HIPAA Refresher Training Checklist for Covered Entities and Business Associates

Check out the new compliance progress tracker


Product Pricing Demo Video Free HIPAA Training
LATEST
video thumbnail
Admin Dashboard Walkthrough Jake guides you step-by-step through the process of achieving HIPAA compliance
Ready to get started? Book a demo with our team
Talk to an expert

HIPAA Refresher Training Checklist for Covered Entities and Business Associates

Kevin Henry

HIPAA

June 16, 2024

6 minutes read
Share this article
HIPAA Refresher Training Checklist for Covered Entities and Business Associates

A well-structured HIPAA refresher training program keeps your workforce confident and compliant while reducing organizational risk. Use this HIPAA Refresher Training Checklist for Covered Entities and Business Associates to reinforce critical responsibilities under the HIPAA Privacy Rule, Security Rule, and Breach Notification Rule.

Each section below outlines what to review, update, and document. Integrate role-based scenarios, short knowledge checks, and compliance auditing to verify that protected health information (PHI) is handled correctly across all workflows.

Annual Training Frequency

Deliver refresher training at least annually to all workforce members who create, receive, maintain, or transmit protected health information. Include employees, contractors, volunteers, students, and temporary staff.

Supplement the annual cadence with targeted refreshers after policy changes, technology deployments, audit findings, incidents, or vendor onboarding. Keep sessions short, focused, and relevant to actual job tasks.

Checklist

  • Provide organization-wide refresher training annually; track 100% completion.
  • Assign role-specific modules (clinical, billing, IT, revenue cycle, front desk).
  • Offer new-hire training promptly, followed by the annual refresher cycle.
  • Schedule ad hoc refreshers after major updates or incidents.
  • Capture attestations and scores to confirm understanding.

Required Training Content

Center your curriculum on the HIPAA Privacy Rule, Security Rule, and Breach Notification Rule, translating requirements into everyday behaviors. Emphasize minimum necessary use, appropriate disclosures, and patient rights.

Core Topics

  • Protected Health Information: definition, identifiers, and handling across paper, verbal, and electronic channels.
  • Privacy Rule: minimum necessary, permitted uses and disclosures, authorizations, NPP awareness, patient rights (access, amendments, restrictions, accounting).
  • Security Rule: administrative, physical, and technical safeguards; passwords, multi-factor authentication, secure messaging, and device security.
  • Breach Notification Rule: spotting incidents, internal reporting, risk assessments, and required notifications.
  • Data sharing and Business Associate Agreements: understanding roles, restrictions, and subcontractor obligations.
  • Cyber hygiene: phishing, social engineering, safe browsing, email, texting, and social media boundaries.
  • Remote work: workstation security, secure Wi‑Fi, VPN, and handling PHI offsite.

Instructional Methods

  • Short, scenario-based microlearning aligned to job tasks.
  • Interactive knowledge checks with remediation paths.
  • Case reviews from recent audits or near-misses.

Business Associate Agreements

Confirm that every vendor or partner that handles PHI has an executed Business Associate Agreement (BAA) before any data exchange. Ensure the BAA specifies permitted uses, required safeguards, reporting duties, and breach cooperation.

Checklist

  • Verify a signed BAA for each vendor, including subcontractor “flow-down” obligations.
  • Define safeguards aligned to the Security Rule and incident reporting timelines.
  • Include right-to-audit provisions, termination steps, and return/destruction of PHI.
  • Track BAA renewal dates and ownership within a centralized repository.
  • Require vendor training commitments and designate points of contact.

Security Rule Compliance

Use training to reinforce your security program and to operationalize the results of ongoing risk assessments. Focus on day-to-day practices that prevent unauthorized access, alteration, or loss of ePHI.

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Safeguards to Reinforce

  • Administrative: risk analysis and risk management, workforce training, sanctions, contingency planning, and vendor oversight.
  • Technical: unique user IDs, MFA, least-privilege access, automatic logoff, encryption in transit and at rest, audit logs, and alerting.
  • Physical: device control, clean desk, secure printing, media disposal, and facility access management.

Operational Actions

  • Map controls to Security Rule standards and update procedures accordingly.
  • Translate risk assessment findings into prioritized training reminders.
  • Run phishing simulations and tabletop exercises; feed results into training content.
  • Document technical and administrative safeguards for compliance auditing.

Documentation and Recordkeeping

Comprehensive records demonstrate compliance and inform continuous improvement. Store documentation in a secure, searchable system with clear retention rules.

What to Maintain

  • Training rosters, completion dates, scores, and signed attestations.
  • Current policies and procedures with version history and approval dates.
  • BAA inventory with status, renewal dates, and assigned owners.
  • Incident reports, investigation notes, risk assessments, and remediation evidence.
  • Audit logs, monitoring reports, and compliance auditing results.

Good Practices

  • Automate reminders and escalations for overdue training.
  • Use dashboards to track completion by department and role.
  • Retain records per organizational policy and applicable requirements.

Incident Response Procedures

Train staff to report suspected privacy or security events immediately and without fear of retaliation. Clear procedures minimize impact and support timely assessments and notifications under the Breach Notification Rule.

Response Playbook

  • Detect and report: simple intake channels (hotline, portal, email) and rapid triage.
  • Contain and preserve: isolate affected systems, secure PHI, and maintain chain of custody.
  • Investigate: determine scope, root cause, and whether PHI was compromised.
  • Assess risk and decide: document analysis and required internal/external notifications.
  • Remediate and learn: fix control gaps, update training, and share lessons learned.

Exercises

  • Conduct periodic tabletop drills using realistic scenarios.
  • Validate contact trees, role assignments, and escalation paths.

Policy Review and Updates

Policies must match how your organization actually operates. Review them regularly to reflect new technologies, vendors, processes, and legal or regulatory changes.

Checklist

  • Set an annual review cycle with interim reviews after major changes or incidents.
  • Engage compliance, privacy, security, legal, HR, and operational leaders in approvals.
  • Communicate updates through training, job aids, and leadership briefings.
  • Collect acknowledgments; track read-and-understood confirmations.
  • Maintain a revision log and archive superseded versions.

Conclusion

Effective refresher training aligns people, processes, and technology with the Privacy, Security, and Breach Notification Rules. By following this checklist—covering cadence, content, BAAs, safeguards, documentation, incident response, and policy governance—you strengthen compliance, reduce risk, and protect PHI across your enterprise.

FAQs.

Is HIPAA refresher training mandatory?

Yes. Organizations that are covered entities or business associates must provide training to their workforce and keep it current. Refresher training ensures ongoing adherence to the HIPAA Privacy Rule, Security Rule, and Breach Notification Rule as processes and risks evolve.

How often should refresher training be conducted?

At least annually, with additional targeted refreshers after policy or technology changes, audit findings, vendor onboarding, or incidents. This cadence reinforces good habits and addresses emerging risks identified through risk assessments and compliance auditing.

What topics must be covered in HIPAA refresher training?

Key topics include PHI handling, minimum necessary, permitted uses and disclosures, patient rights, Security Rule safeguards (administrative, physical, technical), incident recognition, breach reporting, and your organization’s specific policies and procedures.

Are business associates required to complete HIPAA training?

Yes. Business associates must train their workforce on applicable HIPAA requirements and safeguard PHI under their Business Associate Agreements. Covered entities should verify these obligations are defined and monitored as part of vendor oversight.

Share this article

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Related Articles