HIPAA Risk Assessment for Licensed Practical Nurses: Step-by-Step Guide and Checklist
A HIPAA risk assessment helps you identify where patient data could be exposed and how to reduce that risk. This step-by-step guide equips licensed practical nurses (LPNs) to support a thorough Security Risk Analysis, build practical safeguards, and keep documentation audit-ready.
You will learn where Protected Health Information (PHI) lives in daily workflows, how to evaluate threats, and how to implement Risk Management Plans that align with HIPAA Privacy Rule Compliance.
Identifying Protected Health Information Locations
Know what counts as Protected Health Information
Protected Health Information includes any data that can identify a patient combined with health details. It appears in both paper and electronic forms (ePHI) across clinical, administrative, and communication channels you use every shift.
Common PHI locations in LPN workflows
- Electronic Health Records, eMAR/MAR, vitals and intake systems.
- Paper charts, nursing notes, printed handoffs, and label printers.
- Email, secure messaging, telehealth platforms, voicemail, and fax queues.
- Workstations, laptops, tablets, smartphones, USB drives, and cameras.
- Whiteboards, sign-in sheets, bedside notes, and medication storage logs.
- Scheduling, billing, and care coordination tools used with outside providers.
Quick inventory checklist
- List every system and device you touch that stores or transmits PHI.
- Map where PHI is created, received, maintained, or disclosed during a shift.
- Note who else handles the same data (roles, not names) and why they need it.
- Classify PHI by sensitivity (routine, sensitive diagnoses, substance use, etc.).
- Identify data that can be minimized, de-identified, or not retained at all.
Evaluating Risks and Vulnerabilities
Assess threats, vulnerabilities, likelihood, and impact
For each PHI location, document what could go wrong, why it could happen, and the likely harm. Score risk by combining likelihood (how often) and impact (how bad) to prioritize remediation.
Typical risks LPNs help uncover
- Human error: misdirected faxes, charting on the wrong patient, unattended screens.
- Unauthorized access: shared logins, weak passwords, snooping in records.
- Device loss or theft: unencrypted phones, misplaced tablets, unsecured carts.
- Cyber threats: phishing, ransomware, outdated software, misconfigured Wi‑Fi.
- Operational events: power outages, disasters, and failed backups.
Technical evaluation activities
Coordinate Network Vulnerability Scans and remediation with IT, verify patching, and confirm encryption at rest and in transit. These activities feed your overall Security Risk Analysis and help validate that controls work as intended.
Privacy and security alignment
Verify minimum-necessary access, appropriate disclosures, and role-based permissions to maintain HIPAA Privacy Rule Compliance while addressing technical security gaps.
Implementing Security Measures
Administrative safeguards
- Policies covering access control, device use, secure messaging, and sanctions.
- Role-based access aligned to duties; unique IDs and no shared credentials.
- Risk Management Plans with owners, timelines, and acceptance criteria.
Technical safeguards
- Multi-factor authentication, automatic logoff, and strong password standards.
- Audit logs for access, ePHI queries, printing, and exports; routine review.
- Encryption for devices, backups, email gateways, and storage media.
- Approved secure texting/telehealth tools; avoid unencrypted SMS or apps.
Physical safeguards
- Badge-controlled areas, locked carts, screen privacy filters, and clean desk rules.
- Secure disposal: shred bins for paper; certified wiping or destruction for media.
Incident response and downtime readiness
- Define how to detect, report, contain, and escalate suspected breaches.
- Run Disaster Recovery Testing: verify backups, test restores, and downtime charting.
- Maintain emergency mode procedures for power, network, or EHR outages.
Documenting the Risk Assessment Process
What to record
- Asset inventory: systems, devices, data types, owners, and locations.
- Threats, vulnerabilities, existing controls, and residual risks.
- Risk ratings with rationale, chosen mitigations, and acceptance decisions.
- Action plans, deadlines, and evidence of completion (screenshots, tickets).
How to keep documentation audit-ready
Use a single repository with version control, clear dates, and sign-offs. Attach proof such as training rosters, policy acknowledgments, Business Associate Agreements, and test results from Network Vulnerability Scans or Disaster Recovery Testing.
Retention and accountability
Retain risk assessment records, policies, and procedures for at least six years. Assign an owner (privacy or security officer) and define how LPNs contribute updates after incidents, process changes, or new technology deployments.
Ready to assess your HIPAA security risks?
Join thousands of organizations that use Accountable to identify and fix their security gaps.
Take the Free Risk AssessmentReviewing and Updating Risk Assessments
When to reassess
- On a set cadence (at least annually) and after any significant change.
- Events: new EHR modules, telehealth rollouts, relocations, mergers, or breaches.
- Regulatory updates or lessons learned from audits and incidents.
Continuous improvement
- Track metrics: phishing click rate, patch timeliness, log review findings, and near-misses.
- Re-score risks after controls are implemented; update Risk Management Plans.
- Validate controls with spot checks and tabletop exercises.
Conducting Regular Staff Training
Plan and frequency
Provide onboarding plus annual refreshers, with targeted micro-trainings when new tools or risks emerge. Keep content role-based so LPNs practice real scenarios they face daily.
High-impact topics for LPNs
- Minimum necessary use, secure handoffs, and avoiding hallway disclosures.
- Phishing recognition, safe email, and approved secure messaging.
- Workstation security, mobile device encryption, and BYOD rules.
- Proper faxing/scanning, labeling, and handling printed PHI.
Proving effectiveness
Use short quizzes, phishing simulations, and return demonstrations. Record attendance, scores, and remediation steps to show ongoing HIPAA Privacy Rule Compliance.
Managing Third-Party Vendor Risks
Business Associate Agreements
Execute Business Associate Agreements with vendors that create, receive, maintain, or transmit PHI. Define permitted uses, safeguards, breach notification timeframes, subcontractor obligations, return or destruction of data, and audit rights.
Due diligence before onboarding
- Security questionnaires, policy reviews, and evidence of controls (e.g., recent assessments).
- Confirm encryption, access controls, incident response, and backup practices.
- Limit vendor access to minimum necessary; segregate test and production data.
Ongoing monitoring and offboarding
- Maintain a vendor inventory with risk tiers and review cycles.
- Schedule periodic checks of logs, reports, and contract obligations.
- On termination, verify data return/destruction and revoke all access.
Conclusion
By mapping PHI, rating risks, implementing layered safeguards, and documenting every decision, you produce a defensible Security Risk Analysis. Keep training active, test recovery, manage vendors with Business Associate Agreements, and drive Risk Management Plans to completion.
FAQs.
What are the main steps in a HIPAA risk assessment?
Identify all PHI locations and data flows, evaluate threats and vulnerabilities, assign likelihood and impact to score risks, implement and verify safeguards, document decisions and evidence, and track remediation through Risk Management Plans with clear owners and deadlines.
How often should licensed practical nurses perform HIPAA risk assessments?
Support a formal review at least annually and after major changes like new systems, vendor additions, relocations, or security incidents. LPNs should also report workflow changes or near-misses immediately so the assessment and controls stay accurate.
What security measures protect patient information?
Use administrative, technical, and physical safeguards: role-based access, unique IDs, MFA, encryption, automatic logoff, audit logs, device and media controls, secure messaging, and tested backups. Validate effectiveness with Network Vulnerability Scans and Disaster Recovery Testing.
How is HIPAA risk assessment documentation maintained?
Store all artifacts—inventory, risk ratings, policies, training records, scan and test results, and Business Associate Agreements—in a centralized, versioned repository. Keep it current, assign an owner, capture sign-offs, and retain records for at least six years.
Ready to assess your HIPAA security risks?
Join thousands of organizations that use Accountable to identify and fix their security gaps.
Take the Free Risk Assessment