HIPAA Risk Assessment for Acupuncturists: Step-by-Step Guide, Checklist & Template

Product Pricing
Ready to get started? Book a demo with our team
Talk to an expert

HIPAA Risk Assessment for Acupuncturists: Step-by-Step Guide, Checklist & Template

Kevin Henry

Risk Management

April 18, 2026

9 minutes read
Share this article
HIPAA Risk Assessment for Acupuncturists: Step-by-Step Guide, Checklist & Template

Scoping the Risk Assessment

A clear scope keeps your HIPAA risk assessment focused and repeatable. Define which systems, people, and processes touch Protected Health Information (PHI) in your acupuncture practice, and set boundaries, timelines, and responsibilities from the start.

Step-by-Step Guide

  • Set objectives: determine why you are assessing (e.g., initial analysis, annual update, post-incident review).
  • Choose scope: include all locations where PHI is created, received, maintained, or transmitted—clinic, home office, telehealth, and third parties.
  • Name roles: assign an assessment owner, contributors (front desk, biller), and an executive signer.
  • Fix the timeline: establish start/end dates, evidence collection windows, and interview schedules.
  • Define methods: document how you will evaluate Administrative, Physical, and Technical Safeguards under the HIPAA Security Rule.
  • State assumptions and constraints: list exclusions (e.g., personal devices not used for work) and any resource limits.

Checklist

  • Written scope statement approved and dated.
  • Systems list prepared (EHR, email, texting app, billing, backups, routers, mobile devices).
  • People in scope identified (acupuncturists, front desk, contractors, students).
  • Business Associates (BAs) included (billing service, cloud EHR, telehealth platform).
  • Assessment methods defined (document review, interviews, walkthrough, sampling).

Template

  • Purpose: [Initial/Annual/Triggered by change] HIPAA risk assessment.
  • Scope boundary: [Clinic address(es), remote work, telehealth, BAs included].
  • Assessor/Owner: [Name, role, contact].
  • Timeframe: [Start date] to [End date].
  • Methods: [Policies review, control testing, device inspection, sampling, interviews].
  • Exclusions: [If any; justify].

Identifying PHI Locations

Map every place PHI lives or flows. For acupuncturists, PHI spans intake forms, treatment notes, tongue images, appointment schedules, billing records, and messages. Include both paper and electronic formats.

Step-by-Step Guide

  • Inventory repositories: EHR, paper charts, scanned files, patient portal, email, texting/voicemail, telehealth recordings (if used), backups, USB drives.
  • Trace data flows: intake ➝ documentation ➝ billing/claims ➝ storage/retention ➝ disposal.
  • List devices: desktops, laptops, tablets, smartphones, card readers, routers, external drives.
  • Catalog third parties: clearinghouses, cloud storage, appointment reminder tools, transcription.
  • Classify PHI types: identifiers, clinical notes, images, insurance data, payment info related to care.

Checklist

  • Every repository labeled with owner, format (paper/electronic), and location.
  • BYOD and remote work practices reviewed and documented.
  • BA agreements on file for all vendors that handle PHI.
  • Temporary PHI (downloads, camera roll, cached files) addressed.
  • Retention and disposal methods identified for each PHI set.

Template

  • Asset/Location: [e.g., EHR – Cloud]. Type of PHI: [Treatment notes]. Owner: [Name]. Format: [ePHI]. BA: [Vendor]. Retention: [X years].
  • Asset/Location: [Paper files – Cabinet A]. Type of PHI: [Intake, consent]. Owner: [Name]. Format: [Paper]. BA: [N/A]. Retention: [X years].
  • Asset/Location: [Smartphone – Provider]. Type of PHI: [Clinic photos/messages]. Owner: [Name]. Format: [ePHI]. BA: [Messaging vendor]. Retention: [Policy ref].

Evaluating Security Measures

Assess your safeguards against the HIPAA Security Rule across three pillars: Administrative Safeguards, Physical Safeguards, and Technical Safeguards. Verify design, implementation, and evidence.

Step-by-Step Guide

Administrative Safeguards

  • Policies: access management, minimum necessary, sanction policy, incident response, contingency planning.
  • Workforce: role-based access, background checks as appropriate, onboarding/offboarding, training.
  • Vendor management: BA due diligence, signed BAAs, security questionnaires, breach notification terms.

Physical Safeguards

  • Facility access: locked chart cabinets, restricted areas, visitor controls, alarm systems.
  • Workstation security: screen privacy filters, auto-lock, clean desk practices.
  • Device protection: secure storage for laptops/phones, cable locks, inventory tracking.

Technical Safeguards

  • Access controls: unique IDs, strong authentication, MFA for EHR and email.
  • Encryption: full-disk encryption on devices; encrypted transmission for email/portal; secure messaging.
  • Audit controls: EHR audit logs, alerting on unusual access, periodic review.
  • Integrity/availability: anti-malware, patching, secure backups, tested restores.

Checklist

  • Current policies mapped to HIPAA Privacy Rule and Security Rule requirements.
  • Documented training completion for all workforce members.
  • MFA enabled where available; shared accounts eliminated.
  • Backups encrypted and restore tests performed on schedule.
  • Wi‑Fi segmented for guests; default router passwords changed; firmware up to date.

Template

  • Control: [e.g., Access Termination]. Implemented: [Yes/No/Partial]. Evidence: [Ticket #, policy ref]. Gap: [Description].
  • Control: [e.g., Device Encryption]. Implemented: [Yes/No/Partial]. Evidence: [Settings screenshot]. Gap: [Description].
  • Control: [e.g., Audit Log Review]. Implemented: [Yes/No/Partial]. Evidence: [Report date]. Gap: [Description].

Detecting Vulnerabilities

Identify weaknesses that could expose PHI. Consider human error, misconfigurations, outdated systems, insecure messaging, and vendor issues common to small acupuncture clinics.

Ready to assess your HIPAA security risks?

Join thousands of organizations that use Accountable to identify and fix their security gaps.

Take the Free Risk Assessment

Step-by-Step Guide

  • Threat modeling: pair each PHI location with plausible threats (lost device, phishing, ransomware, misdirected email/text, office break‑in, fire/flood).
  • Configuration review: verify patches, encryption, auto‑lock timers, and router settings.
  • Process testing: send a test request to measure identity verification and minimum necessary practices.
  • Risk scoring: rate Likelihood (1–5) and Impact (1–5); compute Risk = L × I to prioritize.
  • Validate with evidence: screenshots, photos, log extracts, and interview notes.

Checklist

  • All mobile devices inventoried; lost/stolen response documented.
  • Email and texting practices reviewed; secure alternatives in place for PHI.
  • Paper handling observed from intake to shredding; locked bins available.
  • Vendor dependence reviewed; BAAs verified; offboarding plan if a vendor fails.
  • Contingency gaps noted (power outage, internet loss, disaster recovery).

Template

  • Risk: [Stolen smartphone with PHI]. Asset: [Provider phone]. L: [4]. I: [4]. Score: [16]. Existing controls: [PIN+MFA+remote wipe].
  • Risk: [Phishing into email]. Asset: [Clinic email]. L: [3]. I: [5]. Score: [15]. Existing controls: [MFA, training].
  • Risk: [Paper chart left in waiting area]. Asset: [Paper files]. L: [2]. I: [4]. Score: [8]. Existing controls: [Clean desk, locked cabinet].

Implementing Corrective Actions

Translate findings into a practical Risk Mitigation Plan. Tackle quick wins immediately and schedule higher-effort projects with clear owners, budgets, and deadlines.

Step-by-Step Guide

  • Prioritize by risk score and regulatory impact; address high-likelihood/high-impact first.
  • Select treatment: mitigate, accept (with justification), avoid, or transfer (e.g., insurance).
  • Define actions: specific, measurable tasks tied to safeguards and evidence requirements.
  • Assign owners and due dates; track status in a centralized log.
  • Verify completion: test controls and capture proof before closing items.

Checklist

  • Enable MFA for EHR/email; disable SMS-based PHI messaging or move to a HIPAA-capable platform.
  • Encrypt all laptops/phones; enforce auto-lock and remote wipe.
  • Implement secure, automated, offsite backups; test restoration quarterly.
  • Update policies (minimum necessary, incident response, contingency plan); train staff.
  • Execute or update BA agreements; document vendor security assurances.

Template

  • Action: [Turn on full-disk encryption]. Owner: [Name]. Due: [Date]. Evidence: [Settings screenshot]. Status: [Open/In progress/Closed].
  • Action: [Adopt secure messaging app]. Owner: [Name]. Due: [Date]. Evidence: [Contract, training log]. Status: [Open/In progress/Closed].
  • Action: [Backup restore test]. Owner: [Name]. Due: [Date]. Evidence: [Test report]. Status: [Open/In progress/Closed].

Verifying Compliance Requirements

Cross-check your controls against the HIPAA Privacy Rule and HIPAA Security Rule, plus the Breach Notification Rule. Ensure your documentation demonstrates how safeguards protect PHI in your acupuncture practice.

Step-by-Step Guide

  • Map controls to standards: Administrative, Physical, and Technical Safeguards with citations to your policies/procedures.
  • Validate Privacy Rule practices: Notice of Privacy Practices, patient rights, minimum necessary, and authorizations.
  • Confirm breach processes: incident identification, risk assessment, notification decision-making, and timelines.
  • Review state-specific requirements for retention or privacy that may exceed HIPAA.
  • Collect evidence: training logs, system settings, audit reports, BAAs, and sample redacted records.

Checklist

  • Access policy aligns with role-based needs; sanctions policy enforced and recorded.
  • Audit logs reviewed on schedule; anomalies investigated and documented.
  • Contingency plan includes data backup, disaster recovery, and emergency mode operations.
  • Notice of Privacy Practices provided and acknowledged; release processes verified.
  • All BAs identified and under current agreements; vendor performance reviewed annually.

Template

  • Requirement: [164.308(a)(1) Risk Management]. Evidence: [Risk register, mitigation plan]. Status: [Meets/Partial/Gap].
  • Requirement: [164.310 Physical Access]. Evidence: [Door logs, cabinet locks, visitor sign-in]. Status: [Meets/Partial/Gap].
  • Requirement: [164.312 Technical—Access Control]. Evidence: [MFA, unique IDs, auto‑logoff]. Status: [Meets/Partial/Gap].

Documenting Assessment Results

Good documentation proves diligence and guides improvement. Your report should capture scope, methods, findings, risks, and your Risk Mitigation Plan, with enough detail to reproduce results.

Step-by-Step Guide

  • Write an executive summary: top risks, major fixes, and overall posture.
  • Record scope and methodology: who, what, where, when, and how you assessed.
  • Attach inventories: PHI locations, devices, vendors, and data flows.
  • List findings and risk ratings with evidence references.
  • Include the finalized Risk Mitigation Plan and acceptance justifications.
  • Obtain sign-off and set the next review date.

Checklist

  • Versioned report stored securely; read-only copy archived.
  • Evidence index with filenames, dates, and custodians.
  • Change log tracking updates since the prior assessment.
  • Training and policy updates reflected in appendices.
  • Retention period and secure disposal method defined.

Template

  • Section 1: Executive Summary.
  • Section 2: Scope, Roles, Timeline, Methods.
  • Section 3: PHI Inventory and Data Flow Diagrams.
  • Section 4: Safeguard Evaluation (Administrative/Physical/Technical).
  • Section 5: Risk Register and Ratings.
  • Section 6: Risk Mitigation Plan and Acceptance Rationale.
  • Section 7: Evidence Index and Appendices.
  • Sign-Off: [Name, Title, Date]. Next Review: [Target month/year].

Summary

This guide helps you scope effectively, locate PHI, evaluate safeguards, uncover vulnerabilities, and implement a documented Risk Mitigation Plan. With concise templates and checklists, you can align daily practice operations with HIPAA’s Privacy and Security Rules and sustain compliance over time.

FAQs

What are the key steps in a HIPAA risk assessment for acupuncturists?

Define scope, inventory PHI locations, evaluate Administrative, Physical, and Technical Safeguards, identify vulnerabilities, rate risks, implement a Risk Mitigation Plan, verify requirements under the HIPAA Privacy Rule and HIPAA Security Rule, and document results with evidence and sign-off.

How often should acupuncturists perform HIPAA risk assessments?

Complete a full assessment at least annually and whenever you introduce material changes—new EHR, telehealth platform, office move, or a significant incident. Perform lighter interim reviews quarterly to track progress and emerging risks.

What specific risks do acupuncturists face under HIPAA?

Common risks include unsecured texting of PHI, lost or unencrypted mobile devices, misdirected appointment or billing messages, unlocked paper charts, misconfigured Wi‑Fi or cloud tools, inadequate backups, vendor breaches, and social engineering that compromises email or portals.

How can acupuncturists document their risk assessment effectively?

Use a structured report: scope and methods, PHI inventory, safeguard evaluation, risk register with scores, and a dated Risk Mitigation Plan. Attach policies, training logs, BAAs, audit logs, and screenshots as evidence. Store a versioned, read-only copy and schedule the next review.

Share this article

Ready to assess your HIPAA security risks?

Join thousands of organizations that use Accountable to identify and fix their security gaps.

Take the Free Risk Assessment

Related Articles