Small Employer Covered Entity Guide: HIPAA Risk Analysis and Encryption

Check out the new compliance progress tracker


Product Pricing Demo Video Free HIPAA Training
LATEST
video thumbnail
Admin Dashboard Walkthrough Jake guides you step-by-step through the process of achieving HIPAA compliance
Ready to get started? Book a demo with our team
Talk to an expert

Small Employer Covered Entity Guide: HIPAA Risk Analysis and Encryption

Kevin Henry

HIPAA

December 31, 2024

6 minutes read
Share this article
Small Employer Covered Entity Guide: HIPAA Risk Analysis and Encryption

HIPAA Risk Analysis Requirements

Purpose and scope for small employers

Your first obligation under the HIPAA Security Rule is to perform an accurate and thorough security risk assessment of electronic protected health information (ePHI). Even as a small employer covered entity, you must evaluate how ePHI is created, received, maintained, and transmitted across people, processes, and technology.

Map where ePHI lives and flows: group health plan records, benefits portals, email, cloud storage, mobile devices, backups, and any third-party systems. Clear scope prevents blind spots and strengthens your overall security posture.

Core steps of a compliant analysis

  • Inventory assets and data flows that handle ePHI.
  • Identify reasonably anticipated threats and vulnerabilities (loss, theft, misconfiguration, unauthorized access, phishing, ransomware).
  • Assess likelihood and potential impact for each risk.
  • Evaluate current safeguards (administrative, physical, technical) and gaps.
  • Assign risk levels and prioritize remediation.
  • Produce a written risk management action plan with owners, timelines, and success criteria.

Repeat the assessment after major changes—such as new vendors, remote-work tools, or system migrations—and at a regular cadence to keep decisions current and defensible.

Practical tips for small teams

  • Keep the analysis lean but complete: short asset lists, simple process maps, and clear risk ratings.
  • Use plain language so business owners, HR, and IT understand the findings and actions.
  • Document every decision, including accepted risks and compensating controls.

Implementing Encryption for ePHI Protection

Understanding the addressable implementation specification

Encryption under the Security Rule is an addressable implementation specification. Addressable does not mean optional. You must implement encryption when reasonable and appropriate, or document why an alternative provides equivalent protection and how risks are otherwise mitigated.

Data at rest

  • Use full-disk encryption based on the Advanced Encryption Standard (for example, AES‑256) on laptops, desktops, and servers handling ePHI.
  • Encrypt databases, file shares, and backups; ensure removable media and mobile devices are encrypted and can be remotely wiped.
  • Manage keys securely: restrict access, rotate keys, back up keys safely, and separate key custodianship from system admins where possible.

Data in transit

  • Protect transmissions with modern protocols (e.g., TLS) for email, portals, and APIs.
  • Use secure messaging or portals for sharing ePHI rather than standard email; if email is necessary, apply message or attachment encryption.
  • Require VPN or zero-trust access for remote connections and enforce multifactor authentication.

Right-sizing for small employers

  • Enable built-in device encryption and MDM on company laptops and phones.
  • Adopt cloud services that support encryption by default and offer audit logs.
  • Capture your rationale and configurations in your risk management action plan.

Using the Security Risk Assessment Tool

What the tool does

A Security Risk Assessment Tool helps you structure evaluations of administrative, physical, and technical safeguards. It guides you through questions, captures notes and evidence, and produces reports you can share with leadership and auditors.

Step-by-step workflow

  1. Set your organizational profile and define the scope of ePHI.
  2. Work through control areas, noting threats, vulnerabilities, and current safeguards.
  3. Rate likelihood and impact to generate risk levels for each item.
  4. Export findings and create a prioritized risk management action plan.
  5. Attach artifacts (screenshots, policies, configurations) to support conclusions.

Use the tool’s notes to record decisions about any addressable implementation specification, including encryption choices and compensating controls.

Ready to assess your HIPAA security risks?

Join thousands of organizations that use Accountable to identify and fix their security gaps.

Take the Free Risk Assessment

Documenting Security Measures and Risk Management

What to document

  • Asset and data-flow inventories for systems handling electronic protected health information.
  • Policies and procedures for access control, incident response, contingency planning, and device/media handling.
  • Technical settings: encryption configurations, authentication, logging, and backup details.
  • Decisions on addressable implementation specifications with business and risk justifications.
  • The risk management action plan: owners, milestones, budget, and acceptance criteria.

How to organize it

  • Maintain version-controlled documents with approval dates and reviewers.
  • Centralize evidence (logs, training rosters, screenshots, vendor attestations) for quick retrieval.
  • Record exceptions and risk acceptances with expiration dates and review triggers.

Managing Business Associate Agreements

Identify and vet business associates

List all vendors that create, receive, maintain, or transmit ePHI on your behalf—IT service providers, cloud storage, benefits administrators, email and eFax platforms, shredding services, and consultants. Execute business associate agreements before sharing any ePHI.

Essential BAA terms

  • Permitted uses/disclosures and the minimum necessary standard.
  • Safeguard obligations (including encryption, access controls, and incident response).
  • Breach and security incident reporting timelines and cooperation duties.
  • Flow-down obligations to subcontractors, right to audit, and termination for cause.
  • Return or secure destruction of ePHI upon contract end.

Track renewal dates, current contacts, and security posture attestations for each vendor and align them with your risk management action plan.

Conducting Regular Audits and Updates

Operational cadence

  • Perform a security risk assessment at least annually and after material changes.
  • Review access rights quarterly; monitor audit logs continuously with monthly summaries.
  • Run vulnerability scans quarterly and patch high-risk findings promptly.
  • Test backups, incident response, and disaster recovery at least annually.
  • Re-evaluate vendors and business associate agreements each year.

Measure and improve

  • Track metrics such as time-to-remediate, patch currency, encryption coverage, and training completion rates.
  • Use results to update priorities and strengthen your security posture over time.

Conclusion

By completing a rigorous security risk assessment, implementing strong encryption, documenting safeguards, managing business associate agreements, and auditing regularly, you create a clear, defensible program. Small employers can meet HIPAA requirements efficiently by focusing on high-impact controls and maintaining an up-to-date risk management action plan.

FAQs.

What are the HIPAA risk analysis requirements for small employers?

You must perform an accurate and thorough assessment of risks and vulnerabilities to the confidentiality, integrity, and availability of ePHI. The analysis identifies where ePHI resides, evaluates threats and vulnerabilities, rates likelihood and impact, and drives a documented remediation plan.

How is encryption applied under HIPAA for covered entities?

Encryption is an addressable implementation specification. Implement it when reasonable and appropriate, or document why an alternative offers equivalent protection. In practice, small employers typically encrypt data at rest (e.g., AES-based full-disk and backups) and data in transit (e.g., TLS) and manage keys securely.

What documentation is required for HIPAA risk analysis compliance?

Maintain your risk assessment, asset and data-flow inventories, policies and procedures, technical configurations, decisions on addressable specifications, evidence of training and audits, incident and breach records, vendor due diligence, business associate agreements, and the current risk management action plan.

How often should risk assessments be updated for small covered entities?

Update at least annually and whenever significant changes occur—new systems, vendors, integrations, telework models, or incidents. Refresh the risk management action plan as you remediate findings or accept residual risks with documented justification and review dates.

Share this article

Ready to assess your HIPAA security risks?

Join thousands of organizations that use Accountable to identify and fix their security gaps.

Take the Free Risk Assessment

Related Articles