How to Create a HIPAA Security Plan for Home Health Providers: Step-by-Step Guide and Checklist

Product Pricing
Ready to get started? Book a demo with our team
Talk to an expert

How to Create a HIPAA Security Plan for Home Health Providers: Step-by-Step Guide and Checklist

Kevin Henry

HIPAA

December 01, 2025

9 minutes read
Share this article
How to Create a HIPAA Security Plan for Home Health Providers: Step-by-Step Guide and Checklist

A strong HIPAA security plan protects your patients, your reputation, and your business. This step-by-step guide and checklist shows you how to build, implement, and maintain practical safeguards tailored to home visits, telehealth, and field operations—while keeping Protected Health Information (PHI) secure.

Use the sections below to draft policies, assign responsibilities, and configure controls that align with the HIPAA Security Rule’s administrative, physical, and technical safeguards.

Purpose and Scope

Define why the plan exists and exactly what it covers. Your scope should include all systems, people, locations, and processes that create, receive, maintain, or transmit PHI and electronic PHI (ePHI), from the EHR to mobile apps used by field clinicians.

Clarify that this document provides organizational policy and procedures, not legal advice. Specify how it applies to contractors, temps, volunteers, and students, and how it integrates with your Privacy Rule policies and emergency operations.

  • State objectives: confidentiality, integrity, and availability of PHI.
  • List in-scope assets: EHR, billing, telehealth, email, cloud storage, paper files, and backups.
  • Define environments: offices, clinicians’ homes, vehicles, and patient homes.
  • Reference the HIPAA Security Rule and related internal policies.
  • Set review cadence (at least annually and after major changes or incidents).

Governance and Roles

Establish decision-making and accountability so security is coordinated, resourced, and measured. Name a Security Official to own the plan end-to-end and convene a cross‑functional security committee.

  • Assign a Security Official, Privacy Officer, IT lead, Compliance lead, HR lead, and Clinical lead.
  • Create a RACI for policy writing, approvals, implementation, monitoring, and reporting.
  • Define meeting cadence (e.g., monthly security committee; quarterly risk review).
  • Document escalation paths for urgent risks and suspected breaches.
  • Require board/leadership oversight with periodic metrics and attestations.

PHI Data Mapping

Inventory where PHI lives, how it flows, and who touches it. Mapping prevents blind spots and enables targeted controls.

  • Catalog systems: EHR, scheduling, referral management, telehealth, messaging, imaging, billing/claims.
  • Identify PHI elements used (e.g., identifiers, clinical notes, images) and minimum-necessary uses.
  • Diagram data flows between users, devices, apps, and vendors; note transmission methods.
  • Classify data by sensitivity and required protections; label storage and transmission channels.
  • Flag external sharing that requires Business Associate Agreements (BAAs).
  • Record data lifecycle: creation, storage, access, transmission, retention, and disposal.

Risk Analysis and Management

Perform a formal risk assessment to identify threats, vulnerabilities, likelihood, and impact. Prioritize remediation and track residual risk.

  • Discover assets and PHI repositories; validate with walk‑throughs and clinician interviews.
  • Identify threats common to home health: lost/stolen devices, unsecured Wi‑Fi, misdirected messages, ransomware, paper notes.
  • Evaluate controls; score risks; create a risk register with owners and due dates.
  • Select treatments: mitigate, transfer, avoid, or accept with justification and leadership sign‑off.
  • Reassess after incidents, technology changes, or vendor transitions.

Data Access Controls

Ensure workforce members see only the minimum necessary PHI using Role‑Based Access Control (RBAC) and least‑privilege principles.

  • Define roles (e.g., clinician, intake, billing, QA) with standard permissions.
  • Require unique user IDs; prohibit shared accounts; enforce session timeouts.
  • Implement joiner‑mover‑leaver workflows with prompt access changes and revocation.
  • Use just‑in‑time or time‑bound elevated access; require approvals and logging.
  • Run quarterly access reviews and correct variances quickly.
  • Provide “break‑glass” emergency access with alerts and post‑event audits.

Authentication Standards

Strengthen identity assurance across all PHI systems with Multi‑Factor Authentication (MFA) and modern password guidance.

  • Require MFA for remote access, EHR, email, VPN, and admin consoles.
  • Use passphrases or strong passwords; enable lockout, throttling, and auto‑logout.
  • Adopt single sign‑on where possible to improve consistency and offboarding.
  • Prohibit SMS for PHI unless using approved encrypted solutions.
  • Rotate and vault administrative credentials; use least‑privilege service accounts.

Encryption Standards

Apply strong, validated cryptography to protect PHI at rest and in transit.

  • Encrypt data at rest (e.g., full‑disk encryption on laptops/mobile; database and backup encryption).
  • Use TLS 1.2+ for data in transit; disable weak ciphers and protocols.
  • Manage keys securely with separation of duties and periodic key rotation.
  • Use secure email gateways or portals for PHI; avoid unencrypted attachments.
  • Ensure encryption on removable media is enforced or block its use.

Secure Data Backup and Recovery

Design backups to meet business needs and withstand ransomware, using clear Recovery Point Objectives (RPO) and Recovery Time Objectives (RTO).

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

  • Define RPO/RTO by system (e.g., EHR, scheduling, billing) and document trade‑offs.
  • Follow a 3‑2‑1 strategy: three copies, two media types, one offsite/immutable.
  • Encrypt backups in transit and at rest; restrict and log restore permissions.
  • Test restores quarterly; rehearse disaster scenarios and switch‑over steps.
  • Retain per policy; securely dispose of expired media with documented destruction.

Secure Network Configuration

Reduce attack surface with segmentation, hardening, and continuous patching—accounting for travel, telehealth, and home use.

  • Segment clinical, administrative, and guest traffic; restrict east‑west movement.
  • Harden firewalls; block unused ports; disable legacy protocols.
  • Use secure remote access (VPN or zero‑trust) with MFA and device posture checks.
  • Mandate WPA2/WPA3 on office Wi‑Fi; prohibit connecting to patient or public Wi‑Fi for PHI tasks.
  • Patch OS/applications promptly; perform vulnerability scanning and remediate findings.

Endpoint and Mobile Device Policy

Control laptops, tablets, and phones that leave the office daily. Standardize builds, restrict data sprawl, and enable rapid response.

  • Use Mobile Device Management (MDM) to enforce encryption, screen locks, and auto‑lock.
  • Restrict local PHI storage; require secure apps with containerization and remote wipe.
  • Define BYOD versus corporate‑owned options and minimum requirements.
  • Prohibit PHI in native SMS, personal email, or camera roll; provide compliant alternatives.
  • Enable application allowlisting and block risky peripherals and cloud sync.

Vendor Security Measures

Vendors that handle PHI must meet your standards and sign Business Associate Agreements (BAAs). Tier vendors by risk and monitor continuously.

  • Require BAAs before any PHI exchange; document permitted uses and safeguards.
  • Conduct due diligence: security questionnaires, independent reports, and control evidence.
  • Set minimums: encryption, MFA, RBAC, logging, uptime, backup/DR, breach notification.
  • Review subcontractors, data location, and incident processes; require notice of changes.
  • Track issues to closure; include right‑to‑audit and secure termination or data return.

Incident Response Plan

Prepare for security events with clear roles, playbooks, and regulatory timelines. Execute consistently and document everything.

  • Phases: preparation, identification, containment, eradication, recovery, lessons learned.
  • Create runbooks for lost devices, ransomware, misdirected PHI, and vendor breaches.
  • Define severity levels and escalation; maintain on‑call contacts and decision authority.
  • Preserve evidence; coordinate with legal and compliance on breach notification requirements.
  • Conduct post‑incident reviews; update policies, training, and controls accordingly.

Audit Logging and Monitoring

Log who accessed what, when, and from where—and actively review it. Monitoring deters misuse and speeds investigations.

  • Enable EHR and critical app audit trails for access, queries, exports, and admin changes.
  • Centralize logs; set alerts for unusual patterns (e.g., bulk access, after‑hours spikes).
  • Review high‑risk events weekly; sample routine access monthly; retain logs per policy.
  • Correlate security events across endpoints, identity systems, and network gateways.
  • Validate “break‑glass” usage with immediate review and documented justification.

Training and Sanctions

People are your strongest control when trained well and held accountable. Tailor content to home health realities.

  • Provide onboarding and annual refreshers; add role‑based modules for clinicians and admin staff.
  • Cover phishing, device handling, minimum necessary, approved communications, and reporting.
  • Run simulated phishing; share lessons learned from real incidents.
  • Publish a progressive sanctions policy; apply it consistently and document actions.

Compliance Documentation

Prove what you do with organized, current records. Documentation should be accessible, versioned, and auditable.

  • Maintain policies/procedures, risk analyses, risk treatment plans, and meeting minutes.
  • Store BAAs, vendor reviews, training logs, incident reports, and audit findings.
  • Record system configurations, access reviews, backup tests, and disaster exercises.
  • Retain required documentation for at least six years or longer per policy.

Change Management and Continuous Improvement

Manage technology and process changes deliberately to avoid introducing new risks. Measure outcomes and iterate.

  • Use a change process with impact analysis, approvals, testing, and rollback plans.
  • Perform security reviews for new vendors, integrations, and features before go‑live.
  • Track metrics: access review closure time, phishing failure rates, patch SLAs, restore success.
  • Schedule internal audits and maturity assessments; remediate gaps with owners and dates.
  • Update the plan after incidents, audits, or regulatory updates; communicate changes to staff.

Conclusion

Building a HIPAA security plan for home health providers takes clear scope, strong governance, and disciplined controls—from RBAC and MFA to MDM, encryption, and tested backups that meet RPO and RTO. Treat this plan as a living program: monitor, train, document, and improve continuously to keep PHI protected wherever care happens.

FAQs

What is the scope of a HIPAA security plan for home health providers?

The scope includes every person, process, system, and location that creates, receives, maintains, or transmits PHI or ePHI. That spans your EHR, messaging tools, telehealth platforms, laptops and mobile devices, backups, offices, clinicians’ homes, vehicles, and patient homes—plus contractors and vendors handling PHI under BAAs.

How do you conduct a risk assessment for HIPAA compliance?

Inventory PHI assets and data flows, identify threats and vulnerabilities, evaluate existing controls, and score likelihood and impact to prioritize risks. Document a risk register with owners and deadlines, choose treatments (mitigate, transfer, avoid, accept), and reassess after changes or incidents. Validate findings with interviews and evidence, not just checklists.

What are the key components of an incident response plan?

Define roles and escalation, severity levels, and communications; maintain playbooks for common events; outline the phases (preparation, identification, containment, eradication, recovery, lessons learned); preserve evidence; coordinate legal and compliance for breach notifications; and run post‑incident reviews that drive policy, training, and control updates.

How should home health providers manage vendor security under HIPAA?

Require BAAs before sharing PHI, tier vendors by risk, and perform due diligence on controls like encryption, MFA, RBAC, logging, backup/DR, and incident handling. Monitor subcontractors, data location, and changes; track issues to closure; and ensure secure offboarding, including data return or destruction with evidence.

Share this article

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Related Articles