HIPAA Risk Assessment for Licensed Practical Nurses: Step-by-Step Guide and Checklist

Check out the new compliance progress tracker


Product Pricing Demo Video Free HIPAA Training
LATEST
video thumbnail
Admin Dashboard Walkthrough Jake guides you step-by-step through the process of achieving HIPAA compliance
Ready to get started? Book a demo with our team
Talk to an expert

HIPAA Risk Assessment for Licensed Practical Nurses: Step-by-Step Guide and Checklist

Kevin Henry

Risk Management

December 23, 2025

6 minutes read
Share this article
HIPAA Risk Assessment for Licensed Practical Nurses: Step-by-Step Guide and Checklist

A HIPAA risk assessment helps you identify where patient data could be exposed and how to reduce that risk. This step-by-step guide equips licensed practical nurses (LPNs) to support a thorough Security Risk Analysis, build practical safeguards, and keep documentation audit-ready.

You will learn where Protected Health Information (PHI) lives in daily workflows, how to evaluate threats, and how to implement Risk Management Plans that align with HIPAA Privacy Rule Compliance.

Identifying Protected Health Information Locations

Know what counts as Protected Health Information

Protected Health Information includes any data that can identify a patient combined with health details. It appears in both paper and electronic forms (ePHI) across clinical, administrative, and communication channels you use every shift.

Common PHI locations in LPN workflows

  • Electronic Health Records, eMAR/MAR, vitals and intake systems.
  • Paper charts, nursing notes, printed handoffs, and label printers.
  • Email, secure messaging, telehealth platforms, voicemail, and fax queues.
  • Workstations, laptops, tablets, smartphones, USB drives, and cameras.
  • Whiteboards, sign-in sheets, bedside notes, and medication storage logs.
  • Scheduling, billing, and care coordination tools used with outside providers.

Quick inventory checklist

  • List every system and device you touch that stores or transmits PHI.
  • Map where PHI is created, received, maintained, or disclosed during a shift.
  • Note who else handles the same data (roles, not names) and why they need it.
  • Classify PHI by sensitivity (routine, sensitive diagnoses, substance use, etc.).
  • Identify data that can be minimized, de-identified, or not retained at all.

Evaluating Risks and Vulnerabilities

Assess threats, vulnerabilities, likelihood, and impact

For each PHI location, document what could go wrong, why it could happen, and the likely harm. Score risk by combining likelihood (how often) and impact (how bad) to prioritize remediation.

Typical risks LPNs help uncover

  • Human error: misdirected faxes, charting on the wrong patient, unattended screens.
  • Unauthorized access: shared logins, weak passwords, snooping in records.
  • Device loss or theft: unencrypted phones, misplaced tablets, unsecured carts.
  • Cyber threats: phishing, ransomware, outdated software, misconfigured Wi‑Fi.
  • Operational events: power outages, disasters, and failed backups.

Technical evaluation activities

Coordinate Network Vulnerability Scans and remediation with IT, verify patching, and confirm encryption at rest and in transit. These activities feed your overall Security Risk Analysis and help validate that controls work as intended.

Privacy and security alignment

Verify minimum-necessary access, appropriate disclosures, and role-based permissions to maintain HIPAA Privacy Rule Compliance while addressing technical security gaps.

Implementing Security Measures

Administrative safeguards

  • Policies covering access control, device use, secure messaging, and sanctions.
  • Role-based access aligned to duties; unique IDs and no shared credentials.
  • Risk Management Plans with owners, timelines, and acceptance criteria.

Technical safeguards

  • Multi-factor authentication, automatic logoff, and strong password standards.
  • Audit logs for access, ePHI queries, printing, and exports; routine review.
  • Encryption for devices, backups, email gateways, and storage media.
  • Approved secure texting/telehealth tools; avoid unencrypted SMS or apps.

Physical safeguards

  • Badge-controlled areas, locked carts, screen privacy filters, and clean desk rules.
  • Secure disposal: shred bins for paper; certified wiping or destruction for media.

Incident response and downtime readiness

  • Define how to detect, report, contain, and escalate suspected breaches.
  • Run Disaster Recovery Testing: verify backups, test restores, and downtime charting.
  • Maintain emergency mode procedures for power, network, or EHR outages.

Documenting the Risk Assessment Process

What to record

  • Asset inventory: systems, devices, data types, owners, and locations.
  • Threats, vulnerabilities, existing controls, and residual risks.
  • Risk ratings with rationale, chosen mitigations, and acceptance decisions.
  • Action plans, deadlines, and evidence of completion (screenshots, tickets).

How to keep documentation audit-ready

Use a single repository with version control, clear dates, and sign-offs. Attach proof such as training rosters, policy acknowledgments, Business Associate Agreements, and test results from Network Vulnerability Scans or Disaster Recovery Testing.

Retention and accountability

Retain risk assessment records, policies, and procedures for at least six years. Assign an owner (privacy or security officer) and define how LPNs contribute updates after incidents, process changes, or new technology deployments.

Ready to assess your HIPAA security risks?

Join thousands of organizations that use Accountable to identify and fix their security gaps.

Take the Free Risk Assessment

Reviewing and Updating Risk Assessments

When to reassess

  • On a set cadence (at least annually) and after any significant change.
  • Events: new EHR modules, telehealth rollouts, relocations, mergers, or breaches.
  • Regulatory updates or lessons learned from audits and incidents.

Continuous improvement

  • Track metrics: phishing click rate, patch timeliness, log review findings, and near-misses.
  • Re-score risks after controls are implemented; update Risk Management Plans.
  • Validate controls with spot checks and tabletop exercises.

Conducting Regular Staff Training

Plan and frequency

Provide onboarding plus annual refreshers, with targeted micro-trainings when new tools or risks emerge. Keep content role-based so LPNs practice real scenarios they face daily.

High-impact topics for LPNs

  • Minimum necessary use, secure handoffs, and avoiding hallway disclosures.
  • Phishing recognition, safe email, and approved secure messaging.
  • Workstation security, mobile device encryption, and BYOD rules.
  • Proper faxing/scanning, labeling, and handling printed PHI.

Proving effectiveness

Use short quizzes, phishing simulations, and return demonstrations. Record attendance, scores, and remediation steps to show ongoing HIPAA Privacy Rule Compliance.

Managing Third-Party Vendor Risks

Business Associate Agreements

Execute Business Associate Agreements with vendors that create, receive, maintain, or transmit PHI. Define permitted uses, safeguards, breach notification timeframes, subcontractor obligations, return or destruction of data, and audit rights.

Due diligence before onboarding

  • Security questionnaires, policy reviews, and evidence of controls (e.g., recent assessments).
  • Confirm encryption, access controls, incident response, and backup practices.
  • Limit vendor access to minimum necessary; segregate test and production data.

Ongoing monitoring and offboarding

  • Maintain a vendor inventory with risk tiers and review cycles.
  • Schedule periodic checks of logs, reports, and contract obligations.
  • On termination, verify data return/destruction and revoke all access.

Conclusion

By mapping PHI, rating risks, implementing layered safeguards, and documenting every decision, you produce a defensible Security Risk Analysis. Keep training active, test recovery, manage vendors with Business Associate Agreements, and drive Risk Management Plans to completion.

FAQs.

What are the main steps in a HIPAA risk assessment?

Identify all PHI locations and data flows, evaluate threats and vulnerabilities, assign likelihood and impact to score risks, implement and verify safeguards, document decisions and evidence, and track remediation through Risk Management Plans with clear owners and deadlines.

How often should licensed practical nurses perform HIPAA risk assessments?

Support a formal review at least annually and after major changes like new systems, vendor additions, relocations, or security incidents. LPNs should also report workflow changes or near-misses immediately so the assessment and controls stay accurate.

What security measures protect patient information?

Use administrative, technical, and physical safeguards: role-based access, unique IDs, MFA, encryption, automatic logoff, audit logs, device and media controls, secure messaging, and tested backups. Validate effectiveness with Network Vulnerability Scans and Disaster Recovery Testing.

How is HIPAA risk assessment documentation maintained?

Store all artifacts—inventory, risk ratings, policies, training records, scan and test results, and Business Associate Agreements—in a centralized, versioned repository. Keep it current, assign an owner, capture sign-offs, and retain records for at least six years.

Share this article

Ready to assess your HIPAA security risks?

Join thousands of organizations that use Accountable to identify and fix their security gaps.

Take the Free Risk Assessment

Related Articles