HIPAA Requirements for Occupational Therapy Clinics: Compliance Checklist

Product Pricing Demo Video Free HIPAA Training
LATEST
video thumbnail
Admin Dashboard Walkthrough Jake guides you step-by-step through the process of achieving HIPAA compliance
Ready to get started? Book a demo with our team
Talk to an expert

HIPAA Requirements for Occupational Therapy Clinics: Compliance Checklist

Kevin Henry

HIPAA

January 12, 2026

6 minutes read
Share this article
HIPAA Requirements for Occupational Therapy Clinics: Compliance Checklist

Administrative Requirements

Governance and Roles

Designate a HIPAA Privacy Officer to manage privacy practices and patient rights, and a Security Officer to oversee safeguards for Electronic Protected Health Information (ePHI). Define responsibilities in writing, including policy ownership, incident response coordination, and vendor oversight.

Policies, Procedures, and Documentation

Create and maintain written policies covering privacy, security, sanctions, incident reporting, device use, bring‑your‑own‑device, remote access, and data retention. Review and update policies at least annually and whenever your technology, workflows, or regulations change. Keep signed acknowledgments from staff to prove policy receipt and understanding.

Security Risk Assessment and Risk Management

Conduct a comprehensive Security Risk Assessment (SRA) to identify threats and vulnerabilities affecting ePHI across people, processes, and technology. Prioritize risks, assign owners, set remediation deadlines, and track progress in a living risk management plan.

Contingency and Incident Response Planning

Document a contingency plan that includes data backups, disaster recovery, and emergency mode operations for clinical continuity. Establish an incident response plan with clear steps for triage, containment, investigation, documentation, and notification under the Breach Notification Rule.

Privacy Requirements

Notice of Privacy Practices and Patient Rights

Provide a clear Notice of Privacy Practices (NPP) at the first visit and make it readily available thereafter. Train staff to honor patient rights, including access, amendment, restrictions, confidential communications, and accounting of disclosures within required timeframes.

Uses, Disclosures, and the Minimum Necessary Standard

Limit PHI use and disclosure to treatment, payment, and healthcare operations unless a valid authorization is obtained. Apply the Minimum Necessary Standard by tailoring access roles, redacting nonessential details, and using de‑identified data when feasible.

Authorizations, Special Situations, and Privacy-by-Design

Use written authorizations for marketing, research, or disclosures beyond routine care. Address unique occupational therapy scenarios—family involvement in sessions, school‑based services, and caregiver communications—by verifying identity and documenting patient preferences.

Breach Notification Rule Readiness

Define how you assess incidents for compromise, calculate risk of data misuse, and decide whether an event is a breach. Prepare patient notice templates, media notice procedures (when required), and timelines so you can act quickly and consistently.

Physical Safeguards

Facility and Workstation Security

Control access to therapy gyms, treatment rooms, and records areas with keys or badges. Position screens to prevent shoulder‑surfing, enable privacy filters where needed, and lock workstations when unattended.

Device and Media Controls

Inventory all devices that create, receive, maintain, or transmit ePHI. Secure laptops and tablets with cable locks or locked storage, and use chain‑of‑custody logs for repairs or relocations. Sanitize or shred paper, drives, and media before disposal or reuse.

Visitor and After‑Hours Controls

Use sign‑in procedures for contractors and visitors, escort non‑staff in restricted areas, and secure paper charts after hours. Post reminders in staff areas about clearing whiteboards and storing printed schedules out of public view.

Technical Safeguards

Access Controls and Authentication

Assign unique user IDs, enforce strong passwords, and restrict ePHI access based on job role. Use multi‑factor authentication for remote access, EHRs, email, and patient portals whenever possible.

Encryption, Transmission Security, and Integrity

Encrypt ePHI at rest on servers and portable devices and in transit via TLS or secure messaging. Implement integrity controls such as checksums and versioning to detect unauthorized alterations.

Audit Controls and Monitoring

Enable audit logs in your EHR, billing, and file systems to record access, edits, and exports. Review logs routinely, focusing on high‑risk patterns like after‑hours access, VIP records, and bulk downloads.

Endpoint and Application Management

Standardize devices with mobile device management, automatic updates, host firewalls, and antivirus. Configure automatic logoff and screen lockouts, and restrict data copy/paste or local downloads when not necessary for care.

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Business Associate Agreements

Identify and Inventory Business Associates

List vendors that handle PHI—EHR and billing platforms, cloud storage, telehealth, appointment reminders, shredding, transcription, and IT support. For each, determine if a Business Associate Agreement (BAA) is required.

BAA Content and Due Diligence

Ensure each BAA specifies permitted uses of PHI, safeguards, breach reporting timelines, subcontractor obligations, and return or destruction of PHI at contract end. Perform due diligence by reviewing security summaries, incident histories, and independent attestations when available.

Ongoing Vendor Risk Management

Track BAA renewal dates, document service changes, and reassess vendors after incidents or significant updates. Apply the Minimum Necessary Standard to shared data fields and deactivate vendor access promptly when services end.

Staff Training and Awareness

Training Plan and Frequency

Provide HIPAA onboarding for new hires before they access PHI, refresh training at least annually, and issue targeted micro‑trainings after policy or technology changes. Keep dated rosters, content outlines, and quiz results as evidence.

Required Topics for Occupational Therapy Settings

  • Privacy Rule basics, the Notice of Privacy Practices, and the Minimum Necessary Standard.
  • Security Rule basics, passwords, phishing and social engineering, secure texting, and email encryption.
  • ePHI handling on mobile devices, photography/video in sessions, and telehealth etiquette.
  • Incident identification and reporting, the Breach Notification Rule, and patient rights workflows.
  • Clean desk, secure printing, and proper disposal of paper and media.

Compliance Audits and Assessments

Audit Program and Evidence

Plan periodic reviews of access rights, minimum‑necessary effectiveness, documentation completeness, and BAA coverage. Sample charts and disclosures, validate retention timelines, and confirm that corrective actions from the last audit were completed.

Security Risk Assessment Cadence

Perform a full Security Risk Assessment at least annually and whenever you adopt new systems, move locations, add telehealth features, or experience incidents. Tie findings to a prioritized remediation roadmap with target dates.

Metrics, Testing, and Continuous Improvement

Track metrics such as training completion, open risks by severity, days to revoke access for terminated staff, and time to incident closure. Run tabletop exercises for breach response and disaster recovery to test readiness in real conditions.

Conclusion

By formalizing governance, honoring privacy rights, and enforcing physical and technical safeguards, your clinic can protect ePHI while delivering exceptional therapy services. Keep BAAs current, train staff intentionally, and use audits and SRAs to drive continuous, documented improvement.

FAQs.

What are the key HIPAA compliance steps for occupational therapy clinics?

Appoint a HIPAA Privacy Officer and Security Officer, publish your Notice of Privacy Practices, implement role‑based access with minimum‑necessary controls, complete a Security Risk Assessment with a remediation plan, secure devices and facilities, execute Business Associate Agreements with vendors, train staff routinely, and document incidents, audits, and improvements.

How often should security risk assessments be conducted?

Conduct a comprehensive Security Risk Assessment at least once every 12 months and any time you introduce significant changes—such as a new EHR, telehealth platform, location move, or after a security incident—to keep risk decisions current and defensible.

What are the required HIPAA staff training topics?

Cover Privacy Rule principles, the Notice of Privacy Practices, the Minimum Necessary Standard, Security Rule basics, password and phishing defense, secure messaging and email encryption, ePHI use on mobile devices, incident reporting, and the Breach Notification Rule. Include scenario‑based modules relevant to occupational therapy workflows.

How do occupational therapy clinics handle breach notifications?

Follow your incident response plan: contain and investigate, perform a four‑factor risk assessment, and determine if the event is a reportable breach. If so, notify affected individuals without unreasonable delay, meet federal and any applicable state timelines, notify the Secretary when required, and document decisions, notices, and remediation steps.

Share this article

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Related Articles