HIPAA Compliance Checklist for Small Medical Practices

Last updated: 2026-04-06 — ComplianceStack Editorial Team

20 items
Progress 0 of 20 reviewed

HIPAA applies equally to a solo family practice and a large hospital system. Small practices are not exempt from the Security Rule, Privacy Rule, or Breach Notification Rule — and OCR enforcement data shows that small and mid-size providers account for a significant share of investigated complaints. The most common reason small practices get cited is not sophistication gap; it is documentation gap. This checklist covers the 20 requirements that OCR auditors verify first, in priority order.

Priority Legend:
● Critical ● High ● Medium ● Ongoing

HIPAA Compliance Checklist for Small Medical Practices

1

Conduct an annual Security Risk Assessment (SRA)

Critical 2–4 days

The SRA is the single most-cited deficiency in OCR enforcement actions. Use the HHS SRA Tool (free) to identify, document, and risk-rate every threat to ePHI in your practice. Document your remediation plan — even accepted risks must be justified in writing.

45 CFR 164.308(a)(1)(ii)(A)
2

Designate a Privacy Officer and Security Officer

Critical Half day

Both roles are required by regulation. In a small practice, one person may fill both. Document the appointment in writing, specify responsibilities, and update it when staff changes. The designation itself must be part of your HIPAA policy set.

45 CFR 164.530(a)(1) (Privacy Officer); 45 CFR 164.308(a)(2) (Security Officer)
3

Execute Business Associate Agreements (BAAs) with every vendor who touches PHI

Critical 3–7 days to collect all signatures

EHR vendors, billing companies, IT support firms, cloud storage providers, transcription services, answering services, and shredding companies are all Business Associates if they handle PHI. A signed BAA must be in place before they receive any patient data. Verbal agreements do not count.

45 CFR 164.502(e); 45 CFR 164.504(e)
4

Implement unique user IDs and access controls for all systems holding ePHI

Critical 1–2 days

Every workforce member who accesses your EHR or any system containing ePHI needs a unique username and password. Shared logins eliminate your audit trail. Access must be role-based — front-desk staff should not have the same permissions as clinicians.

45 CFR 164.312(a)(2)(i) (Unique User Identification); 45 CFR 164.308(a)(4) (Information Access Management)
5

Establish a Breach Notification policy and procedure

Critical 1–2 days

If a breach of unsecured PHI occurs, HIPAA requires notification to affected individuals within 60 days, to HHS, and (for breaches over 500 individuals) to prominent media. Your procedure must cover how to assess incidents, who to notify, and how to document the decision. Failing to report a qualifying breach compounds the original violation.

45 CFR 164.402; 164.410; 164.412
6

Encrypt ePHI on all portable devices and media

Critical 1–2 days

Laptops, tablets, smartphones, USB drives, and portable hard drives used for work must be encrypted with AES-128 or stronger. Encryption is the safe harbor under the Breach Notification Rule — an encrypted device that is lost does not trigger breach reporting obligations.

45 CFR 164.312(a)(2)(iv) (Encryption and Decryption); 45 CFR 164.312(e)(2)(ii)
7

Train all workforce members on HIPAA policies at hire and annually

High 2–4 hours per session; ongoing

Training is required for every person who has access to PHI — including part-time staff, contractors, and volunteers. Document training dates, topics covered, and acknowledgment signatures. Untrained staff who commit violations can still expose the practice to sanctions.

45 CFR 164.530(b)(1); 45 CFR 164.308(a)(5)(i)
8

Post a Notice of Privacy Practices (NPP) and obtain patient acknowledgments

High 1 day to create; ongoing

The NPP must be posted at the practice, provided to new patients at first service, and available on your website if you have one. Obtain written acknowledgment from patients and document good-faith efforts when acknowledgment is refused. Review the NPP annually for accuracy.

45 CFR 164.520
9

Implement physical safeguards for workstations that access ePHI

High 1–2 days

Position screens so patients in waiting areas cannot view clinical data. Lock or log off workstations when unattended. Restrict physical access to areas with ePHI (server rooms, filing areas). Physical safeguards are often overlooked but are frequently cited in complaints.

45 CFR 164.310(b) (Workstation Use); 45 CFR 164.310(c) (Workstation Security)
10

Establish automatic logoff on all systems accessing ePHI

High Half day (IT configuration)

Systems should automatically log off or lock after a period of inactivity (typically 5–15 minutes). This prevents unauthorized access when a workstation is left unattended — a common scenario in busy clinical settings.

45 CFR 164.312(a)(2)(iii) (Automatic Logoff)
11

Implement a workforce sanctions policy for HIPAA violations

High 1 day

Document specific sanctions for HIPAA violations by workforce members — from verbal warnings for minor incidents to termination for willful violations. Apply sanctions consistently and document each case. Having a policy demonstrates good faith; failing to apply it undermines your entire compliance posture.

45 CFR 164.530(e) (Sanctions)
12

Create a data backup and disaster recovery plan

High 2–3 days

Back up ePHI daily to an encrypted, offsite or HIPAA-compliant cloud location. Document your Recovery Time Objective (RTO) and Recovery Point Objective (RPO). Test restoration at least annually. A ransomware attack that encrypts patient records without an accessible backup is both a compliance failure and a business continuity crisis.

45 CFR 164.308(a)(7)(ii)(A–D) (Contingency Plan)
13

Apply the Minimum Necessary standard to all PHI uses and disclosures

Medium 1–2 days to configure EHR roles

Workforce members should access only the PHI needed to perform their specific job function. Role-based EHR permissions, need-to-know policies for paper records, and limiting PHI shared with insurance companies to what the claim requires are all minimum necessary implementations.

45 CFR 164.502(b) (Minimum Necessary)
14

Enable and review audit logs on your EHR

Medium Half day to configure; quarterly reviews

Your EHR must log access to patient records — who viewed, modified, or exported data and when. Designate someone to review logs periodically (quarterly is the common standard). Investigate anomalies such as high after-hours access or access to records outside a clinician's patient panel.

45 CFR 164.312(b) (Audit Controls)
15

Establish media disposal procedures for devices and paper records

Medium 1 day to establish; ongoing

Hard drives from decommissioned computers must be wiped to NIST 800-88 standards or physically destroyed. Paper records must be cross-cut shredded. Document every disposal, including the date, method, and the person responsible. A practice that gives away a computer without wiping the hard drive faces both a breach and an audit liability.

45 CFR 164.310(d)(2)(i–ii) (Media Disposal/Re-use)
16

Implement malware protection and patch management on all ePHI systems

Medium 1–2 days to configure; ongoing

Install and update antivirus/anti-malware software on every device that accesses ePHI. Apply operating system and application patches on a defined schedule (30-day patch cycle is common). Unpatched software is the primary vector for ransomware attacks on medical practices.

45 CFR 164.306(a) (General Requirements); 45 CFR 164.312(a)(1)
17

Respond to patient rights requests within required timeframes

Medium 1 day to establish workflow

Patients may request access to their records (30-day response time; one 30-day extension allowed), request amendments, and obtain an accounting of disclosures. Document every request, the response, and the outcome. Denying access without a valid regulatory reason is a standalone HIPAA violation.

45 CFR 164.524 (Access); 45 CFR 164.526 (Amendment); 45 CFR 164.528 (Accounting)
18

Maintain a device and media inventory

Medium 1 day to build; quarterly updates

Track every device that stores or accesses ePHI — workstations, laptops, tablets, smartphones, fax machines, copiers, and portable media. Record device owner, location, encryption status, and disposal date. An unknown device on your network that contains ePHI is an untracked liability.

45 CFR 164.310(d)(1) (Device and Media Controls)
19

Provide periodic security reminders to all workforce members

Medium 2 hours per quarter

Beyond annual training, send quarterly security reminders on topics like phishing, password hygiene, and proper disposal. Document distribution. Security awareness is a named addressable implementation specification — 'addressable' does not mean optional; it means implement if reasonable.

45 CFR 164.308(a)(5)(ii)(A) (Security Reminders)
20

Retain all HIPAA documentation for a minimum of six years

Medium Half day to organize

Policies, procedures, risk assessments, training records, BAAs, and breach documentation must all be retained for six years from creation or last effective date — whichever is later. Designate a storage location (physical or cloud) and document the retention schedule.

45 CFR 164.530(j)(2) (Documentation Retention)

See How Your Small Medical Practice Scores on HIPAA

Run a free gap analysis to find out which items you have covered and where the risks are.

Gap Analyzer →   Training Tracker →

Common Mistakes That Trigger Enforcement

Assuming small practices are too small for OCR to investigate
OCR investigates every complaint it receives. Practice size is not a shield — it may affect penalty amounts, but small practices have faced six-figure fines. The SRA is required regardless of patient volume.
Using a free consumer email service to send PHI without a BAA
Gmail, Yahoo, and standard Outlook accounts are not HIPAA compliant. Sending lab results, referrals, or clinical notes through a consumer email service is a reportable breach if intercepted.
No BAA with the EHR vendor
EHR vendors are Business Associates. Without a BAA, every record stored in the EHR is an ongoing HIPAA violation — even if no breach has occurred.
Completing the Security Risk Assessment once and never updating it
The SRA must reflect your current environment. Adding a new EHR module, switching IT providers, or moving to the cloud all require an updated SRA. Stale assessments do not satisfy the annual requirement.
Giving terminated employees continued access to ePHI systems
Disabling credentials on the day of termination — before the employee leaves the building — is the required standard. Delayed off-boarding is a common source of insider breaches.

Frequently Asked Questions

Are small medical practices required to comply with HIPAA?

Yes. Any provider that transmits health information electronically — including claims, referrals, or prescriptions — is a covered entity under HIPAA, regardless of size. Solo practitioners, small group practices, and single-location clinics are all subject to the Privacy Rule, Security Rule, and Breach Notification Rule. There are no size-based exemptions.

Does HIPAA compliance require expensive software?

Not necessarily. The HHS Security Risk Assessment Tool is free. Many HIPAA-compliant EHRs include built-in audit logging, access controls, and encryption. The cost of compliance is primarily in time — documenting policies, training staff, and maintaining records — not in proprietary software. The cost of non-compliance, however, averages $1.64 million per breach for small providers.

How long do I have to report a HIPAA breach?

Notification to affected individuals must occur within 60 days of discovering a breach. Notification to HHS must also occur within 60 days for breaches affecting 500 or more individuals; for smaller breaches, you may report annually via the HHS breach portal within 60 days of year-end. Breaches affecting 500 or more individuals in a single state also require notification to prominent media outlets within 60 days of discovery.

✉ Save This Checklist

Enter your email and we'll send you a clean copy — plus updates when requirements change.

We also offer a free personalized gap analysis for your specific situation.

Related Resources