HITECH Act Checklist: Safeguards, Risk Assessments, and Documentation Best Practices

Check out the new compliance progress tracker


Product Pricing Demo Video Free HIPAA Training
LATEST
video thumbnail
Admin Dashboard Walkthrough Jake guides you step-by-step through the process of achieving HIPAA compliance
Ready to get started? Book a demo with our team
Talk to an expert

HITECH Act Checklist: Safeguards, Risk Assessments, and Documentation Best Practices

Kevin Henry

Risk Management

July 28, 2024

6 minutes read
Share this article
HITECH Act Checklist: Safeguards, Risk Assessments, and Documentation Best Practices

Risk Assessment Process

Start with a current, end‑to‑end inventory of systems, users, vendors, and data flows that create, receive, maintain, or transmit electronic protected health information (ePHI). Map where ePHI is stored, how it moves, and who can access it, including cloud apps and mobile endpoints.

Identify reasonably anticipated threats and vulnerabilities for each asset and workflow. Evaluate likelihood and impact to determine inherent risk, then map existing controls to the HIPAA Security Rule’s administrative, physical, and technical safeguards to calculate residual risk.

Prioritize remediation using a risk management framework. Create a risk register that lists owners, due dates, required controls, and expected risk reduction. Produce an executive summary that explains methodology, top risks, and funding or staffing needs.

Reassess at least annually and whenever you introduce major changes—such as a new EHR module, telehealth workflows, cloud migrations, mergers, or vendor additions. Keep evidence: data flow diagrams, interview notes, scoring worksheets, and the final report.

Safeguards Implementation

Administrative safeguards

  • Establish governance: name a Security Officer, define decision rights, and run a recurring compliance committee.
  • Publish policies and procedures that align to the HIPAA Security Rule, including access management, incident response, contingency planning, and sanctions.
  • Complete and enforce Business Associate Agreements (BAAs) with all vendors handling ePHI; include breach reporting timelines, minimum security requirements, right to audit, subcontractor flow‑down, and termination data‑return provisions.
  • Apply workforce security: background checks where appropriate, role‑based access, termination checklists, and periodic access reviews.
  • Embed risk management into procurement, change management, and project lifecycles.

Technical safeguards

  • Access control: unique user IDs, least privilege, multi‑factor authentication for all remote and privileged access, and automated account provisioning/deprovisioning.
  • Encryption standards: encrypt ePHI in transit (e.g., TLS 1.2/1.3) and at rest (e.g., AES‑256), with centralized key management and, where feasible, FIPS‑validated cryptographic modules.
  • Audit controls: centralize logs, retain them to meet policy, and monitor with alerting for anomalous activity.
  • Integrity and transmission security: secure messaging, hashing where appropriate, email protection, and MDM for mobile devices with remote wipe.
  • Endpoint and network protections: EDR/antivirus, vulnerability management, patching SLAs, network segmentation, and zero‑trust principles.

Physical safeguards

  • Facility access controls: badge systems, visitor logs, and server room restrictions.
  • Workstation security: privacy screens in clinical areas and automatic session locks.
  • Device and media controls: asset tracking, secure storage, validated disposal, and media reuse procedures.

Documentation Practices

Maintain a centralized, access‑controlled repository for policies, procedures, standards, and evidence. Use version control, document owners, and scheduled reviews so you can prove what was in effect on a given date and who approved it.

Capture artifacts that demonstrate operation of controls: risk assessment reports, the risk register and remediation plans, system inventories and data maps, BAAs, training rosters and scores, incident and breach logs, access certifications, change tickets, contingency plan tests, and backup/restore records.

Adopt clear naming conventions, indexes, and retention schedules (commonly six years for HIPAA documentation). Include quick‑reference runbooks and checklists to ensure staff apply procedures consistently in daily operations and audits.

Training and Awareness

Deliver onboarding and annual security and privacy training tailored to roles. Reinforce key practices for handling electronic protected health information, such as minimum necessary use, secure messaging, device safeguards, and timely incident reporting.

Offer role‑based modules for IT admins, clinicians, remote staff, and executives. Run phishing simulations, just‑in‑time reminders inside workflows, and targeted refreshers after policy changes or incidents. Track completion, test comprehension, and remediate non‑completion promptly.

Ready to assess your HIPAA security risks?

Join thousands of organizations that use Accountable to identify and fix their security gaps.

Take the Free Risk Assessment

Incident Response Plan

Document a step‑by‑step plan: preparation, detection and analysis, containment, eradication, recovery, and post‑incident review. Define severity levels, decision trees, communication channels, and on‑call roles across IT, privacy, legal, compliance, and leadership.

Use a standard breach risk assessment to determine if an incident is a reportable breach of unsecured ePHI. Consider the nature and extent of data involved, the unauthorized person who used or received the data, whether ePHI was actually viewed or acquired, and the extent of mitigation.

Meet data breach notification obligations: start the clock at discovery, coordinate with Business Associate Agreements for upstream/downstream notifications, and issue notices without unreasonable delay and no later than 60 days when notification is required. For large breaches, prepare media statements and required regulatory submissions. Maintain evidence, timelines, containment steps, and lessons learned.

Continuous Monitoring

Implement ongoing control monitoring instead of point‑in‑time checks. Review logs and alerts via SIEM, run routine vulnerability scans, track patch cycles, and monitor configuration baselines and cloud posture to verify encryption and access settings remain enforced.

Perform periodic user access recertifications, especially for privileged and dormant accounts. Validate backups with test restores, and schedule tabletop exercises for incident response and contingency plans. Re‑evaluate vendors annually and refresh BAAs when services or data flows change.

Use dashboards with KPIs and KRIs—such as time to patch, percent of MFA coverage, number of high‑risk findings open, and training completion rates—to drive accountability and update the risk register.

Corrective Actions and Compliance Maintenance

When gaps arise, open a corrective and preventive action (CAPA). Define the problem, perform root cause analysis, assign owners, set due dates, and document verification of effectiveness. Feed results back into your risk management framework and project pipeline.

Keep policies, standards, and procedures aligned with the HIPAA Security Rule and operational reality. Update them after technology changes, new threats, or audit findings, and follow up with targeted training and communications to close knowledge gaps.

Maintain governance with a recurring compliance committee that reviews metrics, risk posture, incidents, vendor performance, and funding needs. Record decisions and evidence to demonstrate due diligence during audits or investigations.

Summary

This HITECH Act checklist centers on disciplined risk assessments, right‑sized safeguards, strong documentation, informed people, practiced incident response, continuous monitoring, and timely corrective actions. Execute these elements consistently to protect ePHI, meet data breach notification duties, and sustain compliance.

FAQs

What are the key safeguards required by the HITECH Act?

You must implement administrative safeguards (governance, policies, workforce controls), physical safeguards (facility, workstation, and device/media protections), and technical safeguards (access control, encryption standards, audit and integrity controls). Together, these align with the HIPAA Security Rule and are supported by BAAs and continuous monitoring.

How often should risk assessments be conducted under HITECH?

Conduct a comprehensive risk assessment at least annually and whenever material changes occur—such as new systems, major workflow shifts, vendor additions, or cloud migrations. Update the risk register and remediation plan immediately after each assessment.

What documentation is necessary for HITECH compliance?

Maintain current policies and procedures, risk assessment reports, the risk management framework and register, Business Associate Agreements, training records, incident and breach logs, access reviews, change management evidence, contingency plan tests, and backup/restore documentation, with version control and defined retention.

How does the HITECH Act support breach notification requirements?

HITECH establishes data breach notification duties for unsecured ePHI. After discovery, assess risk, contain the incident, and notify affected individuals, regulators, and—when applicable—the media without unreasonable delay and no later than 60 days, coordinating obligations and timelines specified in your BAAs.

Share this article

Ready to assess your HIPAA security risks?

Join thousands of organizations that use Accountable to identify and fix their security gaps.

Take the Free Risk Assessment

Related Articles