HIPAA Requirements for Small Medical Practices: The Essential Compliance Checklist

Product Pricing Demo Video Free HIPAA Training
LATEST
video thumbnail
Admin Dashboard Walkthrough Jake guides you step-by-step through the process of achieving HIPAA compliance
Ready to get started? Book a demo with our team
Talk to an expert

HIPAA Requirements for Small Medical Practices: The Essential Compliance Checklist

Kevin Henry

HIPAA

March 31, 2026

7 minutes read
Share this article
HIPAA Requirements for Small Medical Practices: The Essential Compliance Checklist

Staying compliant with HIPAA protects your patients and your practice. This essential checklist breaks down HIPAA requirements into practical steps you can implement with limited time and budget, while keeping Protected Health Information (PHI) secure.

Use each section to verify policies, close gaps, and build a sustainable compliance program that aligns with the Privacy Rule, Security Rule, and Breach Notification Rule.

Conduct Risk Assessments

Purpose and scope

A Risk Analysis is the foundation of HIPAA Security Rule compliance. You identify ePHI systems, map data flows, and evaluate threats, vulnerabilities, likelihood, and impact to determine risk levels and priorities.

How to execute

  • Inventory where PHI lives and moves (EHR, email, patient portal, backups, mobile devices, third parties).
  • Evaluate administrative, physical, and technical controls already in place (Administrative Safeguards, Physical Safeguards, and Technical Safeguards).
  • Rate risks, document findings, and create a remediation plan with owners and deadlines.

Deliverables to keep

  • Written Risk Analysis with methodology, scope, assets, findings, and risk ratings.
  • Risk management plan tracking corrective actions to completion.

Develop Policies and Procedures

Core policy set

  • Privacy policies: minimum necessary standard, authorizations, marketing, and the Notice of Privacy Practices.
  • Security policies: access control, password/MFA, audit logging, encryption, incident response, device and media controls.
  • Workforce policies: onboarding/offboarding, role-based access, remote work/BYOD, sanctions for violations.

Operationalize and maintain

  • Version-control all documents; review at least annually and after major changes (new EHR, cloud move, mergers).
  • Retain policies and related documentation for at least six years.

Implement Staff Training

What effective training covers

  • How HIPAA applies to each role, including minimum necessary and handling of PHI.
  • Recognizing and reporting incidents, phishing, ransomware, and social engineering.
  • Secure use of EHRs, texting, email, and patient portals; clean desk and screen lock habits.

Frequency and tracking

  • Train new workforce members promptly and provide annual refreshers; document attendance and content covered.
  • Supplement with brief, periodic reminders and phishing simulations.

Establish Business Associate Agreements

When a BAA is required

Any vendor or partner that creates, receives, maintains, or transmits PHI on your behalf is a Business Associate and must sign a Business Associate Contract (BAA). Typical examples include EHR vendors, billing services, cloud hosting, IT support with system access, and e-fax or email encryption providers.

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

What to include

  • Permitted and required uses/disclosures of PHI and the minimum necessary standard.
  • Obligation to implement safeguards, follow the Breach Notification Rule, and report incidents promptly.
  • Flow-down requirements to subcontractors, assistance with access/amendment/accounting requests, and HHS audit cooperation.
  • Return or secure destruction of PHI at termination when feasible, and your right to terminate for material breach.

Apply Physical Safeguards

Facility and workstation protections

  • Control facility access; use visitor logs and escort procedures for non-staff.
  • Position screens away from public view; enable screen privacy filters and auto-lock.
  • Secure paper PHI in locked locations; use clean desk policies.

Device and media controls

  • Maintain an asset inventory for servers, laptops, tablets, and removable media.
  • Use encryption on portable devices; store and transport backups securely.
  • Sanitize, wipe, or shred devices and media prior to reuse or disposal; document the process.

Enforce Technical Safeguards

Access and identity controls

  • Assign unique user IDs, enforce strong passwords, and use multi-factor authentication for remote and privileged access.
  • Apply role-based access; promptly remove access at offboarding; set automatic logoff and session timeouts.

Encryption and transmission security

  • Adopt Encryption Standards for ePHI at rest and in transit (for example, AES-256 for storage and TLS 1.2+ for transmission).
  • Encrypt mobile devices and email where feasible; use secure messaging for texting PHI.

Monitoring and integrity

  • Enable audit logs on EHR and critical systems; review for inappropriate access.
  • Keep systems patched; use anti-malware, endpoint protection, and secure backups with periodic restore testing.

Manage Breach Notification

Rapid assessment and containment

  • Activate your incident response plan: isolate affected systems, preserve logs, and begin a four-factor breach risk assessment.
  • Document what happened, the PHI involved, who received or viewed it, and mitigation steps taken.

Notification requirements

  • Notify affected individuals without unreasonable delay and no later than 60 days after discovery.
  • If 500 or more individuals are affected in a state or jurisdiction, also notify HHS and prominent media; for fewer than 500, report to HHS annually.
  • Content of notices should describe the incident, types of PHI involved, steps individuals should take, what you are doing to mitigate harm, and contact information.

Protect Patient Rights

Privacy Rule rights to support

  • Access and obtain copies of PHI in the requested format if readily producible, typically within 30 days (with one allowable extension).
  • Request amendments, restrictions, and confidential communications (e.g., alternate addresses or phone numbers).
  • Receive an accounting of certain disclosures and a clear Notice of Privacy Practices at first service, with posting in the practice.

Practice tips

  • Standardize request forms and tracking logs; apply reasonable, cost-based copy fees where permitted.
  • Train front-desk and medical records staff on identity verification and response timelines.

Maintain Compliance Documentation

What to retain

  • Risk Analyses, risk management plans, policies and procedures, training records, incident and breach files, and audit log reviews.
  • Executed Business Associate Contracts, vendor due diligence, and device/media disposal records.
  • Copies of your current and prior Notice of Privacy Practices and acknowledgement records.

Retention and organization

  • Keep documentation for at least six years and store it so you can retrieve it quickly during audits or investigations.
  • Use a master index and review schedule; update documents when systems or workflows change.

Perform Regular Audits

Audit plan and cadence

  • Quarterly: sample EHR access logs, verify minimum-necessary access, and spot-check user permissions.
  • Semiannually: vulnerability scans, patch level reviews, backup restore tests, and BAA inventory validation.
  • Annually: refresh the Risk Analysis, table-top incident response exercise, and full policy review.

Close the loop

  • Assign owners to findings, set due dates, and track remediation to completion.
  • Report audit results to leadership and incorporate lessons into training and policies.

Conclusion

By following this checklist—assessing risk, hardening safeguards, training staff, managing vendors, and auditing regularly—you meet core HIPAA requirements for small medical practices and build a defensible, patient-centered privacy and security program.

FAQs.

What are the key HIPAA requirements for small medical practices?

Focus on the fundamentals: complete a documented Risk Analysis; implement Administrative, Physical, and Technical Safeguards; issue and follow your Notice of Privacy Practices; execute Business Associate Contracts with applicable vendors; train your workforce; maintain audit logs and documentation; and follow the Breach Notification Rule for any qualifying incident.

How often should risk assessments be conducted?

Perform a comprehensive Risk Analysis at least annually and whenever you experience significant changes—such as adopting a new EHR, moving to a cloud service, office relocation, mergers, or new clinical workflows. Update your risk management plan continuously as you remediate findings.

What must be included in business associate agreements?

BAAs should define permitted uses/disclosures, require safeguards and compliance with the Breach Notification Rule, mandate prompt incident reporting, flow obligations to subcontractors, support patient rights (access, amendment, accounting), allow HHS access to relevant records, and require return or secure destruction of PHI at termination, with your right to terminate for material breach.

How should a small practice respond to a data breach?

Activate incident response immediately: contain the issue, preserve evidence, and perform a four-factor risk assessment. If a breach is confirmed, notify affected individuals without unreasonable delay and within 60 days, include required content, and notify HHS (and media for large breaches). Document every step, offer mitigation (e.g., credit monitoring when appropriate), and implement corrective actions to prevent recurrence.

Share this article

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Related Articles