HIPAA COMPLIANCE CHECKLIST

HIPAA compliance checklist

The annual HIPAA compliance cycle as a step-by-step checklist: risk analysis, policy updates, workforce training, safeguards, documentation, and re-attestation. Paired with a BPMN process map that ties the cadence together.

Who must comply with HIPAA

Who HIPAA applies to

US healthcare covered entities (health plans, healthcare clearinghouses, most healthcare providers) and their business associates that handle protected health information (PHI).

Jurisdiction: US healthcare (covered entities and business associates). Full name: Health Insurance Portability and Accountability Act.

HIPAA Checklist

The HIPAA compliance checklist

The high-level cycle. Each item below is the visible head of a fuller process - open it in the editor to flesh out the steps, owners, and decisions your team actually runs.

The PDF includes real fillable form fields - tick each checkbox in your PDF reader and fill in organisation name, owner, and dates. The DOCX is fully editable in Word, Google Docs, or any compatible editor.

  1. STEP 1

    Run an accurate and thorough HIPAA risk analysis (45 CFR 164.308(a)(1)(ii)(A)).

  2. STEP 2

    Maintain a current Notice of Privacy Practices and patient access workflow.

  3. STEP 3

    Implement administrative, physical, and technical safeguards per the Security Rule.

  4. STEP 4

    Execute Business Associate Agreements with every vendor that handles PHI on the covered entity's behalf.

  5. STEP 5

    Train the workforce on privacy and security policies - initial onboarding plus annual refreshers.

  6. STEP 6

    Document access controls - joiner / mover / leaver against every system that holds ePHI.

  7. STEP 7

    Operate the Breach Notification Rule process (4-factor risk assessment + 60-day clock).

  8. STEP 8

    Maintain a sanctions policy and disciplinary record for HIPAA violations.

  9. STEP 9

    Document the contingency plan: backups, disaster recovery, emergency mode.

  10. STEP 10

    Annual review of the risk analysis output and re-attest where required.

FILLABLE PDF PREVIEW

HIPAA compliance checklist

Health Insurance Portability and Accountability Act

Organisation

[Organisation name]

Owner

[Assigned to]

Target date

[Target completion date]

Reviewed by

[Reviewed by]


Run an accurate and thorough HIPAA risk analysis (45 CFR 164.308(a)(1)(ii)(A)).

Maintain a current Notice of Privacy Practices and patient access workflow.

Implement administrative, physical, and technical safeguards per the Security Rule.

Execute Business Associate Agreements with every vendor that handles PHI on the covered entity's behalf.

Train the workforce on privacy and security policies - initial onboarding plus annual refreshers.

+ 5 more checkboxes in the downloaded PDF
HIPAA Process Map

HIPAA as a process map

The annual HIPAA compliance cycle, captured as a BPMN process map. Risk analysis feeds policy, policy feeds training, training feeds safeguards, and the annual review feeds the next risk analysis.

Open in editor

HIPAA Security Rule risk analysis process

A HIPAA Security Rule risk analysis (45 CFR 164.308(a)(1)(ii)(A)-(B)) rendered as a BPMN 2.0 process map. The flow inventories ePHI assets, identifies threats and vulnerabilities, rates likelihood and impact, evaluates current controls, decides whether residual risk is acceptable, and either routes findings to a remediation plan and re-assesses, or files the risk register and closes the cycle. The breach-side branch (500-individual-impact split, 60-day HHS / media notification) is covered separately on /hipaa-compliance-processes.

  1. Inventory ePHI assets and the systems that create, receive, maintain, or transmit them (§164.308(a)(1)(ii)(A)).
  2. Identify reasonably anticipated threats and vulnerabilities to the confidentiality, integrity, and availability of ePHI.
  3. Rate likelihood and impact for each threat-vulnerability pair, scoring inherent risk before controls.
  4. Evaluate current administrative, physical, and technical safeguards and recompute residual risk.
  5. If residual risk is unacceptable, open a remediation plan (assign owner, control, due date) and route back for re-assessment after fix.
  6. If residual risk is acceptable, document the determination in the risk register (§164.308(a)(1)(ii)(B)) and archive supporting evidence.
  7. Schedule the next periodic review and close the analysis - the register feeds the security management process and the Sanction and Workforce Security standards.
HIPAA FAQ

Frequently asked questions

Who has to comply with HIPAA?

Covered entities (health plans, healthcare clearinghouses, and most healthcare providers that transmit electronic transactions) and business associates that create, receive, maintain, or transmit PHI on behalf of a covered entity.

Is a HIPAA compliance checklist enough?

A checklist is the right starting point, but HIPAA compliance is operational - it lives in the processes that produce evidence year after year. Most enforcement actions begin not because the checklist was incomplete but because the underlying processes drifted. The diagram on this page is the cadence the OCR expects to see operating.

How often do I need to run a HIPAA risk analysis?

HIPAA does not prescribe a fixed frequency, but the OCR has consistently emphasised that the risk analysis must be "accurate and thorough" and refreshed in response to material changes (new systems, new business associates, incidents). In practice, most programmes run it annually and update for triggering events.

What is the difference between this and the "seven HIPAA processes" page?

This page is the line-by-line checklist for an organisation-wide HIPAA programme. The /hipaa-compliance-processes page goes deeper into the seven specific operational processes (breach notification, incident response, access management, BA onboarding, risk analysis, workforce training, ePHI disposal), with the breach-notification process rendered as an editable BPMN map and the remaining six catalogued for follow-up.

More Compliance Checklists

Other compliance checklists

Cosmic background pattern
Decorative rectangle pattern

Turn the HIPAA checklist into a working process

Open the HIPAA process map, rename the steps to match your organisation, and turn the checklist into a working procedure your team can run year after year.