Proton

This post was updated on June 22, 2022

As discussed in our article on HIPAA Compliance, the Health Insurance Portability and Accountability Act (HIPAA) is a collection of closely aligned regulations that protect the medical data of patients in the United States.

In that article, we also discuss who must be HIPAA compliant — covered entities and business associates — which basically means anyone with any access to patients’ protected health information (PHI). Failures in HIPAA compliance are known as HIPAA violations(nuova finestra), and can result in stiff fines.

This article explains the most important measures and best practices that covered entities and business associates must address in order to be HIPAA compliant. 

Looking to make your business HIPAA compliant? Start with your email. Learn more(nuova finestra)

How to be HIPAA compliant

The HSS Office of Inspector General (OIG) offers a Compliance Resource Portal(nuova finestra) that establishes the “seven fundamental elements of an effective compliance program.” These elements are:

  1. Standards, Policies, and Procedures
  2. Compliance Program Administration 
  3. Screening and Evaluation of Employees, Physicians, Vendors, and other Agents
  4. Communication, Education, and Training on Compliance Issues 
  5. Monitoring, Auditing, and Internal Reporting Systems 
  6. Discipline for Non‐Compliance
  7. Investigations and Remedial Measures

A HIPAA compliance checklist

In practical terms, the key measures that must be implemented by all covered entities and business associates that wish to be (and remain) HIPAA compliant can be summarized as:

1. Develop robust standards, policies, and procedures

Covered entities and business associates must develop administrative systems and practices that ensure they meet the HIPAA compliance Rules (discussed here). Staff must be fully and routinely trained in all such standards, policies, and procedures, and are required to attest that they have received this training.

2. Implement strong physical and technical safeguards

In order to be HIPAA compliant, entities must ensure that all data relating to PHI is secure. This includes implementing:

  • Technical safeguards — such as restricting access to EPHI to authorized personnel only, requiring authorized personnel to verify their identity using unique identification methods (such as physical login tokens), monitoring hardware and software access logs for irregular activity, using strong encryption, implementing auto-logout, clearly specifying emergency access procedures, and using a HIPAA-compliant email(nuova finestra) service.
  • Physical safeguards — restrictions on who can physically access buildings, offices, and facilities, restrictions on who has access to workstations and electronic media, and procedures for disposing of or otherwise moving workstations and electronic media (such as old hard drives).

3. Perform an annual HIPAA risk assessment

According to the HIPAA Security Rule(nuova finestra), “risk analysis should be an ongoing process, in which a covered entity regularly reviews its records to track access to e-PHI and detect security incidents, periodically evaluates the effectiveness of security measures put in place, and regularly reevaluates potential risks to e-PHI.”

In order to comply with this requirement, HIPAA compliant entities are strongly advised to perform an annual audit to identify problems or gaps in their implementation of the security standards specified in the Security and Privacy Rules. These audits should therefore cover all administrative, physical security, and technical security measures deployed by the company in order to achieve HIPAA compliance.

4. Report data breaches

HIPAA-compliant entities must develop procedures outlining the measures to be taken in the event of a data breach. These include procedures for notifying customers, the HSS OCR, and any other entities required in accordance with the Breach Notification Rule.

5. Investigate violations and implement remedial measures

If a HIPAA violation occurs for any reason (including any violation identified during the annual self-audit) then it must be fully investigated, and a remedial plan developed and then implemented to correct the problem and bring the covered entity or business associate back in line with HIPAA regulations.

6. Document everything

Covered entities and business associates should document everything related to HIPAA compliance. This includes:

  • All measures taken to become HIPAA compliant.
  • All contact with other covered entities and business associates that they share PHI with.
  • All HIPAA violations that occur, plus all measures taken to remedy and report such incidents.

Failure to keep extensive documentation of all matters relating to HIPAA compliance is likely to result in a company failing the HSS OCR audit(nuova finestra) requirements.

What is an OCR HIPAA audit?

HIPAA is overseen by the Department of Health and Human Services (HSS) and is enforced by its Office for Civil Rights(nuova finestra) (OCR). 

In response to an alarming growth in data breaches being reported to the HSS, in 2014 the OCR announced the first phase of a new Privacy, Security, and Breach Notification Audit Program(nuova finestra).

A second phase was conducted in 2016, and in 2017 the OCR announced phase 3: on-site audits. This is a major expansion of the audit program and means that the OCR can now show up unannounced to view evidence that an individual or organization is HIPAA compliant.

The main purpose of maintaining a HIPAA compliance checklist could therefore be seen as providing proof of HIPAA compliance in the event of OCR audit. It is in everyone’s interest that covered entities and business associates work hard to maintain HIPAA compliance, however, regardless of whether an OCR audit is performed or not.

Audit Protocol

In order to help entities create checklists that meet HIPAA standards, the OCR has published an Audit Protocol(nuova finestra) which explains all areas that may be assessed during an OCR audit. 

The audit protocol lists the different audit types (privacy, security, or breach), and identifies “key activities” that entities must comply with to be deemed HIPAA compliant. The “established performance criteria” needed to meet these standards are explained in detail.

HIPAA checklist FAQ

What is required for HIPAA compliance?

HIPAA compliant entities must appoint a HIPAA Privacy Officer and a HIPAA Security Officer to oversee HIPAA compliance. These can be existing staff members or outside contactors. 

Their responsibility is to run risk assessments on the privacy and security systems and standards used by your company to protect PHI. The key areas that must be examined are:

  • The working practices of all staff members
  • Physical security measures in place to prevent unauthorized access to PHI
  • Electronic security measures in place to prevent unauthorized access to PHI
  • How your company will respond if a HIPAA violation or data breach occurs

Once risks have been identified, effective measures should be put into place to address them. The HIPAA Audit Protocol makes it clear that the OCR values evidence that self-audits are updated on a regular basis to account for changes within the entity, and for changes in the wider privacy and security landscape.

How do you do a HIPAA compliance checklist?

Your HIPAA Privacy and Security Officers should document all the key areas they have examined for potential risks. If existing safeguards are deemed sufficient to address these risks then this should be documented, or if additional safeguards are required then this, along with evidence of implementing the safeguards, should also be documented. 

Detailed plans should be made and documented about what to do in the event of a HIPAA violation or data breach, with clear lines of responsibility established for actions that will be taken.

How do I know my documentation is sufficient to pass a HIPAA audit?

The Audit Protocol, which is published on the HSS website, should help identify all areas that your HIPAA compliance checklist should cover. If you are not confident in your entity’s ability to produce sufficient documentation, then there are many companies that offer professional help with HIPAA compliance.

What are desk audits and physical audits?

Desk audits are remote audits, where covered entities and business associates are asked to submit their documentation via the OCR’s secure web portal. Physical audits involve the OCR turning up at your workplace to inspect your HIPAA compliance provisions. They are often made in response to a lack of cooperation when an entity is asked to submit a desk audit, but also include the impromptu phase 3 on-site audits discussed above.

What happens if you fail a HIPAA audit?

If minor issues are found during a desk audit then you will be notified by the HSS. If minor issues are found during a physical audit then you may need to produce evidence of addressing them. 

If major issues are found during any HSS audit then you may be subject to the penalties.

Do HIPAA audits only assess how EPHI is stored and transmitted?

No. Although HSA audits were introduced primarily to address an alarming rise in electronic data breaches, they assess all aspects of HIPAA compliance. This includes administrative practices, physical security measures, and planning for the possibility of data breaches, in addition to technical measures used to keep EPHI data safe.

***

Feel free to share your feedback and questions with us via our official social media channels on Twitter(nuova finestra) and Reddit(nuova finestra).

Articoli correlati

The cover image for a Proton Pass blog comparing SAML and OAuth as protocols for business protection
en
SAML and OAuth help your workers access your network securely, but what's the difference? Here's what you need to know.
Proton Lifetime Fundraiser 7th edition
en
Learn how to join our 2024 Lifetime Account Charity Fundraiser, your chance to win our most exclusive plan and fight for a better internet.
The cover image for a Proton Pass blog about zero trust security showing a dial marked 'zero trust' turned all the way to the right
en
Cybersecurity for businesses is harder than ever: find out how zero trust security can prevent data breaches within your business.
How to protect your inbox from an email extractor
en
Learn how an email extractor works, why your email address is valuable, how to protect your inbox, and what to do if your email address is exposed.
How to whitelist an email address and keep important messages in your inbox
en
Find out what email whitelisting is, why it’s useful, how to whitelist email addresses on different platforms, and how Proton Mail can help.
The cover image for Proton blog about cyberthreats businesses will face in 2025, showing a webpage, a mask, and an error message hanging on a fishing hook
en
Thousands of businesses of all sizes were impacted by cybercrime in 2024. Here are the top cybersecurity threats we expect companies to face in 2025—and how Proton Pass can protect your business.