HIPAA Policies and Procedures
HIPAA PRIVACY AND SECURITY POLICIES AND PROCEDURES
[ORGANIZATION NAME]
Effective Date: [EFFECTIVE DATE]
Last Revised: [REVISION DATE]
Version: [VERSION NUMBER]
Approved By: [NAME/TITLE]
TABLE OF CONTENTS
- Introduction and Purpose
- Definitions
- Privacy Policies
- Security Policies
- Breach Notification Policies
- Workforce Training
- Sanctions
- Documentation and Retention
- Policy Maintenance
SECTION 1: INTRODUCTION AND PURPOSE
1.1 Purpose
These policies and procedures establish the framework for [ORGANIZATION NAME] ("Organization") to protect the privacy and security of protected health information (PHI) in compliance with:
- Health Insurance Portability and Accountability Act of 1996 (HIPAA)
- HIPAA Privacy Rule (45 CFR Part 164, Subpart E)
- HIPAA Security Rule (45 CFR Part 164, Subpart C)
- HIPAA Breach Notification Rule (45 CFR Part 164, Subpart D)
- Health Information Technology for Economic and Clinical Health (HITECH) Act
- Applicable state privacy laws
1.2 Scope
These policies apply to:
☐ All workforce members (employees, volunteers, trainees, contractors)
☐ All business associates
☐ All PHI in any form (paper, electronic, verbal)
☐ All locations where PHI is accessed, stored, or transmitted
1.3 Responsible Officials
Privacy Officer:
- Name: [NAME]
- Title: [TITLE]
- Contact: [PHONE/EMAIL]
Security Officer:
- Name: [NAME]
- Title: [TITLE]
- Contact: [PHONE/EMAIL]
SECTION 2: DEFINITIONS
Covered Entity: A health plan, healthcare clearinghouse, or healthcare provider that transmits health information electronically.
Business Associate: A person or entity that performs functions involving PHI on behalf of a covered entity.
Protected Health Information (PHI): Individually identifiable health information transmitted or maintained in any form.
Electronic Protected Health Information (ePHI): PHI transmitted or maintained in electronic media.
Workforce: Employees, volunteers, trainees, and other persons under the direct control of the Organization.
Minimum Necessary: Using or disclosing only the minimum PHI necessary to accomplish the intended purpose.
Designated Record Set: Medical records and billing records used to make decisions about individuals.
SECTION 3: PRIVACY POLICIES
Policy 3.1: Uses and Disclosures of PHI
Policy Statement: PHI will only be used or disclosed as permitted or required by HIPAA and applicable law.
Procedures:
3.1.1 Permitted Uses Without Authorization:
☐ Treatment: Sharing PHI with other providers for patient care
☐ Payment: Using PHI for billing and claims processing
☐ Healthcare Operations: Quality assessment, training, compliance activities
3.1.2 Uses Requiring Authorization:
☐ Marketing (with limited exceptions)
☐ Sale of PHI
☐ Psychotherapy notes
☐ Other uses not described in Notice of Privacy Practices
3.1.3 Required Disclosures:
☐ To the individual upon request (45 CFR § 164.524)
☐ To HHS for compliance investigations
3.1.4 Verification Requirements:
☐ Verify identity of person requesting PHI
☐ Verify authority to access PHI
☐ Document verification efforts
Policy 3.2: Minimum Necessary Standard
Policy Statement: Workforce members shall use, disclose, or request only the minimum PHI necessary to accomplish the intended purpose.
Procedures:
3.2.1 For Uses:
☐ Define role-based access to PHI
☐ Limit access based on job function
☐ Review access rights periodically
3.2.2 For Disclosures:
☐ Limit disclosures to information reasonably necessary
☐ Develop standard protocols for routine disclosures
☐ Review non-routine disclosure requests individually
3.2.3 Exceptions:
☐ Disclosures to the individual
☐ Disclosures pursuant to authorization
☐ Disclosures to HHS for enforcement
☐ Disclosures required by law
☐ Uses/disclosures for treatment
Policy 3.3: Individual Rights
Policy Statement: Individuals have specific rights regarding their PHI, and the Organization will honor these rights in accordance with HIPAA.
3.3.1 Right to Access (45 CFR § 164.524)
Procedures:
☐ Respond to access requests within 30 days (one 30-day extension permitted)
☐ Provide PHI in requested format if readily producible
☐ Charge only reasonable, cost-based fees
☐ Provide electronic access to ePHI as required
☐ Document all requests and responses
3.3.2 Right to Amendment (45 CFR § 164.526)
Procedures:
☐ Respond to amendment requests within 60 days
☐ Accept or deny requests based on permitted criteria
☐ If denied, provide written explanation and right to disagree
☐ Inform business associates of accepted amendments
3.3.3 Right to Accounting of Disclosures (45 CFR § 164.528)
Procedures:
☐ Track disclosures not for TPO, to individual, or pursuant to authorization
☐ Provide accounting within 60 days of request
☐ Include required information for each disclosure
☐ First accounting in 12-month period is free
3.3.4 Right to Request Restrictions (45 CFR § 164.522)
Procedures:
☐ Consider restriction requests
☐ Must agree to restrictions for self-pay patients requesting restriction from health plans
☐ Document agreed-upon restrictions
☐ Implement agreed restrictions except in emergencies
3.3.5 Right to Confidential Communications (45 CFR § 164.522)
Procedures:
☐ Accommodate reasonable requests
☐ Document alternative communication methods
☐ Implement requests without requiring explanation
Policy 3.4: Notice of Privacy Practices
Policy Statement: The Organization will maintain and distribute a Notice of Privacy Practices (NPP) as required by 45 CFR § 164.520.
Procedures:
☐ Provide NPP at first service delivery
☐ Make good faith effort to obtain written acknowledgment
☐ Document if acknowledgment not obtained and reason
☐ Post NPP in facility and on website
☐ Revise NPP promptly when material changes occur
Policy 3.5: Business Associate Management
Policy Statement: The Organization will enter into Business Associate Agreements (BAAs) with all business associates as required by 45 CFR § 164.504(e).
Procedures:
☐ Identify all business associates
☐ Execute compliant BAAs before sharing PHI
☐ Include all required provisions per 45 CFR § 164.504(e)
☐ Monitor business associate compliance
☐ Address known violations
☐ Maintain inventory of all BAAs
SECTION 4: SECURITY POLICIES
Policy 4.1: Administrative Safeguards
4.1.1 Security Management Process (§ 164.308(a)(1))
Procedures:
☐ Conduct annual risk analysis
☐ Implement risk management measures
☐ Maintain sanction policy for violations
☐ Regularly review information system activity
4.1.2 Workforce Security (§ 164.308(a)(3))
Procedures:
☐ Implement procedures for authorizing access
☐ Conduct background checks as appropriate
☐ Establish termination procedures
☐ Remove access immediately upon termination
4.1.3 Security Awareness and Training (§ 164.308(a)(5))
Procedures:
☐ Provide initial training to all workforce members
☐ Provide periodic security reminders
☐ Train on malware protection
☐ Train on login monitoring and password management
☐ Document all training
4.1.4 Security Incident Procedures (§ 164.308(a)(6))
Procedures:
☐ Identify and respond to security incidents
☐ Mitigate harmful effects
☐ Document incidents and outcomes
☐ Report incidents as required
4.1.5 Contingency Plan (§ 164.308(a)(7))
Procedures:
☐ Maintain data backup plan
☐ Maintain disaster recovery plan
☐ Maintain emergency mode operation plan
☐ Test and revise plans periodically
Policy 4.2: Physical Safeguards
4.2.1 Facility Access Controls (§ 164.310(a))
Procedures:
☐ Implement facility security measures
☐ Control physical access to systems
☐ Maintain access logs
☐ Secure workstations in public areas
4.2.2 Device and Media Controls (§ 164.310(d))
Procedures:
☐ Implement disposal procedures for media containing ePHI
☐ Implement media re-use procedures
☐ Track movement of hardware and media
☐ Create backup copies before moving equipment
Policy 4.3: Technical Safeguards
4.3.1 Access Control (§ 164.312(a))
Procedures:
☐ Assign unique user identification
☐ Implement emergency access procedures
☐ Implement automatic logoff
☐ Encrypt ePHI as appropriate
4.3.2 Audit Controls (§ 164.312(b))
Procedures:
☐ Implement hardware and software audit mechanisms
☐ Record and examine activity in systems with ePHI
☐ Review audit logs regularly
4.3.3 Integrity Controls (§ 164.312(c))
Procedures:
☐ Implement mechanisms to ensure ePHI is not altered or destroyed
☐ Implement electronic signatures where appropriate
4.3.4 Transmission Security (§ 164.312(e))
Procedures:
☐ Implement integrity controls for ePHI transmission
☐ Encrypt ePHI transmitted over open networks
SECTION 5: BREACH NOTIFICATION POLICIES
Policy 5.1: Breach Identification and Response
Policy Statement: The Organization will identify, respond to, and report breaches of unsecured PHI as required by 45 CFR Part 164 Subpart D.
Procedures:
5.1.1 Breach Identification:
☐ Train workforce to identify potential breaches
☐ Establish reporting mechanism for potential breaches
☐ Investigate all reports promptly
5.1.2 Breach Assessment:
☐ Determine if breach occurred using four-factor analysis:
- Nature and extent of PHI involved
- Unauthorized person who used/received PHI
- Whether PHI was actually acquired or viewed
- Extent to which risk has been mitigated
5.1.3 Breach Notification:
☐ Notify affected individuals within 60 days of discovery
☐ Notify HHS (annually if <500 affected; within 60 days if 500+)
☐ Notify media if 500+ affected in a state/jurisdiction
☐ Include all required content in notifications
5.1.4 Documentation:
☐ Document breach assessment and decision
☐ Document notification efforts
☐ Retain documentation for 6 years
SECTION 6: WORKFORCE TRAINING
Policy 6.1: Privacy and Security Training
Policy Statement: All workforce members will receive HIPAA training upon hire and periodically thereafter.
Procedures:
☐ Initial training within [30/60/90] days of hire
☐ Annual refresher training
☐ Training upon material policy changes
☐ Role-specific training as needed
☐ Document all training (date, attendees, topics)
Training Topics:
☐ Overview of HIPAA Privacy and Security Rules
☐ Organization's privacy and security policies
☐ Workforce member responsibilities
☐ Identifying and reporting incidents
☐ Patient rights
☐ Consequences of violations
SECTION 7: SANCTIONS
Policy 7.1: Sanctions for Violations
Policy Statement: Workforce members who violate HIPAA policies will be subject to sanctions, up to and including termination.
Procedures:
7.1.1 Sanction Process:
☐ Investigate all reported violations
☐ Determine severity of violation
☐ Apply appropriate sanction
☐ Document all sanctions applied
7.1.2 Sanction Levels:
☐ Level 1 - Verbal warning with documentation
☐ Level 2 - Written warning
☐ Level 3 - Suspension
☐ Level 4 - Termination
☐ Level 5 - Report to law enforcement/licensing board (if criminal)
7.1.3 Factors in Determining Sanctions:
☐ Severity of violation
☐ Whether violation was intentional
☐ Whether patient was harmed
☐ Prior violations by same workforce member
☐ Workforce member's cooperation in investigation
SECTION 8: DOCUMENTATION AND RETENTION
Policy 8.1: Documentation Requirements
Policy Statement: The Organization will maintain documentation as required by 45 CFR § 164.530(j).
Required Documentation:
☐ Privacy and security policies and procedures
☐ Notice of Privacy Practices and acknowledgments
☐ Authorizations
☐ Business Associate Agreements
☐ Accounting of disclosures
☐ Training records
☐ Sanction documentation
☐ Complaint logs
☐ Risk assessments
☐ Security incident reports
☐ Breach documentation
Retention Period: Six (6) years from date of creation or last effective date, whichever is later.
SECTION 9: POLICY MAINTENANCE
Policy 9.1: Policy Review and Updates
Policy Statement: These policies will be reviewed annually and updated as needed.
Procedures:
☐ Annual review by Privacy and Security Officers
☐ Update upon regulatory changes
☐ Update upon significant operational changes
☐ Communicate changes to workforce
☐ Provide training on material changes
ACKNOWLEDGMENT
I acknowledge that I have received, read, and understand the HIPAA Privacy and Security Policies and Procedures of [ORGANIZATION NAME]. I agree to comply with all applicable policies and understand that violation may result in disciplinary action.
Workforce Member Signature: ______________________________________
Printed Name: [NAME]
Date: ______________
Document Control:
| Version | Date | Author | Changes |
|---|---|---|---|
| 1.0 | [DATE] | [NAME] | Initial release |
| [X.X] | [DATE] | [NAME] | [DESCRIPTION] |
About This Template
These templates cover the everyday paperwork that happens between patients, providers, and health plans: consent forms, medical record authorizations, directives for end-of-life care, and requests to approve or deny treatment. Getting them right matters because they document medical decisions, release sensitive health information, and often have to meet both federal privacy rules and state-specific requirements. A form that is missing a required disclosure can be rejected by a provider or challenged later in court.
Important Notice
This template is provided for informational purposes. It is not legal advice. We recommend having an attorney review any legal document before signing, especially for high-value or complex matters.
Last updated: May 2026