HIPAA
Checklist

HIPAA Compliance Checklist: Complete Guide for Healthcare Organizations in 2026

HIPAA compliance is mandatory for covered entities (healthcare providers, health plans, and clearinghouses) and their business associates that handle Protected Health Information. This checklist covers the Security Rule, Privacy Rule, and Breach Notification Rule requirements to help your organization protect patient data and avoid costly penalties. Use it to build or strengthen your HIPAA compliance program from the ground up.

Checklist Overview
28items across 4 phases

Work through each phase in order. Most organizations complete this checklist in 4-8 months for initial compliance program; ongoing maintenance required.

Phase 1: Prepare

6 items in this phase

1

Determine covered entity or business associate status

Confirm whether your organization qualifies as a covered entity or business associate under HIPAA. This determination drives your specific compliance obligations and the rules that apply to your organization.

2

Designate a HIPAA Privacy Officer and Security Officer

Appoint individuals responsible for developing and implementing your HIPAA privacy and security programs. These may be the same person in smaller organizations but must be formally designated.

3

Inventory all systems that create, receive, store, or transmit PHI

Map every system, application, device, and medium that handles Protected Health Information. Include electronic, paper, and oral forms of PHI in your inventory.

4

Conduct a comprehensive risk analysis

Perform the risk analysis required by the Security Rule to identify threats and vulnerabilities to ePHI. Assess the likelihood and impact of potential risks and document your findings thoroughly.

5

Identify all business associates and subcontractors

Create a comprehensive list of all vendors, contractors, and partners that access, process, or store PHI on your behalf. Each requires a Business Associate Agreement.

6

Assess current state against HIPAA requirements

Compare your existing policies, procedures, and technical controls against all HIPAA Security Rule administrative, physical, and technical safeguards. Document gaps requiring remediation.

Phase 2: Implement

11 items in this phase

7

Develop and implement Security Rule policies

Create policies addressing all administrative, physical, and technical safeguards required by the HIPAA Security Rule. Include workforce security, facility access, workstation use, and device controls.

8

Develop and implement Privacy Rule policies

Create policies governing the use and disclosure of PHI, including minimum necessary standards, patient rights, and Notice of Privacy Practices requirements.

9

Execute Business Associate Agreements

Negotiate and execute BAAs with all identified business associates and subcontractors. Ensure agreements include required provisions for PHI protection, breach notification, and termination.

10

Implement access controls for ePHI

Deploy unique user identification, emergency access procedures, automatic logoff, and encryption mechanisms. Implement role-based access ensuring workforce members only access PHI necessary for their job functions.

11

Deploy audit controls and activity logging

Implement hardware, software, and procedural mechanisms to record and examine access to systems containing ePHI. Ensure logs capture who accessed what data, when, and from where.

12

Implement encryption for ePHI at rest and in transit

Encrypt all ePHI using industry-standard algorithms. While HIPAA treats encryption as addressable rather than required, unencrypted ePHI breaches trigger notification obligations, making encryption a de facto requirement.

13

Create a breach notification procedure

Establish a process for detecting, investigating, and reporting breaches of unsecured PHI. Include notification to affected individuals (within 60 days), HHS, and media for breaches affecting 500+ individuals.

14

Develop a contingency plan

Create data backup, disaster recovery, and emergency mode operation plans for systems containing ePHI. Test the contingency plan periodically to ensure PHI can be recovered and systems restored.

15

Conduct workforce HIPAA training

Train all workforce members on HIPAA privacy and security requirements, your organization-specific policies, and their responsibilities for protecting PHI. New employees must be trained within a reasonable period of hiring.

16

Implement physical safeguards

Control physical access to facilities and workstations where ePHI is accessible. Implement policies for workstation use, mobile device management, and proper disposal of media containing ePHI.

17

Establish a sanctions policy for violations

Create and communicate a sanctions policy that outlines disciplinary actions for workforce members who violate HIPAA policies. Document all sanctions applied and maintain records.

Phase 3: Audit

6 items in this phase

18

Conduct an internal HIPAA compliance audit

Perform a thorough audit of all Security Rule, Privacy Rule, and Breach Notification Rule requirements. Test administrative, physical, and technical safeguards for effectiveness.

19

Review audit logs and access reports

Analyze system access logs to identify unauthorized access attempts, unusual patterns, or policy violations. Document findings and take corrective action for any identified issues.

20

Verify Business Associate Agreement compliance

Review all BAAs for completeness and currency. Verify that business associates are meeting their contractual obligations through attestations, audits, or security assessments.

21

Test incident response and breach notification procedures

Run a tabletop exercise simulating a PHI breach. Verify that the response team can detect, contain, assess, and report the breach within required timelines.

22

Validate contingency plan effectiveness

Test data backup and recovery procedures to ensure ePHI can be restored within acceptable timeframes. Conduct a disaster recovery drill and document results and improvements needed.

23

Assess physical security controls

Walk through all facilities where ePHI is accessible and verify physical safeguards are operational. Check badge access systems, visitor logs, workstation positioning, and media disposal procedures.

Phase 4: Maintain

5 items in this phase

24

Update the risk analysis annually

Reassess risks to ePHI at least annually and whenever significant changes occur in your environment, such as new systems, mergers, or changes in the threat landscape.

25

Provide annual HIPAA refresher training

Conduct annual refresher training for all workforce members. Update training content to reflect policy changes, recent incidents, and emerging threats specific to healthcare data.

26

Review and update policies and procedures

Review all HIPAA policies at least annually and update them to reflect operational changes, regulatory updates, and lessons learned from incidents or audit findings.

27

Monitor for regulatory changes and enforcement trends

Track HHS Office for Civil Rights enforcement actions, audit findings, and regulatory guidance to stay ahead of evolving HIPAA requirements and industry expectations.

28

Maintain documentation for six years

Retain all HIPAA-related policies, procedures, risk analyses, training records, BAAs, and incident documentation for a minimum of six years from creation or last effective date as required by the regulation.

Timeline & Cost

Estimated Timeline

4-8 months for initial compliance program; ongoing maintenance required

Estimated Cost

$25,000-$200,000 depending on organization size and existing security maturity

Frequently Asked Questions

Who needs to comply with HIPAA?

HIPAA applies to covered entities (healthcare providers who transmit health information electronically, health plans, and healthcare clearinghouses) and their business associates (organizations that perform functions involving PHI on behalf of covered entities). This includes cloud providers, IT vendors, billing companies, and any other entity that creates, receives, maintains, or transmits PHI.

What are the penalties for HIPAA violations?

HIPAA penalties range from $137 to $68,928 per violation depending on the level of culpability, with annual maximums of $2,067,813 per violation category. Criminal penalties can reach $250,000 and 10 years imprisonment for knowingly obtaining PHI under false pretenses. State attorneys general can also bring actions on behalf of residents.

Is HIPAA certification available?

There is no official HIPAA certification issued by HHS. Organizations cannot be "HIPAA certified" in the way they can be ISO 27001 certified. Third-party assessments and attestations are available but do not constitute official certification. Compliance is demonstrated through documented policies, risk analyses, and adherence to all applicable rules.

What is considered Protected Health Information?

PHI is any individually identifiable health information created, received, maintained, or transmitted by a covered entity or business associate. This includes medical records, billing information, lab results, and any data that can identify a patient combined with health information. PHI in electronic form is called ePHI and is subject to the Security Rule.

Do I need a Business Associate Agreement with every vendor?

You need a BAA with any vendor or contractor that will access, create, receive, maintain, or transmit PHI on your behalf. This includes cloud hosting providers, email services handling patient communications, EHR vendors, billing companies, and IT service providers with access to systems containing PHI. Vendors that only handle de-identified data do not require a BAA.

How quickly must I report a HIPAA breach?

Breaches of unsecured PHI must be reported to affected individuals within 60 days of discovery. Breaches affecting 500 or more individuals must also be reported to HHS and prominent media outlets in the affected jurisdiction within the same timeframe. Breaches affecting fewer than 500 individuals must be reported to HHS within 60 days of the end of the calendar year in which they were discovered.

Generate HIPAA policies automatically

PoliWriter creates all the policies referenced in this checklist, customized to your organization. AI-powered, audit-ready, hours not months.

Get Started Free