⚠️ January 2025 HIPAA Security Rule Updates Now in Effect
HIPAA Security Rule

Security Rule Compliance Checklist

Complete checklist of all Administrative, Physical, and Technical Safeguards required by the HIPAA Security Rule (45 CFR Part 164, Subpart C). Track your compliance status with official regulation references.

Overall Progress

0%

0 of 45 requirements completed

Administrative

0/23

Physical

0/10

Technical

0/12

RequiredMandatory implementation specification
AddressableMust implement or document alternative

Security Management Process

Risk Analysis (164.308(a)(1)(ii)(A))

Required

Conduct an accurate and thorough assessment of potential risks and vulnerabilities to the confidentiality, integrity, and availability of ePHI.

Risk Management (164.308(a)(1)(ii)(B))

Required

Implement security measures sufficient to reduce risks and vulnerabilities to a reasonable and appropriate level.

Sanction Policy (164.308(a)(1)(ii)(C))

Required

Apply appropriate sanctions against workforce members who fail to comply with security policies and procedures.

Information System Activity Review (164.308(a)(1)(ii)(D))

Required

Implement procedures to regularly review records of information system activity (logs, audit reports, incident tracking reports).

Security Officer

Assigned Security Responsibility (164.308(a)(2))

Required

Identify the security official who is responsible for the development and implementation of security policies and procedures.

Workforce Security

Authorization and Supervision (164.308(a)(3)(ii)(A))

Addressable

Implement procedures for authorization and/or supervision of workforce members who work with ePHI or in locations where it might be accessed.

Workforce Clearance Procedure (164.308(a)(3)(ii)(B))

Addressable

Implement procedures to determine that the access of a workforce member to ePHI is appropriate.

Termination Procedures (164.308(a)(3)(ii)(C))

Addressable

Implement procedures for terminating access to ePHI when employment or other arrangement ends or when access is no longer required.

Information Access Management

Access Authorization (164.308(a)(4)(ii)(B))

Addressable

Implement policies and procedures for granting access to ePHI through workstations, transactions, programs, or processes.

Access Establishment and Modification (164.308(a)(4)(ii)(C))

Addressable

Implement policies and procedures that establish, document, review, and modify a user's right of access to workstation, transaction, program, or process.

Security Training

Security Awareness and Training (164.308(a)(5)(i))

Required

Implement a security awareness and training program for all members of the workforce (including management).

Security Reminders (164.308(a)(5)(ii)(A))

Addressable

Periodic security updates and reminders to workforce members.

Protection from Malicious Software (164.308(a)(5)(ii)(B))

Addressable

Procedures for guarding against, detecting, and reporting malicious software.

Log-in Monitoring (164.308(a)(5)(ii)(C))

Addressable

Procedures for monitoring log-in attempts and reporting discrepancies.

Password Management (164.308(a)(5)(ii)(D))

Addressable

Procedures for creating, changing, and safeguarding passwords.

Security Incidents

Security Incident Response (164.308(a)(6)(i))

Required

Identify and respond to suspected or known security incidents; mitigate harmful effects; document incidents and outcomes.

Contingency Plan

Data Backup Plan (164.308(a)(7)(ii)(A))

Required

Establish procedures to create and maintain retrievable exact copies of ePHI.

Disaster Recovery Plan (164.308(a)(7)(ii)(B))

Required

Establish procedures to restore any loss of data.

Emergency Mode Operation Plan (164.308(a)(7)(ii)(C))

Required

Establish procedures to enable continuation of critical business processes for protection of ePHI while operating in emergency mode.

Testing and Revision Procedures (164.308(a)(7)(ii)(D))

Addressable

Implement procedures for periodic testing and revision of contingency plans.

Applications and Data Criticality Analysis (164.308(a)(7)(ii)(E))

Addressable

Assess the relative criticality of specific applications and data in support of other contingency plan components.

Evaluation

Evaluation (164.308(a)(8))

Required

Perform periodic technical and nontechnical evaluation of security measures in response to environmental or operational changes.

Business Associates

Business Associate Contracts (164.308(b)(1))

Required

Obtain satisfactory assurances in writing that business associates will appropriately safeguard ePHI through Business Associate Agreements.

Get Expert Help with Security Rule Compliance

Our HIPAA compliance specialists can help you implement every safeguard and ensure your organization meets all Security Rule requirements.