HIPAA Compliance Checklist for Small Medical Practices
Last updated: 2026-04-06 — ComplianceStack Editorial Team
HIPAA applies equally to a solo family practice and a large hospital system. Small practices are not exempt from the Security Rule, Privacy Rule, or Breach Notification Rule — and OCR enforcement data shows that small and mid-size providers account for a significant share of investigated complaints. The most common reason small practices get cited is not sophistication gap; it is documentation gap. This checklist covers the 20 requirements that OCR auditors verify first, in priority order.
HIPAA Compliance Checklist for Small Medical Practices
Conduct an annual Security Risk Assessment (SRA)
The SRA is the single most-cited deficiency in OCR enforcement actions. Use the HHS SRA Tool (free) to identify, document, and risk-rate every threat to ePHI in your practice. Document your remediation plan — even accepted risks must be justified in writing.
Designate a Privacy Officer and Security Officer
Both roles are required by regulation. In a small practice, one person may fill both. Document the appointment in writing, specify responsibilities, and update it when staff changes. The designation itself must be part of your HIPAA policy set.
Execute Business Associate Agreements (BAAs) with every vendor who touches PHI
EHR vendors, billing companies, IT support firms, cloud storage providers, transcription services, answering services, and shredding companies are all Business Associates if they handle PHI. A signed BAA must be in place before they receive any patient data. Verbal agreements do not count.
Implement unique user IDs and access controls for all systems holding ePHI
Every workforce member who accesses your EHR or any system containing ePHI needs a unique username and password. Shared logins eliminate your audit trail. Access must be role-based — front-desk staff should not have the same permissions as clinicians.
Establish a Breach Notification policy and procedure
If a breach of unsecured PHI occurs, HIPAA requires notification to affected individuals within 60 days, to HHS, and (for breaches over 500 individuals) to prominent media. Your procedure must cover how to assess incidents, who to notify, and how to document the decision. Failing to report a qualifying breach compounds the original violation.
Encrypt ePHI on all portable devices and media
Laptops, tablets, smartphones, USB drives, and portable hard drives used for work must be encrypted with AES-128 or stronger. Encryption is the safe harbor under the Breach Notification Rule — an encrypted device that is lost does not trigger breach reporting obligations.
Train all workforce members on HIPAA policies at hire and annually
Training is required for every person who has access to PHI — including part-time staff, contractors, and volunteers. Document training dates, topics covered, and acknowledgment signatures. Untrained staff who commit violations can still expose the practice to sanctions.
Post a Notice of Privacy Practices (NPP) and obtain patient acknowledgments
The NPP must be posted at the practice, provided to new patients at first service, and available on your website if you have one. Obtain written acknowledgment from patients and document good-faith efforts when acknowledgment is refused. Review the NPP annually for accuracy.
Implement physical safeguards for workstations that access ePHI
Position screens so patients in waiting areas cannot view clinical data. Lock or log off workstations when unattended. Restrict physical access to areas with ePHI (server rooms, filing areas). Physical safeguards are often overlooked but are frequently cited in complaints.
Establish automatic logoff on all systems accessing ePHI
Systems should automatically log off or lock after a period of inactivity (typically 5–15 minutes). This prevents unauthorized access when a workstation is left unattended — a common scenario in busy clinical settings.
Implement a workforce sanctions policy for HIPAA violations
Document specific sanctions for HIPAA violations by workforce members — from verbal warnings for minor incidents to termination for willful violations. Apply sanctions consistently and document each case. Having a policy demonstrates good faith; failing to apply it undermines your entire compliance posture.
Create a data backup and disaster recovery plan
Back up ePHI daily to an encrypted, offsite or HIPAA-compliant cloud location. Document your Recovery Time Objective (RTO) and Recovery Point Objective (RPO). Test restoration at least annually. A ransomware attack that encrypts patient records without an accessible backup is both a compliance failure and a business continuity crisis.
Apply the Minimum Necessary standard to all PHI uses and disclosures
Workforce members should access only the PHI needed to perform their specific job function. Role-based EHR permissions, need-to-know policies for paper records, and limiting PHI shared with insurance companies to what the claim requires are all minimum necessary implementations.
Enable and review audit logs on your EHR
Your EHR must log access to patient records — who viewed, modified, or exported data and when. Designate someone to review logs periodically (quarterly is the common standard). Investigate anomalies such as high after-hours access or access to records outside a clinician's patient panel.
Establish media disposal procedures for devices and paper records
Hard drives from decommissioned computers must be wiped to NIST 800-88 standards or physically destroyed. Paper records must be cross-cut shredded. Document every disposal, including the date, method, and the person responsible. A practice that gives away a computer without wiping the hard drive faces both a breach and an audit liability.
Implement malware protection and patch management on all ePHI systems
Install and update antivirus/anti-malware software on every device that accesses ePHI. Apply operating system and application patches on a defined schedule (30-day patch cycle is common). Unpatched software is the primary vector for ransomware attacks on medical practices.
Respond to patient rights requests within required timeframes
Patients may request access to their records (30-day response time; one 30-day extension allowed), request amendments, and obtain an accounting of disclosures. Document every request, the response, and the outcome. Denying access without a valid regulatory reason is a standalone HIPAA violation.
Maintain a device and media inventory
Track every device that stores or accesses ePHI — workstations, laptops, tablets, smartphones, fax machines, copiers, and portable media. Record device owner, location, encryption status, and disposal date. An unknown device on your network that contains ePHI is an untracked liability.
Provide periodic security reminders to all workforce members
Beyond annual training, send quarterly security reminders on topics like phishing, password hygiene, and proper disposal. Document distribution. Security awareness is a named addressable implementation specification — 'addressable' does not mean optional; it means implement if reasonable.
Retain all HIPAA documentation for a minimum of six years
Policies, procedures, risk assessments, training records, BAAs, and breach documentation must all be retained for six years from creation or last effective date — whichever is later. Designate a storage location (physical or cloud) and document the retention schedule.
See How Your Small Medical Practice Scores on HIPAA
Run a free gap analysis to find out which items you have covered and where the risks are.
Gap Analyzer → Training Tracker →Common Mistakes That Trigger Enforcement
Frequently Asked Questions
Are small medical practices required to comply with HIPAA?
Yes. Any provider that transmits health information electronically — including claims, referrals, or prescriptions — is a covered entity under HIPAA, regardless of size. Solo practitioners, small group practices, and single-location clinics are all subject to the Privacy Rule, Security Rule, and Breach Notification Rule. There are no size-based exemptions.
Does HIPAA compliance require expensive software?
Not necessarily. The HHS Security Risk Assessment Tool is free. Many HIPAA-compliant EHRs include built-in audit logging, access controls, and encryption. The cost of compliance is primarily in time — documenting policies, training staff, and maintaining records — not in proprietary software. The cost of non-compliance, however, averages $1.64 million per breach for small providers.
How long do I have to report a HIPAA breach?
Notification to affected individuals must occur within 60 days of discovering a breach. Notification to HHS must also occur within 60 days for breaches affecting 500 or more individuals; for smaller breaches, you may report annually via the HHS breach portal within 60 days of year-end. Breaches affecting 500 or more individuals in a single state also require notification to prominent media outlets within 60 days of discovery.
✉ Save This Checklist
Enter your email and we'll send you a clean copy — plus updates when requirements change.
We also offer a free personalized gap analysis for your specific situation.
Related Resources
- Complete HIPAA Framework Guide
- HIPAA for Dental Practices
- HIPAA for Mental Health Providers
- HIPAA Penalty Tiers
- HIPAA Breach Notification Penalties
- HIPAA Compliance Checklist for Dental Practices
- HIPAA Compliance Checklist for Mental Health Providers
- HIPAA Compliance Checklist for Pharmacies
- Free Compliance Gap Analyzer
- Employee Training Tracker
- 5-Minute Compliance Quiz