHI. Emphasize identity security, resilient backups, and continuous monitoring tuned to healthcare workflows.

Focus on practical guardrails that support clinical speed without sacrificing security, and verify their effectiveness with regular testing.

  • Identity and access: multifactor authentication, least privilege, privileged access management, and rapid offboarding.
  • Endpoint and email protection: EDR with isolation, phishing defenses, and attachment/link sandboxing.
  • Network hygiene: segmentation for medical devices and administrative networks; secure remote access; encrypted traffic.
  • Data protection: encryption at rest/in transit, DLP for common exfiltration channels, and secure disposal.
  • Backup and recovery: 3-2-1 strategy with offline/immutable copies; frequent restore drills.
  • Patch and vulnerability management: defined SLAs, emergency patch paths, and configuration baselines.
  • Monitoring and logging: centralized logs, alert tuning for PHI-related anomalies, and well-practiced escalation.
  • Awareness and simulation: role-based training, phishing tests, and targeted refreshers for high-risk roles.

Third-Party Risk Management

Vendors and partners handling PHI are extensions of your risk surface. Establish clear Business Associate Agreements, confirm their controls, and ensure they can meet your incident reporting and recovery expectations.

Continuously validate that each partner collects only the minimum necessary and secures integrations, especially for urgent COVID-19 workflows like testing, reporting, and telehealth support.

  • Maintain a complete inventory of vendors touching PHI/ePHI; classify by criticality and data sensitivity.
  • Execute and enforce BAAs that define permitted uses, Security Safeguards, incident notice windows, and right-to-audit.
  • Perform due diligence: security questionnaires, independent assurances, and targeted technical validation.
  • Limit data sharing to minimum necessary; document data flows and retention for each integration.
  • Control access with SSO, least privilege, and timely deprovisioning; require audit trails.
  • Plan exits: data return/destruction, certificate revocation, and removal of network and API access.
  • Require vendors to test their Incident Response Plan and share lessons relevant to your environment.

Put together, these steps align emergency readiness, risk assessment, incident response, breach communications, cybersecurity, and vendor oversight so you can protect patients, sustain operations, and comply with the HIPAA Privacy Rule during COVID-19 and beyond.

FAQs

How does the HIPAA Privacy Rule apply during the COVID-19 pandemic?

The HIPAA Privacy Rule remains in effect. You may disclose PHI, when permitted, to support treatment, payment, healthcare operations, and specific public health activities such as reporting to health authorities. Continue to apply the minimum necessary standard, verify requestors, and document disclosures. Temporary operational changes (like telehealth or surge staffing) do not remove your obligation to safeguard PHI and ePHI.

What are the breach notification requirements during COVID-19?

Requirements are unchanged under the Breach Notification Rule. If unsecured PHI is compromised and your risk assessment indicates a reportable breach, notify affected individuals without unreasonable delay within required timelines, follow applicable regulator reporting, and notify media when thresholds are met. Prepare templates and surge processes so you can meet deadlines even when operations are disrupted.

Prioritize multifactor authentication, least privilege, strong email and endpoint protection, network segmentation, encryption, and tested backups with offline or immutable copies. Monitor centralized logs for PHI-related anomalies, maintain rapid patching, and conduct role-based security training. Validate effectiveness with regular exercises and adjust controls as threats evolve.

Share this article

Ready to assess your HIPAA security risks?

Join thousands of organizations that use Accountable to identify and fix their security gaps.

Take the Free Risk Assessment

Related Articles