CDMP Fundamentals • 100 Questions • 90 Minutes
← Back to HIPAA Compliance

HIPAA Compliance Checklist

Use this comprehensive checklist to assess the organization's compliance with all major HIPAA requirements. Each item maps to a specific regulation reference and includes a priority level and a beginner tip. Work through each category systematically, marking items as Compliant, Partially Compliant, Non-Compliant, or Not Applicable.

Administrative Safeguards

Conduct a comprehensive risk analysis identifying threats and vulnerabilities to all ePHI

164.308(a)(1)(ii)(A) Critical

💡 This is the single most important HIPAA requirement. Use the HHS Security Risk Assessment Tool (free) or NIST SP 800-30 methodology. Document EVERYTHING.

Implement a risk management plan to reduce identified risks to reasonable levels

164.308(a)(1)(ii)(B) Critical

💡 The risk management plan is your compliance roadmap. For each risk identified in the risk analysis, document the planned action, responsible person, timeline, and status.

Implement and enforce a sanction policy for workforce HIPAA violations

164.308(a)(1)(ii)(C) High

💡 Create a progressive discipline policy: first offense education, second offense written warning, third offense suspension or termination. Ensure consistency.

Conduct regular review of information system activity (audit log review)

164.308(a)(1)(ii)(D) High

💡 At minimum, review access logs monthly for anomalies. Set up automated alerts for high-risk events like after-hours access or bulk data downloads.

Designate a Security Officer responsible for security policies and procedures

164.308(a)(2) Critical

💡 This must be a named individual with documented responsibilities. In small practices, this can be the same person as the Privacy Officer.

Implement workforce authorization and supervision procedures

164.308(a)(3)(ii)(A) High

💡 Define who is authorized to access what ePHI. Create an access authorization matrix mapping roles to systems and data access levels.

Implement workforce clearance procedures for positions accessing ePHI

164.308(a)(3)(ii)(B) Medium

💡 Consider background checks for positions with access to sensitive ePHI. At minimum, verify credentials and references for all positions with PHI access.

Implement termination procedures that revoke ePHI access when workforce members leave

164.308(a)(3)(ii)(C) Critical

💡 Create a termination checklist: revoke Active Directory access, EHR access, VPN access, badge access, email access, and collect all devices. Complete within 24 hours of termination.

Implement information access management policies and procedures

164.308(a)(4)(i) High

💡 Establish a formal process: access request form, manager approval, security review, IT provisioning, documentation. No access without documented authorization.

Deliver security awareness training to all workforce members

164.308(a)(5)(i) Critical

💡 Train all staff at hire and annually thereafter. Include: PHI identification, password security, phishing awareness, physical security, incident reporting. Document all training with signed acknowledgments.

Implement security incident response procedures

164.308(a)(6)(i) Critical

💡 Create a clear incident response plan with roles, responsibilities, and escalation procedures. Conduct tabletop exercises at least annually.

Establish a contingency plan including data backup, disaster recovery, and emergency mode operations

164.308(a)(7)(i) Critical

💡 Implement automated, encrypted backups with offsite storage. Define RTOs and RPOs for each critical system. Test backup restoration quarterly.

Conduct periodic security evaluations

164.308(a)(8) High

💡 Evaluate your security program at least annually and after any significant changes. Consider engaging an independent assessor for objectivity.

Execute Business Associate Agreements with all vendors that access PHI

164.308(b)(1) Critical

💡 Inventory ALL vendors that touch PHI. No BAA = no PHI access. Track all BAAs in a central register with execution dates and review dates.

Physical Safeguards

Implement facility access controls to limit physical access to ePHI systems

164.310(a)(1) High

💡 Server rooms must be locked with access logging. Use badge readers or key cards for sensitive areas. Implement visitor sign-in procedures.

Establish workstation use policies specifying proper functions and physical attributes of workstation surroundings

164.310(b) Medium

💡 Ensure screens displaying PHI are not visible to unauthorized persons. Use privacy filters in public areas. Configure automatic screen lock.

Implement physical safeguards for workstations to restrict access to authorized users

164.310(c) High

💡 Encrypt all laptops. Use cable locks in shared spaces. Maintain a workstation inventory. Establish lost/stolen device reporting procedures.

Implement device and media disposal procedures ensuring ePHI is destroyed before disposal

164.310(d)(2)(i) Critical

💡 Never dispose of any device or media without secure wiping or physical destruction. Get certificates of destruction. Remember: old copiers and printers have internal hard drives.

Implement device and media re-use procedures to remove ePHI before re-use

164.310(d)(2)(ii) High

💡 Before repurposing any device, perform a certified wipe of all data. Reformatting is NOT sufficient — use NIST 800-88 guidelines for media sanitization.

Maintain accountability records for hardware and media movement

164.310(d)(2)(iii) Medium

💡 Track all devices containing ePHI: serial numbers, locations, assigned users, and movement history. Conduct annual physical inventory verification.

Technical Safeguards

Assign unique user identifiers for all users accessing ePHI (no shared accounts)

164.312(a)(2)(i) Critical

💡 Every single person gets their own login. Shared accounts like 'frontdesk' or 'nurse1' must be eliminated. This is non-negotiable.

Establish emergency access (break-glass) procedures for ePHI systems

164.312(a)(2)(ii) High

💡 Create a documented process for accessing ePHI in emergencies. Break-glass access should be logged, reviewed after every use, and reserved for genuine emergencies only.

Implement automatic logoff on all systems accessing ePHI

164.312(a)(2)(iii) High

💡 Configure screen lock after 2-5 minutes of inactivity in clinical areas, up to 15 minutes in private offices. Use Group Policy to enforce consistently.

Implement encryption for ePHI at rest and in transit

164.312(a)(2)(iv) Critical

💡 Encrypt databases (TDE), laptops (BitLocker/FileVault), backups, and all network transmissions (TLS 1.2+). Encryption is the HIPAA safe harbor — encrypted data lost/stolen is NOT a breach.

Implement audit controls that record and examine activity in ePHI systems

164.312(b) Critical

💡 Log all access to PHI: who, what, when, where, and how. Review logs regularly. Retain logs for 6 years. Use a SIEM if budget allows.

Implement integrity controls to protect ePHI from improper alteration or destruction

164.312(c)(1) High

💡 Use database constraints, triggers, and checksums. Implement file integrity monitoring. Never allow hard deletes of clinical records — use soft deletes with audit trails.

Implement person or entity authentication mechanisms

164.312(d) Critical

💡 Deploy MFA for all remote access and administrative accounts. Implement strong password policies. Prohibit shared credentials and default passwords.

Implement transmission security controls including encryption for ePHI in transit

164.312(e)(1) Critical

💡 Use TLS 1.2+ for all web traffic, encrypted VPN for remote access, secure email for PHI. Disable legacy protocols (SSLv3, TLS 1.0/1.1). Never send PHI over unencrypted channels.

Privacy Rule Policies

Designate a Privacy Officer responsible for privacy policies and procedures

164.530(a)(1) Critical

💡 This must be a named individual. In small practices, the same person can serve as both Privacy and Security Officer. Document the designation in writing.

Develop and distribute a Notice of Privacy Practices to all patients

164.520 Critical

💡 Provide the NPP to every new patient, post it in the facility, and publish it on your website. Obtain acknowledgment of receipt (not required for refusal, but best practice to document attempts).

Implement Minimum Necessary policies for all uses and disclosures (except treatment)

164.502(b) High

💡 For each type of PHI use or disclosure, define what the minimum necessary information is. Train staff to share only what is needed, not entire records.

Establish procedures for patient rights: access, amendment, accounting, restrictions, confidential communications

164.524-164.528 Critical

💡 Create standardized forms and workflows for each patient right. Track requests with deadlines. The right to access (30 days) is the most common and most enforced.

Implement authorization procedures for uses and disclosures beyond TPO

164.508 High

💡 Create a valid authorization form that includes: description of PHI, who is disclosing, who is receiving, purpose, expiration date, right to revoke, and signature.

Train all workforce members on privacy policies and procedures

164.530(b) Critical

💡 Train at hire and annually. Include: what PHI is, permitted uses/disclosures, patient rights, minimum necessary, and how to report concerns. Document all training.

Breach Notification

Implement breach identification and investigation procedures

164.400-164.414 Critical

💡 Create a clear process for reporting suspected breaches. Train all staff to recognize and report potential breaches immediately.

Establish 4-factor risk assessment methodology for breach determination

164.402 Critical

💡 Document your methodology for evaluating: nature of PHI, who accessed it, whether it was actually viewed, and extent of mitigation. Every incident must go through this assessment.

Establish individual notification procedures (within 60 days of discovery)

164.404 Critical

💡 Pre-draft notification letter templates. Establish procedures for sending first-class mail or email (with prior consent). Include all required content elements.

Establish HHS notification procedures (within 60 days for 500+ affected; annual log for fewer)

164.408 Critical

💡 Know the HHS breach portal URL and have credentials ready. For breaches of 500+, you must report immediately (within 60 days). For smaller breaches, maintain a log and submit annually.

Establish media notification procedures for breaches affecting 500+ residents of a jurisdiction

164.406 High

💡 Prepare a media notification template and identify prominent local media outlets in advance. Have a communications plan ready before you need it.

Maintain a breach log for all breaches affecting fewer than 500 individuals

164.408(c) High

💡 Create a breach log spreadsheet: date discovered, date of breach, number affected, type of PHI, description, individuals notified, HHS reported (annual submission).

Business Associate Management

Maintain a complete inventory of all Business Associates

164.308(b)(1) Critical

💡 Review all vendor contracts and accounts payable records. Any vendor that accesses, creates, receives, stores, or transmits PHI on your behalf is a BA.

Execute BAAs with all Business Associates before sharing any PHI

164.308(b)(1) Critical

💡 No BAA = no PHI sharing. This is absolute. If a vendor refuses to sign a BAA, find a different vendor.

Ensure BAAs contain all required Omnibus Rule provisions

164.314(a)(2) High

💡 Key provisions: safeguard implementation, breach notification, subcontractor requirements, access termination, PHI return/destruction, compliance with applicable Security Rule requirements.

Monitor Business Associate compliance (annual assessments or certifications)

164.308(b)(1) Medium

💡 Request SOC 2 Type II reports, HITRUST certifications, or send annual compliance questionnaires. Document your due diligence efforts.

Require BAs to ensure their subcontractors also comply with HIPAA

164.314(a)(2)(i)(B) High

💡 Your BAA must require BAs to flow down HIPAA obligations to any subcontractors who access PHI. Ask BAs for their subcontractor management procedures.

Training and Awareness

Deliver HIPAA privacy training to all workforce members at hire

164.530(b)(1) Critical

💡 Training should occur within 30 days of hire, ideally before the employee accesses any PHI. Cover basic privacy concepts, patient rights, and organizational policies.

Deliver HIPAA security awareness training to all workforce members at hire

164.308(a)(5)(i) Critical

💡 Cover: password security, phishing recognition, physical security, device security, incident reporting, and social engineering awareness.

Conduct annual HIPAA refresher training for all workforce members

164.530(b)(1) and 164.308(a)(5)(i) Critical

💡 Annual training should cover new threats, policy updates, lessons learned from incidents, and reinforce core concepts. Track completion and follow up on non-completions.

Deliver additional training when policies or procedures change materially

164.530(b)(2)(i)(C) High

💡 When you update a HIPAA policy, deliver targeted training to affected staff within a reasonable time. Document the training with the specific policy change covered.

Maintain training documentation for at least 6 years

164.530(j)(2) Critical

💡 Keep records of: training date, attendees, content covered, trainer, assessment results, and signed acknowledgments. Use an LMS for automated tracking and reporting.