The Essential HIPAA Compliance Checklist for Healthcare Billing Companies

Product Pricing
Ready to get started? Book a demo with our team
Talk to an expert

The Essential HIPAA Compliance Checklist for Healthcare Billing Companies

Kevin Henry

HIPAA

November 21, 2025

8 minutes read
Share this article
The Essential HIPAA Compliance Checklist for Healthcare Billing Companies

Healthcare billing companies handle large volumes of protected health information (PHI) across claims, remittances, clearinghouses, and payer portals. To stay compliant and resilient, you must operationalize the HIPAA Privacy Rule, Security Rule, and Breach Notification Rule through clear policies, strong controls, and repeatable routines.

This checklist translates regulatory requirements into day-to-day actions. Work through each section to verify how you govern PHI, contract with partners, harden systems, train staff, manage risk, enforce access controls, and respond to incidents.

Protected Health Information Management

Scope and data inventory

Identify all PHI and ePHI your team touches, including claims data, eligibility files, remittance advices, EOB images, call recordings, and support tickets. Map where PHI originates, flows, is stored, processed, and transmitted across systems, vendors, and locations.

  • Maintain a living data inventory with systems, owners, purposes, locations, and retention periods.
  • Distinguish PHI from de-identified data; document de-identification methods and re-identification safeguards.
  • Track transfer points and monitor Electronic Data Interchange (EDI) logs for anomalies and unauthorized disclosures.

Minimum necessary and lifecycle controls

Apply the minimum necessary standard to each workflow. Limit what you collect, view, transmit, and retain to what a task truly requires, and control PHI across its entire lifecycle.

  • Standardize intake forms and data fields to avoid over-collection.
  • Use purpose-based masking and redaction in tickets, screenshots, and exports.
  • Enforce retention schedules; securely dispose of paper and electronic media using approved methods.

Handling, transmission, and documentation

Encrypt PHI in transit and at rest, and use authenticated channels for exchanges with payers and providers. Document permissible uses and disclosures under the HIPAA Privacy Rule to support audits and patient rights.

  • Use secure APIs, SFTP, or managed file transfer; prohibit ad hoc email attachments unless encrypted.
  • Maintain disclosure logs and patient access request workflows with defined turnaround times.
  • Periodically reconcile EDI logs, ticketing records, and disclosure logs to detect gaps.

Business Associate Agreements

When you need a Business Associate Agreement (BAA)

Execute a Business Associate Agreement (BAA) with every covered entity you serve and with each subcontractor that creates, receives, maintains, or transmits PHI on your behalf. No PHI should flow until a BAA is fully executed.

Non‑negotiable components to include

  • Permitted and required uses/disclosures of PHI and explicit prohibitions.
  • Administrative, physical, and technical safeguards aligned to the Security Rule.
  • Breach and incident reporting duties, including timelines, content, and cooperation requirements.
  • Flow‑down clauses obligating subcontractors to the same protections.
  • Support for individual rights: access, amendments, and accounting of disclosures.
  • Audit and inspection rights, record retention, and secure return or destruction of PHI at termination.
  • Termination for cause tied to material breach and cure periods.

Oversight and maintenance

Centralize all BAAs, track expirations and versions, and review at least annually or upon service or regulatory changes. Pair BAA governance with vendor due diligence, security questionnaires, and proof of controls.

Privacy and Security Best Practices

Policy foundation

Publish a cohesive policy set that maps to the HIPAA Privacy Rule and Security Rule. Translate policies into step‑by‑step procedures for intake, coding, billing, customer support, telework, and vendor access.

Administrative, physical, and technical safeguards

  • Administrative: risk analysis, workforce training, sanctions, contingency planning, and vendor management.
  • Physical: facility access controls, device security, clean desk, and secure media handling.
  • Technical: encryption, access controls, audit logging, integrity controls, and transmission security.

Operational hardening and monitoring

Harden endpoints and servers with patching, EDR, and configuration baselines. Centralize log collection, set alerts for suspicious behavior, and retain logs to support investigations and accounting of disclosures.

  • Enable data loss prevention for email and file sharing; restrict removable media.
  • Continuously monitor EDI logs, authentication logs, and admin activity; review high‑risk events weekly.
  • Test backups and recovery; document results and corrective actions.

Mandatory Staff Training

Audience, cadence, and format

Train all workforce members—employees, temps, contractors, and executives—during onboarding and at least annually. Provide role‑based modules for billers, coders, support agents, IT, and leadership, with real‑world billing scenarios.

Core curriculum

  • HIPAA Privacy Rule basics, minimum necessary, and common disclosure pitfalls.
  • Security Rule safeguards, phishing and social engineering, remote work hygiene, and Multi‑Factor Authentication (MFA).
  • Incident identification and prompt reporting, including misdirected faxes, emails, and EDI misroutes.

Evidence and effectiveness

Record attendance, completion dates, and quiz scores. Run periodic phishing simulations and targeted refreshers for repeat offenders. Keep training artifacts for audits and BAA evidence requests.

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Risk Analysis and Management

Performing the analysis

Inventory assets, data flows, and vendors; identify threats and vulnerabilities; then rate likelihood and impact to produce a risk register. Complement the Security Rule risk analysis with Privacy Impact Assessments (PIAs) when launching new processes or tools.

Treating and tracking risk

  • Prioritize remediation for high risks; assign owners and due dates; define acceptance criteria for residual risk.
  • Implement targeted controls, such as encryption, MFA expansion, network segmentation, or process redesign.
  • Validate fixes with testing and update the risk register to reflect new exposure levels.

Continuous cycle

Reassess at least annually and after major changes like new billing platforms, vendor onboarding, mergers, or remote‑work shifts. Use vulnerability scans, penetration tests, and control audits to feed the next analysis cycle.

Access Control Implementation

Principles and governance

Apply least privilege and separation of duties across all billing systems and data stores. Define standard roles with pre‑approved permissions and document exception processes for urgent “break‑glass” access.

User lifecycle and reviews

  • Automate provisioning from HR events; remove access immediately at offboarding.
  • Perform quarterly access recertifications for high‑risk systems and shared mailboxes.
  • Harden service accounts; prohibit shared credentials; rotate secrets regularly.

Authentication and session security

Require Multi‑Factor Authentication (MFA) for any system that stores or accesses ePHI, including VPN, SSO, and admin consoles. Enforce strong passwords, session timeouts, device compliance checks, and IP/geo restrictions where feasible.

Remote and third‑party access

Gate remote access through secure VPN or zero‑trust gateways with logging and alerting. For vendors, limit to scoped accounts, time‑bound access, and monitored sessions; capture activity for forensics and accounting of disclosures.

Incident Response and Reporting

Team, playbooks, and readiness

Establish an on‑call incident response team with clear roles, contact trees, and decision authority. Create playbooks for common billing scenarios such as misaddressed statements, EDI misroutes, lost devices, malware, and suspicious portal access.

Breach assessment and notifications

Use the HIPAA four‑factor assessment to determine breach probability: the PHI type and sensitivity, the unauthorized recipient, whether PHI was actually acquired or viewed, and mitigation performed. If a breach is confirmed, follow the Breach Notification Rule.

  • Notify affected individuals without unreasonable delay and no later than 60 days after discovery.
  • Report to HHS; for incidents affecting 500 or more individuals in a state or jurisdiction, also notify prominent media.
  • For fewer than 500 individuals, log the incident and submit the annual HHS report within required timelines.

Post‑incident improvement

Perform root‑cause analysis, update controls and training, and document corrective actions. Re‑evaluate risks and revise policies, procedures, and BAAs if obligations or safeguards change.

Conclusion

By operationalizing this HIPAA compliance checklist—governing PHI, tightening BAAs, enforcing privacy and security controls, training your people, managing risk, restricting access with MFA, and executing an effective incident program—you protect patients, strengthen payer and provider trust, and keep your billing operations audit‑ready.

FAQs

What constitutes protected health information under HIPAA?

PHI is individually identifiable health information—such as names, addresses, dates, account numbers, claim details, or images—that relates to a person’s health, care, or payment and is created or received by a covered entity or business associate. When data is properly de‑identified, it is no longer PHI.

How often should healthcare billing companies perform risk assessments?

Conduct a comprehensive risk analysis at least annually and whenever significant changes occur—new systems, vendors, workflows, office moves, or telework shifts. Supplement with continuous activities like vulnerability scanning, access reviews, and targeted Privacy Impact Assessments (PIAs).

What are the key components of a Business Associate Agreement?

A solid BAA specifies permitted uses/disclosures, required safeguards under the Security Rule, breach and incident reporting duties, subcontractor flow‑down, support for individual rights, audit rights, record retention, and secure return or destruction of PHI at termination, plus termination for cause tied to material breach.

How should incidents involving PHI breaches be reported?

Escalate internally immediately, contain the issue, and perform the four‑factor risk assessment. If it’s a breach, notify affected individuals without unreasonable delay and within 60 days, report to HHS per thresholds, and notify media when 500 or more individuals in a state or jurisdiction are affected. Document actions and corrective measures.

Share this article

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Related Articles