How to Conduct a HIPAA Risk Assessment for Ophthalmologists: Step-by-Step Guide & Checklist

Product Pricing
Ready to get started? Book a demo with our team
Talk to an expert

How to Conduct a HIPAA Risk Assessment for Ophthalmologists: Step-by-Step Guide & Checklist

Kevin Henry

HIPAA

December 20, 2025

9 minutes read
Share this article
How to Conduct a HIPAA Risk Assessment for Ophthalmologists: Step-by-Step Guide & Checklist

Identify and Document Protected Health Information

Your first step is to map every place Protected Health Information (PHI) is created, received, maintained, processed, or transmitted across your ophthalmology practice. Build a current-state picture of people, processes, technology, and third parties touching PHI.

Map PHI in ophthalmology workflows

  • Clinical intake and scheduling: demographics, insurance, consent forms, referral notes.
  • Exams and diagnostics: OCT scans, fundus photos, fluorescein angiography, ultrasound biomicroscopy, visual field tests, corneal topography, IOL calculations, slit-lamp images.
  • Treatment and surgery: operative notes, lens implant data, postoperative instructions, prescriptions.
  • Billing and revenue cycle: superbills, claims (X12/EDI), payment cards (stored separately from PHI), statements.
  • Patient communications: portals, appointment reminders, teleophthalmology images, eRx.
  • Devices and media: imaging workstations, PACS/DICOM servers, SD cards/USB media, local caches, backups.

Create an asset and data-flow inventory

  • Systems: EHR, imaging devices, PACS, practice management, eRx, email, file servers, cloud storage.
  • Data flows: device-to-workstation, workstation-to-PACS/EHR, portal-to-EHR, EHR-to-clearinghouse.
  • Locations: clinics, ASC, offsite storage, cloud environments, mobile devices used by providers.
  • People: staff roles and Business Associates (BAAs) such as imaging vendors, IT MSPs, clearinghouses.
  • Media lifecycle: creation, transfer, storage, archival, and disposal of images and paper.

Define PHI sensitivity and volume

  • Sensitivity: pediatric data, high-resolution images revealing unique identifiers, surgical details.
  • Volume: average daily patients, number of records/images, retention period, and backup copies.

Checklist

  • Complete a PHI data map and asset inventory with owners and locations.
  • Document BAAs and confirm PHI touchpoints for each vendor.
  • List all media types (including SD cards) and their handling procedures.

Assess Threats and Vulnerabilities

Identify what could go wrong (threats) and the weaknesses that make it possible (vulnerabilities). Consider human, process, technical, and physical dimensions—plus ophthalmology-specific nuances.

Common threat scenarios

  • Phishing or credential theft leading to EHR or portal compromise.
  • Ransomware affecting imaging workstations, PACS, or file servers.
  • Lost or stolen laptops, tablets, or unencrypted removable media.
  • Misdelivery of records, fax/email errors, or improper disclosures.
  • Natural disasters, power failures, or HVAC issues damaging on‑prem servers.

Ophthalmology-specific vulnerabilities

  • Imaging devices running outdated OS versions or default credentials.
  • Unsecured DICOM services, open PACS ports, or weak device network segmentation.
  • Local image caching on workstations and cameras outside centralized PACS.
  • Vendor remote access without MFA or session recording.
  • SD cards used to move images between rooms without chain-of-custody controls.

How to discover vulnerabilities

  • Conduct interviews and walk-throughs to observe real workflows.
  • Review configurations, patch levels, and password/MFA settings for all systems.
  • Run vulnerability scans and analyze audit logs for anomalous access.
  • Test email and portal processes end-to-end; verify encryption in transit.
  • Inspect physical safeguards: door locks, visitor logs, device placement, screen privacy.

Checklist

  • Catalog threats aligned to each asset and workflow.
  • List specific vulnerabilities with evidence (screenshots, configs, logs).
  • Confirm whether exploitable paths exist from public internet to PHI.

Evaluate Existing Safeguards

Assess the strength and coverage of your Administrative Safeguards, Technical Safeguards, and Physical Safeguards. Tie each safeguard to a risk and note effectiveness and gaps.

Administrative Safeguards

  • Risk Management Framework and governance: roles, meeting cadence, decision records.
  • Policies and procedures: Access Control Policies, sanctions, device/media handling, minimum necessary.
  • Training and awareness: onboarding, annual refreshers, phishing simulations, role-based training.
  • Vendor management: BAAs, due diligence, security questionnaires, right-to-audit clauses.
  • Contingency planning: backups, disaster recovery, emergency mode operations.
  • Security Incident Procedures: escalation paths, evidence preservation, notification steps.

Technical Safeguards

  • Identity and access: unique IDs, role-based access, MFA on EHR/portal/VPN, automatic logoff.
  • Encryption: full-disk on laptops/workstations; TLS for EHR, PACS/DICOM, portals, and email security.
  • Audit controls: centralized logging, alerting, periodic access reviews, image access tracking.
  • Endpoint and server protection: EDR/antivirus, application allowlisting, timely patching.
  • Network defenses: firewalls, segmentation isolating imaging devices, secure vendor remote access.
  • Data integrity and backups: immutable backups, 3-2-1 strategy, routine restore testing.

Physical Safeguards

  • Facility controls: locked server rooms, visitor badges, camera coverage where appropriate.
  • Workstation security: privacy screens, screen timeouts, cable locks for imaging stations.
  • Device/media controls: secure storage for SD cards, shredding bins, certified media destruction.
  • Environmental protections: HVAC monitoring, surge protection, water-leak sensors near racks.

Checklist

  • Map each safeguard to specific risks and rate effectiveness.
  • Document evidence (policies, screenshots, logs, photos) for each safeguard.
  • Record gaps and dependencies (e.g., pending vendor firmware updates).

Determine Impact and Likelihood of Risks

Translate findings into risk levels using a simple, consistent scoring model. This helps you prioritize remediation and demonstrate due diligence.

Ready to assess your HIPAA security risks?

Join thousands of organizations that use Accountable to identify and fix their security gaps.

Take the Free Risk Assessment

Scoring model

  • Impact (1–5): combines patient harm, regulatory exposure, operational downtime, and financial/reputational damage.
  • Likelihood (1–5): considers exploitability, existing controls, threat activity, and exposure time.
  • Risk score: Impact × Likelihood; define thresholds (e.g., 15–25 high, 8–14 medium, 1–7 low).

Context for ophthalmology

  • High-resolution images can be uniquely identifying and voluminous, raising impact.
  • Imaging device legacy OS and vendor access can increase likelihood without segmentation and MFA.
  • Clinic downtime delays urgent care (e.g., retinal detachments), heightening impact.

Document a risk register

  • Risk statement: “If [vulnerability] is exploited by [threat], then [impact on PHI/operations] may occur.”
  • Attributes: assets, owner, score, existing controls, proposed mitigations, target date, residual risk.
  • Review cycle: validate scores with leadership and update after control changes or incidents.

Checklist

  • Apply the same scoring rubric across all risks.
  • Prioritize high scores with quick, measurable mitigations.
  • Capture rationale for each rating to ensure repeatability.

Develop and Implement Mitigation Strategies

Turn priorities into action using a time-bound plan with owners, budgets, and success criteria. Blend quick wins with structural improvements for durable risk reduction.

Quick wins (30–60 days)

  • Enable MFA on EHR, portals, VPN, and vendor remote access; tighten Access Control Policies.
  • Encrypt all laptops/workstations; disable local image storage where possible.
  • Patch high-severity vulnerabilities on imaging devices and servers; remove default passwords.
  • Lock down DICOM/PACS interfaces; restrict to approved IPs; enforce TLS where supported.
  • Harden email: enforce encryption for PHI, add warning banners, and train on phishing.
  • Backups: verify offline/immutable copies and complete a successful restore test.
  • Update Security Incident Procedures and run a tabletop exercise.

Structural improvements (60–180 days)

  • Network segmentation for biomedical devices; dedicated VLANs and least-privilege rules.
  • Centralize images in secure PACS; automate ingestion from devices; retire ad hoc SD card use.
  • Implement MDM for mobile devices; enforce screen locks, encryption, and remote wipe.
  • Deploy centralized logging and alerting (SIEM) for EHR, PACS, and critical servers.
  • Establish configuration baselines and routine firmware lifecycles for imaging vendors.
  • Enhance physical controls: server room access logs, locked cabinets, privacy screens.

Execution and measurement

  • Assign owners and due dates; track in a remediation plan aligned to the risk register.
  • Define metrics: MFA adoption rate, patch SLAs met, restore time, phishing failure rate.
  • Re-score residual risk after each control is implemented to demonstrate improvement.

Checklist

  • Publish a prioritized remediation roadmap with owners and timelines.
  • Integrate changes into policies and training so improvements stick.
  • Verify each control in production and record evidence.

Document Findings and Maintain Compliance Records

Strong documentation proves diligence and supports audits. Keep organized, current records and retain them according to HIPAA requirements.

What to keep

  • Risk analysis report: scope, methodology, inventories, findings, scores, and conclusions.
  • Risk register and remediation plan with status, owners, and residual risk.
  • Policies and procedures: Administrative, Technical, and Physical Safeguards.
  • Training materials and completion logs; sanction documentation when applicable.
  • BAAs, vendor due diligence, and system security summaries.
  • Backups/DR evidence: test results, recovery objectives, and change records.
  • Incident logs: Security Incident Procedures actions, root cause, and lessons learned.

How to organize

  • Central repository with version control and access tracking.
  • Map each safeguard and policy to HIPAA Security Rule standards for easy cross-reference.
  • Include screenshots, photos, and exports (e.g., audit logs) as objective evidence.

Retention and cadence

  • Retain required documentation for at least six years from creation or last effective date.
  • Review key documents annually and after major changes or incidents.

Checklist

  • Finalize and sign the risk analysis and remediation plan.
  • Maintain a current control library and evidence index.
  • Track retention dates and archival locations for all records.

Schedule Regular Risk Assessments

Risk assessment is not a one-time task. Establish a cadence that reflects your practice’s pace of change and risk profile.

  • Conduct a comprehensive HIPAA risk assessment at least annually.
  • Reassess after major events: new EHR/PACS, new imaging devices, clinic expansions, cloud migrations, or security incidents.
  • Perform targeted mini-assessments when introducing high-risk workflows (e.g., teleophthalmology, AI image analysis).

Quarterly operating rhythm

  • Q1: Refresh inventories, review policies, update vendor assessments.
  • Q2: Validate controls, run restore tests, and conduct access reviews.
  • Q3: Tabletop incident exercise and physical walkthroughs.
  • Q4: Full risk analysis update, residual risk review, and board/owner report.

Continuous monitoring

  • Automate alerts for unusual access, failed logins, and anomalous image exports.
  • Track KPIs/KRIs and escalate when thresholds are exceeded.
  • Schedule vendor check-ins to confirm patch and firmware roadmaps.

Conclusion

By mapping PHI, pinpointing threats and vulnerabilities, evaluating safeguards, scoring risks, and executing a prioritized remediation plan, you build a defensible HIPAA program. Maintain clear documentation, follow your Risk Management Framework, and keep assessments regular to protect patients, sustain operations, and reduce regulatory exposure.

FAQs.

What specific PHI is involved in ophthalmology practices?

Typical PHI includes demographics, insurance details, exam notes, prescriptions, surgical records, and a wide range of images: OCT, fundus photos, angiography, corneal topography, ultrasound, and visual field data. Metadata in DICOM files (dates, device IDs) and portal messages are PHI as well.

How often should a HIPAA risk assessment be conducted?

Perform a comprehensive assessment at least once per year and whenever significant changes occur—such as adding imaging devices, migrating PACS/EHR, expanding locations, adopting teleophthalmology, or after a security incident.

What are common vulnerabilities in ophthalmology data systems?

Frequent gaps include outdated imaging device operating systems, default or shared passwords, weak network segmentation, unsecured DICOM/PACS services, unencrypted laptops or SD cards, and insufficient logging or MFA for vendor remote support.

How can ophthalmologists mitigate risks effectively?

Start with MFA everywhere, full-disk encryption, timely patching, and email protections. Segment imaging networks, secure DICOM with TLS, centralize images in PACS, enforce Access Control Policies, maintain strong Administrative, Technical, and Physical Safeguards, test backups, and drill your Security Incident Procedures.

Share this article

Ready to assess your HIPAA security risks?

Join thousands of organizations that use Accountable to identify and fix their security gaps.

Take the Free Risk Assessment

Related Articles