Home / Requirements

HIPAA Compliance Requirements Checklist

A complete checklist of HIPAA requirements across the Privacy Rule, Security Rule, and Breach Notification Rule. Use this alongside the cost calculator to understand both what is required and what it costs. Updated 26 March 2026.

6

Privacy Rule items

10

Security Rule items

6

Breach Notification items

Privacy Rule Requirements

Designate a Privacy Officer

Low effort

Required for all covered entities. The Privacy Officer is responsible for developing and implementing privacy policies, handling complaints, and staff training.

Issue Notice of Privacy Practices (NPP)

Medium effort

Covered entities must provide patients with a written NPP describing how PHI is used and disclosed, and patient rights. The NPP must be posted and available on request.

Apply minimum necessary standard

Medium effort

Only the minimum amount of PHI necessary to accomplish an intended purpose should be used, disclosed, or requested. Policies must define what constitutes minimum necessary for each role.

Establish patient rights procedures

Medium effort

Patients have the right to access, amend, and request restrictions on their PHI. Covered entities need documented procedures for responding to these requests within required timeframes.

Train all workforce on Privacy Rule

High effort

All workforce members who handle PHI must receive training on the organization's privacy policies and procedures. Training must be documented.

Execute Business Associate Agreements (BAAs)

Medium effort

Any vendor or contractor who creates, receives, maintains, or transmits PHI on your behalf is a Business Associate. A signed BAA is legally required before sharing PHI.

Security Rule Requirements

Conduct formal Security Risk Analysis

High effort

Identify and document all systems containing electronic PHI (ePHI), assess threats and vulnerabilities, determine current safeguards, and calculate residual risk. Must be updated when the environment changes.

Implement Risk Management Plan

High effort

Develop and implement security measures to reduce identified risks to a reasonable and appropriate level. Prioritize remediation by risk severity.

Designate a Security Officer

Low effort

A named individual must be responsible for developing and implementing the organization's security policies and procedures.

Implement access controls

High effort

Unique user identification, emergency access procedures, automatic logoff, and encryption/decryption controls are required. Role-based access control (RBAC) is the standard implementation approach.

Maintain audit controls and logs

Medium effort

Hardware, software, and procedural mechanisms must be implemented to record and examine activity in information systems containing ePHI. Logs must be retained and regularly reviewed.

Implement integrity controls

Medium effort

Policies and procedures to protect ePHI from improper alteration or destruction. This includes transmission security, hash verification, and change management.

Encrypt ePHI at rest and in transit

High effort

While technically an addressable specification, encryption of ePHI is effectively required in practice given OCR enforcement patterns. AES-256 for storage; TLS 1.2+ for transmission.

Develop and test contingency plans

Medium effort

Data backup plan, disaster recovery plan, and emergency mode operation plan are required. Plans must be tested periodically. Criticality analysis determines restoration priorities.

Conduct periodic security evaluations

Medium effort

Technical and non-technical evaluations in response to environmental or operational changes. Many organizations conduct these annually with third-party assessors.

Execute Business Associate Agreements

Low effort

BAAs must specifically address Security Rule obligations, including the requirement for BAs to implement appropriate administrative, physical, and technical safeguards.

Breach Notification Rule Requirements

Define breach and exceptions

Low effort

A breach is an impermissible use or disclosure of unsecured PHI. Three exceptions apply: unintentional access by an authorized person, inadvertent disclosure to another authorized person, and a good-faith belief that the unauthorized recipient could not retain the PHI.

Conduct breach risk assessments

Medium effort

For each potential breach, a four-factor risk assessment determines whether notification is required: nature and extent of PHI, identity of the person who acquired it, whether PHI was actually acquired or viewed, and extent to which risk has been mitigated.

Notify affected individuals

High effort

Covered entities must notify affected individuals without unreasonable delay and within 60 days of discovering the breach. Notification must include specific elements defined in 45 CFR 164.404.

Notify HHS of breaches

Medium effort

Breaches affecting 500 or more individuals must be reported to HHS contemporaneously. Breaches affecting fewer than 500 individuals must be reported annually via the HHS web portal.

Notify media for large breaches

Low effort

If a breach affects 500 or more residents of a state or jurisdiction, prominent media outlets in that area must be notified without unreasonable delay and within 60 days.

Maintain breach log

Low effort

Covered entities must maintain documentation of all breaches, including those that do not require individual notification, for at least six years.

Ready to budget your HIPAA program?

Use the cost calculator to get a detailed estimate based on your organization type, size, and current maturity.

Open Calculator