HIPAA Risk Assessment for Oncologists: A Step-by-Step Checklist and Template for Compliance
Administrative Safeguards for Oncology Practices
A strong HIPAA program in oncology starts with clear governance, consistent policies, and complete documentation. Your Privacy and Security Officer designation centralizes accountability for oversight, decision-making, and reporting.
Establish written policies for access, minimum necessary use, sanctions, contingency planning, incident response, and vendor oversight. Maintain Business Associate Agreements with every service that handles PHI, including labs, imaging partners, billing, cloud EHRs, and transcription.
Document your HIPAA risk analysis and decisions, retain all records for at least six years, and schedule periodic reviews. Keep your Notice of Privacy Practices current, distribute it to patients, and capture acknowledgments where feasible.
Checklist
- Complete and document Privacy and Security Officer designation with roles, authority, and reporting lines.
- Inventory vendors and execute/refresh Business Associate Agreements; verify breach and subcontractor terms.
- Publish and enforce policies on access, minimum necessary, sanctions, incident handling, and contingency plans.
- Maintain a current Notice of Privacy Practices and patient acknowledgment workflow.
- Schedule risk analysis and policy reviews at least annually and upon significant changes.
- Track decisions, approvals, and evidence of control operation for audit readiness.
Oncology-specific considerations
- Define rules for communicating with caregivers and family, verifying consent before disclosures.
- Address research, tumor boards, and image/data sharing workflows with minimum necessary standards.
- Coordinate with infusion and radiation teams on access rights, downtime procedures, and after-hours use.
Implementing Physical Safeguards
Protect PHI wherever it is created, received, maintained, or transmitted. Control facility access to infusion areas, radiation suites, record rooms, and on-site servers while ensuring emergency access for patient safety.
Secure workstations and mobile carts; position screens away from public view and use privacy filters. Manage device and media controls for copiers, laptops, removable media, and decommissioned equipment with verified data destruction.
Checklist
- Use badge-based facility access, visitor logs, and escort rules for restricted zones.
- Lock record rooms and server closets; maintain environmental and power protections.
- Harden workstations: auto-lock screens, cable-lock kiosks, and apply privacy filters where needed.
- Implement chain-of-custody and certified destruction for drives, printers, and backup media.
- Separate patient check-in areas from clinical workstations to reduce incidental disclosures.
Applying Technical Safeguards
Enforce unique user IDs, role-based access, and multi-factor authentication for EHR, PACS, and radiation oncology systems. Apply encryption and password protection across endpoints and servers, with automatic session timeouts and secure remote access.
Enable EHR audit logs and configure alerts for anomalous access, high-volume exports, or snooping. Validate data integrity with change controls, backups, and tested restores; secure transmissions using TLS and encrypted messaging.
Checklist
- Require strong passwords, MFA, and automatic logoff on all clinical and administrative systems.
- Encrypt data at rest and in transit; manage keys securely and monitor for encryption failures.
- Centralize EHR audit logs, SIEM alerts, and regular reviews with documented follow-up.
- Segment networks for medical devices; restrict admin privileges and use application allowlists.
- Enroll mobile devices in MDM; disable local storage of PHI and enforce remote wipe.
Operational standards
- Audit review cadence: daily for high-risk alerts, weekly for summary reports, monthly for trend analysis.
- Access recertification: quarterly for privileged users, semiannually for standard users.
- Backup testing: quarterly restore tests and annual disaster recovery exercises.
Conducting Risk Assessment Process
A HIPAA risk assessment identifies where PHI resides, who can access it, and how threats could exploit vulnerabilities. You evaluate likelihood and impact, rate risks, and select reasonable and appropriate controls.
Ready to assess your HIPAA security risks?
Join thousands of organizations that use Accountable to identify and fix their security gaps.
Take the Free Risk AssessmentStep-by-step process
- Define scope: systems, locations, data types, users, and third parties touching PHI.
- Map data flows from intake and referrals to imaging, treatment, billing, and patient communications.
- Identify threats and vulnerabilities, including human error, malware, device loss, and misconfiguration.
- Assess existing controls and detect gaps; consider operational, technical, and physical layers.
- Score likelihood and impact; assign a risk level and rationale for each scenario.
- Document findings, recommended safeguards, and residual risk after mitigation.
- Obtain leadership approval and set review dates and triggers for reassessment.
Risk assessment checklist
- Complete asset and vendor inventories with PHI classification.
- Validate access rights and emergency access procedures.
- Test backups, restores, and downtime workflows for critical treatments.
- Evaluate incident detection, EHR audit logs coverage, and alerting quality.
- Confirm encryption and password protection policies across all devices and systems.
Template
Risk ID Asset/Process Threat/Vulnerability Likelihood Impact Risk Level Recommended Safeguards Owner Due Date Residual Risk Evidence R-001 EHR access Unauthorized viewing; weak password Medium High High MFA, password policy, monitoring IT Security 2026-06-30 Low Audit logs, screenshotsScoring guide
- Likelihood: Low/Medium/High based on history, exposure, and control strength.
- Impact: Low/Medium/High based on volume of PHI, patient safety, cost, and legal impact.
- Risk Level: Matrix of likelihood × impact with documented rationale.
Developing Risk Management Plans
Translate assessment results into prioritized actions with clear owners, deadlines, and acceptance criteria. Focus first on high-impact, high-likelihood risks and quick wins that materially reduce exposure.
Build a remediation roadmap, update policies, and implement controls such as encryption, access changes, and monitoring. Maintain risk remediation tracking to show progress, validate effectiveness, and support audits.
Checklist
- Prioritize and fund high-risk items; define milestones and success metrics.
- Assign owners and due dates; require evidence of completion and control testing.
- Decide on mitigation, transfer, acceptance, or avoidance with documented approvals.
- Update Business Associate Agreements or vendor controls when risks involve third parties.
- Integrate actions into change management and communicate impacts to clinical teams.
Risk Remediation Tracking
Risk ID Mitigation Task Owner Target Date Status Validation/Evidence Notes R-001 Enable MFA for all remote access IT 2026-05-15 In Progress MFA logs, user list Phase rollout by clinicEnsuring Breach Notification and Response
Your breach response plan should define how you detect, contain, investigate, and notify. Activate incident command, preserve evidence, and assess the four breach risk factors to determine if notification is required.
When notification is required, inform affected individuals without unreasonable delay and no later than 60 days after discovery. Notify HHS and, for incidents affecting 500 or more individuals in a state or jurisdiction, the media. Coordinate with business associates per contract terms.
Checklist
- Maintain a current breach response plan with roles, call trees, and decision criteria.
- Document investigation steps, systems affected, and PHI involved; preserve logs and images.
- Use standardized patient letters and FAQs; stand up a hotline and monitor complaints.
- Submit required notifications to regulators within timelines; track proof of submission.
- Perform post-incident reviews and update controls, training, and Business Associate Agreements.
Four-factor assessment
- Nature and extent of PHI involved.
- Unauthorized person who used or received the PHI.
- Whether PHI was actually acquired or viewed.
- Extent to which the risk has been mitigated.
Training and Educating Oncology Staff
Deliver role-based training at hire and at least annually, with refreshers after incidents or major changes. Emphasize minimum necessary use, secure caregiver communications, and verification before disclosures.
Reinforce secure handling of schedules, treatment plans, images, and patient portals. Include phishing simulations, secure texting, device hygiene, and downtime drills aligned to infusion and radiation workflows.
Checklist
- Publish training plans, objectives, and completion targets for all roles.
- Use scenario-based modules for caregiver conversations, tumor boards, and remote consults.
- Track attestations, knowledge checks, and remediation for low scores.
- Update content after risk assessments, incidents, or technology changes.
Summary
By aligning administrative, physical, and technical safeguards with a rigorous risk assessment, you create a defensible HIPAA program. Use the provided template and risk remediation tracking to drive measurable progress, and keep your breach response plan and training current to sustain compliance.
FAQs
What are the key components of a HIPAA risk assessment for oncologists?
Define scope and data flows, inventory systems and vendors, evaluate threats and vulnerabilities, review existing controls, score likelihood and impact, document risks and safeguards, obtain approvals, and schedule follow-ups. Embed oncology-specific scenarios like caregiver communications, imaging exchange, and treatment coordination.
How often should oncologists conduct HIPAA risk assessments?
Perform a full assessment at least annually and after major changes such as EHR upgrades, new sites, vendor onboarding, or incidents. Review risk status quarterly to confirm progress, validate controls, and reprioritize actions.
What measures ensure compliance with HIPAA technical safeguards?
Implement MFA, strong passwords, automatic logoff, and encryption and password protection on all systems. Centralize EHR audit logs with alerting, apply network segmentation for medical devices, manage endpoints with MDM, and test backups and restores regularly.
How should oncologists respond to a HIPAA breach?
Activate your breach response plan, contain and investigate, document the four risk factors, and determine notification needs. Notify affected individuals without unreasonable delay and no later than 60 days, alert regulators as required, provide clear patient communications, and complete a post-incident review with corrective actions.
Ready to assess your HIPAA security risks?
Join thousands of organizations that use Accountable to identify and fix their security gaps.
Take the Free Risk Assessment