Back to Resources
HIPAA Compliance Checklist — visual preview
Checklist

HIPAA Compliance Checklist

Privacy Rule, Security Rule & Breach Notification

Overview

HIPAA compliance is non-negotiable for any organization that touches protected health information. With OCR enforcement intensifying and breach settlement amounts regularly exceeding seven figures, having a thorough compliance program is a business imperative. This checklist breaks HIPAA into actionable components covering the Privacy Rule, Security Rule, and Breach Notification Rule with practical implementation steps for covered entities and business associates.

Privacy Rule Checklist

  • Designate a Privacy Officer responsible for policy development and compliance
  • Develop and distribute a Notice of Privacy Practices (NPP)
  • Implement minimum necessary standards for PHI access and disclosure
  • Establish procedures for patient rights: access, amendment, accounting of disclosures
  • Train workforce members on PHI handling within 60 days of hire
  • Obtain valid authorizations for uses and disclosures not permitted by the Privacy Rule
  • Maintain documentation of all privacy policies for at least six years

Security Rule Requirements

Safeguard categoryKey requirementsImplementation steps
AdministrativeRisk analysis, workforce security, contingency planningAnnual risk assessment, background checks, DR plan documentation
PhysicalFacility access, workstation security, device controlsBadge systems, clean desk policy, encrypted laptops, media sanitization
TechnicalAccess control, audit controls, integrity, transmission securityUnique user IDs, MFA, activity logging, encrypted email and messaging

Risk Analysis Process

The HIPAA risk analysis is the cornerstone of the Security Rule and the most cited deficiency in enforcement actions. Identify every system that creates, receives, maintains, or transmits ePHI. Document current safeguards for each system. Evaluate threats and vulnerabilities specific to your environment. Determine the likelihood and impact of each threat. Calculate risk levels and prioritize remediation. Update the risk analysis at least annually and after significant environmental changes. Document everything because regulators will ask for it.

Business Associate Management

  • Inventory all business associates that access PHI on your behalf
  • Execute Business Associate Agreements (BAAs) before sharing any PHI
  • Verify that BAAs include required provisions: permitted uses, safeguards, breach notification, termination rights
  • Assess business associate security practices during onboarding and periodically thereafter
  • Maintain copies of all BAAs and update them when relationships change
  • Document the process for terminating BAA relationships and retrieving or destroying PHI

Breach Response Obligations

Establish a breach investigation and reporting process before a breach occurs. When a potential breach is identified, conduct the four-factor risk assessment to determine if notification is required: nature and extent of PHI involved, unauthorized person who used or received the PHI, whether PHI was actually acquired or viewed, and extent of risk mitigation. For reportable breaches, notify affected individuals within 60 days, HHS OCR, and media outlets if 500 or more residents of a state are affected. Maintain a breach log for all incidents regardless of size.

Frequently Asked Questions

Does HIPAA apply to all healthcare organizations?

HIPAA applies to covered entities (healthcare providers who transmit health information electronically, health plans, and healthcare clearinghouses) and their business associates. Not all healthcare organizations are covered, but most that handle electronic health information are.

What qualifies as PHI under HIPAA?

Any individually identifiable health information that relates to past, present, or future physical or mental health conditions, provision of healthcare, or payment for healthcare. This includes 18 specific identifiers such as names, dates, Social Security numbers, and medical record numbers.

How often should HIPAA training be conducted?

All workforce members must be trained on HIPAA policies and procedures within a reasonable time of hiring and whenever there are material changes to policies. Most organizations conduct annual refresher training as a best practice.

What are the penalties for HIPAA non-compliance?

Civil monetary penalties range from $137 to $68,928 per violation, with annual caps up to $2,067,813. Criminal penalties can reach $250,000 in fines and up to 10 years imprisonment for knowing misuse of PHI.

Is cloud storage HIPAA compliant?

Cloud storage can be HIPAA compliant if the cloud service provider signs a BAA, implements appropriate safeguards, and meets the Security Rule requirements. Major providers like AWS, Azure, and Google Cloud offer HIPAA-eligible services.

Ready to use this resource?

Download it now or schedule a demo to see how Hunto AI can automate your security workflows.

Book a Demo

© 2026 Hunto AI. Copyright. All Rights Reserved