HIPAA Risk Assessment for Dietitians: Step-by-Step Guide and Checklist
Understanding HIPAA Compliance
A HIPAA risk assessment helps you find and fix weaknesses that could expose your patients’ Protected Health Information. For dietitians—whether you run a solo practice, work in a clinic, or deliver telehealth—this process shows where PHI lives, how it flows, and what could go wrong.
HIPAA takes a risk-based approach. You must analyze risks to electronic PHI (ePHI), implement reasonable controls, and prove you manage those risks over time. Think of this as an ongoing cycle: assess, remediate, document, train, and monitor.
The three safeguard families you must address
- Administrative Safeguards: policies, workforce oversight, Business Associate Agreements, risk management, and contingency planning.
- Technical Safeguards: access controls, authentication, encryption, activity logs, and transmission security.
- Physical Safeguards: facility access, workstation placement, device and media controls, and secure disposal.
Identifying Protected Health Information
Protected Health Information is any individually identifiable health data related to a person’s condition, care, or payment. In nutrition care, PHI includes appointment notes, food logs tied to a name, progress photos, billing records, portal messages, and telehealth session details.
Start by listing every place PHI is created, received, maintained, or transmitted. Include your EHR, scheduling and billing tools, email, patient portal, cloud storage, texting platforms, laptops, phones, paper files, and backup locations. Don’t forget intake forms, referral faxes, and home-office binders.
Create a PHI data map
- Inventory assets that store or process PHI and label each as on-premise, cloud, or third-party.
- Diagram data flows from intake to discharge, including telehealth and remote monitoring devices.
- Record retention locations, backup copies, and deletion timelines.
- List Business Associates and verify contracts and security practices.
Common blind spots
- Texting PHI, calendar invites with diagnoses, or emailed spreadsheets without encryption.
- Download folders and screenshots on mobile devices used for patient photos.
- Paper forms left on clipboards, unlocked filing cabinets, or home printers.
- Unvetted apps that sync food diaries or measurements to consumer clouds.
Conducting Risk Analysis
Step-by-step process
- Define scope: include all systems, people, processes, and locations that handle ePHI or paper PHI.
- Inventory assets: EHR, scheduling, billing, email, telehealth, cloud drives, devices, paper files, website forms, and backups.
- Identify threats and vulnerabilities: lost or stolen devices, misdirected email, phishing, weak passwords, misconfigured cloud storage, office break-ins, floods, or failed backups.
- Estimate likelihood and impact for each risk, then assign a risk rating (e.g., Low/Medium/High).
- Document current controls and gaps—note where Administrative, Technical, or Physical Safeguards already exist.
- Choose treatments: mitigate, transfer, accept, or avoid; assign owners and due dates.
- Build your Risk Management Plan with prioritized actions, timelines, and success metrics.
Example dietitian risk scenarios
- Misdirected food log via email: Medium likelihood, Medium impact. Controls: secure portal, address auto-complete off, message templates, and user training.
- Lost phone with patient photos: Medium likelihood, High impact. Controls: device encryption, strong PIN, auto-wipe, mobile device management, and photo auto-upload to an encrypted, access-controlled repository.
- Misconfigured cloud folder sharing: Low likelihood, High impact. Controls: least-privilege access, link expiration, disable public links, quarterly permission reviews, and audit alerts.
As you rate risks, confirm how you would detect and respond to incidents. Fold Security Incident Response steps and Data Breach Notification criteria into each scenario so you know exactly who does what, when, and how.
Ready to assess your HIPAA security risks?
Join thousands of organizations that use Accountable to identify and fix their security gaps.
Take the Free Risk AssessmentImplementing Security Measures
Administrative Safeguards
- Assign a security officer and define roles, responsibilities, and decision authority.
- Establish policies for access control, password standards, texting and messaging, device use (BYOD), and data retention.
- Execute and track Business Associate Agreements for any vendor that handles PHI.
- Develop a contingency plan: backups, disaster recovery, emergency operations, and communication procedures.
- Run a formal Security Incident Response program with triage, containment, eradication, recovery, and lessons learned.
- Document a Data Breach Notification procedure that defines thresholds, investigation steps, decision logs, and timely notifications.
- Maintain your Risk Management Plan with owners, due dates, budget needs, and measurable outcomes.
Technical Safeguards
- Use unique user IDs, role-based access, least privilege, and multi-factor authentication for EHR, email, and portals.
- Encrypt data in transit (TLS) and at rest on servers, laptops, and mobile devices; enable remote lock and wipe.
- Configure automatic logoff and screen locks; shorten timeouts on shared workstations.
- Keep systems patched; deploy endpoint protection and restrict administrative rights.
- Use secure portals or encrypted email for PHI; avoid standard SMS and consumer file links.
- Record and review audit logs for logins, downloads, and changes to records; alert on anomalies.
- Back up critical data to an encrypted repository and test restores regularly.
Physical Safeguards
- Control facility access with locks and visitor sign-in; secure rooms used for telehealth.
- Position workstations to limit viewing; add privacy screens and cable locks where needed.
- Track devices and media; sanitize or shred before disposal or reuse.
- Secure home offices: locked storage for files and devices; separate personal and work equipment.
Documenting Findings and Actions
In HIPAA, if it’s not documented, it effectively didn’t happen. Keep clear records that show how you identified risks, what you decided to do, and the evidence that controls are working.
What to document
- Risk register: asset, threat/vulnerability, likelihood, impact, risk rating, existing controls, owner, target date, status, and residual risk.
- Policies and procedures with version history and approval dates.
- Signed Business Associate Agreements and vendor due-diligence notes.
- Training rosters, materials, completion dates, and quiz results.
- Incident and breach investigation logs, decisions, and notifications.
Make the Risk Management Plan actionable
- Prioritized remediation list with milestones and acceptance criteria.
- Budget and resource needs aligned to risk severity and patient impact.
- Evidence of completion: screenshots, ticket numbers, vendor attestations, and test results.
Training Staff on HIPAA Requirements
Your safeguards only work if people use them correctly. Provide role-based training that teaches the “why” behind each rule and gives staff simple, repeatable steps for everyday tasks.
Plan and content
- Onboarding and annual refreshers covering Privacy Rule basics and Security Rule practices.
- Role-specific guidance for dietitians, front desk, billing, and telehealth facilitators.
- Phishing awareness, secure messaging, minimum necessary use of PHI, and do/don’t examples.
- Remote work and BYOD expectations, including storage, backup, and photo handling.
- Who to contact and how to act during Security Incident Response and potential breaches.
Reinforcement and tracking
- Short monthly tips or huddles, plus quick drills for common scenarios.
- Simulated phishing and tabletop exercises that include Data Breach Notification decisions.
- Attendance logs, attestations, and remediation plans for missed training.
Monitoring and Updating Risk Assessments
Treat your assessment as a living program. Review at least annually and whenever you add new technology, change workflows, move locations, experience an incident, or change vendors that handle PHI.
Continuous monitoring
- Review audit logs and access reports; investigate anomalies quickly.
- Test backup restores and disaster recovery steps on a defined schedule.
- Check device compliance, vulnerabilities, and patch levels for all endpoints.
- Reassess vendors: confirm BAAs, evaluate security updates, and track service changes.
- Run incident drills that practice Security Incident Response and decision-making for Data Breach Notification.
Conclusion
A solid HIPAA risk assessment shows where PHI could be exposed, ranks the biggest threats, and drives a focused Risk Management Plan. By closing gaps across Administrative, Technical, and Physical Safeguards—and proving your training, monitoring, and updates—you protect patients, your practice, and your reputation.
FAQs
What is a HIPAA risk assessment for dietitians?
It’s a structured evaluation of how your practice creates, receives, maintains, and transmits PHI, the threats that could compromise it, and the safeguards you put in place. The output is a documented risk register and a Risk Management Plan with prioritized actions.
How often should dietitians conduct a risk assessment?
Complete a full assessment at least annually and whenever you introduce significant changes—new EHR, telehealth platform, office move, security incident, or new vendors handling PHI. Smaller reviews throughout the year help you stay ahead of emerging risks.
What types of risks are identified in HIPAA assessments?
Common findings include weak access controls, lost or unencrypted devices, misdirected emails, overbroad file sharing in cloud tools, inconsistent backups, phishing exposure, and gaps in policies, training, or incident response. Physical issues like unlocked storage or unsecured workstations also appear.
How can dietitians ensure compliance after assessment?
Turn results into a living Risk Management Plan with owners, deadlines, and evidence of completion. Implement safeguards, run staff training, test backups and incident response, monitor logs, keep BAAs current, and update documentation as your environment changes.
Ready to assess your HIPAA security risks?
Join thousands of organizations that use Accountable to identify and fix their security gaps.
Take the Free Risk Assessment