The Ultimate Guide to HIPAA Compliance: Rules, Requirements, and a Step-by-Step Checklist

Product Pricing
Ready to get started? Book a demo with our team
Talk to an expert

The Ultimate Guide to HIPAA Compliance: Rules, Requirements, and a Step-by-Step Checklist

Kevin Henry

HIPAA

December 02, 2025

7 minutes read
Share this article
The Ultimate Guide to HIPAA Compliance: Rules, Requirements, and a Step-by-Step Checklist

HIPAA Compliance Overview

HIPAA establishes national standards to protect the privacy and security of Protected Health Information (PHI), including Electronic Protected Health Information (ePHI). Its framework combines privacy requirements, security safeguards, and breach response obligations to reduce risk and build patient trust.

You achieve HIPAA compliance by implementing a risk-based program: identify how PHI flows through your environment, apply appropriate safeguards, train your workforce, and document everything. Compliance is continuous—policies, controls, and monitoring evolve as your technology, vendors, and threats change.

Covered Entities and Business Associates

Covered entities include health plans, most healthcare providers that conduct standard electronic transactions, and healthcare clearinghouses. Business associates are vendors or partners that create, receive, maintain, or transmit PHI on behalf of a covered entity; their subcontractors are also in scope when they handle PHI.

Business Associate Agreements (BAAs) are mandatory and must define permitted uses and disclosures, required safeguards, reporting duties for incidents and breaches, and the flow-down of obligations to subcontractors. A signed BAA does not replace your due diligence—both parties must perform Risk Analysis and ongoing oversight.

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Key HIPAA Rules

  • Privacy Rule: Governs how PHI may be used and disclosed, applies the minimum necessary standard, and grants individuals rights (access, amendments, restrictions, accounting of disclosures, and complaints).
  • Security Rule: Requires administrative, physical, and technical safeguards to protect the confidentiality, integrity, and availability of ePHI through a documented, risk-based program.
  • Breach Notification Rule: Requires timely notification to affected individuals, regulators, and, in some cases, the media after certain unauthorized uses or disclosures of unsecured PHI.
  • Enforcement Rule: Establishes investigation processes and civil monetary penalties that scale with the level of culpability and corrective action.

HIPAA Compliance Checklist

Step-by-step

  • Assign a Privacy Officer and a Security Officer with clear authority and responsibility.
  • Map PHI and ePHI: inventory systems, applications, devices, locations, users, and data flows (including cloud and mobile).
  • Perform a comprehensive Risk Analysis; prioritize risks and document a risk management plan with owners, budgets, and timelines.
  • Establish and maintain written policies: privacy practices, minimum necessary, Access Control, device and media handling, disposal, change management, encryption, and remote access.
  • Execute and maintain Business Associate Agreements (BAAs); validate vendor controls and monitor third-party risk.
  • Implement technical controls: unique IDs, least privilege, MFA, encryption in transit and at rest (where reasonable and appropriate), logging, and continuous monitoring.
  • Implement administrative and physical safeguards: workforce vetting, role-based access, facility controls, workstation security, and secure media handling.
  • Deliver role-based training and ongoing awareness; track completion and test with simulations.
  • Develop and test your Incident Response Plan, backup and disaster recovery plans, and emergency mode operations.
  • Establish auditing and review: log reviews, access verification, sanctions for violations, and internal assessments.
  • Prepare breach assessment and notification procedures aligned with the Breach Notification Rule.
  • Document everything and retain required records for at least six years.

Risk Assessment Process

Start with scope: list all assets that store, process, or transmit ePHI, including endpoints, servers, cloud services, integrations, and vendors. Identify where PHI enters, how it moves, where it’s stored, and how it leaves your environment.

Identify threats and vulnerabilities such as phishing, ransomware, lost or stolen devices, misconfigurations, inadequate Access Control, and vendor failures. Evaluate existing controls and determine likelihood and impact to rate inherent and residual risk.

Create a risk register with remediation actions, deadlines, and accountable owners. Use compensating controls where needed, and decide whether to mitigate, accept, transfer, or avoid each risk. Reassess at least annually and whenever you introduce significant changes, new systems, or vendors.

Document methodology, evidence, and decisions thoroughly; that documentation substantiates your Risk Analysis and ongoing risk management program.

Administrative Safeguards

  • Security management process: Risk Analysis, risk management, sanction policy, and information system activity review.
  • Assigned security responsibility: designate leadership for security operations and decision-making.
  • Workforce security and training: authorize, supervise, and terminate access appropriately; deliver periodic, role-based training and awareness.
  • Information access management: apply least privilege and role-based controls; regularly review and certify user access.
  • Security awareness and training: phishing simulations, alerts, and refresher content to sustain vigilance.
  • Security incident procedures: maintain and exercise an Incident Response Plan with detection, containment, investigation, and post-incident review.
  • Contingency planning: backup, disaster recovery, and emergency mode operations; test and document results.
  • Evaluation: perform periodic technical and nontechnical evaluations to validate program effectiveness.
  • Business associate oversight: execute BAAs and verify that vendors meet your standards.

Physical Safeguards

  • Facility access controls: restrict and log access to data centers, network closets, and records storage; protect against environmental hazards.
  • Workstation use and security: define acceptable use; deploy privacy screens, automatic screen locks, and secure workstation placement.
  • Device and media controls: maintain inventories; secure storage, transport, reuse, and disposal of devices and media containing ePHI; use validated destruction methods.
  • Visitor management: issue badges, escort visitors, and maintain logs; separate public and restricted areas.

Technical Safeguards

  • Access Control: unique user IDs, role-based permissions, just-in-time access, session timeouts, and emergency access procedures.
  • Authentication: strong passwords or passphrases, multi-factor authentication, and managed identities for service accounts.
  • Encryption and integrity: encrypt ePHI in transit and at rest where appropriate; apply integrity controls (hashing, digital signatures) to detect unauthorized changes.
  • Audit controls: centralize logs, monitor privileged activity, and alert on anomalies; retain logs for investigations.
  • Transmission security: enforce TLS, secure VPNs for remote access, and segment networks to isolate sensitive systems.
  • Endpoint and data protection: EDR, anti-malware, mobile device management, data loss prevention, and secure backups with periodic restore tests.

Breach Notification Requirements

A breach is an impermissible use or disclosure of unsecured PHI that compromises privacy or security. Conduct a documented, four-factor risk assessment considering the nature of PHI, the unauthorized person, whether PHI was actually acquired or viewed, and the mitigation performed.

Common exceptions include unintentional, good-faith access within scope of authority; inadvertent disclosures between authorized persons; and disclosures where the recipient cannot reasonably retain the information. If encryption renders PHI unusable, unreadable, or indecipherable, notification may not be required.

When notification is required, notify affected individuals without unreasonable delay and no later than 60 days after discovery. For incidents affecting 500 or more residents of a state or jurisdiction, also notify prominent media. Report breaches to the regulator; for fewer than 500 individuals, submit annually, and for 500 or more, submit without unreasonable delay and no later than 60 days.

Business associates must notify the covered entity without unreasonable delay (often sooner if the BAA specifies a shorter window). Preserve evidence, document decisions, and update your Incident Response Plan and controls based on lessons learned.

Conclusion

Effective HIPAA compliance blends sound governance, practical safeguards, and consistent execution. By performing rigorous Risk Analysis, enforcing strong Access Control, managing vendors with BAAs, and preparing for the Breach Notification Rule, you reduce risk, protect patients, and strengthen organizational resilience.

FAQs.

What entities are covered under HIPAA?

Covered entities include health plans, most healthcare providers that conduct standard electronic transactions, and healthcare clearinghouses. Business associates and their subcontractors are also in scope when they create, receive, maintain, or transmit PHI for a covered entity.

How often should a HIPAA risk assessment be conducted?

Perform a comprehensive Risk Analysis at least annually and whenever major changes occur—such as new systems, integrations, locations, or vendors. Treat risk assessment as an ongoing process, with continuous monitoring and periodic reviews.

What are the required safeguards under HIPAA?

HIPAA requires administrative, physical, and technical safeguards. These include policies and training, facility and device protections, and controls like Access Control, authentication, encryption (where appropriate), logging, integrity, and transmission security—all tailored by risk.

When must a HIPAA breach be reported?

Notify affected individuals without unreasonable delay and no later than 60 days after discovery. Report large breaches (500 or more individuals) promptly to regulators and, when applicable, to the media; smaller breaches are reported annually. Business associates must notify covered entities without unreasonable delay, consistent with the BAA.

Share this article

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Related Articles