Hospice Vendor Security Assessment Guide: Checklist, Questions, and HIPAA Requirements
HIPAA Compliance for Healthcare Vendors
Hospice programs rely on outside partners for EHRs, billing, communications, DME logistics, and in-home technology. The moment a vendor creates, receives, maintains, or transmits Protected Health Information (PHI), it becomes a HIPAA Business Associate and must sign Business Associate Agreements (BAAs) before any data exchange.
BAAs should specify permitted uses of PHI, required safeguards, reporting duties for incidents and breaches, Breach Notification Timelines, and Subcontractor Compliance terms mirroring the same restrictions downstream. Vendors must implement administrative, technical, and physical controls aligned to the HIPAA Security Rule while supporting the hospice’s Privacy Rule obligations.
Core HIPAA pillars for vendors
- Privacy Rule: limit PHI use/disclosure to the minimum necessary and support patient rights.
- Security Rule: implement risk-based administrative, technical, and physical safeguards for ePHI.
- Breach Notification Rule: follow defined assessment steps and timelines for notifying the hospice, individuals, regulators, and in some cases the media.
What PHI looks like in hospice operations
Common hospice PHI includes diagnoses, medication profiles, care plans, hospice eligibility documents, caregiver contact details, financial information, and visit notes. Voice messages, images, and telemetry from remote devices also count if they can identify a person.
Shared responsibility model
The hospice (covered entity) governs data purpose, consent, and disclosure decisions. The vendor (business associate) must protect PHI within its environment, maintain Audit Controls, and report incidents quickly. Both parties coordinate Incident Response Plans and ensure subcontractors commit to equivalent protections.
Vendor Security Assessment Checklist
Use this sequence to evaluate any current or prospective vendor that touches hospice PHI.
- Define PHI data flows: what is collected, where it travels, where it rests, and retention/archival practices.
- Confirm a signed BAA with clear roles, permitted uses, Subcontractor Compliance, and Breach Notification Timelines.
- Review security governance: named security/privacy officers, policy set, risk management program, and annual reviews.
- Examine risk analysis and risk treatment plans with evidence of remediation tracking.
- Validate identity and access management: least privilege, role-based access, MFA, SSO, joiner-mover-leaver controls.
- Verify Data Encryption Standards: strong encryption at rest (for example, AES-256) and in transit (TLS 1.2+), plus key management and rotation.
- Evaluate logging and Audit Controls: centralized logs, time sync, retention, and alerting for anomalous access.
- Check secure SDLC: code reviews, dependency scanning, SAST/DAST, and vulnerability management with SLAs.
- Assess endpoint and network security: EDR, configuration baselines, patch cadence, segmentation, and backups.
- Confirm Incident Response Plans with on-call escalation, tabletop testing, and forensics readiness.
- Review contingency planning: disaster recovery RTO/RPO, backup encryption, and restoration tests.
- Look at privacy controls: data minimization, de-identification where feasible, and approved data sharing paths.
- Require evidence: recent pen test summary, SOC 2/HITRUST/ISO reports, training completion rates, and policy index.
- Set ongoing monitoring: security scorecards, periodic attestations, and renewal checkpoints tied to contract terms.
Key questions to ask vendors
- Which PHI elements do you handle, and can you map them to each system and subprocessor?
- What Data Encryption Standards protect data at rest and in transit, and how are keys stored and rotated?
- How do you enforce least-privilege access and monitor privileged activity across environments?
- What Audit Controls exist, how long are logs retained, and who reviews alerts?
- Describe your Incident Response Plans, including 24/7 escalation, forensics partners, and testing frequency.
- What are your contractual Breach Notification Timelines to the hospice, and what details are included in notices?
- How do you ensure Subcontractor Compliance, and how often do you reassess them?
- What are your RTO/RPO targets, and when was the last successful failover or restore test?
- How do you segregate customer data, and what is your data lifecycle (collection, retention, deletion)?
- Which independent assessments (e.g., SOC 2 Type II, ISO 27001, HITRUST) cover the in-scope services?
Administrative Safeguards
Risk analysis and risk management
Conduct a documented risk analysis covering systems, data flows, threats, vulnerabilities, and controls. Maintain a living risk register with owners, due dates, and acceptance/mitigation decisions, and review it at least annually.
Governance, policies, and training
Appoint security and privacy leaders, publish policies (access, encryption, incident response, change control), and require HIPAA training for all workforce members with role-based add-ons. Enforce a sanction policy for violations and track training completion.
Access management and minimum necessary
Implement role-based access control, periodic access recertifications, and rapid termination for offboarding. Limit PHI exposure in support workflows and require break-glass approvals for emergency access.
Contingency and Incident Response Plans
Document backup, disaster recovery, and business continuity plans with defined RTO/RPO. Test restores and run tabletop exercises that simulate hospice-specific scenarios like after-hours home visit data loss.
Vendor and subcontractor oversight
Inventory all third parties handling PHI, extend BAA terms to subcontractors, and evaluate them with proportionate due diligence. Require prompt reporting of incidents, material changes, and control degradations.
Technical Safeguards
Identity, authentication, and session security
Enforce unique user IDs, MFA everywhere feasible, and SSO with conditional access. Configure automatic logoff and session timeouts, and manage service accounts with vaulted secrets and rotation.
Encryption and key management
Apply Data Encryption Standards such as AES-256 for data at rest and TLS 1.2+ or 1.3 for data in transit. Store keys in managed KMS or HSMs, separate duties for key custodians, and rotate keys on a defined cadence.
Network, endpoint, and application security
Use segmentation, firewalls, and EDR to reduce blast radius. Patch operating systems and applications on SLAs matched to severity, and scan continuously for vulnerabilities. Embed security in the SDLC with SAST/DAST, supply chain scanning, secure APIs, and secrets detection.
Audit Controls and monitoring
Centralize logs in a SIEM, ensure time synchronization, and alert on anomalous activity such as mass exports, failed MFA, or off-hours access. Retain logs long enough to support investigations and regulatory expectations.
Data integrity, transmission security, and privacy by design
Use hashing, checksums, and database protections to detect tampering. Secure email and messaging with strong transport encryption and approved channels, and minimize PHI fields in routine communications.
Ready to assess your HIPAA security risks?
Join thousands of organizations that use Accountable to identify and fix their security gaps.
Take the Free Risk AssessmentPhysical Safeguards
Facility access and environmental controls
Restrict data center and office access with badges, visitor logs, and surveillance. Protect server rooms with temperature, fire suppression, and power continuity monitoring.
Workstation and device security
Lock screens automatically, enable full-disk encryption, and require privacy screens in shared spaces. Apply mobile device management for remote wipe, configuration, and application control.
Device and media controls
Track assets from acquisition through disposal with chain-of-custody. Sanitize or destroy media using approved methods, validate before reuse, and document the process for audits.
Breach Notification Procedures
Detection, triage, and containment
Define how alerts are received, who validates them, and how to isolate affected systems. Preserve volatile evidence and escalate to the hospice contact listed in the BAA.
Risk assessment
Assess the nature of PHI involved, who accessed it, whether it was actually viewed or acquired, and how risks were mitigated. Use this assessment to decide whether notification is required.
Notification and timelines
Business associates must notify the hospice without unreasonable delay and no later than 60 calendar days after discovery; BAAs often require much shorter windows (for example, 24–72 hours). Covered entities notify affected individuals without unreasonable delay and within 60 days; for incidents affecting 500 or more residents of a state or jurisdiction, additional regulator and media notices may be required. Maintain evidence and message templates to meet Breach Notification Timelines.
Recovery and post-incident improvements
Eradicate root causes, restore services, and monitor for recurrence. Document lessons learned, update controls and Incident Response Plans, and brief stakeholders on remediation.
Compliance Certifications
There is no official government-issued “HIPAA certification.” Instead, vendors demonstrate maturity through independent assessments mapped to HIPAA safeguards. Certifications do not replace BAAs or risk analysis, but they provide assurance about control design and operation.
- HITRUST CSF: comprehensive, healthcare-focused framework mapping to HIPAA requirements.
- SOC 2 Type II: independent attestation over security, availability, and confidentiality with HIPAA mappings.
- ISO/IEC 27001 and 27701: information security and privacy management systems supporting HIPAA-aligned controls.
- Complementary evidence: recent pen test summaries, vulnerability metrics, IR test reports, and workforce training rates.
Evidence to request
- Attestation letters and report summaries with scope, dates, and exceptions.
- Policy index, data flow diagrams, and architecture overviews showing PHI boundaries.
- Backup/restore and disaster recovery test results with RTO/RPO performance.
- Audit Controls evidence: log retention configuration, alert runbooks, and sample investigations.
Summary
A strong hospice vendor assessment pairs a clear BAA with rigorous safeguards, verifiable controls, and practiced Incident Response Plans. Use the checklist and questions to validate Data Encryption Standards, access controls, logging, and Subcontractor Compliance, and require independent attestations to sustain trust.
FAQs
What are the key HIPAA requirements for hospice vendors?
Vendors that touch PHI must sign Business Associate Agreements, complete risk analysis, and implement administrative, technical, and physical controls. They must maintain Audit Controls, use strong encryption, train staff, limit access by role, and follow defined Breach Notification Timelines and procedures.
How should vendors manage subcontractor security compliance?
Extend the BAA’s restrictions to all subcontractors that handle PHI, verify their controls through due diligence, and reassess them periodically. Require prompt incident reporting, minimum Data Encryption Standards, and alignment with your Incident Response Plans.
What protocols are essential for secure PHI transmission?
Use TLS 1.2 or 1.3 for data in transit, with modern ciphers and certificate management. Prefer mutually authenticated APIs, enforce MFA for portals, and avoid unapproved channels for PHI; if email must be used, enable transport encryption and minimize PHI content.
What is the timeline for breach notification?
HIPAA requires notification without unreasonable delay and no later than 60 calendar days after discovery. BAAs often set stricter timelines for business associates to notify the hospice (for example, 24–72 hours) so the hospice can meet its obligations to individuals and regulators.
Ready to assess your HIPAA security risks?
Join thousands of organizations that use Accountable to identify and fix their security gaps.
Take the Free Risk Assessment