HIPAA Security for Nonprofit Healthcare Organizations: Practical Compliance Guide & Checklist

Product Pricing
Ready to get started? Book a demo with our team
Talk to an expert

HIPAA Security for Nonprofit Healthcare Organizations: Practical Compliance Guide & Checklist

Kevin Henry

HIPAA

October 25, 2025

8 minutes read
Share this article
HIPAA Security for Nonprofit Healthcare Organizations: Practical Compliance Guide & Checklist

Nonprofits handle sensitive clinical and social services data every day. This practical guide shows you how to build HIPAA Security for Nonprofit Healthcare Organizations into daily operations, using clear steps, concise checklists, and safeguards that fit limited budgets and staff capacity.

HIPAA Applicability to Nonprofits

HIPAA applies based on what you do, not whether you are a nonprofit. If you provide healthcare services, bill electronically, or process claims data, you likely operate as a Covered Entity. If you create, receive, maintain, or transmit Protected Health Information (PHI) for another organization, you may be a Business Associate and must meet HIPAA obligations through a Business Associate Agreement (BAA).

Determine your role

  • Map services: clinical care, behavioral health, care coordination, telehealth, or billing support.
  • Identify data flows: who creates, receives, maintains, or transmits PHI or ePHI.
  • Decide status: Covered Entity, Business Associate, or hybrid entity (only certain units handle PHI).
  • Document decisions and rationale for auditors and funders.

Applicability checklist

  • List systems holding PHI (EHR, case management, email, file shares, mobile devices).
  • Record integrations (labs, HIEs, clearinghouses, telehealth platforms).
  • Catalog vendors touching ePHI and confirm BAAs are executed before data exchange.
  • Define workforce: employees, volunteers, interns, board members with access to PHI.

Privacy and Security Measures

HIPAA sets complementary expectations: the Privacy Rule governs when PHI may be used or disclosed, and the Security Rule requires protections for electronic PHI. Your nonprofit needs both: policy boundaries for sharing data and technical/operational controls to keep that data safe.

Core practices you should implement

  • Minimum necessary: limit access and disclosures to the least amount of PHI needed for a task.
  • Role-based access: grant permissions by job role and review at least quarterly.
  • Individual rights: processes for access, amendments, and accounting of disclosures.
  • Notice of privacy practices: publish, distribute where applicable, and keep versions on file.
  • Secure communications: use encrypted messaging and approved channels for telehealth and email.

Quick-start security checklist

  • Enable multifactor authentication (MFA) on EHR, email, VPN, and cloud tools.
  • Encrypt devices at rest and enforce automatic screen locks.
  • Use least-privilege permissions and unique user IDs for accountability.
  • Turn on audit logging and review alerts for anomalous access.
  • Maintain incident response and breach notification procedures with clear roles.

Protected Health Information Management

Protected Health Information includes any individually identifiable health data linked to a person (name, contact, ID numbers) and their health status, care, or payment. ePHI is PHI in electronic form, which triggers Security Rule safeguards.

Data classification and mapping

  • Inventory PHI elements you collect, store, and transmit across programs and systems.
  • Tag locations of PHI (databases, shared drives, email, mobile apps) to prioritize controls.
  • Differentiate PHI from de-identified data; restrict re-identification capability.

Use, disclosure, and minimization

  • Define permitted uses and disclosures in policy and workflows.
  • Apply minimum necessary rules to internal reports and exports.
  • Standardize consent processes for special categories where required by law.

Practical controls

  • Data loss prevention for outbound email and cloud sharing.
  • Template-based data sharing agreements for research or program evaluation.
  • Access reviews when staff change roles or depart; immediately revoke credentials.

Retention Storage and Disposal

HIPAA requires you to retain HIPAA-related policies, procedures, and designated documentation for at least six years from creation or last effective date. Medical record retention periods can also be driven by state law, payer contracts, and funder requirements—set your schedule to meet the most stringent applicable rule.

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Retention planning

  • Publish a records retention schedule covering PHI, logs, backups, and HIPAA documentation.
  • Automate retention and disposition in EHRs and cloud storage where feasible.
  • Preserve litigation holds by suspending disposal for affected records.

Secure storage and backup

  • Encrypt PHI at rest and in transit; secure keys and restrict administrative access.
  • Maintain offsite, encrypted backups; test restorations regularly.
  • Segregate sensitive datasets and apply stricter access controls.

Disposal and media sanitization

  • Shred paper using cross-cut or better; protect bins until destruction.
  • Wipe or destroy drives and removable media using industry-accepted methods; document chain of custody.
  • Obtain certificates of destruction from vendors and retain them per your retention schedule.

Business Associates Compliance

Vendors that handle PHI on your behalf are Business Associates and must sign a Business Associate Agreement. A strong BAA allocates security duties, breach response, and subcontractor oversight, and requires safeguards consistent with the Security Rule.

Vendor lifecycle controls

  • Due diligence: assess security posture, SOC reports where available, and incident history.
  • BAA execution: ensure scope, permitted uses, safeguards, breach notification, and termination rights are explicit.
  • Onboarding: provision least-privilege access and confirm encryption/MFA are enabled.
  • Monitoring: review access logs, attestations, and penetration test summaries annually.
  • Offboarding: revoke credentials, require data return or certified destruction, and update your inventory.

BAA essentials checklist

  • Defines PHI/ePHI handled and permitted purposes.
  • Requires Administrative Safeguards, Physical Safeguards, and Technical Safeguards.
  • Commits to timely breach notification and cooperation in investigations.
  • Flows obligations down to subcontractors with written agreements.
  • Specifies return/destruction of PHI upon termination and ongoing confidentiality.

Security Rule Safeguards

The HIPAA Security Rule groups controls into Administrative Safeguards, Physical Safeguards, and Technical Safeguards. Your program should tie these to a documented Risk Analysis and continuous risk management cycle.

Administrative Safeguards

  • Risk Analysis: identify threats, vulnerabilities, likelihood, and impact across systems handling ePHI.
  • Risk management: select and implement controls; document “addressable” decisions and compensating measures.
  • Policies and procedures: access, device use, media handling, incident response, and sanctions.
  • Workforce security: background checks as appropriate, onboarding/offboarding, and role-based access.
  • Contingency planning: data backup, disaster recovery, and emergency-mode operations with tested drills.
  • Evaluation: periodic technical and non-technical assessments of compliance and effectiveness.

Physical Safeguards

  • Facility access controls: visitor logs, badges, and secured server/network closets.
  • Workstation security: privacy screens, auto-locks, and clean desk policies.
  • Device and media controls: inventory, secure transport, and validated disposal methods.

Technical Safeguards

  • Access control: unique IDs, MFA, and automatic logoff; use break-glass protocols only with logging.
  • Audit controls: centralized logging, alerting for unusual behavior, and periodic reviews.
  • Integrity controls: hashing, versioning, and change management for critical systems.
  • Transmission security: TLS for data in transit; SFTP or secure APIs for data exchange.
  • Encryption at rest: full-disk or field-level encryption; protect and rotate keys.

Practical controls checklist

  • Harden endpoints with EDR, automatic patching, and device encryption.
  • Segment networks; restrict administrative interfaces to trusted ranges or VPN.
  • Implement conditional access for unmanaged devices; block risky downloads.
  • Use secure configurations and disable legacy protocols in email and identity systems.

Training and Awareness

Staff and volunteers are your front line. Deliver role-specific training before PHI access and refresh it regularly or when policies change. Reinforce good habits with reminders, tabletop exercises, and phishing simulations grounded in your actual workflows.

Training plan

  • New-hire orientation: privacy basics, acceptable use, secure messaging, and reporting channels.
  • Annual refreshers: updates on policies, emerging threats, and lessons learned from incidents.
  • Role-based modules: front desk identity verification, clinician telehealth etiquette, IT admin logging.
  • Documentation: attendance, materials, dates, and effectiveness evaluations kept on file.

Culture and accountability

  • Make it easy to report suspected incidents without blame.
  • Apply sanctions consistently for policy violations.
  • Celebrate positive behaviors and share quick wins from audits or drills.

Conclusion

Effective HIPAA compliance for nonprofits comes from clear governance, a living Risk Analysis, and practical safeguards you can maintain. Focus on minimum necessary access, strong vendor BAAs, encryption and MFA everywhere, and steady training to keep PHI protected while supporting your mission.

FAQs.

What are the key HIPAA requirements for nonprofit healthcare organizations?

You must determine whether you are a Covered Entity or Business Associate, safeguard ePHI through Administrative Safeguards, Physical Safeguards, and Technical Safeguards, complete and maintain a Risk Analysis with ongoing risk management, execute and manage Business Associate Agreements for vendors, and retain required HIPAA documentation for at least six years. Build policies, train your workforce, monitor controls, and document everything.

How should nonprofits handle PHI securely?

Limit PHI access to the minimum necessary, enforce role-based permissions with MFA, encrypt data in transit and at rest, and log access for auditing. Use approved channels for telehealth and messaging, keep secure backups, and follow defined retention and disposal procedures. When sharing with partners, ensure a signed BAA and verify their safeguards.

What training is required for staff under HIPAA?

Provide training appropriate to each role before granting PHI access and whenever policies or systems change, with periodic refreshers thereafter. Cover privacy principles, acceptable use, secure communication, incident reporting, and specific workflows. Keep records of attendance, dates, and materials to demonstrate compliance.

How can nonprofits ensure compliance with Business Associate Agreements?

Perform vendor due diligence, execute a BAA that defines permitted uses of PHI and required safeguards, and flow obligations to subcontractors. Monitor vendors through access reviews, attestations, and security reports, and require prompt breach notification. At termination, revoke access and obtain proof of data return or destruction as specified in the agreement.

Share this article

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Related Articles