PHI Not Safeguarded? Compliance Checklist to Prevent Breaches and Fines

Check out the new compliance progress tracker


Product Pricing Demo Video Free HIPAA Training
LATEST
video thumbnail
Admin Dashboard Walkthrough Jake guides you step-by-step through the process of achieving HIPAA compliance
Ready to get started? Book a demo with our team
Talk to an expert

PHI Not Safeguarded? Compliance Checklist to Prevent Breaches and Fines

Kevin Henry

HIPAA

August 29, 2024

8 minutes read
Share this article
PHI Not Safeguarded? Compliance Checklist to Prevent Breaches and Fines

If PHI is not safeguarded, the risk of regulatory penalties, lawsuits, and reputational damage rises quickly. Use this practical checklist to strengthen HIPAA Compliance, close security gaps, and demonstrate due diligence before an incident occurs.

Each section below outlines focused actions you can take now—anchored in a Risk Management Framework, clear Access Control Policies, and rigorous Security Incident Documentation—to prevent breaches and avoid fines.

Risk Assessment

A current, evidence-based risk analysis is the foundation of HIPAA Compliance. It identifies where PHI and ePHI reside, how it flows, and which threats matter most so you can prioritize controls and budget.

Define scope and inventory PHI

  • Map where PHI/ePHI is created, received, maintained, or transmitted, including applications, databases, cloud services, email, backups, and endpoints.
  • Document data flows between systems and third parties to reveal hidden exposure points.
  • Classify data sensitivity and assign owners responsible for stewardship and approvals.

Analyze threats and vulnerabilities

  • Identify credible threats (phishing, lost devices, misconfigurations, insider misuse, vendor failures) and related vulnerabilities.
  • Evaluate current controls such as ePHI Encryption, logging, network segmentation, and user access reviews.
  • Consider business processes (intake, billing, telehealth) where human error may expose PHI.

Score and prioritize risks

  • Use a Risk Management Framework to score likelihood and impact, then rank risks by residual exposure.
  • Define risk acceptance thresholds and approval paths for exceptions.
  • Link each risk to specific mitigating controls and owners.

Treat and track risks

  • Maintain a living risk register with due dates, milestones, and evidence of completion.
  • Review at least annually and upon major changes (new systems, vendors, or mergers).
  • Feed lessons learned from incidents into updated assessments and plans.

Policies and Procedures

Clear, enforced Policies and Procedures translate requirements into daily practice. They guide decisions, drive consistent behavior, and provide audit-ready evidence.

Core policy set

  • Access Control Policies defining role-based access, least privilege, and periodic recertifications.
  • Acceptable use, mobile/remote work, email and messaging, and media disposal policies.
  • Privacy, security, breach response, sanctions, vendor risk, change management, and data retention.

Operational procedures

  • Joiner/mover/leaver processes for rapid provisioning, transfers, and terminations.
  • Encryption key management, secure backup/restore, vulnerability and patch management.
  • Release-of-information workflows enforcing minimum necessary use and disclosure.

Governance and evidence

  • Version control, approvals, and distribution logs for all Policies and Procedures.
  • Annual reviews with signoffs; interim updates when technology or laws change.
  • Attestations showing workforce acknowledgment and understanding.

Training and Awareness

People handle PHI daily; targeted training reduces mistakes and speeds reporting when something goes wrong.

Baseline and role-based training

  • Provide onboarding and at least annual refreshers that cover HIPAA basics, the Breach Notification Rule, phishing, and privacy practices.
  • Offer role-based modules for clinicians, billing, IT, and executives focusing on their PHI touchpoints.

Ongoing awareness

  • Run phishing simulations, just-in-time reminders in critical apps, and quarterly micro-lessons.
  • Promote a speak-up culture with clear channels for reporting suspected incidents.

Measure and improve

  • Track completion rates, test scores, and repeat offenses to target coaching.
  • Use Security Incident Documentation trends to adapt content and emphasize high-risk behaviors.

Breach Notification

When an incident occurs, quickly determine if it is a reportable breach under the Breach Notification Rule, then meet all content and timing requirements.

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Decide: incident vs breach

  • Perform the four-factor risk assessment: nature/extent of PHI, unauthorized person, whether PHI was actually acquired/viewed, and mitigation effectiveness.
  • Consider limited exceptions (e.g., good-faith internal access, inadvertent disclosure between authorized individuals, or when the recipient cannot retain the information).
  • Document rationale and evidence for every decision, even when you determine it is not a breach.

Who to notify and when

  • Notify affected individuals without unreasonable delay and no later than 60 calendar days after discovery.
  • Notify HHS for breaches affecting 500 or more individuals without unreasonable delay and in no case later than 60 days; for fewer than 500, report within 60 days of the end of the calendar year.
  • If 500 or more residents of a state or jurisdiction are affected, notify prominent media outlets serving that area.
  • Business associates must notify the covered entity as required by the Business Associate Agreement.

Notification content

  • Plain-language description of the incident, types of PHI involved, and likely risks.
  • Steps individuals should take to protect themselves and what you are doing to mitigate harm.
  • Contact methods (toll-free number, email, postal address, website) for questions and support.

Documentation and proof

  • Retain Security Incident Documentation: timelines, risk assessments, notices sent, mailing lists, and confirmations.
  • Capture remediation actions, control improvements, and leadership approvals.

Business Associate Agreements

Vendors that handle PHI must be governed by a robust Business Associate Agreement and monitored throughout the relationship lifecycle.

Identify business associates

  • List all vendors that create, receive, maintain, or transmit PHI, including cloud providers, EHRs, billing, transcription, storage, and shredding services.
  • Map subcontractors to ensure PHI protections flow down the chain.

Required contract terms

  • Permitted uses/disclosures, safeguards (including ePHI Encryption), breach reporting duties, and Access Control Policies expectations.
  • Subcontractor obligations, right to audit, termination for cause, and return or destruction of PHI.

Due diligence and monitoring

  • Collect security questionnaires and attestations; review independent audits where available.
  • Set performance and incident-reporting SLAs; test contacts and escalation paths.
  • Record oversight activities as part of ongoing Security Incident Documentation.

Security Measures

Implement layered administrative, physical, and technical safeguards to reduce risk and prove reasonable and appropriate protection of ePHI.

Administrative safeguards

  • Risk management planning aligned to your Risk Management Framework with defined owners and timelines.
  • Workforce security, sanctions, vendor risk management, and contingency planning.
  • Periodic evaluations to verify controls remain effective as systems and threats evolve.

Physical safeguards

  • Facility access controls, visitor management, and secure server rooms.
  • Workstation security and device/media controls for transfer, reuse, and disposal.
  • Asset tracking for laptops, removable media, and medical devices that may store ePHI.

Technical safeguards

  • ePHI Encryption in transit and at rest; strong key management with rotation and separation of duties.
  • Access Control Policies enforcing unique IDs, multi-factor authentication, least privilege, and automatic logoff.
  • Audit controls with centralized logging, alerting, and periodic review of access to ePHI.
  • Integrity and availability controls: backups, secure restore tests, anti-malware, and patch/vulnerability management.

Data lifecycle controls

  • Data minimization, classification, retention schedules, and secure disposal.
  • De-identification or pseudonymization where feasible to limit PHI exposure.

Monitoring and continuous improvement

  • Use metrics (e.g., incident counts, time to detect/respond, overdue risk actions) to guide investment.
  • Feed monitoring results into Security Incident Documentation and governance reviews.

Incident Response Plan

An effective plan minimizes harm, accelerates recovery, and ensures compliance with the Breach Notification Rule when applicable.

Prepare

  • Define incident roles, decision authorities, contact trees, and on-call rotations.
  • Create runbooks for common scenarios: lost device, misdirected PHI, ransomware, vendor outage.
  • Conduct tabletop exercises and ensure forensics readiness (log retention, time sync, chain of custody).

Detect and analyze

  • Establish intake channels for employees, patients, and vendors; correlate alerts from security tools.
  • Classify severity, preserve evidence, and initiate the breach risk assessment.
  • Log every action in Security Incident Documentation for accountability and audits.

Contain, eradicate, recover

  • Isolate affected systems, revoke compromised credentials, and block malicious activity.
  • Eradicate root causes, patch vulnerabilities, and restore validated backups.
  • Verify normal operations and monitor closely for recurrence.

Post-incident improvements

  • Deliver a lessons-learned report; update Risk Assessment and Policies and Procedures.
  • Adjust training, Access Control Policies, and technical safeguards based on findings.
  • Report progress to leadership with measurable outcomes and next steps.

Conclusion

Protecting PHI demands continuous attention, not one-time fixes. By executing the checklist in this guide—rigorous assessment, clear policies, strong security controls, tested incident response, and disciplined vendor oversight—you reduce breach likelihood, meet HIPAA Compliance obligations, and avoid costly fines.

FAQs.

What are the consequences of failing to safeguard PHI?

Organizations face regulatory penalties, corrective action plans, and potential lawsuits. Operational impacts can include system downtime, costly remediation, and long-term reputational harm. Regulators also expect proof of a sustained compliance program, so weak or missing Security Incident Documentation can worsen outcomes.

How can organizations prevent PHI breaches?

Start with a thorough Risk Assessment, implement ePHI Encryption, enforce Access Control Policies, and keep Policies and Procedures current. Train staff regularly, require a strong Business Associate Agreement for every vendor handling PHI, monitor systems continuously, and rehearse your Incident Response Plan to catch issues early and limit impact.

What are the mandatory steps after a PHI breach?

Contain the incident, conduct the four-factor risk assessment, and follow the Breach Notification Rule: notify affected individuals without unreasonable delay and no later than 60 days after discovery; notify HHS on the required timeline; and notify media if 500 or more residents of a state or jurisdiction are affected. Document every decision and action, implement corrective measures, and update your Risk Management Framework and training accordingly.

Share this article

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Related Articles