Ultimate HIPAA Compliance Checklist for Medical Practices in 2023

Check out the new compliance progress tracker


Product Pricing Demo Video Free HIPAA Training
LATEST
video thumbnail
Admin Dashboard Walkthrough Jake guides you step-by-step through the process of achieving HIPAA compliance
Ready to get started? Book a demo with our team
Talk to an expert

Ultimate HIPAA Compliance Checklist for Medical Practices in 2023

Kevin Henry

HIPAA

January 11, 2024

8 minutes read
Share this article
Ultimate HIPAA Compliance Checklist for Medical Practices in 2023

HIPAA Compliance Overview

HIPAA sets national standards for protecting patient information handled by covered entities and their business associates. It governs how you use, disclose, and safeguard protected health information (PHI), including electronic Protected Health Information (ePHI), across clinical, billing, and operational workflows.

Your compliance program should integrate the Privacy Rule, Security Rule, and Breach Notification Rule into daily practice. Assign a Privacy Officer and a Security Officer, define clear responsibilities, and ensure leadership support, budget, and tools to sustain the program over time.

  • Identify where PHI/ePHI resides, flows, and is stored across systems and vendors.
  • Adopt written policies and procedures aligned to HIPAA requirements and your operations.
  • Train your workforce regularly and enforce a sanctions policy for violations.
  • Complete a documented risk analysis, implement risk-based safeguards, and track remediation.
  • Maintain Business Associate Agreements (BAAs) and monitor vendor compliance.
  • Prepare for incidents with breach notification protocols and tested contingency plans.

Privacy Rule Requirements

Deliver a clear Notice of Privacy Practices to patients at the first service encounter, post it prominently in your facility and on your website, and make a good-faith effort to obtain written acknowledgment. Review and update the notice when your privacy practices change, and retain prior versions per retention rules.

Limit uses and disclosures to treatment, payment, and healthcare operations unless an authorization or specific exception applies. Apply the minimum necessary standard to routine disclosures and internal access, tailoring role-based access to what each job requires.

Operationalize patient rights: timely access to records, amendments, restrictions where feasible, confidential communications, and accounting of disclosures when required. Document processes, track timelines, and provide simple request forms so staff can execute consistently.

Designate a Privacy Officer, maintain a complaint process without retaliation, and enforce a sanctions policy. Ensure physical conversations, waiting room practices, and workstation placement prevent incidental disclosures and uphold patient dignity.

Security Rule Requirements

The Security Rule requires safeguards—administrative, physical, and technical—scaled to your risks. Your goal is to ensure the confidentiality, integrity, and availability of ePHI while enabling efficient care delivery.

  • Administrative safeguards: perform a risk analysis, manage risks, assign security responsibility, manage workforce access, conduct security awareness training, define incident response, and integrate security into vendor and change management.
  • Physical safeguards: control facility access, secure server/network closets, define workstation use and placement, and manage device and media controls (inventory, encryption, secure disposal, and media reuse procedures).
  • Technical safeguards: implement unique user IDs, strong authentication (preferably MFA), role-based access, automatic logoff, audit logs with regular review, integrity monitoring, and encryption for data in transit and at rest where feasible.

Keep systems patched, segment networks for clinical systems, and restrict remote access through VPNs or zero-trust methods. If mobile devices or removable media touch ePHI, require encryption and remote wipe, and prohibit local storage when possible.

Risk Assessment Procedures

Begin with an enterprise-wide inventory of assets that create, receive, maintain, or transmit ePHI—EHRs, billing systems, imaging, patient portals, backups, and vendor platforms. Map data flows to understand where information originates, travels, and is stored.

Identify reasonably anticipated threats and vulnerabilities (technical, physical, and human). Estimate likelihood and impact to compute risk levels, then prioritize remediation in a risk register with owners and due dates. Document compensating controls and residual risk after mitigation.

Close the loop by validating fixes, updating policies and training where needed, and reporting status to leadership. Repeat the risk analysis periodically—at least annually and whenever you introduce new technology, workflows, locations, or vendors.

Business Associate Agreements Management

Catalog all vendors that handle PHI/ePHI—EHR and RCM providers, cloud services, IT support, e-fax, transcription, labs, telehealth, and analytics firms. Execute Business Associate Agreements before sharing PHI, and ensure subcontractors are bound to the same protections.

BAAs should define permitted uses/disclosures, require administrative, physical, and technical safeguards, mandate prompt breach reporting, and obligate cooperation with access, amendment, and accounting requests. Include HHS access rights, secure return/destruction of PHI on termination, and a termination clause for material breach.

Perform reasonable due diligence (security questionnaires, SOC reports, or attestations), track renewal dates, and monitor performance. Standardize breach reporting expectations in BAAs to support your breach notification timelines.

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Employee Training Programs

Train all workforce members at onboarding and at least annually, with role-specific modules for front desk, clinical staff, billing, and IT. Reinforce the minimum necessary standard, privacy at the point of care, and practical steps for handling paper and electronic records.

Cover phishing and social engineering, password and MFA hygiene, device and media handling, secure texting/telehealth, and incident reporting. Document attendance, test comprehension, and use simulated exercises to keep awareness high.

Incorporate sanctions for noncompliance and celebrate positive behaviors to build a culture of privacy and security. Refresh training promptly when policies change or new systems go live.

Breach Notification Protocols

Establish a rapid response playbook: identify, contain, and investigate suspected incidents. Conduct a risk assessment considering the nature and extent of PHI, who received it, whether it was actually viewed or acquired, and the extent of mitigation. If you cannot demonstrate a low probability of compromise, treat the event as a breach.

Follow breach notification timelines: notify affected individuals without unreasonable delay and no later than 60 calendar days after discovery. For incidents affecting 500 or more individuals in a state or jurisdiction, notify prominent media and the Department of Health and Human Services (HHS) within 60 days. For fewer than 500 individuals, report to HHS no later than 60 days after the end of the calendar year.

Individual notices must describe what happened, the types of information involved, steps individuals should take, what you are doing to investigate and mitigate harm, and contact information. Use first-class mail or secure electronic delivery if the patient agreed to it; provide substitute notice if contact information is insufficient.

Coordinate closely with business associates to meet deadlines; your BAAs should require prompt reporting to your practice so you can assess, decide, and notify on time. Preserve evidence, document decisions, and maintain a breach log for smaller incidents.

Documentation and Policies Maintenance

Maintain a centralized, version-controlled repository for policies, procedures, risk analyses, training records, BAAs, incident logs, and system inventories. Ensure documents are easy for staff to find and follow during daily work and emergencies.

Review policies at least annually and upon operational or legal changes. Retain required documentation for a minimum of six years from creation or last effective date, whichever is later. Record when policies are communicated and when workforce training occurs.

Use simple, actionable formats—checklists, quick-reference guides, and forms—so staff can execute consistently. Align forms and workflows with your EHR and ticketing systems to capture evidence of compliance automatically.

Contingency Planning Strategies

Implement contingency plans to ensure the availability of ePHI during emergencies. Create a data backup plan with secure, encrypted, and routinely tested backups; define recovery point and recovery time objectives that match clinical needs.

Draft a disaster recovery plan to restore systems after outages or cyberattacks, and an emergency mode operations plan to keep critical services running under degraded conditions. Include communication trees, vendor contacts, manual downtime procedures, and steps for safe return to normal operations.

Test plans through tabletop exercises and technical failover drills, document lessons learned, and update procedures. Extend planning to key vendors, ensuring BAAs and service agreements support your recovery objectives.

In summary, build a living HIPAA program: document your practices, train your team, analyze and mitigate risks, manage Business Associate Agreements, respond quickly to incidents, and keep contingency plans ready. This disciplined approach protects patients, supports compliance, and strengthens clinical resilience.

FAQs.

What are the main components of HIPAA compliance for medical practices?

The core components are the Privacy Rule (use/disclosure of PHI and patient rights), the Security Rule (administrative, physical, and technical safeguards for ePHI), and the Breach Notification Rule (assessment and notification duties after incidents). A complete program also includes ongoing risk analysis, Business Associate Agreements, workforce training, documentation, and contingency plans.

How often should risk assessments be conducted for ePHI?

Perform an initial, enterprise-wide risk analysis, then reassess at least annually and whenever you introduce significant changes—new EHR modules, cloud services, locations, mergers, or integration projects. Treat risk analysis as a continuous process with remediation tracking and leadership reporting.

What are the requirements for Business Associate Agreements under HIPAA?

BAAs must set permitted uses/disclosures of PHI, require appropriate safeguards (administrative, physical, and technical), mandate prompt incident and breach reporting, ensure subcontractor compliance, support patient rights processes, allow HHS access, and require secure return or destruction of PHI upon termination. They should also permit termination for material breach.

How must breaches involving patient data be reported?

Notify affected individuals without unreasonable delay and no later than 60 days after discovery. For breaches impacting 500+ individuals in a state or jurisdiction, also notify prominent media and HHS within 60 days; for fewer than 500, report to HHS within 60 days of the end of the calendar year. Document your assessment, notifications, and remediation steps in your breach log.

Share this article

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Related Articles