
To ensure compliance and security, covered entities must implement a HIPAA audit protocol that includes regular risk assessments and audits. This protocol is designed to identify vulnerabilities and weaknesses in their HIPAA policies and procedures.
The audit protocol must be led by a qualified auditor who has experience with HIPAA regulations and compliance. The auditor will conduct a thorough review of the covered entity's HIPAA policies, procedures, and practices to ensure they meet the required standards.
The audit protocol will also involve a review of the covered entity's risk analysis and management plan to ensure it is comprehensive and effective. This includes identifying potential risks and vulnerabilities, as well as implementing controls to mitigate these risks.
The goal of the audit protocol is to ensure that covered entities are protecting the confidentiality, integrity, and availability of protected health information. By regularly assessing and auditing their HIPAA policies and procedures, covered entities can identify and address potential vulnerabilities before they become major security risks.
What Is HIPAA Audit Protocol
HIPAA audit protocol is a process used by the Office for Civil Rights (OCR) to investigate potential HIPAA violations. OCR will reach out to organizations via certified mail and may also send an email.
The first step in a HIPAA audit is to verify the authenticity of the request. Be aware that fraudulent HIPAA investigation notices have been sent to healthcare organizations in the past.
There are two types of HIPAA audits that OCR officials may instigate: HIPAA desk audits and onsite HIPAA audits.
In a HIPAA desk audit, federal investigators will request documentation from your organization. This documentation may include:
- Employee training records with documented attestation
- Demonstration that you have audited the status of your organization’s compliance
- Remediation plans executed to address any gaps in your organization’s compliance, dated and signed
- Policies and procedures
- Vendor management and business associate agreements, along with documentation of due diligence
- Disaster recovery plan
- Tracking of any incidents or HIPAA violations that have occurred within the organization
Preparation and Planning
Preparation and Planning is crucial when it comes to a HIPAA audit. You need to designate a HIPAA security and privacy champion, as mentioned in Example 5, who will take the leading role in performing the subsequent steps in the audit.
This person will work with management to determine the audit's scope and objectives, as described in Example 6. The specific objectives of the audit need to be defined for each system and application in scope, including administrative, physical, and technical safeguards implemented to protect regulated data.
A shocking two-thirds of companies, as reported by Zinethia Clemmons, did not have thorough and up-to-date risk assessments in place, as mentioned in Example 8. This highlights the importance of having a solid risk management plan, which includes identifying threats, risks, and vulnerabilities in your system, applications, and processes, as outlined in Example 2.
Why Do You Need to Undergo?
You need to undergo a HIPAA compliance audit because the OCR periodically selects organizations for audits to ensure compliance with federal law. If you get picked, you'll have just 10 days to respond.
The consequences of failing a HIPAA compliance audit can be severe, as seen in the case of Anthem Inc. in 2019, which was required to pay $16 million after a security breach.
Designate a Champion
Designating a champion is the first step in preparing for a HIPAA audit. This person will be responsible for understanding HIPAA regulations and the ramifications of noncompliance.

In large organizations, this role may be a full-time position filled by a dedicated HIPAA Compliance Officer. In smaller organizations, a trusted and knowledgeable individual is typically assigned as the security and privacy expert for the duration of the audit.
This individual will take the leading role in performing the subsequent steps in the audit, and their duties may entail obtaining support from management and identifying key personnel responsible for implementing HIPAA rules throughout the organization.
Establish Objectives
Establishing objectives is a crucial step in the audit process. This involves defining specific objectives for each system and application in scope, including administrative, physical, and technical safeguards.
The objectives should focus on elements such as breach response procedures and data privacy policies. These elements are typically in scope for HIPAA audits.
To ensure a successful audit, it's essential to identify the key personnel or subject matter experts who will serve as resources for the audit. These individuals should be familiar with the procedures and practices used in the processing of PHI.
Incorporating systems that don't contain regulated data can lead to unnecessary complications and oversights, which can negatively impact HIPAA compliance and the way PHI is protected.
Establishing Scope and Objectives
Establishing scope and objectives is a crucial step in preparing for a HIPAA audit. This involves determining the audit's scope and objectives, which should focus on data falling under HIPAA regulations.
You'll need to identify the systems and applications that process HIPAA-regulated data and document them. This might be a subset of your entire IT environment, depending on your organization's specific needs.
The specific objectives of the audit should be defined for each system and application in scope. This includes administrative, physical, and technical safeguards implemented to protect regulated data.
Key personnel or subject matter experts (SMEs) will need to be identified and serve as resources for the audit. These individuals should be familiar with the procedures and practices used in processing PHI.
To avoid unnecessary complications, it's essential to keep the audit scope focused on HIPAA-regulated data. Incorporating other systems that don't contain regulated data can lead to oversights and negatively impact HIPAA compliance.
Here's a quick checklist to help you determine the audit scope and objectives:
- Identify systems and applications that process HIPAA-regulated data
- Document these systems and applications
- Define specific objectives for each system and application in scope
- Identify key personnel or SMEs to serve as resources for the audit
By following these steps, you'll be well-prepared to establish a clear scope and set of objectives for your HIPAA audit.
Documentation and Review
Documentation and Review is a crucial step in the HIPAA audit protocol. It involves collecting and reviewing all existing documentation supporting HIPAA compliance.
Organizational HIPAA policies, risk assessments, training records, Business Associate Agreements, incident response and disaster recovery plans, and reports from prior audits should be collected and reviewed. These documents provide a baseline for evaluating the organization's compliance readiness.
A thorough review of existing security and privacy controls, policies, and procedures is also necessary. This includes reviewing the following elements:
- Patient consent forms and privacy notices for data sharing
- Disclosure notices and guidelines
- Restricting access to PHI
- Organizational HIPAA policies
- Risk assessments including outcomes and mitigation strategies
- Training records for all personnel
- Business Associate Agreements (BAAs) made with third-party IT vendors
- Incident response and disaster recovery plans
- Reports from prior audits
Documenting findings and remediating vulnerabilities is also essential. This involves identifying gaps or vulnerabilities that may impact the ability to protect PHI and addressing them through remediation plans.
To ensure ongoing compliance, it's essential to implement periodic reviews of policies and procedures. This can be done by reviewing employee training materials and tools annually, for example, to check for understanding of HIPAA policies and procedures.
Risk Management Plan and Analysis
Creating a risk management plan and conducting a risk analysis is a crucial step in preparing for a HIPAA audit. This involves identifying vulnerabilities and threats to your system, applications, and processes.
To conduct a risk assessment, you should map how your PHI flows and where it is created and transmitted. This includes identifying what happens to PHI in the system, how it is stored, and how it leaves the environment.
You'll also need to identify threats, risks, and vulnerabilities in your system, applications, and processes. Hackers, weak passwords, and disgruntled employees are all threats to your business.
Deciding and analyzing your HIPAA risk level is the next step. To properly rank risks, consider both the probability of a threat occurring and its potential impact.
Here are the five steps to conduct a risk assessment:
- Map how your PHI flows and where it is created and transmitted.
- Identify threats, risks, and vulnerabilities in your system, applications, and processes.
- Decide and analyze your HIPAA risk level.
- Create a risk management plan and test your environment with vulnerability scans, penetration tests, and gap analysis.
- Document and outline everything.
By proactively managing risks, you'll ensure the safety and security of your patient's sensitive information stored in HIPAA-compliant software.
Breach Notification Rules
A breach is an impermissible use or disclosure under the Privacy Rule that compromises the privacy and security of the protected health information. This can happen in various ways, but it's essential to know how to identify and respond to a breach.
To identify a PHI breach, you need to determine if there's been an impermissible use or disclosure of protected health information. This involves evaluating the circumstances of the breach and determining if it meets the definition of a breach under the HIPAA rules.
Following a breach at a business associate, it's crucial to take specific actions to mitigate the damage and prevent future occurrences. This may include conducting a risk assessment, implementing additional security measures, and providing staff training on compliance protocols.
The HIPAA breach notification rule requires reporting breaches to the OCR under specific circumstances. You should also report the breach to other entities, such as affected individuals and state officials, as necessary.
Here are the key steps to take following a breach:
- Identify if a PHI breach has occurred
- Report the breach to the OCR and other necessary entities
- Conduct a risk assessment and implement additional security measures
- Provide staff training on compliance protocols
By following these steps and having a plan in place, you can mitigate the damage and demonstrate an ongoing commitment to compliance during audits.
Training and Education
Training and Education is a critical aspect of any HIPAA audit protocol. HIPAA regulations mandate appropriate training for all employees and contractors handling PHI.
Comprehensive training ensures that all employees in your organization are up-to-date with the recent updates in the law as well as the best practices to ensure security of the PHI. This training should be provided to employees soon after they join the organization.
The first step to achieving this goal is to provide education and training materials to all employees, covering topics such as the rights of patients and how to handle confidential information. Ideally, every employee should get trained soon after their joining.
Here's a checklist of what your HIPAA training must accomplish:
- Ensure employees understand the importance of HIPAA and why it’s necessary to protect PHI
- Reviews the basics of HIPAA law and how it applies to your company
- Outlines the specific procedures and controls employees should follow when handling patient Information
- Explains the consequences of violating HIPAA rules
- Ensure employees are always updated on the latest changes to HIPAA law through regular training
Documentation of the training is then great to show to an auditor to indicate your organization’s dedication to education. This also helps to show the OCR that your employees do in fact understand HIPAA law.
Technical and Compliance
Conducting regular technical assessments is crucial for HIPAA compliance. These assessments include risk analysis, penetration tests, and vulnerability scans designed to identify weaknesses that can impact the ability to protect PHI.
SMEs should be engaged to test their systems, and all issues should be documented and addressed as soon as possible.
Failing to address HIPAA audit protocols can result in significant fines, ranging from $100 to $50,000 per violation, in addition to potential criminal charges.
Techumen's senior experts have guided over 235 clinics and more than 1,200 healthcare organizations to successful audits from HHS and CMS, with a total of over 2,000 successful audits under their belt.
Technical Assessments
Conducting technical assessments is a crucial step in ensuring the security of sensitive information. This involves a risk analysis, penetration tests, and vulnerability scans to identify weaknesses that could impact data protection.
A thorough risk analysis is necessary to understand the potential threats to your systems and applications. SMEs should be engaged to test their systems and identify vulnerabilities.
All issues found during the technical assessment should be documented and addressed as soon as possible. This ensures that any weaknesses are corrected before they can be exploited by hackers.
Data Loss Prevention
Data loss prevention software is a valuable tool to promote compliance, and it's especially useful for organizations handling regulated data. Data loss prevention (DLP) software like the Reveal Platform by Next automatically enforces an organization's data handling policies to eliminate the misuse of regulated data.
Investing in the right DLP tool today could save you thousands of dollars in fines tomorrow. The Reveal Platform by Next provides user training at the point of risk, emphasizing data security and helping to prevent data breaches.
DLP software can be a game-changer for organizations looking to promote HIPAA compliance. By using DLP software, organizations can ensure that their data handling policies are being followed, and that their employees are trained to handle regulated data securely.
Rule Requirements
HIPAA audit protocols cover 72 audit inquiries that address the Security Rule requirements for technical, administrative and physical safeguards for electronically protected health information.
The Security Rule has two categories of implementation specifications: required and addressable. Required specifications must be implemented, while addressable specifications provide covered entities with the option not to implement and to use an alternative standard.
If a covered entity chooses not to implement an addressable specification, they must provide documentation explaining why that safeguard was not deemed appropriate or reasonable.
HIPAA audit protocols also cover 89 areas for potential audit inquiry under the HIPAA Privacy Rule, which sets national standards to protect individuals' medical records and other individual health information.
The Privacy Rule sets limits and conditions on the uses and disclosures of protected health information without an individual's authorization.
The HIPAA Privacy Rule concerns several key areas, including:
- The minimum acceptable standard
- The notice of privacy practices for PHI
- Business associate contract requirement
- An individual's rights to examine and obtain a copy of their PHI
- Patient's rights to amend document requests and contact information
- A process for individuals to request information relating to protected health information
A breach is an impermissible use or disclosure under the Privacy Rule that compromises the privacy and security of protected health information.
Frequently Asked Questions
What triggers a HIPAA audit?
HIPAA audits are triggered by complaints, potential HIPAA violations, data breaches, or random selection to ensure widespread compliance. Promptly addressing and documenting incidents is crucial to avoid audits and potential penalties.
Sources
- https://www.nextdlp.com/resources/blog/how-to-conduct-a-hipaa-compliance-audit
- https://compliancy-group.com/hipaa-audit-protocol-checklist-requirements/
- https://sprinto.com/blog/hipaa-compliance-audit/
- https://www.atlantic.net/hipaa-compliant-hosting/prepare-hipaa-audit-checklist/
- https://techumen.com/hipaa-audit-protocols/
Featured Images: pexels.com