HIPAA Compliance Checklists

The HIPAA Security Rule establishes national standards to protect electronic protected health information (ePHI). These checklists enumerate each implementation specification organized by safeguard category as codified in 45 CFR Part 164, Subpart C.

Required specifications must be implemented as stated. Addressable specifications must be assessed and either implemented as-is, implemented with an equivalent alternative measure, or documented as to why implementation is not reasonable and appropriate.

Technical Safeguards

45 CFR 164.312
#StandardCFR SectionTypeDescription
1Unique User Identification164.312(a)(2)(i)RequiredAssign a unique name and/or number for identifying and tracking user identity.
2Emergency Access Procedure164.312(a)(2)(ii)RequiredEstablish procedures for obtaining necessary ePHI during an emergency.
3Automatic Logoff164.312(a)(2)(iii)AddressableImplement electronic procedures that terminate an electronic session after a predetermined time of inactivity.
4Encryption and Decryption164.312(a)(2)(iv)AddressableImplement a mechanism to encrypt and decrypt electronic protected health information.
5Audit Controls164.312(b)RequiredImplement hardware, software, and/or procedural mechanisms that record and examine activity in systems that contain or use ePHI.
6Mechanism to Authenticate ePHI164.312(c)(2)AddressableImplement electronic mechanisms to corroborate that ePHI has not been altered or destroyed in an unauthorized manner.
7Person or Entity Authentication164.312(d)RequiredImplement procedures to verify that a person or entity seeking access to ePHI is the one claimed.
8Integrity Controls (Transmission)164.312(e)(2)(i)AddressableImplement security measures to ensure that electronically transmitted ePHI is not improperly modified without detection.
9Encryption (Transmission)164.312(e)(2)(ii)AddressableImplement a mechanism to encrypt ePHI whenever deemed appropriate during transmission over electronic networks.

Administrative Safeguards

45 CFR 164.308
#StandardCFR SectionTypeDescription
1Risk Analysis164.308(a)(1)(ii)(A)RequiredConduct an accurate and thorough assessment of the potential risks and vulnerabilities to the confidentiality, integrity, and availability of ePHI.
2Risk Management164.308(a)(1)(ii)(B)RequiredImplement security measures sufficient to reduce risks and vulnerabilities to a reasonable and appropriate level.
3Sanction Policy164.308(a)(1)(ii)(C)RequiredApply appropriate sanctions against workforce members who fail to comply with security policies and procedures.
4Information System Activity Review164.308(a)(1)(ii)(D)RequiredImplement procedures to regularly review records of information system activity, such as audit logs, access reports, and security incident tracking reports.
5Authorization and/or Supervision164.308(a)(3)(ii)(A)AddressableImplement procedures for the authorization and/or supervision of workforce members who work with ePHI or in locations where it might be accessed.
6Workforce Clearance Procedure164.308(a)(3)(ii)(B)AddressableImplement procedures to determine that the access of a workforce member to ePHI is appropriate.
7Termination Procedures164.308(a)(3)(ii)(C)AddressableImplement procedures for terminating access to ePHI when the employment of, or other arrangement with, a workforce member ends.
8Security Awareness and Training164.308(a)(5)(i)RequiredImplement a security awareness and training program for all members of the workforce, including management.
9Security Reminders164.308(a)(5)(ii)(A)AddressableImplement periodic security updates.
10Log-in Monitoring164.308(a)(5)(ii)(C)AddressableImplement procedures for monitoring log-in attempts and reporting discrepancies.
11Password Management164.308(a)(5)(ii)(D)AddressableImplement procedures for creating, changing, and safeguarding passwords.
12Security Incident Procedures164.308(a)(6)(i)RequiredImplement policies and procedures to address security incidents.
13Contingency Plan164.308(a)(7)(i)RequiredEstablish policies and procedures for responding to an emergency or other occurrence that damages systems containing ePHI.
14Data Backup Plan164.308(a)(7)(ii)(A)RequiredEstablish and implement procedures to create and maintain retrievable exact copies of ePHI.
15Disaster Recovery Plan164.308(a)(7)(ii)(B)RequiredEstablish procedures to restore any loss of data.
16Emergency Mode Operation Plan164.308(a)(7)(ii)(C)RequiredEstablish procedures to enable continuation of critical business processes for protection of ePHI while operating in emergency mode.
17Evaluation164.308(a)(8)RequiredPerform periodic technical and nontechnical evaluations in response to environmental or operational changes affecting ePHI security.

Physical Safeguards

45 CFR 164.310
#StandardCFR SectionTypeDescription
1Contingency Operations164.310(a)(2)(i)AddressableEstablish procedures that allow facility access in support of restoration of lost data under the disaster recovery plan and emergency mode operations plan.
2Facility Security Plan164.310(a)(2)(ii)AddressableImplement policies and procedures to safeguard the facility and the equipment therein from unauthorized physical access, tampering, and theft.
3Access Control and Validation Procedures164.310(a)(2)(iii)AddressableImplement procedures to control and validate a person's access to facilities based on their role or function, including visitor control and control of access to software programs for testing and revision.
4Maintenance Records164.310(a)(2)(iv)AddressableImplement policies and procedures to document repairs and modifications to the physical components of a facility which are related to security.
5Workstation Use164.310(b)RequiredImplement policies and procedures that specify the proper functions to be performed, the manner in which those functions are to be performed, and the physical attributes of the surroundings of a specific workstation or class of workstation that can access ePHI.
6Workstation Security164.310(c)RequiredImplement physical safeguards for all workstations that access ePHI, to restrict access to authorized users.
7Disposal164.310(d)(2)(i)RequiredImplement policies and procedures to address the final disposition of ePHI and/or the hardware or electronic media on which it is stored.
8Media Re-use164.310(d)(2)(ii)RequiredImplement procedures for removal of ePHI from electronic media before the media are made available for re-use.
9Accountability164.310(d)(2)(iii)AddressableMaintain a record of the movements of hardware and electronic media and any person responsible therefor.
10Data Backup and Storage164.310(d)(2)(iv)AddressableCreate a retrievable, exact copy of ePHI, when needed, before movement of equipment.

Additional Requirements

Beyond these safeguards, covered entities must also comply with Organizational Requirements (45 CFR 164.314) covering business associate contracts, and Documentation Requirements (45 CFR 164.316) mandating retention of policies and procedures for six years from the date of creation or the date when last in effect.