How to Conduct a HIPAA Risk Assessment for Healthcare Nonprofits

Product Pricing Demo Video Free HIPAA Training
LATEST
video thumbnail
Admin Dashboard Walkthrough Jake guides you step-by-step through the process of achieving HIPAA compliance
Ready to get started? Book a demo with our team
Talk to an expert

How to Conduct a HIPAA Risk Assessment for Healthcare Nonprofits

Kevin Henry

HIPAA

March 19, 2026

6 minutes read
Share this article
How to Conduct a HIPAA Risk Assessment for Healthcare Nonprofits

A disciplined HIPAA risk assessment helps healthcare nonprofits protect Protected Health Information (PHI), avoid costly incidents, and demonstrate compliance. This guide walks you through each step—mapping your environment, analyzing risks, and building a practical Risk Management Plan—so you can meet the HIPAA Security Rule’s Administrative, Technical, and Physical Safeguards with confidence.

Determine the Scope of Assessment

Start by defining exactly what PHI you handle and where it resides. Inventory data types (ePHI and paper), who uses them, how they flow across systems, and where they are stored, processed, and transmitted. Include EHRs, patient portals, email, billing, imaging, backups, cloud apps, and third-party services.

Map people, processes, and technology. List workforce roles, volunteers, and business associates that access PHI; capture workflows such as intake, referrals, telehealth, and revenue cycle. Note all locations—clinics, administrative offices, home offices, and mobile/remote work.

Set clear boundaries and assumptions. Decide the assessment period, depth, and methodology, and assign an accountable owner. Align the scope to the HIPAA Security Rule’s Administrative Safeguards (policies, training, access governance), Technical Safeguards (access controls, encryption, audit logs), and Physical Safeguards (facility and device protections).

Identify Threats and Vulnerabilities

List credible threats to PHI confidentiality, integrity, and availability. Common examples include phishing, ransomware, lost or stolen devices, insider misuse, misconfigurations, system failures, vendor breaches, natural disasters, and power or network outages.

For each asset, identify vulnerabilities attackers or accidents could exploit: weak passwords, missing multi-factor authentication (MFA), unpatched systems, excessive privileges, open ports, inadequate audit logging, misconfigured cloud storage, poor media disposal, unlocked areas, or insufficient visitor controls.

Pair threats with vulnerabilities to create analyzable scenarios (e.g., “phishing + untrained staff” or “stolen laptop + no full‑disk encryption”). Use a structured questionnaire or a Security Risk Assessment Tool to ensure comprehensive coverage and reduce blind spots.

Assess Existing Security Measures

Evaluate the design and operating effectiveness of current controls. Gather evidence—policies, system settings, screenshots, logs, contracts—to support Compliance Documentation and avoid subjective scoring.

Administrative Safeguards

  • Security and privacy policies, sanctions policy, and workforce security training cadence.
  • Role-based access control (RBAC), least privilege, onboarding/offboarding, periodic access reviews.
  • Vendor due diligence and Business Associate Agreements (BAAs), incident response and breach notification procedures, contingency planning.

Technical Safeguards

  • MFA, unique user IDs, strong authentication, session timeouts, and automatic logoff.
  • Encryption in transit and at rest, mobile device management (MDM), secure configuration baselines.
  • Audit logging, centralized monitoring, intrusion detection, email security, endpoint protection, timely patching.

Physical Safeguards

  • Facility access controls, visitor logs, locked network closets, surveillance where appropriate.
  • Workstation security, secure storage and disposal of media, cable locks for portable devices.
  • Environmental protections and power redundancy for critical systems.

Evaluate Likelihood and Impact of Risks

Rate each threat–vulnerability scenario for likelihood and impact using consistent criteria (e.g., low/medium/high or 1–5 scales). Consider exposure of PHI volume and sensitivity, potential patient safety implications, service disruption, regulatory penalties, and reputational harm.

Calculate inherent risk (before controls) and residual risk (after controls) to reveal where current measures still leave gaps. A simple model—Risk = Likelihood × Impact—keeps prioritization clear. Validate ratings with incident history, audit results, and industry trends to improve objectivity.

Ready to assess your HIPAA security risks?

Join thousands of organizations that use Accountable to identify and fix their security gaps.

Take the Free Risk Assessment

Develop a Risk Management Plan

Translate prioritized risks into a concrete Risk Management Plan with actions, owners, deadlines, and budgets. Choose the appropriate treatment strategy for each risk: mitigate, transfer (e.g., cyber insurance), avoid (change the process), or accept with documented justification.

High-Value Mitigations to Consider

  • Administrative: refresh security awareness training, tighten access reviews, update BAAs, rehearse incident response, and refine contingency plans.
  • Technical: enforce MFA everywhere, encrypt laptops and backups, harden email and endpoints, implement MDM for BYOD, close unused ports, and accelerate patch cycles.
  • Physical: improve facility access controls, secure workstations, and strengthen media handling and disposal.

Define success metrics (e.g., phishing click rate, patch SLAs, failed login anomalies) and track them routinely. Use outputs from a Security Risk Assessment Tool to seed your remediation backlog and support ongoing management reporting.

Document the Assessment Process

Maintain complete, organized Compliance Documentation. Capture scope, methodology, asset inventory, data flows, control evaluations, risk register, scoring rationale, and selected treatments. Attach supporting evidence: policy versions, training rosters, system configurations, logs, contracts, and acceptance memos.

Record management approvals and dates, plus dependencies, budgets, and milestones. Version-control your documents and preserve an auditable trail to streamline responses to audits, funder inquiries, or investigations.

Review and Update Risk Assessment

Treat risk analysis as a living program. Reassess at least annually and whenever significant changes occur—new EHR modules, cloud migrations, mergers, staffing shifts, telehealth expansion, or notable incidents. After each update, re-baseline your risk register and refresh the Risk Management Plan.

Establish continuous monitoring with key risk indicators and periodic control testing. Schedule tabletop exercises for incident response and contingency plans, and close the loop by verifying that mitigations reduced residual risk as intended.

Conclusion

By scoping accurately, analyzing realistic threat–vulnerability pairs, rating risks consistently, and executing a documented Risk Management Plan, your nonprofit can safeguard PHI and demonstrate HIPAA Security Rule compliance across Administrative, Technical, and Physical Safeguards.

FAQs.

What entities are required to perform HIPAA risk assessments?

Covered entities—healthcare providers, health plans, and healthcare clearinghouses—and their business associates that create, receive, maintain, or transmit ePHI must perform risk assessments. Healthcare nonprofits that meet the definition of a covered entity or business associate are included, as are vendors with PHI access under BAAs.

How often should healthcare nonprofits update their HIPAA risk assessment?

Update at least annually and whenever material changes occur, such as new systems, major process shifts, vendor changes, security incidents, or significant workforce or facility changes. Frequent mini-assessments after notable events keep the analysis current between annual cycles.

What are common vulnerabilities identified in HIPAA risk assessments?

Typical gaps include unencrypted laptops or backups, missing MFA, weak or unreviewed access rights, unpatched software, misconfigured cloud storage, inadequate audit logging, default passwords, insufficient staff training, absent or outdated BAAs, insecure media disposal, and weak physical controls like unlocked areas or poor visitor management.

How does the Security Risk Assessment Tool assist in HIPAA compliance?

It provides structured questionnaires aligned to the Security Rule, helping you inventory assets, evaluate controls, and produce reports. The tool highlights deficiencies, supports prioritization, and creates reusable artifacts for Compliance Documentation. While not a compliance guarantee, it streamlines a thorough, repeatable assessment—especially for small and mid-sized nonprofits.

Share this article

Ready to assess your HIPAA security risks?

Join thousands of organizations that use Accountable to identify and fix their security gaps.

Take the Free Risk Assessment

Related Articles