How to Examine HIPAA Privacy Rule Compliance: A Practical Checklist

Product Pricing Demo Video Free HIPAA Training
LATEST
video thumbnail
Admin Dashboard Walkthrough Jake guides you step-by-step through the process of achieving HIPAA compliance
Ready to get started? Book a demo with our team
Talk to an expert

How to Examine HIPAA Privacy Rule Compliance: A Practical Checklist

Kevin Henry

HIPAA

February 04, 2025

8 minutes read
Share this article
How to Examine HIPAA Privacy Rule Compliance: A Practical Checklist

This practical checklist helps you examine HIPAA Privacy Rule compliance step by step. It shows how to protect Protected Health Information (PHI), confirm your obligations, and document decisions you can defend.

Use this as your working guide for audits, program build‑outs, or annual reviews. As you work through each section, map processes, verify controls, and keep records that show due diligence.

Covered Entity Status Evaluation

Start by confirming whether you are a covered entity, a business associate, or a hybrid entity. Covered entities include health plans, health care clearinghouses, and health care providers that transmit health information electronically in connection with standard transactions.

Checklist

  • Identify your roles: health plan, clearinghouse, or provider conducting standard electronic transactions (claims, eligibility, referrals).
  • Map all PHI flows to confirm where PHI is created, received, maintained, or transmitted.
  • Assess whether you function as a business associate to another covered entity, and where others act as business associates to you.
  • For complex organizations, consider hybrid entity designation and document health care components.
  • Determine participation in organized health care arrangements (OHCAs) and record shared NPP responsibilities.
  • Publish a brief determination memo with your rationale and review it when services or ownership change.

Documentation to Maintain

  • Covered entity vs. business associate determination memo and diagrams of PHI flows.
  • Hybrid entity designation (if applicable) and OHCA agreements.
  • Inventory of systems, apps, and repositories that store or transmit PHI.

Developing Privacy Policies and Procedures

Written policies operationalize the Privacy Rule. They translate legal requirements into day‑to‑day practices, assign responsibilities, and establish accountability for Patient Rights under HIPAA.

Checklist

  • Designate a Privacy Officer; define roles for intake, release of information, and complaint handling.
  • Write policies for uses/disclosures (TPO, public health, research), authorizations, and the Minimum Necessary Standard.
  • Define processes for identity verification, de‑identification, limited data sets, and data use agreements.
  • Establish patient rights procedures: access, amendment, restrictions, confidential communications, and accounting of disclosures.
  • Set up sanctions, mitigation, and non‑retaliation procedures for incidents and complaints.
  • Include marketing, fundraising, and sale‑of‑PHI rules and document any opt‑out mechanisms.
  • Retain policies, revisions, and acknowledgments for at least six years; review at least annually.

Providing Notice of Privacy Practices

The Notice of Privacy Practices (NPP) explains how you use and disclose PHI, your duties, and individual rights. Providers must offer it at the first service encounter, post it prominently, and obtain a good‑faith acknowledgment. Health plans must distribute it at enrollment, issue updates after material changes, and remind members periodically that it is available.

Required Content

  • Permitted uses/disclosures and those requiring authorization (e.g., marketing, sale of PHI, psychotherapy notes when applicable).
  • Individual rights: access, amendment, restrictions (including self‑pay restrictions to a health plan), confidential communications, accounting of disclosures, and the right to a paper copy.
  • Covered entity duties: safeguard PHI, provide the NPP, follow current terms, and communicate material changes.
  • How to file complaints with you and with the federal government, and your non‑retaliation policy.
  • Fundraising statement with opt‑out rights (if you fundraise) and breach notification duties.
  • Plan‑specific statements where applicable (e.g., limits on using genetic information for underwriting).

Distribution and Posting

  • Providers: offer at first service, post in a clear location and on your website, and obtain acknowledgment or document good‑faith efforts.
  • Health plans: provide at enrollment, send revised notices after material changes, and issue periodic availability reminders.
  • Maintain version control, effective dates, and archives of prior NPPs.

Managing Patient Rights

Operationalize Patient Rights under HIPAA with clear intake forms, deadlines, and tracking logs. Standardize responses so you can meet timelines and document outcomes.

Access to PHI

  • Provide access to the designated record set within 30 days; one 30‑day extension allowed with written notice.
  • Supply records in the requested form and format if readily producible; allow direct transmission to a third party at the patient’s direction.
  • Charge only a reasonable, cost‑based fee where applicable; publish fee schedules.

Amendment

  • Respond within 60 days; one 30‑day extension allowed with written notice.
  • Grant amendments or provide a timely written denial with the reason and a right to submit a statement of disagreement.

Restrictions and Confidential Communications

  • Evaluate restriction requests; honor required restrictions for services paid in full out‑of‑pocket when disclosure is to a health plan for payment/operations.
  • Accommodate reasonable requests for confidential communications (alternative address, phone, or channel).

Accounting of Disclosures

  • Provide an accounting for non‑TPO disclosures over the past six years, with required elements and deadlines.
  • Maintain logs and a standard response template.

Applying the Minimum Necessary Standard

The Minimum Necessary Standard limits PHI uses, disclosures, and requests to the least amount needed to accomplish the purpose. Build this into roles, workflows, and technology.

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Checklist

  • Define role‑based access and approve workforce access on a need‑to‑know basis.
  • Pre‑define routine disclosures (e.g., payment, operations) with standardized data sets; review non‑routine disclosures case by case.
  • Prefer limited data sets or de‑identified data when feasible.
  • Implement technical controls: least‑privilege access, query filters, and data loss prevention.
  • Know the exceptions: treatment, disclosures to the individual, uses/disclosures pursuant to authorization, and those required by law or for oversight.

Establishing Business Associate Agreements

A Business Associate Agreement (BAA) is required when a vendor or partner creates, receives, maintains, or transmits PHI on your behalf. Typical business associates include billing services, cloud providers, consultants, and legal or actuarial firms.

Required BAA Terms

  • Permitted and required uses/disclosures of PHI and a prohibition on other uses.
  • Safeguards for PHI, including subcontractor flow‑down requirements.
  • Prompt reporting of breaches, security incidents, and impermissible uses/disclosures.
  • Support for access, amendment, and accounting requests.
  • Availability for government compliance review.
  • Return or destruction of PHI at termination where feasible, and termination rights for material breach.

Practical Steps

  • Inventory all vendors; classify whether PHI is touched directly or indirectly.
  • Execute BAAs before any PHI exchange; verify insurance, security certifications, and incident response capabilities.
  • Review BAAs periodically and upon scope changes.

Conducting HIPAA Training and Awareness

Training turns policy into practice. Deliver role‑based training to all workforce members within a reasonable time after hire and when policies change, with periodic refreshers.

Checklist

  • Cover the Privacy Rule basics, PHI handling, Minimum Necessary Standard, Patient Rights under HIPAA, and how to report concerns.
  • Add job‑specific scenarios (front desk, clinical staff, billing, IT, research).
  • Track attendance, test comprehension, and document materials and dates.
  • Reinforce awareness with reminders, posters, and simulated exercises.

Performing Risk Assessment and Management

Use Risk Assessment to identify where privacy failures could occur and how likely and harmful they would be. Pair this with a remediation plan and timelines you can defend.

Risk Assessment Steps

  • Inventory PHI locations, data flows, and recipients (internal and external).
  • Identify threats: misdirected mail, over‑disclosure, snooping, improper portal access, or vendor failures.
  • Evaluate likelihood and impact; consider volume, sensitivity, and legal exposure.

Risk Management

  • Prioritize high‑risk findings; assign owners and due dates.
  • Implement controls: access changes, process tweaks, stronger identity checks, or template updates.
  • Validate fixes and record evidence; schedule reassessments at least annually.

Implementing Breach Notification Procedures

The Breach Notification Rule requires notifying affected individuals and, in some cases, regulators and the media when unsecured PHI is compromised. Build a repeatable, time‑bound process.

Core Process

  • Define “breach” with exceptions (good‑faith workforce access without further use, inadvertent disclosure to an authorized person, or when the recipient could not retain the information).
  • Perform a breach risk assessment: nature and extent of PHI, who received it, whether it was actually viewed/acquired, and mitigation.
  • If notification is required, notify individuals without unreasonable delay and no later than 60 days after discovery.
  • For incidents affecting 500 or more residents of a state/jurisdiction, notify prominent media and regulators within required timelines; maintain an annual log for smaller events and submit as required.
  • Use first‑class mail or agreed‑to email; provide substitute notice when contact information is insufficient; document any law‑enforcement delay.
  • Include in notices: what happened, the PHI involved, steps individuals should take, what you are doing to investigate/mitigate/prevent, and contact methods.

Conclusion

To stay compliant, integrate this How to Examine HIPAA Privacy Rule Compliance: A Practical Checklist into daily operations, vendor oversight, and training. Revisit each area at least annually, document decisions, and continuously reduce risk as your services and technologies evolve.

FAQs

What defines a covered entity under HIPAA?

A covered entity is a health plan, a health care clearinghouse, or a health care provider that transmits health information electronically in connection with standard transactions. Some organizations are hybrid entities that designate specific health care components subject to the Privacy Rule.

How often should HIPAA privacy training be conducted?

Train workforce members within a reasonable time after hire and whenever policies or job duties change. Most organizations also deliver an annual refresher to reinforce key concepts and document continued competency.

What are the required elements of a Notice of Privacy Practices?

The NPP must describe permitted uses/disclosures, uses requiring authorization (e.g., marketing, sale of PHI), individual rights (access, amendment, restrictions including self‑pay to plan, confidential communications, accounting, and right to a paper copy), your duties, how to file complaints, breach notification duties, fundraising opt‑out if applicable, and any plan‑specific statements such as limits on using genetic information for underwriting.

How should a breach of PHI be reported?

After a breach risk assessment, if notification is required, notify affected individuals without unreasonable delay and no later than 60 days after discovery. For incidents affecting 500 or more in a state or jurisdiction, also notify prominent media and the federal regulator; maintain a log and submit annual reports for smaller breaches.

Share this article

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Related Articles