HIPAA Compliance Checklist: What Healthcare Providers Often Miss

Annual compliance review season is underway, and for healthcare organizations, that means taking a hard look at HIPAA adherence across every department and system that touches patient data. Most healthcare providers understand the broad strokes of HIPAA requirements, but the details are where compliance gaps tend to hide. These gaps may go unnoticed for months or years until an audit, breach investigation, or patient complaint brings them to light.


The consequences of non-compliance are significant. The Department of Health and Human Services Office for Civil Rights can impose penalties ranging from thousands to millions of dollars per violation category, and criminal penalties can apply in cases of willful neglect. Beyond fines, a HIPAA violation can devastate patient trust and organizational reputation. This checklist highlights the areas that healthcare organizations most commonly overlook.

healthcare

The Risk Assessment Gap

The single most frequently cited deficiency in HIPAA enforcement actions is the failure to conduct a thorough and current risk assessment. The HIPAA Security Rule explicitly requires covered entities and business associates to perform a comprehensive assessment of potential risks and vulnerabilities to the confidentiality, integrity, and availability of electronic protected health information (ePHI).


Many healthcare organizations either have never conducted a formal risk assessment or completed one years ago and have not updated it since. Technology environments change constantly as new applications are deployed, staff members turn over, and systems are upgraded or replaced. A risk assessment from three years ago does not reflect today's threat landscape or your current infrastructure.


An effective risk assessment examines every system, application, and workflow that creates, receives, maintains, or transmits ePHI. It identifies potential threats to those systems, evaluates the likelihood and impact of each threat, and documents the security measures in place to mitigate them. The resulting analysis should produce a prioritized remediation plan that guides your security investments and operational improvements.


Organizations that partner with experienced IT compliance professionals often discover vulnerabilities they did not know existed, including systems that were deployed without proper security configurations or workflows that bypass established safeguards.

Business Associate Agreement Blind Spots

HIPAA requires covered entities to have signed Business Associate Agreements with every vendor, contractor, and partner that handles ePHI on their behalf. While this requirement is well known, the execution is where many organizations fall short during compliance reviews.

Here are some of the most commonly overlooked relationships that require a BAA:

Unapproved Cloud Storage Services

Individual departments sometimes adopt cloud storage tools without organizational approval, creating ePHI exposure through platforms that lack proper agreements or security configurations.

IT Maintenance Vendors

Third-party IT vendors who access systems for troubleshooting, updates, or routine maintenance may encounter ePHI during their work, requiring a signed BAA even if data handling is not their primary function.

Answering and Messaging Services

Answering services that take patient messages, appointment requests, or relay clinical information are handling ePHI and must be covered by a formal agreement.

Document Destruction Companies

Shredding and document destruction vendors that handle paper or digital records containing patient information are business associates under HIPAA, even though their role is to destroy rather than process data.

Email Marketing and Communication Platforms

Platforms used to send appointment reminders, patient communications, or health-related newsletters process ePHI and require BAAs that many organizations overlook during vendor onboarding.

Outdated Existing Agreements

BAAs signed years ago may not include provisions required by subsequent regulatory updates, and organizations should review existing agreements to confirm they address current requirements for breach reporting and data return or destruction.

Organizations should conduct a complete vendor inventory at least annually to identify any relationships that lack proper agreements and to verify that existing BAAs remain current and comprehensive.

Access Control and Authentication Weaknesses

HIPAA requires organizations to implement technical policies and procedures to allow access to ePHI only to those persons or software programs that have been granted access rights. In practice, access control is one of the most common areas of non-compliance.


Issues that frequently surface during audits include shared login credentials among staff members, inactive user accounts that were never disabled when employees departed, access privileges that exceed what is necessary for an individual's job function, and workstations left logged in and unattended in clinical areas.


The principle of minimum necessary access is central to HIPAA compliance. Each user should have access only to the specific ePHI they need to perform their job duties. This requires role-based access controls that are configured thoughtfully and reviewed regularly as staff responsibilities change.


Multi-factor authentication has become an expected standard for systems containing ePHI, even though HIPAA does not explicitly mandate a specific technology. Auditors and enforcement officials increasingly view the absence of multi-factor authentication as a failure to implement reasonable and appropriate safeguards.

Commonly Overlooked HIPAA Requirements

Beyond the major categories above, there are several specific requirements that healthcare organizations frequently miss during compliance reviews.


Here are eight items that belong on every healthcare provider's HIPAA compliance checklist:

1. Workforce Training Documentation

HIPAA requires training for all workforce members on policies and procedures related to ePHI. Organizations must document who was trained, what topics were covered, and when training occurred. Annual refresher training should address new threats and updated policies. Generic training that does not address your organization's specific systems and procedures is insufficient.

2. Encryption of ePHI on Mobile Devices

Laptops, tablets, smartphones, and USB drives that contain ePHI must be encrypted. Lost or stolen unencrypted devices are one of the most common triggers for breach notifications. If a device is encrypted and properly secured, a loss may not constitute a reportable breach, making encryption both a security measure and a liability reduction strategy.

3. Audit Log Review

HIPAA requires organizations to implement mechanisms to record and examine activity in systems that contain ePHI. However, many organizations collect logs without ever reviewing them. Regular audit log review can detect unauthorized access, unusual activity patterns, and potential breaches before they escalate.

4. Facility Access Controls

Physical security is part of HIPAA compliance. Server rooms, filing areas containing patient records, and workstations displaying ePHI should have appropriate physical access controls. Visitor logs, badge access systems, and camera surveillance in sensitive areas support compliance with the physical safeguard requirements.

5. Contingency Planning and Testing

HIPAA requires a data backup plan, disaster recovery plan, and emergency mode operation plan. Many organizations have documented plans but have never tested them. Untested plans may contain assumptions that do not hold up under real conditions. Test backup restoration, practice emergency procedures, and document the results.

6. Breach Notification Procedures

Organizations must have documented procedures for identifying, investigating, and reporting breaches of unsecured ePHI. The notification requirements include specific timelines: affected individuals must be notified within 60 days of discovery, and breaches affecting 500 or more individuals require notification to HHS and local media. Many organizations lack clear internal procedures for escalating potential breaches to the privacy officer.

7. Patient Right of Access Compliance

Patients have the right to access their health records, and organizations must respond to requests within 30 days. The HHS Right of Access Initiative has resulted in numerous enforcement actions against organizations that failed to provide timely access. Review your procedures for handling patient access requests to ensure they meet the required timelines and format options.

8. Sanction Policy Enforcement

HIPAA requires a sanction policy that applies appropriate consequences to workforce members who violate policies and procedures. Having a written policy is not enough; organizations must demonstrate that the policy is actually enforced. Document any sanctions applied and maintain records showing consistent enforcement across the organization.


These items represent areas where even well-intentioned healthcare organizations frequently have gaps.

Building a Culture of Compliance

HIPAA compliance is not a project that ends with a checklist. It is an ongoing operational discipline that requires attention throughout the year. Organizations that treat compliance as a continuous process rather than an annual exercise are far less likely to experience violations and far better prepared for audits.


Leadership commitment sets the tone. When executives and practice leaders demonstrate that patient data protection is a priority, staff members follow that example. When compliance is treated as an afterthought or a burden, shortcuts and oversights become routine.


Regular internal audits, ongoing staff education, and a responsive incident management process form the foundation of a compliance culture. Technology plays a critical supporting role by automating access controls, monitoring systems for unauthorized activity, encrypting sensitive data, and maintaining the audit trails that demonstrate compliance.

Partnering for Compliance Confidence

Healthcare technology and regulatory requirements are complex, and managing both simultaneously stretches most organizations' internal resources. Working with a technology partner who understands the intersection of healthcare operations and HIPAA requirements can make the difference between confident compliance and risky uncertainty.


At Lone Cypress Technology, we work with healthcare providers across San Antonio to build and maintain technology environments that meet HIPAA requirements while supporting efficient clinical operations. Our team understands the unique challenges healthcare organizations face and brings over 20 years of experience to every engagement.


If your organization is conducting its annual compliance review or preparing for an audit, contact us to discuss how we can support your HIPAA compliance goals with technology that is secure, reliable, and built for healthcare.


Ready to take the guesswork out of your IT? Contact Lone Cypress Technology today and let's build a plan that works for your business.

Glenda Anzualda

Glenda Anzualda is the President and co-founder of Lone Cypress Technology, which she helped establish in 2004 to deliver specialized managed services, cloud solutions, and IT consulting to San Antonio businesses.

Previous
Previous

Why SMBs Are Switching to VoIP Communication Systems

Next
Next

Preparing Your Municipality's IT Infrastructure for Severe Weather Season