How to Comply with the HIPAA Omnibus Rule: Best Practices
The HIPAA Omnibus Rule strengthens HIPAA Privacy, Security, and Breach Notification requirements and extends direct liability to business associates and their subcontractors. To achieve HIPAA Privacy Rule compliance and protect protected health information (PHI), you need a repeatable program that blends governance, security engineering, vendor oversight, and culture.
This guide outlines practical steps you can operationalize now. It integrates Business Associate Agreements, Protected Health Information safeguards, Breach Notification Requirements, Genetic Information Nondiscrimination Act (GINA) provisions, and penalty enforcement guidelines so you can build a resilient, auditable compliance posture.
Conduct Regular Self-Audits and Risk Assessments
Plan and scope your assessments
Map where PHI and ePHI are created, received, maintained, or transmitted. Include clinical systems, cloud apps, data lakes, medical devices, endpoints, and subcontractors. Define audit criteria across privacy, security, and breach notification standards.
Perform a Security Risk Analysis and risk management
Identify reasonably anticipated threats and vulnerabilities, evaluate likelihood and impact, and document existing controls. Prioritize risks, assign owners, and decide to remediate, mitigate, or accept with justification. Keep a living risk register tied to business objectives.
Test controls continuously
Use configuration reviews, vulnerability scans, penetration tests, and phishing simulations to validate safeguards. Sample logs and access rights for least-privilege enforcement. Reassess after major changes, mergers, new systems, or incidents.
Audit privacy practices
Verify minimum necessary use, right-of-access workflows, and restrictions such as GINA’s underwriting prohibitions. Confirm that disclosures, authorizations, and notices of privacy practices reflect current operations and state overlay requirements.
Develop Remediation Plans
Build corrective and preventive actions (CAPA)
For each finding, define the root cause, corrective step, preventive control, owner, resources, target date, and success metric. Sequence quick wins (e.g., disabling dormant accounts) alongside structural fixes (e.g., identity governance or data loss prevention).
Track to closure
Use a centralized register to monitor status, document evidence, and capture residual risk. Escalate overdue items and revisit priorities based on current threats and operational impact.
Align with penalty enforcement guidelines
Document good-faith efforts, timely remediation, and cooperation. These factors influence enforcement discretion and can mitigate exposure under tiered penalty enforcement guidelines.
Maintain Comprehensive Documentation
What to document
- Policies and procedures for privacy, security, and breach notification.
- Security Risk Analysis, risk register, and risk management plans.
- Business Associate Agreements and subcontractor flow-downs.
- Training curricula, attendance records, and sanction actions.
- Access management logs, audit logs, and change records.
- Incident and breach logs, investigation reports, and notifications.
- Data retention, disposal records, and device/media tracking.
Retention and version control
Maintain documents for required retention periods and preserve prior versions when you update policies. Use clear versioning, approval dates, and owners to prove governance maturity during reviews.
Privacy content updates
Incorporate GINA prohibitions on using genetic information for underwriting, marketing and sale-of-PHI restrictions, fundraising limits, and right-of-access procedures. Ensure your notices and forms match operations and are consistently applied.
Ready to simplify HIPAA compliance?
Join thousands of organizations that trust Accountable to manage their compliance needs.
Implement Administrative Physical and Technical Safeguards
Administrative safeguards
- Governance: risk management, assigned security responsibility, and workforce security.
- Access: role-based access, unique IDs, and minimum necessary standards.
- Contingency planning: backups, disaster recovery, and emergency mode operations.
- Vendor oversight: due diligence, BAAs, risk tiering, and monitoring.
- Sanctions and workforce management: enforceable policies and corrective actions.
Physical safeguards
- Facility access controls, visitor management, and environmental protections.
- Workstation security for clinical areas and telework locations.
- Device and media controls: inventory, encryption, reuse/return, and secure disposal.
Technical safeguards
- Access controls: multi-factor authentication, automatic logoff, and session timeouts.
- Encryption for data in transit and at rest, including mobile devices and backups.
- Audit controls and monitoring: centralized logging, anomaly detection, and alerting.
- Integrity and transmission security: hashing, TLS, secure APIs, and email safeguards.
- Data loss prevention and endpoint protection to reinforce protected health information safeguards.
Manage Business Associate Relationships
Identify, vet, and contract
Catalog all vendors and subcontractors that create, receive, maintain, or transmit PHI. Perform risk-based due diligence and execute Business Associate Agreements that define permitted uses, safeguards, breach notification requirements, and downstream obligations.
Monitor and enforce
Tier suppliers by risk, require security attestations or assessments, and set incident reporting protocols. Reserve audit rights, mandate timely notifications, and define data return or destruction at termination.
Provide Employee Training
Build role-based, scenario-driven learning
Deliver onboarding and periodic refreshers tailored to job functions. Cover privacy basics, minimum necessary, secure messaging, phishing awareness, device hygiene, and reporting obligations. Update training when laws, systems, or processes change.
Measure effectiveness
Use quizzes, simulations, and KPI tracking to verify comprehension. Document attendance, results, and remedial steps. Reinforce expectations with a fair, consistently applied sanction policy.
Establish Incident Management Protocols
Prepare and detect
Create an incident response plan that defines roles, severity levels, decision trees, and communication channels. Instrument systems for detection with logs, alerts, and user reporting routes that are easy to use and well publicized.
Triage, contain, and investigate
Stabilize affected systems, preserve evidence, and analyze scope and root cause. Coordinate with legal, privacy, security, and leadership to decide whether the event constitutes a reportable breach under Breach Notification Requirements.
Perform breach risk assessment
Evaluate the nature and extent of PHI, the unauthorized person or recipient, whether the PHI was actually viewed or acquired, and mitigation actions taken. Document rationale and keep supporting evidence for audits.
Notify and remediate
When notification is required, inform individuals and other parties promptly and within applicable timelines. Include a plain-language description, types of information involved, recommended protective steps, what you are doing to mitigate harm, and contact information.
Improve and test
Conduct post-incident reviews, update controls, and track corrective actions. Rehearse the plan with tabletop exercises to validate your incident reporting protocols and readiness.
Conclusion
Compliance with the HIPAA Omnibus Rule is an ongoing program: assess risk, remediate gaps, document thoroughly, harden safeguards, manage vendors, train your workforce, and respond decisively to incidents. Repeat these cycles and you will measurably reduce risk and demonstrate accountability.
FAQs.
What are the key requirements of the HIPAA Omnibus Rule?
The rule expands direct liability to business associates and their subcontractors, strengthens breach notification by requiring a documented risk assessment for potential compromises, updates privacy provisions (including GINA’s prohibition on using genetic information for underwriting), tightens marketing and sale-of-PHI limits, and requires updated notices and Business Associate Agreements that reflect these obligations.
How often should risk assessments be conducted for compliance?
Perform a comprehensive Security Risk Analysis at least annually and whenever significant changes occur—such as new systems, mergers, or major process shifts. Supplement with ongoing monitoring, targeted mini-assessments, and reviews after incidents or major vulnerabilities are discovered.
What are the penalties for non-compliance with the HIPAA Omnibus Rule?
Penalties are tiered based on culpability, ranging from reasonable-cause violations to willful neglect, with escalating fines and potential corrective action plans or monitoring. Aggravating and mitigating factors in the penalty enforcement guidelines—such as scope, harm, history, and cooperation—affect outcomes; severe or willful violations can trigger substantial financial and reputational impact.
How should organizations handle breaches under the Omnibus Rule?
Activate your incident response plan, contain the event, and conduct a formal risk assessment that considers the nature of PHI, the unauthorized party, whether data was actually viewed or acquired, and mitigation steps. If a breach is confirmed, provide required notifications within applicable timelines, maintain detailed documentation, and implement corrective actions to prevent recurrence.
Table of Contents
Ready to simplify HIPAA compliance?
Join thousands of organizations that trust Accountable to manage their compliance needs.