Compliance

HIPAA for Small Healthcare Practices: A Plain-English Guide

HIPAA compliance doesn't require enterprise resources. Learn what small healthcare practices must do to protect patient data and avoid costly violations.

SimplCyber TeamMarch 20, 202519 min read

HIPAA Compliance for Small Practices

The Health Insurance Portability and Accountability Act (HIPAA) applies to healthcare practices of all sizes, but small practices face unique challenges in meeting compliance requirements. You don't need enterprise budgets or dedicated compliance staff, but you do need to understand what's required and implement practical controls.

This guide translates HIPAA's complex regulations into actionable steps for small medical, dental, mental health, and other healthcare practices.

Who Must Comply with HIPAA

Covered Entities

HIPAA directly applies to healthcare providers who transmit health information electronically. This includes doctors, dentists, and clinics of all sizes.

Chiropractors, physical therapists, psychologists, and counselors must also comply. Nursing homes, pharmacies, and any provider conducting electronic transactions fall under HIPAA requirements.

Health insurance companies, HMOs, and company health plans are covered entities. Healthcare clearinghouses that process health information between providers and plans must comply as well.

Business Associates

If you handle Protected Health Information (PHI) on behalf of a covered entity, you're a Business Associate and must comply with HIPAA. This applies even if you're not directly providing healthcare services.

Medical billing companies, IT service providers, and cloud storage providers hosting PHI are business associates. Transcription services, medical device manufacturers with data access, and legal or accounting firms handling PHI must also comply.

Understanding Protected Health Information (PHI)

What Qualifies as PHI

PHI is any health information that can be linked to a specific individual. This includes medical records, treatment notes, lab results, diagnoses, prescription information, billing data, and appointment schedules.

Identifying information becomes PHI when combined with health data. This includes names, addresses, dates (birth, admission, discharge, death), phone numbers, email addresses, Social Security numbers, medical record numbers, insurance information, photos, fingerprints, and IP addresses linked to health information.

De-identified data that's been properly stripped of all identifiers is not PHI. Once properly de-identified, health information is no longer subject to HIPAA restrictions.

Electronic PHI (ePHI)

ePHI is any PHI created, stored, or transmitted electronically. Electronic health records (EHR) systems, patient portals, and practice management software all contain ePHI.

Email containing patient information, digital images, scans, backup systems, databases, and mobile devices with patient data are all examples of ePHI. Each requires appropriate security measures.

The Three HIPAA Rules

1. Privacy Rule: Controlling PHI Usage

The Privacy Rule establishes national standards for protecting patient health information. It governs how covered entities may use and disclose PHI.

Patient Rights

Patients have the right to access their health records and obtain copies within 30 days of request. They can also request amendments to correct inaccurate information in their records.

Patients can request an accounting of PHI disclosures and ask for restrictions on how their information is used or shared. They have the right to request confidential communications via specific methods or locations.

Notice of Privacy Practices

You must provide patients with a written notice explaining how you use and disclose PHI. This notice must describe patient rights under HIPAA and your legal duties regarding PHI.

The notice must include complaint procedures if patients believe their privacy rights have been violated. Patients should acknowledge receipt of this notice.

Minimum Necessary Standard

Only use or disclose the minimum PHI necessary for the intended purpose. This applies to internal uses and external disclosures.

Exceptions exist for treatment purposes, patient-authorized disclosures, and disclosures to the patient themselves. These activities don't require minimum necessary determinations.

Permitted Uses Without Authorization

You may use PHI without patient authorization for treatment, payment, and healthcare operations. Public health reporting, law enforcement requests (with specific requirements), and situations involving abuse or neglect are also permitted.

Disclosures required by law don't need patient authorization. However, you must still apply the minimum necessary standard where applicable.

Authorization Required

Marketing purposes always require patient authorization before using PHI. The sale of PHI and uses of psychotherapy notes (which have special protections) require explicit authorization.

Any use not covered by permitted exceptions requires written patient authorization. Authorization forms must be specific about what information will be used and for what purpose.

2. Security Rule: Protecting ePHI

The Security Rule requires administrative, physical, and technical safeguards for ePHI. These safeguards must be reasonable and appropriate for your practice size and complexity.

Administrative Safeguards

Risk Analysis

Conduct a thorough risk analysis to identify where ePHI exists in your practice. Assess threats and vulnerabilities to this information.

Determine the likelihood and impact of potential security incidents. Document your current security measures and identify gaps.

Risk Management

Implement security measures that address identified risks and vulnerabilities. Document your decisions and the rationale behind chosen controls.

Reduce risks to reasonable and appropriate levels based on your practice's size and resources. No practice can eliminate all risks, but you must manage them appropriately.

Workforce Security

Authorize access to ePHI based on each staff member's role and responsibilities. Implement procedures to ensure only authorized personnel access ePHI.

Revoke access immediately when employment ends. Track who accesses ePHI and what modifications they make.

Training

Train all workforce members on proper PHI handling procedures and your practice's privacy and security policies. This includes employees, volunteers, trainees, and anyone with access to your systems.

Document training completion for all staff members. Provide refresher training annually and when policies change.

Contingency Planning

Establish procedures for backing up ePHI regularly. Develop a disaster recovery plan to restore lost data.

Create emergency mode operations procedures to continue critical functions during system failures. Test and revise these procedures periodically.

Physical Safeguards

Facility Access Controls

Limit physical access to systems and equipment containing ePHI. Implement badge systems, locks, or other access controls as appropriate for your facility.

Maintain visitor logs and escort requirements for non-employees in areas with ePHI. Establish workstation security policies for areas accessible to patients or visitors.

Workstation Security

Position computer screens away from public view in waiting areas and hallways. Implement automatic screen locks after brief periods of inactivity.

Enforce clean desk policies requiring staff to secure PHI when not in use. Provide secure storage for devices, removable media, and paper records.

Device and Media Controls

Maintain an inventory of all devices containing ePHI including computers, laptops, tablets, phones, and removable storage. Implement secure disposal and destruction procedures for devices and media.

Encrypt portable devices like laptops and phones that could be lost or stolen. Establish media reuse procedures that securely wipe data before repurposing devices.

Technical Safeguards

Access Control

Assign unique user IDs to each person accessing ePHI systems. Never share passwords or allow generic accounts.

Establish emergency access procedures for when normal authentication isn't possible. Implement automatic logoff after periods of inactivity.

Encrypt ePHI when transmitted over networks or the internet. This includes email, file transfers, and remote access.

Audit Controls

Implement logging systems to record access to ePHI and activities within your systems. Capture who accessed what information and when.

Review logs regularly for suspicious or unauthorized activity. Retain logs according to your practice's retention policy and regulatory requirements.

Integrity Controls

Ensure ePHI isn't improperly altered or destroyed. Implement mechanisms to authenticate ePHI and detect unauthorized modifications.

This may include checksums, digital signatures, or version control systems. The goal is maintaining confidence that your data hasn't been tampered with.

Transmission Security

Encrypt ePHI whenever it's transmitted electronically outside your facility. This includes emails, file transfers, and communications with patients or other providers.

Use secure messaging platforms that are HIPAA-compliant. Implement VPNs for remote access to practice systems.

3. Breach Notification Rule

The Breach Notification Rule requires covered entities to notify affected individuals, HHS, and sometimes the media when a breach of unsecured PHI occurs. Understanding what constitutes a breach and the notification requirements is critical.

What Constitutes a Breach

A breach is an impermissible use or disclosure of PHI that compromises the security or privacy of the information. Lost or stolen unencrypted devices containing PHI are breaches.

Misdirected emails containing PHI, unauthorized access to medical records, and improper disposal of records are all potential breaches. Each incident requires assessment.

Exceptions to Breach Definition

Unintentional access by a workforce member acting in good faith and within their job duties isn't a breach. Inadvertent disclosure to another authorized person at the same organization may not be a breach.

If PHI cannot reasonably be retained (like a temporary view with no ability to save or capture), it may not constitute a breach. Document your analysis of each incident.

Notification Requirements for Small Breaches

For breaches affecting fewer than 500 people, notify affected individuals within 60 days of discovery. Send written notification by mail or email if the patient previously agreed to electronic communications.

Include a description of the breach and types of information involved. Explain steps individuals should take to protect themselves and what your practice is doing in response.

Provide contact information for questions. Report these breaches to HHS annually.

Notification Requirements for Large Breaches

For breaches affecting 500 or more people in the same state or jurisdiction, notify prominent local media outlets. Use the same timeframe as individual notification (within 60 days).

Notify HHS within 60 days of discovering the breach. These large breaches are publicly posted on HHS's "wall of shame" website.

The Cost of Healthcare Breaches in 2025

Healthcare breaches are among the most expensive across all industries. In 2025, the average healthcare data breach in the United States costs $10.22 million.

Globally, healthcare breaches average $7.42 million. In 2025 alone, 508 large healthcare breaches were reported to HHS.

It takes an average of 279 days to identify and contain a healthcare breach. This extended timeline significantly increases costs and patient risk.

HIPAA Penalties in 2025

Civil penalties vary based on the level of culpability. Unknowing violations carry penalties of $100 to $50,000 per violation.

Violations due to reasonable cause range from $1,000 to $50,000 per violation. Willful neglect that's corrected within 30 days carries penalties of $10,000 to $50,000 per violation.

Willful neglect that's not corrected results in mandatory $50,000 penalties per violation. The annual maximum penalty per violation category has increased to $2.13 million in 2025.

Practical HIPAA Implementation for Small Practices

Step 1: Designate Roles

Privacy Officer

The Privacy Officer develops and implements privacy policies for your practice. They handle patient requests for records, amendments, and accounting of disclosures.

This role investigates privacy complaints and provides privacy training to staff. In small practices, one person can serve as both Privacy and Security Officer.

Security Officer

The Security Officer develops and implements security policies and conducts risk assessments. They manage security incidents and provide security training.

This role is responsible for ensuring technical, physical, and administrative safeguards are in place and functioning. Documentation of their activities is essential.

Step 2: Conduct Risk Assessment

Inventory Your ePHI

Identify every system and location where ePHI exists. This includes EHR/EMR systems, practice management software, email systems, and patient portals.

Don't forget backup systems, mobile devices, and paper records that may eventually be digitized. Cloud storage and file shares must be included.

Identify Threats

Consider unauthorized access from external hackers and insider threats from employees. Data loss from device theft, improper disposal, or ransomware is a major risk.

System failures from hardware crashes or software bugs can compromise ePHI. Natural disasters like fires or floods and human errors like misdirected emails or lost devices must be assessed.

Assess Current Controls

Evaluate your existing access controls including passwords and multi-factor authentication. Review encryption status for data at rest and in transit.

Examine backup procedures, physical security measures, and training programs. Document what's working and what's not.

Document Gaps and Prioritize

Identify risks that remain unaddressed and controls that are missing or inadequate. Prioritize remediation based on likelihood and potential impact.

Your risk assessment documentation must be retained for six years. Update it annually or when significant changes occur.

Step 3: Implement Security Measures

Access Management

Assign unique usernames to each staff member—never share accounts. Enforce strong password requirements: minimum 12 characters with complexity.

Implement multi-factor authentication for all systems containing ePHI. Configure role-based access so staff only see information they need for their jobs.

Set automatic timeout after 10-15 minutes of inactivity. Remove access immediately when employment ends.

Encryption

Enable full disk encryption on all devices using BitLocker (Windows) or FileVault (Mac). Encrypt all emails containing PHI using built-in encryption features or HIPAA-compliant email services.

Use only HIPAA-compliant messaging platforms for communicating PHI. Ensure backup systems encrypt data both in transit and at rest.

Network Security

Deploy a firewall protecting your office network from internet threats. Secure your WiFi network with WPA3 or WPA2 encryption at minimum.

Create a separate guest network for patients that has no access to your internal systems. Implement VPN for remote access to practice systems.

Apply security updates and patches promptly—ideally within 30 days of release. Enable automatic updates where possible.

Policies and Procedures

Develop written privacy and security policies specific to your practice. Create an acceptable use policy for technology and PHI.

Document your incident response plan and breach notification procedures. If you allow personal devices, establish a BYOD policy with security requirements.

Make policies accessible to all staff. Review and update them annually.

Training Program

Provide HIPAA training to all new hires before they access PHI. Conduct annual refresher training for all staff.

Offer targeted training when policies change or after incidents. Document training completion with dates, topics, and attendee names.

Business Associate Agreements

Identify every vendor and contractor who might access, store, or transmit PHI. This includes obvious ones like EHR vendors and less obvious ones like shredding services.

Obtain a signed Business Associate Agreement before sharing any PHI. Review BAAs periodically to ensure they remain current.

Common vendors requiring BAAs include EHR vendors, cloud storage providers, IT support companies, billing services, email providers (for custom domains), and shredding services. Your internet service provider typically doesn't need a BAA if they're only providing conduit services.

Facility Security

Lock doors to rooms containing records or computers with ePHI access. Implement secure storage for paper records with limited key distribution.

Maintain visitor sign-in logs and escort non-employees in sensitive areas. Consider after-hours security measures like alarms or cameras.

Workstation Security

Position computer screens away from waiting areas and public corridors. Install privacy screens on monitors in exposed locations.

Enforce clean desk policies requiring staff to lock away or secure all PHI when leaving their workspace. Use cable locks for laptops in semi-public areas.

Secure Disposal

Shred all paper containing PHI before disposal—never use regular trash. Securely wipe electronic media before disposal or reuse.

Use a certified shredding service that will sign a BAA. Obtain certificates of destruction for disposed devices containing ePHI.

Step 4: Create Required Documentation

Essential Documents

Create and distribute a Notice of Privacy Practices to all patients. Develop comprehensive privacy and security policies.

Document your risk assessment findings and remediation plans. Maintain training records for all staff.

Keep incident logs even for events that don't rise to the level of reportable breaches. Collect signed Business Associate Agreements from all relevant vendors.

Create patient authorization forms for uses beyond treatment, payment, and operations. Prepare breach notification templates for rapid response.

Retention Requirements

Maintain all HIPAA documentation for six years from creation or last effective date, whichever is later. This includes policies, risk assessments, training records, and incident reports.

Some states have longer retention requirements. Follow the longer requirement if applicable.

Step 5: Establish Ongoing Processes

Monthly Tasks

Review access logs for unusual activity patterns or unauthorized access attempts. Verify that automated backups completed successfully.

Install software updates and security patches that have been released. Check for any new security vulnerabilities affecting your systems.

Quarterly Tasks

Test backup restoration procedures to ensure you can actually recover data if needed. Review and update policies to reflect operational changes.

Send security awareness reminders to staff about common threats like phishing. Review any incidents that occurred and lessons learned.

Annual Tasks

Conduct a comprehensive risk assessment reviewing all systems and processes. Provide HIPAA training to all staff members.

Review and renew Business Associate Agreements as they expire. Audit access controls and user permissions, removing unnecessary access.

Common HIPAA Violations in Small Practices

Improper Disposal

Throwing PHI in regular trash or recycling bins is a common violation. Failing to wipe devices before disposal or donating equipment with patient data intact creates breach risk.

Prevent this by shredding all paper PHI and securely wiping or physically destroying electronic media. Use certified disposal services with BAAs.

Unencrypted Devices

Lost or stolen laptops, phones, or tablets without encryption are reportable breaches. Unencrypted portable storage devices create the same risk.

Prevent this by enabling full disk encryption on all devices. Implement remote wipe capability for mobile devices and maintain device inventories with tracking.

Unauthorized Access

Staff accessing records of patients they don't treat (snooping) is a serious violation. Sharing login credentials or leaving workstations unlocked enables unauthorized access.

Prevent this through audit logging and regular log review. Implement role-based access controls and establish clear policies with consequences for violations.

Unsecured Email

Sending PHI via unencrypted email to patients or external parties is a technical safeguard violation. Using personal email accounts for work communications compounds the problem.

Prevent this by using encrypted email systems or HIPAA-compliant secure messaging. Train staff on proper communication channels and provide patient portals for secure message exchange.

Lack of Business Associate Agreements

Sharing PHI with vendors, contractors, or partners without signed BAAs is a violation. Many practices overlook less obvious business associates like IT support or shredding services.

Prevent this by identifying all vendors with potential PHI access before engaging them. Make BAA execution a prerequisite for any vendor relationship involving PHI.

Inadequate Training

Staff who haven't received HIPAA training make mistakes that lead to breaches. Lack of documented training creates compliance gaps during audits.

Prevent this through mandatory initial training before PHI access. Conduct annual refresher training and document all training completion.

HIPAA-Compliant Technology Choices

Electronic Health Records

Choose an EHR system that's HIPAA-compliant by design. It must provide encryption at rest and in transit.

Required features include audit logging capabilities, robust access controls and authentication, and willingness to sign a BAA. Popular options include Epic (large practices), Athenahealth, DrChrono (small practices), and NextGen.

Email Platforms

Microsoft 365 and Google Workspace are HIPAA-compliant when you obtain a BAA. Configure encryption for external emails containing PHI.

Never use personal email accounts for patient communications. Ensure your email service provider will sign a BAA before using their service for ePHI.

Secure Messaging

Use platforms designed for healthcare like TigerConnect, Spok, or Halo Health. Consumer messaging apps aren't HIPAA-compliant even if they offer encryption.

Signal may be used if you obtain a BAA and configure it properly. SMS text messaging is not secure and shouldn't be used for PHI.

Video Conferencing for Telehealth

Use telehealth-specific platforms like Zoom for Healthcare, Doxy.me, or VSee. Microsoft Teams can be used with a BAA.

Consumer versions of video platforms typically won't sign BAAs. Ensure any platform includes required safeguards like encryption and access controls.

Cloud Storage

Microsoft OneDrive for Business, Google Drive for Business, Box (HIPAA edition), and Dropbox Business (HIPAA edition) are approved with BAAs. Always verify the vendor will sign a BAA before storing ePHI.

Personal versions of cloud storage services are not HIPAA-compliant. Consumer file sharing services like WeTransfer or personal Dropbox cannot be used for PHI.

Cost of HIPAA Compliance for Small Practices

Initial Investment

Risk assessment costs range from $1,000-5,000 for professional services or you can use templates to DIY. Initial training runs $200-500 per year.

Encryption software is often free (BitLocker included with Windows, FileVault with Mac). Security tools like firewalls and antivirus cost $500-2,000 annually.

Policy templates range from $200-1,000 for comprehensive sets. Total initial investment typically runs $2,000-10,000 for a small practice.

Ongoing Costs

HIPAA-compliant email and EHR systems are often included in standard subscription costs. Annual training costs $200-500.

Security tools require annual renewals of $500-2,000. Compliance monitoring and periodic risk assessments cost $1,000-3,000 per year.

Total annual compliance costs typically range from $2,000-6,000 for small practices. This is a modest investment compared to breach costs.

Cost of Non-Compliance in 2025

With the average healthcare breach costing $10.22 million in the US, even a small practice can face devastating financial consequences. Civil penalties can reach $2.13 million per violation category annually.

Reputation damage from a breach can be immeasurable and practice-ending. Willful violations can result in criminal charges including fines and imprisonment.

The cost of basic compliance is far less than the potential cost of a single violation or breach. Consider compliance an essential business expense and patient protection measure.

Key Takeaways

HIPAA compliance for small practices is achievable without massive budgets or dedicated compliance teams. The key requirements—risk assessment, appropriate safeguards, training, and documentation—can be implemented practically.

Start with fundamental protections: encrypt all devices, use secure communications, train staff thoroughly, and document everything. Build additional controls based on your specific risk profile and practice size.

Healthcare breaches are expensive and time-consuming, with US healthcare breaches averaging $10.22 million in 2025. The 279-day average to identify and contain breaches means early detection systems are critical.

With 508 large healthcare breaches reported in 2025 and penalties up to $2.13 million per violation category, compliance is both a legal and financial imperative. View HIPAA not just as regulatory burden but as a framework for protecting patient trust.

The cost of basic compliance ($2,000-10,000 initially, $2,000-6,000 annually) is modest compared to breach costs and penalties. Most importantly, proper HIPAA compliance protects the patient information entrusted to your care.


Need help assessing your practice's HIPAA compliance? Get a free security assessment from SimplCyber to identify gaps and receive a practical implementation roadmap.

Tags:HIPAAhealthcarecompliancePHIprivacysecurity rule

Related Articles

Protect your business today

Get a comprehensive security assessment and actionable remediation plan.

Get Your Free Risk Scan