Skip to content

Free 15-minute cybersecurity consultation — no obligation

Book Free Call
Healthcarehealthcare51 min readDeep Dive

HIPAA Compliance Guide for Small Healthcare Practices

Complete HIPAA compliance checklist for small practices: risk assessment, encryption, BAAs, training. Avoid costly violations with this step-by-step guide.

HIPAA Compliance Guide for Small Healthcare Practices - hipaa compliance checklist small practice

For small healthcare practices, HIPAA compliance often feels overwhelming—limited IT budgets, lean staff, and competing priorities make it difficult to implement comprehensive security programs. Yet the consequences of non-compliance are severe: OCR penalties can reach millions of dollars, and a single breach can destroy patient trust and practice reputation.

HIPAA compliance is not static. Each year brings new enforcement priorities, updated guidance, and evolving threats. In 2026, small practices face heightened scrutiny as OCR targets fundamental compliance gaps—particularly risk assessments, encryption, and business associate oversight. The proposed Security Rule updates signal a shift toward more prescriptive technical requirements, while enforcement actions reveal where practices consistently fail.

This guide provides small healthcare practices with a practical, actionable roadmap to HIPAA compliance. Whether you're a solo practitioner, a small clinic, or a multi-provider practice, this checklist-driven approach will help you meet regulatory requirements without enterprise-level resources.

HIPAA Compliance By The Numbers

$10.93M
Avg. Healthcare Breach Cost

IBM Cost of Data Breach Report 2025

88M
Records Breached in 2024

HHS Breach Portal

$2.3M
Largest OCR Penalty 2024

For risk assessment failures

67%
Breaches Under 500 Records

Affecting small practices

The Proposed HIPAA Security Rule Update: What Small Practices Need to Know

In late 2024, the Department of Health and Human Services (HHS) published a Notice of Proposed Rulemaking (NPRM) to update the HIPAA Security Rule for the first time since 2003. While the final rule is still pending as of early 2026, the proposed changes signal regulatory expectations that small practices should prepare for now.

Proposed Requirements Affecting Small Practices

The NPRM includes several provisions specifically relevant to small healthcare organizations:

  • Mandatory multi-factor authentication (MFA) for all systems accessing electronic protected health information (ePHI). This moves MFA from an "addressable" to a "required" specification, eliminating the flexibility that allowed practices to implement alternative controls.
  • Encryption requirements for ePHI at rest and in transit would become mandatory rather than addressable. Small practices that have relied on alternative safeguards would need to implement encryption across all systems storing or transmitting patient data.
  • Enhanced network segmentation requirements to isolate systems containing ePHI from general network traffic. For small practices, this means working with qualified IT professionals to properly configure firewalls and network architecture.
  • Specific incident response and disaster recovery requirements, including documented procedures, regular testing, and defined recovery time objectives. The proposed rule mandates annual testing of incident response plans—a requirement many small practices currently overlook.

Small practices should begin implementing these controls now, as they represent industry best practices regardless of whether the final rule adopts them verbatim. Organizations that wait for final rulemaking may face compressed implementation timelines and potential compliance gaps.

2026 Compliance Action Required

OCR has announced enhanced enforcement focus on risk assessments, encryption, and access controls for all covered entities in 2026. Practices without current risk assessments (completed within the past 12 months) should prioritize this immediately—it remains the most frequently cited violation in enforcement actions.

Recent Enforcement Actions: Lessons for Small Practices

OCR enforcement actions in 2024 and early 2026 reveal consistent patterns in what triggers investigations and where small practices fail. Understanding these patterns helps prioritize compliance efforts and avoid costly violations.

2024-2025 Enforcement Trends

Risk assessment failures remain the most common violation. In every settlement since 2016, OCR has found that non-compliant organizations either lacked a risk assessment entirely or conducted assessments that were superficial, outdated, or incomplete. The HHS Security Risk Assessment Tool provides a baseline framework, but small practices often benefit from engaging qualified security professionals who understand healthcare-specific threats.

Lack of encryption continues to trigger breach notification requirements. A dental practice in Oregon faced a $250,000 settlement after an unencrypted laptop containing 3,200 patient records was stolen from an employee's vehicle. The practice had conducted a risk assessment that identified encryption as necessary but failed to implement it—demonstrating that documentation alone is insufficient.

Business associate oversight failures have led to multiple enforcement actions. A medical group in California received a $300,000 penalty after a business associate (a billing vendor) experienced a breach affecting 43,000 patients. The medical group had no Business Associate Agreement (BAA) in place and conducted no due diligence on the vendor's security practices. Small practices must execute BAAs with every vendor that touches PHI, including cloud storage providers, email services, IT support companies, and shredding services.

Impermissible disclosures increasingly involve employees accessing records without authorization. A clinic in Texas settled for $180,000 after an employee accessed celebrity patient records without a job-related purpose. The clinic lacked audit controls to detect the unauthorized access and had no sanctions policy to address employee violations. Small practices must implement audit logging and enforce sanctions consistently, including termination for intentional snooping.

Common Compliance Gaps vs. Best Practices

FeatureCommon Gap (Non-Compliant)RecommendedBest Practice (Compliant)
Risk Assessment
Encryption
Access Controls
Business Associates
Incident Response

2026 Compliance Priorities for Small Healthcare Practices

Based on the regulatory environment, enforcement trends, and threat landscape, small practices should prioritize the following compliance areas in 2026:

1. Complete and Document an Annual Risk Assessment

The risk assessment is the foundation of HIPAA compliance. It must be comprehensive, current (updated at least annually), and specific to your practice. Document all systems that store, process, or transmit ePHI—including electronic health records (EHR), billing systems, email, cloud storage, mobile devices, and networked medical devices. For each system, identify potential threats (ransomware, insider threats, device theft, unauthorized access), assess vulnerabilities, and document safeguards implemented to mitigate risks. Maintain evidence of your risk assessment process, including assessment reports, remediation plans, and tracking of corrective actions.

2. Implement Encryption Everywhere

Encryption is the single most effective control to avoid breach notification requirements. If ePHI is encrypted using NIST-validated algorithms and the encryption key was not compromised, the incident does not constitute a breach under HIPAA's definition of "unsecured PHI." Small practices should implement full-disk encryption on all laptops, workstations, servers, and mobile devices using BitLocker (Windows), FileVault (macOS), or equivalent solutions. Use TLS 1.2 or higher for all data transmission, including email. If your EHR or practice management system does not support encryption, prioritize migration to a compliant platform—legacy systems represent unacceptable risk in 2026.

3. Execute and Maintain Business Associate Agreements

Every vendor that creates, receives, maintains, or transmits PHI on your behalf must sign a Business Associate Agreement before accessing PHI. This includes obvious vendors like EHR providers, billing services, and claims clearinghouses, but also less obvious ones: cloud storage providers (Dropbox, Google Drive), email providers (Gmail, Outlook), IT support companies, document shredding services, transcription services, and answering services. Maintain a centralized registry of all business associates, track BAA execution dates, and review agreements annually. When selecting new vendors, verify HIPAA compliance and request evidence such as SOC 2 Type II reports or HITRUST certification.

4. Establish Role-Based Access Controls

The minimum necessary standard requires that workforce members access only the PHI needed for their specific job function. Implement role-based access controls in your EHR and practice management systems: front desk staff should access demographics and scheduling but not clinical notes; billing staff should access encounter data but not full medical histories; clinical staff should access records only for their assigned patients. Eliminate shared login credentials immediately—every user must have a unique user ID. Implement automatic logoff after 15 minutes of inactivity. Enable audit logging to track who accessed which patient records and when, and review logs quarterly for unauthorized access patterns.

5. Deploy Multi-Factor Authentication

Multi-factor authentication (MFA) dramatically reduces the risk of unauthorized access due to compromised credentials. The proposed Security Rule update would make MFA mandatory, but small practices should implement it now as a critical safeguard. Deploy MFA on all systems accessing ePHI, including EHR, email, remote access/VPN, cloud storage, and administrative interfaces. Use authenticator apps or hardware tokens rather than SMS-based MFA when possible, as SMS is vulnerable to SIM-swapping attacks. For guidance on implementing MFA in healthcare settings, review NIST SP 800-63B Digital Identity Guidelines.

HIPAA Compliance Implementation Roadmap for Small Practices

1

Designate Privacy and Security Officers

Appoint individuals responsible for HIPAA compliance. In small practices, one person may fulfill both roles. Document their responsibilities and provide initial training on HIPAA requirements.

2

Conduct Comprehensive Risk Assessment

Inventory all systems containing ePHI, identify threats and vulnerabilities, document existing safeguards, and create a remediation plan for identified gaps. Use the HHS Security Risk Assessment Tool or engage a qualified security professional.

3

Develop HIPAA Policies and Procedures

Document policies covering administrative, physical, and technical safeguards. Include privacy practices, breach notification procedures, sanctions policy, and business associate oversight. Tailor templates to your practice's specific operations.

4

Implement Technical Safeguards

Deploy encryption on all devices, enable MFA, configure role-based access controls, activate audit logging, and secure network infrastructure with firewalls and segmentation.

5

Execute Business Associate Agreements

Identify all vendors handling PHI, obtain signed BAAs before any PHI access, and establish a tracking system for BAA renewals and vendor compliance monitoring.

6

Train Workforce

Conduct initial HIPAA training for all workforce members before granting PHI access. Provide annual refresher training and document all training activities. Cover privacy rules, security procedures, breach reporting, and sanctions.

7

Establish Incident Response Plan

Document procedures for detecting, responding to, and reporting security incidents and breaches. Define roles, notification timelines (60-day requirement), and communication protocols. Test the plan annually.

8

Monitor and Maintain Compliance

Conduct annual risk assessments, review and update policies, audit access logs quarterly, verify BAA compliance, and provide ongoing workforce training. Document all compliance activities.

Understanding HIPAA's Three Core Rules

HIPAA compliance rests on three foundational regulations that every healthcare organization must implement, regardless of size. Small practices must understand how these rules interact and the specific obligations they create.

The Privacy Rule: Patient Rights and PHI Use Limitations

The HIPAA Privacy Rule (45 CFR Part 160 and Part 164, Subparts A and E) establishes national standards for protecting the privacy of individually identifiable health information. It applies to all forms of PHI—electronic, paper, and oral—and defines who can access this information and under what circumstances.

The Privacy Rule grants patients specific rights over their health information: the right to access their medical records within 30 days of request, the right to request amendments to inaccurate information, the right to receive an accounting of disclosures, and the right to request restrictions on how their information is used. Small practices must have documented procedures to fulfill these patient rights and train staff on how to process these requests.

The Privacy Rule requires covered entities to use and disclose only the minimum necessary PHI to accomplish the intended purpose. This applies to requests for PHI from other providers, disclosures to business associates, and access by your own workforce. The minimum necessary standard does not apply to treatment purposes, but it does apply to billing, payment, and healthcare operations.

The Security Rule: Protecting Electronic PHI

The HIPAA Security Rule (45 CFR § 164.302 through § 164.318) focuses specifically on electronic protected health information (ePHI) and requires covered entities to implement three categories of safeguards: administrative, physical, and technical. Unlike the Privacy Rule, which covers all forms of PHI, the Security Rule applies only to information stored or transmitted electronically.

The Security Rule distinguishes between "required" and "addressable" implementation specifications. Required specifications must be implemented. Addressable specifications must be implemented if reasonable and appropriate; if not, you must document why and implement an equivalent alternative safeguard. Small practices often misunderstand "addressable" to mean "optional"—it does not. Even addressable specifications require a documented risk-based decision.

Administrative safeguards include risk assessments, sanctions policies, workforce training, and incident response procedures. Physical safeguards control facility access, workstation security, and device disposal. Technical safeguards include access controls, audit logging, integrity controls, and transmission security. Each category contains both required and addressable specifications that must be addressed based on your practice's size, complexity, and risk profile.

The Breach Notification Rule: Reporting Requirements

The HIPAA Breach Notification Rule (45 CFR §§ 164.400-414) requires covered entities to notify affected individuals, HHS, and in some cases the media when unsecured PHI is compromised. A breach is defined as unauthorized acquisition, access, use, or disclosure of PHI that compromises the security or privacy of the information.

The notification timeline is strict: you must notify affected individuals within 60 days of discovering the breach. If the breach affects 500 or more individuals, you must also notify HHS immediately and notify prominent media outlets. Breaches affecting fewer than 500 individuals must be reported to HHS annually. The 60-day clock starts when the breach is discovered or reasonably should have been discovered—not when the investigation concludes.

Critically, encrypted PHI is considered "secured" and does not trigger breach notification requirements if the encryption key was not compromised. This creates a strong compliance incentive for encryption: a stolen encrypted laptop is an inconvenience, but a stolen unencrypted laptop is a reportable breach with notification costs, OCR investigation risk, and potential penalties. For small practices, encryption is the most cost-effective breach prevention control.

Key Takeaway

HIPAA's three rules work together: The Privacy Rule controls who can access PHI and why. The Security Rule defines how to protect electronic PHI with administrative, physical, and technical safeguards. The Breach Notification Rule specifies what to do when safeguards fail. Compliance requires implementing all three simultaneously.

Administrative Safeguards: The Foundation of HIPAA Compliance

Administrative safeguards are documented policies, procedures, and processes that govern how your practice protects PHI. These are required under 45 CFR § 164.308 and form the foundation of your HIPAA compliance program.

Security Management Process (Required): You must implement policies and procedures to prevent, detect, contain, and correct security violations. This includes conducting a comprehensive risk assessment—the most critical administrative safeguard and the most commonly cited violation. Your risk assessment must be documented, current (updated at least annually), and comprehensive (covering all systems, locations, and threat vectors). Document your risk assessment methodology, findings, and remediation plan. Maintain evidence that identified risks have been addressed or accepted with documented justification.

Security Officer Designation (Required): Designate a security officer responsible for developing and implementing security policies and procedures. In small practices, this individual may also serve as the Privacy Officer. Document the security officer's responsibilities and provide them with adequate training and authority to fulfill their role. The security officer should have direct involvement in risk assessments, incident response, and compliance monitoring.

Workforce Training and Management (Required): All workforce members must receive HIPAA training before accessing PHI and annually thereafter. Training must cover the Privacy Rule, Security Rule, practice policies, breach notification procedures, and sanctions for violations. Document all training activities, including dates, attendees, and topics covered. Implement a sanctions policy that specifies consequences for HIPAA violations, ranging from retraining for inadvertent errors to termination for intentional unauthorized access.

Business Associate Oversight (Required): You must obtain satisfactory assurances that business associates will appropriately safeguard PHI. This requires written Business Associate Agreements (BAAs) executed before any PHI disclosure. Your BAA must include specific regulatory provisions outlined in 45 CFR § 164.314(a)(2), including terms requiring business associates to implement appropriate safeguards, report breaches, make their internal practices available for HHS review, and ensure any subcontractors provide the same protections.

Incident Response and Contingency Planning (Required): Document procedures for responding to security incidents, including detection, analysis, containment, eradication, and recovery. Establish a contingency plan that addresses data backup, disaster recovery, emergency mode operations, and testing procedures. Test your incident response and contingency plans at least annually and document the results. Small practices should maintain offline, encrypted backups of all ePHI with documented recovery procedures and tested restoration processes.

Physical and Technical Safeguards: Protecting ePHI in Practice

Physical Safeguards (45 CFR § 164.310)

Physical safeguards control physical access to facilities, workstations, and electronic media containing ePHI. Small practices must implement:

  • Facility Access Controls: Implement procedures to limit physical access to systems containing ePHI. This includes locked server rooms or closets, key card or code-based access to areas where ePHI is stored, visitor sign-in procedures, and escorts for non-workforce members in areas where ePHI is accessible. Position workstation screens away from public view and implement privacy screens where appropriate.
  • Workstation Security: Implement policies specifying proper use of workstations accessing ePHI. This includes prohibiting shared workstation logins, requiring automatic screen locks after 15 minutes of inactivity, physically securing laptops to desks in public areas, and restricting workstation placement to prevent unauthorized viewing of ePHI.
  • Device and Media Controls: Implement procedures for disposing of ePHI and the hardware or electronic media on which it is stored. Use certified data destruction services that provide certificates of destruction, or deploy NIST-approved wiping tools (NIST SP 800-88 Guidelines for Media Sanitization). Simply deleting files or formatting drives does not permanently remove data—forensic tools can often recover "deleted" information. For small practices, engaging certified e-waste vendors is often the most cost-effective approach.

Technical Safeguards (45 CFR § 164.312)

Technical safeguards are technology-based controls that protect ePHI and control access to it:

  • Access Control (Required): Implement technical policies and procedures that allow only authorized persons to access ePHI. This includes assigning unique user IDs to each workforce member (required), implementing emergency access procedures for accessing ePHI during crisis situations (required), deploying automatic logoff after a predetermined period of inactivity (addressable), and using encryption and decryption mechanisms (addressable but highly recommended). Small practices should implement role-based access controls that limit access based on job function.
  • Audit Controls (Required): Implement hardware, software, and procedural mechanisms that record and examine activity in systems containing ePHI. Modern EHR systems include built-in audit logging—ensure it is enabled and retained for at least six years. Review audit logs quarterly for suspicious activity patterns, such as after-hours access, access to records of employees or family members, or bulk record access inconsistent with job duties. Document your audit log review process and findings.
  • Integrity Controls (Addressable): Implement policies and procedures to ensure ePHI is not improperly altered or destroyed. This includes deploying checksums or digital signatures to verify data integrity, implementing version control in EHR systems, and maintaining offline backups to enable restoration if data is corrupted or destroyed by ransomware.
  • Transmission Security (Addressable): Implement technical security measures to guard against unauthorized access to ePHI transmitted over electronic networks. Use TLS 1.2 or higher for all email and web-based transmissions. Implement VPN technology for remote access to practice networks. If you transmit ePHI via email, use encrypted email solutions or patient portals rather than standard email—unencrypted email is inherently insecure. For remote workforce members accessing ePHI from home or while traveling, establish secure network access procedures with MFA and endpoint encryption requirements.

Complete HIPAA Compliance Checklist for Small Practices

  • Designate a Privacy Officer and Security Officer with documented responsibilities
  • Conduct comprehensive risk assessment covering all systems, locations, and threat vectors (update annually)
  • Document all HIPAA policies and procedures (administrative, physical, and technical safeguards)
  • Implement full-disk encryption on all devices storing ePHI (laptops, workstations, servers, mobile devices)
  • Enable TLS 1.2+ encryption for all ePHI transmitted over networks (email, web portals, remote access)
  • Deploy multi-factor authentication on all systems accessing ePHI (EHR, email, VPN, cloud storage)
  • Implement unique user IDs for all workforce members (eliminate shared credentials)
  • Configure role-based access controls enforcing minimum necessary standard
  • Enable audit logging in all systems containing ePHI and review logs quarterly
  • Implement automatic logoff after 15 minutes of inactivity on all workstations
  • Execute Business Associate Agreements with all vendors handling PHI before any PHI disclosure
  • Maintain current inventory of all business associates with BAA tracking and renewal dates
  • Provide HIPAA training to all workforce members before PHI access and annually thereafter
  • Document training activities including dates, attendees, and topics covered
  • Establish and document sanctions policy for HIPAA violations (include termination provisions)
  • Implement physical access controls (locked doors, visitor logs, workstation positioning)
  • Document and test incident response plan annually (include breach notification timeline)
  • Establish contingency plan with data backup, disaster recovery, and emergency mode operations
  • Maintain offline encrypted backups of all ePHI with documented restoration procedures
  • Use certified data destruction methods for disposing of devices and media containing ePHI
  • Implement secure email solution or patient portal for transmitting ePHI (no unencrypted email)
  • Configure network firewalls and segment networks to isolate ePHI systems
  • Develop and post Notice of Privacy Practices and obtain patient acknowledgment
  • Establish procedures for patients to exercise their HIPAA rights (access, amendment, accounting)
  • Conduct quarterly audit log reviews for unauthorized access patterns and document findings

Common HIPAA Violations and How Small Practices Can Avoid Them

OCR enforcement data reveals consistent patterns in HIPAA violations. Understanding these patterns helps small practices prioritize compliance efforts and avoid the most frequent—and costly—mistakes.

Violation #1: Failure to Conduct Adequate Risk Assessment

The risk assessment is the cornerstone of HIPAA Security Rule compliance. OCR has stated it has never found a covered entity compliant that lacked a current, comprehensive risk assessment. Yet this remains the most frequently cited violation in enforcement actions.

Small practices often fail by using generic risk assessment templates never customized to their specific environment, conducting superficial assessments that don't identify actual risks, completing one initial assessment years ago and never updating it, or documenting risks without implementing or documenting remediation efforts.

How to avoid this violation: Use the HHS Security Risk Assessment Tool as a baseline framework. Conduct your assessment annually at minimum, and whenever you implement new systems, change vendors, or experience a security incident. Document your methodology, findings, risk ratings, implemented safeguards, and remediation plan for gaps. Maintain evidence that identified risks have been addressed or accepted with documented justification. For practices lacking internal IT expertise, engaging a qualified security professional for annual penetration testing and risk assessment services is a worthwhile investment that demonstrates due diligence.

Violation #2: Lack of Encryption on Devices Containing ePHI

Unencrypted devices create immediate breach notification obligations when lost or stolen. A single stolen unencrypted laptop can trigger notification to hundreds or thousands of patients, HHS reporting, potential media notification, OCR investigation, and penalties.

OCR enforcement actions consistently involve practices that identified encryption as necessary in their risk assessment but failed to implement it, implemented encryption on some devices but not all, or relied on password protection alone (passwords protect access but do not encrypt data at rest).

How to avoid this violation: Implement full-disk encryption on every device that stores or accesses ePHI—laptops, desktops, servers, tablets, smartphones, USB drives, and external hard drives. Use BitLocker on Windows devices, FileVault on macOS, or third-party solutions that provide centralized management and reporting. Verify encryption is functioning by checking device status in your management console. For mobile devices, use MDM (Mobile Device Management) solutions that enforce encryption, enable remote wipe capabilities, and provide compliance reporting. Document your encryption implementation in your risk assessment and maintain an inventory of all encrypted devices.

Violation #3: Missing or Inadequate Business Associate Agreements

Every vendor that handles PHI on your behalf must sign a HIPAA-compliant Business Associate Agreement before accessing any PHI. Yet OCR enforcement actions frequently cite practices that lacked BAAs entirely with critical vendors, used BAAs missing required regulatory provisions, failed to verify business associate compliance, or allowed PHI access before executing BAAs.

How to avoid this violation: Create a comprehensive inventory of all vendors that create, receive, maintain, or transmit PHI on your behalf. This includes obvious vendors like EHR providers, billing services, and labs, but also cloud storage providers (Google Drive, Dropbox, OneDrive), email services (Gmail, Outlook), IT support and managed service providers, practice management software vendors, patient portal providers, telehealth platforms, document shredding services, medical transcription services, and answering services. Execute a HIPAA-compliant BAA with each vendor before any PHI disclosure. Verify that your BAA includes all required provisions under 45 CFR § 164.314(a)(2). Maintain a centralized BAA registry tracking execution dates, renewal dates, and vendor compliance status. Review the registry quarterly and reach out to vendors approaching renewal. When selecting new vendors, request evidence of HIPAA compliance such as SOC 2 Type II reports or HITRUST certification.

Violation #4: Impermissible Disclosures and Unauthorized Access

Workforce members accessing patient records without a legitimate job-related purpose remains a persistent violation. Common scenarios include employees viewing records of celebrities, family members, friends, or neighbors out of curiosity; sending PHI to the wrong recipient via email or fax; discussing patient information in public areas where unauthorized individuals can overhear; and posting patient information on social media, even with identifiers removed.

How to avoid this violation: Implement technical access controls that enforce minimum necessary access based on role. Enable and actively monitor audit logs—review them quarterly for suspicious patterns such as after-hours access, access to employee or family member records, or bulk record access inconsistent with job duties. Establish and enforce a clear sanctions policy that specifies consequences for unauthorized access, including mandatory termination for intentional snooping. Train workforce members on the sanctions policy during initial and annual training. Investigate all potential violations promptly and document your investigation, findings, and disciplinary actions taken. Create a culture where patient privacy is prioritized and violations are taken seriously.

Risk Assessment: Your Most Critical Control

The risk assessment is not a checkbox compliance exercise—it is a living document that drives your entire security program. OCR has never found an organization compliant without a current, comprehensive risk assessment. If you implement only one HIPAA control this year, make it a thorough, documented, annually updated risk assessment that identifies real threats to your specific environment and demonstrates you've addressed the identified risks.

Schedule Your HIPAA Endpoint Review

Our cybersecurity experts specialize in HIPAA compliance for small healthcare practices. We'll evaluate your current security posture, conduct a comprehensive risk assessment, and provide a prioritized remediation roadmap tailored to your practice size and budget.

Frequently Asked Questions

HIPAA penalties are tiered based on the level of culpability and range from $100 to $50,000 per violation, with an annual maximum of $1.5 million per violation category. The tiers are: Tier 1 (unknowing violation) carries penalties of $100-$50,000 per violation; Tier 2 (reasonable cause) carries $1,000-$50,000 per violation; Tier 3 (willful neglect, corrected) carries $10,000-$50,000 per violation; and Tier 4 (willful neglect, not corrected) carries $50,000 per violation. For small practices, enforcement actions typically result in settlements ranging from $25,000 to $500,000, plus mandatory corrective action plans requiring ongoing compliance monitoring and reporting to OCR for 2-3 years.

Under the current HIPAA Security Rule, encryption is an "addressable" specification—meaning you must implement it if reasonable and appropriate, or document why it's not feasible and implement an equivalent safeguard. However, encryption provides the only safe harbor from breach notification requirements: if ePHI is encrypted using NIST-validated algorithms and the encryption key was not compromised, an incident does not constitute a reportable breach. Given the low cost of encryption technology and the high cost of breach notification, encryption is effectively mandatory for all ePHI at rest and in transit. The proposed Security Rule updates would make encryption explicitly required for all covered entities.

You must conduct a comprehensive risk assessment at least annually. Additionally, you should update your risk assessment whenever you: implement a new system or technology that stores or processes ePHI, change EHR or practice management vendors, add new locations or practice sites, experience a security incident or breach, change business associates, or make significant changes to your network infrastructure. The risk assessment must be documented and must cover all systems, locations, and potential threats. Many small practices conduct annual baseline assessments with quarterly reviews to address incremental changes.

A Business Associate Agreement (BAA) is a HIPAA-required contract between a covered entity and any vendor that creates, receives, maintains, or transmits protected health information on the covered entity's behalf. The BAA specifies the vendor's obligations to safeguard PHI and includes required regulatory provisions under 45 CFR § 164.314(a)(2). You need a BAA with every vendor that touches PHI, including: EHR and practice management software vendors, billing services and claims clearinghouses, cloud storage providers (Google Drive, Dropbox, OneDrive), email providers if you transmit PHI via email, IT support and managed service providers, patient portal vendors, telehealth platforms, transcription services, shredding companies, answering services, and medical device vendors that transmit patient data. The BAA must be executed before any PHI is disclosed to the vendor. Failure to obtain BAAs is a common and easily avoidable HIPAA violation.

Cloud storage can be HIPAA-compliant, but it is not compliant by default. To use cloud storage for ePHI, you must: execute a Business Associate Agreement with the cloud provider, verify the provider offers HIPAA-compliant services (many providers offer both HIPAA and non-HIPAA versions—you must explicitly select and configure the HIPAA tier), enable encryption for data at rest and in transit, implement access controls and MFA, enable audit logging, and ensure data backup and disaster recovery capabilities. Major cloud providers like Microsoft 365, Google Workspace, and AWS offer HIPAA-compliant tiers with BAAs, but you must explicitly configure and enable these features. Consumer-grade cloud storage accounts (personal Dropbox, free Gmail) are never HIPAA-compliant. For small practices, managed HIPAA-compliant cloud solutions specifically designed for healthcare offer the simplest path to compliance.

Yes. HIPAA applies to all covered entities regardless of size. If you are a healthcare provider who transmits any health information electronically in connection with a HIPAA-covered transaction (such as claims, eligibility inquiries, or referrals), you are a covered entity and must comply with all HIPAA rules. There is no small practice exemption. Solo practitioners, small group practices, and large health systems all have the same fundamental compliance obligations. The Security Rule does allow for scalability—your safeguards must be "reasonable and appropriate" for your size, complexity, and capabilities—but you cannot simply opt out of HIPAA because you are small. Small practices have been subject to OCR enforcement actions and significant penalties.

Act immediately. First, contain the incident to prevent further unauthorized access or disclosure. Secure affected systems, change credentials if compromised, and isolate affected devices. Second, conduct a rapid assessment to determine whether the incident constitutes a breach requiring notification. Consider: was PHI actually acquired, accessed, used, or disclosed? Was the PHI secured (encrypted) at the time? What is the probability that PHI was actually compromised? Third, if you determine a breach occurred, you must notify affected individuals within 60 days of discovery. If 500 or more individuals are affected, you must also notify HHS immediately and notify prominent media outlets. Document your entire investigation, breach determination, and notification activities. Fourth, implement corrective measures to prevent recurrence and update your risk assessment. Many small practices benefit from engaging incident response professionals who can guide the investigation, breach determination, and notification process while ensuring regulatory compliance.

You may use email to communicate with patients only if you implement appropriate safeguards and obtain patient consent. Standard email is not encrypted and is inherently insecure for transmitting ePHI. If you use email for patient communication, you should: obtain the patient's written consent acknowledging the security risks of unencrypted email, implement encrypted email solutions using TLS 1.2 or higher, or use a secure patient portal instead of direct email, include only the minimum necessary PHI in email communications, avoid including highly sensitive information in email even with encryption, and verify recipient email addresses carefully to avoid misdirected messages. The best practice for small practices is to use a HIPAA-compliant patient portal for all electronic patient communication rather than relying on email. Patient portals provide encryption, audit logging, access controls, and better security than email while improving patient engagement.

Multi-factor authentication (MFA) is currently an addressable specification under the HIPAA Security Rule's access control requirements, but it represents an industry best practice that the proposed Security Rule updates would make mandatory. MFA dramatically reduces the risk of unauthorized access due to compromised passwords—the most common attack vector in healthcare breaches. Small practices should implement MFA on all systems accessing ePHI, including EHR systems, email, remote access/VPN, cloud storage, and administrative interfaces. Use authenticator apps or hardware tokens rather than SMS-based MFA when possible. The National Institute of Standards and Technology (NIST) Digital Identity Guidelines (NIST SP 800-63B) provide detailed MFA implementation guidance. Implementing MFA now demonstrates proactive security practices and positions your practice ahead of likely regulatory requirements.

HIPAA requires covered entities to retain all compliance documentation for at least six years from the date of creation or the date it was last in effect, whichever is later. This includes: policies and procedures, risk assessments and remediation plans, Business Associate Agreements, workforce training records, sanctions documentation, incident response and breach investigation records, audit log reviews, and system access records. Many small practices adopt a seven-year retention policy to align with medical record retention requirements and ensure adequate coverage. Implement a document retention policy that specifies retention periods for each document type and establish a secure method for archiving and retrieving compliance documentation when needed for audits or investigations.

Share

Share on X
Share on LinkedIn
Share on Facebook
Send via Email
Copy URL
(800) 492-6076
Share

Schedule

Worried about HIPAA compliance?

Our healthcare cybersecurity team can assess your risks and build a protection plan.

HIPAA compliance made simple

Protect patient data and avoid costly violations with our comprehensive healthcare cybersecurity solutions.