HIPAA Privacy Rule Compliance Checklist: Key Steps, Risks, and Documentation

Product Pricing Demo Video Free HIPAA Training
LATEST
video thumbnail
Admin Dashboard Walkthrough Jake guides you step-by-step through the process of achieving HIPAA compliance
Ready to get started? Book a demo with our team
Talk to an expert

HIPAA Privacy Rule Compliance Checklist: Key Steps, Risks, and Documentation

Kevin Henry

HIPAA

January 31, 2025

6 minutes read
Share this article
HIPAA Privacy Rule Compliance Checklist: Key Steps, Risks, and Documentation

Use this HIPAA Privacy Rule compliance checklist to verify that your organization protects Protected Health Information (PHI) and Electronic Protected Health Information (ePHI), manages risks, and keeps the documentation regulators expect. The steps below align policy, training, technical safeguards, and Breach Notification Requirements into a practical program you can run and prove.

Covered Entity Status Assessment

Determine your role

Confirm whether you are a covered entity, a business associate, or a hybrid entity. Covered entities include health plans, health care clearinghouses, and health care providers that transmit PHI electronically in standard transactions. Business associates handle PHI on behalf of covered entities; hybrid entities formally designate their health care components.

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Key actions

  • Map services and data flows to identify where PHI/ePHI is created, received, maintained, or transmitted.
  • Check for electronic standard transactions (claims, eligibility, remittance) that trigger covered entity status.
  • If hybrid, document designated health care components and firewalls between covered and non-covered functions.
  • Record the status decision, responsible owner, and review triggers (e.g., new service lines or systems).

Common pitfalls

  • Assuming vendor status avoids HIPAA duties; business associates have direct compliance obligations.
  • Overlooking research, telehealth, or revenue cycle workflows that handle PHI.

Develop Privacy Policies and Procedures

Build the policy framework

  • Designate a Privacy Officer and define governance, escalation, and complaint handling.
  • Address permitted uses and disclosures, minimum necessary, authorizations, and marketing/fundraising limits.
  • Define individual rights: access, amendments, restrictions, confidential communications, and accounting of disclosures.
  • Document de-identification and limited data set practices and re-identification controls.

Operationalize and document

  • Create procedures for intake/release of PHI, identity verification, and denial/appeal workflows.
  • Align with security safeguards for ePHI (access control, audit logs, transmission security).
  • Set version control, approval dates, and retention for all policies and records.

Distribute Notice of Privacy Practices

Content and distribution

  • Draft a clear Notice of Privacy Practices (NPP) explaining how you use/share PHI, patient rights, and complaint options.
  • Provide the NPP at first service, make it available at points of care, and post it prominently; health plans provide it at enrollment and upon material changes.
  • Make reasonable efforts to obtain written acknowledgment of receipt and record refusals.

Maintenance

  • Review the NPP whenever policies, vendors, or laws change; keep prior versions for reference.
  • Offer accessible formats and language assistance where appropriate.

Conduct Security Risk Assessment

Risk analysis for ePHI

  • Inventory assets that create, receive, maintain, or transmit ePHI (systems, apps, medical devices, cloud services).
  • Map ePHI data flows and storage locations to identify unauthorized access, alteration, or transmission risks.
  • Evaluate threats and vulnerabilities, rate likelihood/impact, and prioritize risks.

Risk management

  • Select and implement safeguards (encryption, MFA, least privilege, audit logging, endpoint protection, backups).
  • Document findings, decisions, owners, timelines, and residual risk; track remediation to completion.
  • Repeat the Risk Assessment at least annually and after major changes or incidents.

Provide Employee HIPAA Training

Make training role-based and continuous

  • Train all workforce members on the Privacy Rule, your policies, security hygiene, and incident reporting.
  • Provide onboarding training promptly, refresher training periodically (at least annually is best practice), and targeted updates when policies or systems change.
  • Use scenarios tailored to roles (front desk, clinicians, billing, IT) and test comprehension.

Proof of completion

  • Maintain training logs, materials, completion dates, scores, and attestations.
  • Apply and document sanctions for violations consistently.

Manage Business Associate Agreements

Due diligence and contracts

  • Identify vendors and partners that handle PHI/ePHI and execute Business Associate Agreements (BAAs) before sharing data.
  • Ensure BAAs define permitted uses/disclosures, require safeguards, address Breach Notification Requirements, and flow obligations to subcontractors.
  • Review security posture (questionnaires, audits, certifications) and document risk decisions.

Lifecycle management

  • Centralize BAA records, track terms and renewals, and verify termination/return or destruction of PHI.
  • Test incident reporting paths and contacts listed in BAAs.

Implement Breach Notification Procedures

Identify, assess, notify

  • Define “breach” and apply the four-factor risk assessment to determine if PHI was compromised.
  • If a breach occurred, notify affected individuals without unreasonable delay and no later than 60 calendar days after discovery.
  • For incidents affecting 500+ individuals in a state or jurisdiction, notify prominent media and report to HHS within 60 days; for fewer than 500, report to HHS within 60 days after the end of the calendar year.

Execution details

  • Use templates that include what happened, types of PHI, steps individuals should take, your mitigation, and contact information.
  • Require business associates to notify you without unreasonable delay per the BAA and document investigations and decisions.
  • Keep a breach log, evidence, and lessons learned to improve controls.

Maintain Documentation and Records

Record Retention Policies

  • Retain HIPAA-required documentation (policies/procedures, NPPs, BAAs, training logs, risk analyses, complaints, sanctions, breach assessments and notices) for at least six years from creation or last effective date.
  • Align medical record retention with applicable state laws if longer than HIPAA’s baseline.
  • Implement version control, access restrictions, and an audit-ready repository.

Perform Continuous Monitoring and Improvement

Operational oversight

  • Run periodic privacy and security audits, spot-check access logs, and test minimum necessary enforcement.
  • Track metrics such as training completion, time-to-terminate access, encryption coverage, and incident closure times.
  • Embed privacy by design in projects and change management; reassess risks when technologies or workflows change.

Conclusion

This HIPAA Privacy Rule compliance checklist ties Covered Entity status, policies, Notice of Privacy Practices, Security Risk Assessment, training, Business Associate Agreements, breach response, and documentation into a program you can demonstrate. Maintain discipline in execution and evidence, and you will reduce risk while honoring patient privacy.

FAQs.

What determines Covered Entity status under HIPAA?

You are a covered entity if you are a health plan, a health care clearinghouse, or a health care provider that transmits PHI electronically in standard transactions (such as claims or eligibility checks). Organizations that perform both regulated and non-regulated functions can designate themselves as hybrid entities. Vendors that create, receive, maintain, or transmit PHI for a covered entity are business associates and must comply with HIPAA via BAAs.

How often should HIPAA training be conducted?

Train new workforce members promptly upon hire and whenever policies or systems materially change. In practice, provide refresher training at least annually, tailor modules to roles, and document attendance, comprehension, and acknowledgments.

What are the components of a Security Risk Assessment?

Inventory ePHI assets and data flows, identify threats and vulnerabilities, rate likelihood and impact, and assign risk levels. Select safeguards to reduce risks, document decisions and owners, schedule remediation, and monitor progress. Repeat the assessment periodically and after significant changes or incidents.

When must breach notifications be sent?

Send individual notifications without unreasonable delay and no later than 60 calendar days after discovery of a breach. For incidents involving 500 or more individuals in a state or jurisdiction, also notify prominent media and report to HHS within 60 days; for fewer than 500, report to HHS within 60 days after the end of the calendar year. Business associates must notify the covered entity promptly as required in the BAA.

Share this article

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Related Articles