HIPAA Requirements for Mammography Centers: A Practical Compliance Checklist
For mammography centers, HIPAA compliance is not just about avoiding penalties—it is how you protect patients, sustain trust, and keep care moving. This practical checklist translates the HIPAA Privacy Rule and Security Rule into day-to-day actions for facilities that handle Electronic Protected Health Information (ePHI) across RIS/PACS, modalities, and patient portals. Use it to operationalize safeguards, document decisions, and verify that your Health Information Technology supports safe, compliant imaging workflows.
Facility-Wide Compliance Measures
Map your PHI footprint
- Inventory where PHI and ePHI live and flow: scheduling, intake, imaging devices, PACS/RIS, dictation, billing, CDs/USBs, cloud archives, messaging, and backups.
- Identify who touches PHI (front desk, technologists, radiologists, billing, IT, contractors) and apply minimum necessary access.
Establish Business Associate Agreements (BAAs)
- Execute BAAs with vendors that create, receive, maintain, or transmit ePHI (e.g., cloud PACS, billing, transcription, IT support, secure email, shredding).
- Ensure BAAs specify permitted uses/disclosures, security safeguards, breach and incident reporting, subcontractor flow-downs, return/destruction of PHI, HHS access, and termination for cause.
Standardize privacy practices across the facility
- Publish and provide your Notice of Privacy Practices; post it prominently at check-in and make it available electronically upon request.
- Enforce minimum necessary, need-to-know conversations, and privacy at counters and changing areas; use privacy screens and queue management where feasible.
- Apply a clean-desk policy; secure fax/print stations; prohibit unsecured notes containing PHI.
Administrative controls that anchor daily operations
- Unique user IDs; role-based access; prompt termination of access at offboarding; periodic access reviews.
- Sanctions policy; vendor due diligence; incident response plan; contingency and downtime procedures for imaging and reporting.
- Document everything and retain HIPAA-required documentation for at least six years from creation or last effective date.
Security Risk Assessments and Remediation
Perform a Security Risk Assessment (SRA)
- Identify assets handling ePHI (modalities, workstations, PACS/RIS, databases, mobile devices, cloud services, backups).
- Analyze threats and vulnerabilities (unpatched systems, legacy OS on modalities, phishing, misdirected results, lost media, misconfigured cloud storage).
- Evaluate likelihood and impact, then prioritize risks.
Turn findings into measurable action
- Create a remediation plan with owners, timelines, and success criteria; track progress to closure.
- Harden systems: patching cadence, endpoint protection, MFA for remote and privileged access, secure configurations, and network segmentation that isolates imaging devices from general traffic.
- Log and monitor access to ePHI; enable audit trails in PACS/RIS; review anomalous activity regularly.
Repeat and update
- Reassess at least annually and whenever technology, operations, or facilities change (e.g., new PACS, cloud migrations, mergers, renovations).
- Test backups and disaster recovery; document restoration tests for image archives and reports.
Appointment of Compliance Officers
Designate leadership and define charters
- Appoint a Privacy Officer (Privacy Rule) and a Security Officer (Security Rule); in smaller centers, one qualified person may serve both roles with clear responsibilities.
- Publish a charter covering policy oversight, risk management, incident handling, BAAs, training, audits, and reporting to executive leadership or owners.
Embed accountability
- Set a quarterly compliance meeting cadence; maintain minutes and action logs.
- Track KPIs: SRA status, open remediation items, access reviews completed, training completion rates, incidents and corrective actions.
- Provide a visible, documented contact path for patient privacy concerns and workforce questions.
Development of Policies and Procedures
Core HIPAA Privacy Rule policies
- Uses/disclosures of PHI; minimum necessary; patient right of access, amendments, restrictions, confidential communications, and accounting of disclosures.
- Authorization management for non-TPO purposes (e.g., research, marketing); verification of requestors; identity proofing for proxies.
Security Rule administrative, physical, and technical safeguards
- Administrative: risk analysis and management, workforce security, security incident procedures, contingency planning, evaluations.
- Physical: facility access controls, workstation security, device and media controls (receiving, reuse, disposal, media movement logs).
- Technical: unique user IDs, access controls, audit controls, integrity controls, person or entity authentication, transmission security.
Operational essentials for imaging environments
- Email and texting PHI; secure portal use; image exchange; removable media; camera/photography rules in clinical areas.
- Change management for RIS/PACS; data retention; secure disposal; vulnerability and patch management; encryption standards guidance.
- Incident response and Breach Notification Rule procedures, including decision trees and notification templates.
Version policies, record approvals, train to them, and review at least annually or when regulations or workflows change.
Staff Training and Awareness
Make training role-based and timely
- Provide onboarding HIPAA training before independent access to PHI and refresh at least annually; keep signed attestations.
- Tailor modules for front desk, technologists, radiologists, coders/billers, IT, and contractors.
Focus on scenarios that matter in mammography
- Identity verification with two identifiers; handling companions and proxies; privacy at check-in and changing rooms.
- Secure scheduling, results delivery, and call-backs; avoiding hallway discussions; safe faxing and scanning; preventing misdirected communications.
- Recognize and report incidents quickly; practice phishing awareness; never store ePHI on personal devices.
Measure understanding
- Use short quizzes and tabletop exercises (e.g., lost CD, ransomware downtime, misdirected portal message) and document remediation steps.
Data Encryption and Integrity Safeguards
Protect ePHI in transit and at rest
- Encrypt data in transit with modern TLS for portals, email gateways, VPNs, and device-to-PACS communications.
- Encrypt data at rest on servers, workstations, laptops, and backups using strong, NIST-recommended Data Encryption Standards (e.g., AES-256) and FIPS-validated cryptographic modules where feasible.
- Use secure email/encrypted messaging or patient portals for PHI; avoid unencrypted removable media.
Preserve integrity and authenticity
- Enable audit logs and tamper-evident controls in PACS/RIS; apply checksums or digital signatures where appropriate.
- Implement key management procedures (key rotation, storage, recovery) and restrict administrative privileges.
- Back up image archives and reports regularly; test restores to verify data integrity.
While certain encryption controls are “addressable” under the Security Rule, document your analysis and implement them unless a reasonable and equivalent alternative provides equal protection.
Ready to simplify HIPAA compliance?
Join thousands of organizations that trust Accountable to manage their compliance needs.
Patient Rights and Consent Management
Right of access and timely fulfillment
- Provide patients access to their records—including images and finalized reports—within 30 days of request, with one permissible 30-day extension when documented.
- Offer electronic copies when requested; charge only reasonable, cost-based fees as permitted.
Authorizations, restrictions, and confidential communications
- Use HIPAA-compliant authorizations for disclosures beyond treatment, payment, and operations; verify identity for in-person and remote requests.
- Honor requests to restrict disclosures to a health plan when services are paid in full out of pocket, and support reasonable requests for alternative contact methods.
Accounting of disclosures and documentation
- Maintain logs for disclosures that require accounting and provide them upon request within required timeframes.
- Retain all privacy-related documentation and decisions for at least six years.
Conclusion
By mapping PHI flows, executing strong BAAs, conducting a rigorous Security Risk Assessment, enforcing encryption and integrity controls, and honoring patient rights, your mammography center can meet HIPAA Privacy Rule and Security Rule obligations with confidence. Treat remediation and training as ongoing programs, and you will convert compliance into a consistent, patient-centered safety advantage.
FAQs
What are the key HIPAA compliance steps for mammography centers?
Start by inventorying where ePHI resides and who can access it, then complete a Security Risk Assessment to identify and prioritize risks. Appoint Privacy and Security Officers, implement written policies and procedures tied to daily workflows, execute Business Associate Agreements with all relevant vendors, deploy encryption and access controls, train staff initially and annually, and establish incident response and Breach Notification Rule processes with documented evidence of all activities.
How often should risk assessments be conducted?
Conduct a comprehensive Security Risk Assessment at least annually and any time you introduce major changes—such as a new PACS/RIS, cloud migration, office move, or significant workflow update. Track remediation to completion, retest controls, and document results so you can demonstrate an ongoing risk management program.
What are the requirements for Business Associate Agreements?
BAAs must define permitted uses/disclosures of PHI, require appropriate safeguards for ePHI, mandate prompt reporting of incidents and breaches, flow down obligations to subcontractors, support patient access and disclosure accounting as applicable, stipulate return or destruction of PHI at termination, allow HHS access to records, and permit termination for material breach. Execute BAAs before vendors handle PHI and review them periodically.
How should mammography centers handle breach notifications?
Activate your incident response plan to contain and investigate. If a breach of unsecured PHI is confirmed, notify affected individuals without unreasonable delay and no later than 60 days after discovery, include all required content, and offer appropriate support. Report to HHS: for 500+ affected individuals, notify contemporaneously; for fewer than 500, log and submit within the required annual timeframe. If 500+ individuals in a state or jurisdiction are affected, notify prominent media as required. Document decisions and corrective actions thoroughly.
Ready to simplify HIPAA compliance?
Join thousands of organizations that trust Accountable to manage their compliance needs.