HIPAA Risk Assessment for Obstetricians: Step-by-Step Guide and Compliance Checklist
Understanding HIPAA Risk Assessment Requirements
A HIPAA risk assessment helps you identify how electronic protected health information (ePHI) is created, received, maintained, and transmitted across your obstetrics practice. It measures the likelihood and impact of potential threats so you can reduce risk to a reasonable and appropriate level.
The Security Rule §164.308(a)(1)(ii)(A) requires a thorough and accurate risk analysis of ePHI. In practice, this means documenting where ePHI lives, who can access it, what could go wrong, and which controls are in place or needed. Risk analysis feeds risk management, where you choose and implement safeguards to reduce identified risks.
What counts as ePHI in obstetrics
- Ultrasound images, fetal heart rate tracings, and PACS archives
- Prenatal records, genetic screening results, lab and imaging reports
- Scheduling data, referral notes, discharge summaries, patient portal messages
- Telehealth recordings, secure messages, and on-call communications
Quick compliance checklist
- Define scope (all systems, devices, vendors handling ePHI).
- Appoint a security lead and assemble clinical, IT, and operations stakeholders.
- Select a risk methodology (likelihood × impact, defined scales and criteria).
- Document data flows from intake to postpartum care.
- Identify business associates and confirm BAAs are current.
Conducting a Comprehensive Risk Inventory
Start with a complete inventory of assets that store, process, or transmit ePHI. Capture people, processes, technology, and third parties so nothing falls through the cracks in high-velocity labor and delivery settings.
Asset categories to include
- Applications: EHR, ultrasound/PACS, patient portal, billing, e-prescribing.
- Devices: L&D workstations, tablets, portable ultrasounds, fetal monitors, printers, scanners.
- Data stores: on-prem servers, cloud storage, backups, email, shared drives, removable media.
- Communication channels: secure messaging, telehealth, VPN, email, fax, texting.
- Vendors: imaging services, labs, billing, transcription, call centers, cloud providers.
Data flow mapping
Trace how ePHI moves from referral and prenatal intake through triage, delivery, and postpartum follow-up. Note where data is handed off (e.g., to hospitals, labs, and cloud PACS) and any remote access used by on-call physicians.
Inventory fields to capture
- Asset name/owner/location and supported clinical workflow
- Types and volume of ePHI; storage/processing/transmission methods
- Connectivity (network segments, internet exposure, remote access)
- Existing controls (encryption, MFA, logging, backups)
- Dependencies and business associate involvement
Identifying Threats and Vulnerabilities
With your inventory in hand, evaluate what could compromise confidentiality, integrity, or availability of ePHI, and why. Consider obstetrics-specific realities such as shared workstations, family presence in rooms, and frequent after-hours access.
Common threat categories
- Human: error, phishing, unauthorized snooping, improper texting or photo sharing.
- Technical: ransomware, outdated operating systems on ultrasound consoles, misconfigurations.
- Physical: theft or loss of laptops, unlocked exam-room computers, shoulder surfing.
- Environmental/process: power loss, fire, vendor outages, misrouted faxes or lab results.
Typical vulnerabilities in OB settings
- Generic or shared logins for shift coverage; disabled auto-logoff in L&D rooms.
- Unencrypted mobile devices and removable media containing images or tracings.
- No multi-factor authentication for remote EHR or portal administration.
- Medical devices on flat networks; default passwords on fetal monitors.
- Gaps in vendor due diligence or missing business associate agreements.
Risk scoring approach
- Assign likelihood and impact on a consistent 1–5 scale; compute inherent risk.
- Note existing controls; estimate residual risk after controls.
- Define risk acceptance criteria and escalation paths for high risks.
Evidence to gather
- Configuration screenshots, audit logs, sample imaging exports, device inventories
- Policies, procedures, training rosters, incident and ticket histories
- Vendor attestations and service-level commitments
Developing a Risk Remediation Plan
Translate findings into clear, time-bound remediation recommendations and record them in a living risk register. Prioritize items with high residual risk that materially affect ePHI in patient care areas.
Ready to assess your HIPAA security risks?
Join thousands of organizations that use Accountable to identify and fix their security gaps.
Take the Free Risk AssessmentPrioritization and planning
- Target high-impact/high-likelihood risks first; include quick wins and strategic fixes.
- Map each action to administrative safeguards, technical safeguards, or physical safeguards.
- Assign owners, budgets, milestones, and success criteria.
Examples of remediation recommendations
- Implement secure messaging for on-call communications; prohibit standard SMS with ePHI.
- Enforce device encryption and MDM on all laptops/tablets; disable USB mass storage.
- Deploy MFA for remote EHR, portal admin, and VPN access.
- Eliminate shared accounts; enforce role-based access and automatic logoff in L&D.
- Segment medical devices; change default passwords on fetal monitors; patch consoles.
- Harden email with anti-phishing and DLP; train staff on minimum necessary use of ePHI.
- Test immutable, offsite backups and documented restore procedures for critical systems.
Risk register essentials
- Asset and ePHI involved; threat–vulnerability pair
- Inherent and residual risk scores; current controls
- Remediation recommendations; owner; due date; status
- Risk treatment decision (mitigate, transfer, accept, avoid) with justification
Implementing Safeguards and Controls
Choose safeguards that are reasonable and appropriate for your size, complexity, and capabilities. Balance patient care needs in fast-paced obstetrics with reliable protections for ePHI.
Administrative safeguards
- Access authorization and termination procedures; sanctions policy.
- Workforce training focused on imaging, photography, and bedside privacy.
- Vendor risk management and current BAAs for all ePHI handlers.
- Contingency planning: data backup, disaster recovery, and emergency operation procedures.
- Incident response with clear triage, investigation, and breach notification steps.
- Periodic evaluations to confirm controls remain effective and documented.
Technical safeguards
- Unique user IDs, emergency access (“break-the-glass”), automatic logoff.
- Encryption for devices, databases, and transmissions; TLS for portals and telehealth.
- MFA for remote access and privileged accounts; strong password policies.
- Audit controls: centralized logging for EHR, PACS, and admin activity; weekly reviews.
- Integrity protections and anti-malware; application allowlisting on medical devices.
- Network segmentation for fetal monitors and ultrasound equipment; EDR on endpoints.
Physical safeguards
- Controlled access to L&D and equipment rooms; badge and visitor management.
- Workstation placement to reduce viewing by visitors; privacy screens where needed.
- Device and media controls: secure storage, tracking, and proper disposal of media.
- Clean-desk and locked cabinets for any residual paper containing ePHI.
Maintaining Compliance Documentation
Document what you did, why you did it, and how you verified effectiveness. Keep records centralized and version-controlled to streamline audits and leadership reviews.
Must-have records
- Risk analysis report aligned to Security Rule §164.308(a)(1)(ii)(A).
- Current risk register and remediation plan with status updates.
- Policies and procedures; training content and attendance logs.
- BAAs, vendor assessments, and service reliability evidence.
- Access reviews, audit logs, incident and breach records, backup and restore tests.
Retention and organization
- Retain HIPAA-required documentation for at least six years from creation or last effective date.
- Index documents by system and control family; track owners, approval dates, and next review dates.
- Store evidence (screenshots, tickets, reports) with clear references to risk items.
Ensuring Ongoing Monitoring and Updates
Risk management is continuous. Set a cadence for monitoring, reassessment, and improvement so controls stay aligned with evolving clinical workflows and threats.
Operational cadence
- Daily: review critical alerts; confirm backups and key interfaces succeeded.
- Weekly: audit log spot-checks for EHR/PACS; patch deployment status.
- Monthly: vulnerability scans; phishing simulations; open-risk review.
- Quarterly: user access recertifications; business associate oversight.
- Semiannual: incident response tabletop exercises; restore drills.
- Annual: full risk assessment refresh and control effectiveness evaluation.
Common triggers to reassess
- New or upgraded EHR, ultrasound/PACS, telehealth platforms, or messaging tools.
- Office moves, network redesigns, mergers, or major staffing changes.
- Security incidents, vendor breaches, or significant audit findings.
- New services (e.g., expanded prenatal genetics) or regulatory guidance.
Metrics that matter
- High-risk items aging and closure rate in the risk register.
- Training completion and phishing resilience trends.
- Patch and vulnerability remediation SLAs met.
- Audit log review coverage and findings resolved.
Conclusion
A structured HIPAA risk assessment for obstetricians—rooted in a solid inventory, clear risk scoring, and targeted remediation—builds resilient protection for ePHI without slowing care. Use your risk register to drive prioritized action, implement administrative, technical, and physical safeguards, and document everything to sustain compliance and trust.
FAQs
What triggers a HIPAA risk assessment for obstetricians?
Typical triggers include deploying or upgrading EHR, ultrasound/PACS, telehealth, or secure messaging; office moves or network changes; onboarding new vendors handling ePHI; mergers; significant staffing shifts; security incidents or vendor breaches; and launching new services like expanded prenatal genetics. Any meaningful change to how ePHI is created, stored, or transmitted should prompt a reassessment.
How often should obstetricians conduct HIPAA risk assessments?
HIPAA expects ongoing analysis and updates, not a one-time task. Many practices perform a comprehensive assessment annually and also conduct targeted reviews whenever triggers occur. The goal is to ensure risks remain at a reasonable and appropriate level as technology and workflows evolve.
What are the key components of a HIPAA remediation plan?
A strong plan lists prioritized risks with clear remediation recommendations, maps each action to administrative safeguards, technical safeguards, or physical safeguards, assigns owners and timelines, defines success criteria and evidence to collect, budgets resources, and records treatment decisions in the risk register until closure or justified acceptance.
How can obstetricians ensure ongoing HIPAA compliance?
Embed security into daily operations: maintain a current inventory and risk register, monitor alerts and audit logs, train staff regularly, enforce MFA and encryption, manage vendors and BAAs, test backups and incident response, perform periodic access reviews, and refresh your risk assessment on a defined cadence and when changes arise.
Table of Contents
Ready to assess your HIPAA security risks?
Join thousands of organizations that use Accountable to identify and fix their security gaps.
Take the Free Risk Assessment