Form cover
Page 1 of 4

HIPAA Compliance Self-Assessment ChecklistπŸ›‘

Use this self-assessment guide to evaluate your HIPAA compliance readiness

Answer the questions below to gain insight into how well your current privacy and security practices align with HIPAA requirements, and to identify areas that may require additional effort or improvement. Each question includes examples and explanations to help you make an informed choice

⚠️ Note: This guide is designed to provide a general overview of your HIPAA preparedness and is not intended to replace a professional compliance audit ⚠️

βœ… SECTION 0: ORGANIZATION OVERVIEW

What industry do you operate in?

E.g. Medical Biotech, Telemedicine & Digital Health, Consumer-Oriented Digital Health, Health Insurers & Patient Data Platforms, Healthcare IT & Infrastructure, Medical Devices & Digital Therapeutics

What is your company’s current size?

What are your primary geographic target markets?

πŸ’‘ HIPAA compliance is legally required if your organization handles protected health information (PHI) of U.S. patients; for companies operating outside the U.S., compliance may still be critical for securing partnerships, contracts, and trust within the U.S. healthcare market.
What are your primary geographic target markets?

Does your product/service diagnose, treat, monitor, or influence clinical decision-making?

πŸ’‘ If your product influences clinical decisions, it may be classified as a medical device under FDA or MDR regulations β€” triggering stricter HIPAA, security, and regulatory requirements.

βœ… SECTION 1: HIPAA GENERAL APPLICABILITY

1. Does your organization create, receive, store, or transmit Protected Health Information (PHI or ePHI)?

E.g. you process patient data, lab results, appointment schedules, or health insurance information.
1. Does your organization create, receive, store, or transmit Protected Health Information (PHI or ePHI)?
A
B
C

2. What best describes your organization’s relationship to PHI?

You may be a medical provider, a software vendor for hospitals, or a cloud storage provider.

2. What best describes your organization’s relationship to PHI?
A
B
C

πŸ’‘ Under HIPAA, if your organisation handles identifiable health information and operates as a Covered Entity or Business Associate, you are subject to the full scope of the Privacy, Security, and Breach Notification Rules. Compliance efforts must be fully established, documented, and maintained.

Not sure whether the data you collect qualifies as PHI? Contact Sekurno for expert guidance. Our team can help you assess your compliance obligations accurately and ensure you're aligned with current HIPAA standards.πŸ’‘


πŸ” SECTION 2: PRIVACY RULE COMPLIANCE

3. Do you have clear, written privacy policies that govern how you use and share PHI?

Your policies explain what data you collect from patients and how it's used internally or shared with third parties.
3. Do you have clear, written privacy policies that govern how you use and share PHI?
A
B
C

4. Have you officially designated a Privacy Officer?

Example: Someone responsible for managing privacy policies, staff training, and patient rights requests.


4. Have you officially designated a Privacy Officer?
A
B
C

5. How does your organization address the requirement to inform individuals about privacy practices?

Example: A webpage or PDF outlining your data use, user rights, and how to contact you.
5. How does your organization address the requirement to inform individuals about privacy practices?
A
B
C
D

🧩 SECTION 3: SECURITY RULE COMPLIANCE

6. Have you conducted a formal Risk Assessment for systems handling ePHI?

Example: You’ve identified and documented risks to servers storing patient data, mobile devices, and third-party tools.
6. Have you conducted a formal Risk Assessment for systems handling ePHI?
A
B
C

7. Have you assigned a Security Officer to oversee technical safeguards?

Example: This person manages cybersecurity, access controls, and works with IT to mitigate threats.
7. Have you assigned a Security Officer to oversee technical safeguards?
A
B
C

8. Are your systems protected with access control and authentication protocols?

Example: Logins require usernames and passwords, possibly with MFA, and access is limited by role.
8. Are your systems protected with access control and authentication protocols?
A
B
C

9. Do you monitor and log access to PHI systems?

Example: You can track who accessed what data, when, and from whereβ€”and investigate if needed.
9. Do you monitor and log access to PHI systems?
A
B
C

10. Have you implemented secure software development practices (SSDLC)?

Example: Code is reviewed for vulnerabilities, and apps are tested before deployment.
10. Have you implemented secure software development practices (SSDLC)?
A
B
C

πŸ›  SECTION 4: TECHNICAL & PHYSICAL SAFEGUARDS

11. Do you encrypt PHI data both at rest and in transit?

Example: Stored data is encrypted using AES-256, and TLS is used for data transmission.
11. Do you encrypt PHI data both at rest and in transit?
A
B
C

12. Are your endpoints protected (e.g., antivirus, firewalls, remote wipe)?

Example: Workstations and mobile devices used to access ePHI are secured.
12. Are your endpoints protected (e.g., antivirus, firewalls, remote wipe)?
A
B
C

13. Do you have backups and disaster recovery plans for ePHI?

Example: Nightly backups of cloud systems and an off-site recovery plan
13. Do you have backups and disaster recovery plans for ePHI?
A
B
C

14. Have you conducted penetration testing or security scans?

Example: An external vendor tested your systems for vulnerabilities
14. Have you conducted penetration testing or security scans?
A
B
C

πŸ‘©β€πŸ’Ό SECTION 5: WORKFORCE TRAINING & MANAGEMENT

15. Do you train all employees on HIPAA privacy and security policies?

Example: New hires go through privacy training, and current staff are updated annually.
15. Do you train all employees on HIPAA privacy and security policies?
A
B
C

16. Do you have any measures or policies in place for handling employee violations of HIPAA?

Example: Violations like sharing credentials or accessing patient data without reason are disciplined.
16. Do you have any measures or policies in place for handling employee violations of HIPAA?
A
B
C

⚠️ SECTION 6: BREACH NOTIFICATION

17. How does your organization handle breach notification?

Example: A written procedure for what to do if PHI is leaked or stolen
17. How does your organization handle breach notification?
A
B
C
D

18. Do you track and document all security incidents and breaches?

Example: You log and store all suspected and confirmed security events
18. Do you track and document all security incidents and breaches?
A
B
C

πŸ“„ SECTION 7: BUSINESS ASSOCIATES & VENDORS

19. What agreements do you have with vendors or partners who handle PHI?

Example: You use a cloud platform or analytics tool that accesses PHI
19. What agreements do you have with vendors or partners who handle PHI?
A
B
C
D

20. Do you review vendor security policies and compliance status?

Example: You review their data handling, encryption, and incident response processes
20. Do you review vendor security policies and compliance status?
A
B
C

πŸ“ SECTION 8: DOCUMENTATION & AUDITS

21. Do you maintain HIPAA-related documentation for at least 6 years?

Example: Policy changes, risk assessments, training logs, incident reports
21. Do you maintain HIPAA-related documentation for at least 6 years?
A
B
C

22. Have you ever undergone a third-party HIPAA audit or readiness assessment?

Example: A certified firm reviewed your HIPAA posture and provided a gap analysis
22. Have you ever undergone a third-party HIPAA audit or readiness assessment?
A
B
C

πŸ“‹ SECTION 9: POLICIES & DOCUMENTATION INVENTORY

Which of the following HIPAA-required or best-practice policies does your organization already have?

Please check all that apply. This helps identify your current documentation maturity and the effort needed to become fully compliant.

23. Notice of Privacy Practices (NPP)

User-facing document informing individuals about their rights and your data use practices (required for Covered Entities).
23. Notice of Privacy Practices (NPP)
A
B
C

24. Information Security Policy

Overview of technical and administrative safeguards protecting PHI
24. Information Security Policy
A
B

25. Risk Analysis & Risk Management Plan

Risk register, threat modeling, and remediation plans for ePHI-related systems
25. Risk Analysis & Risk Management Plan
A
B

26. Access Control Policy

Explains role-based access, account creation, password strength, and MFA enforcement
26. Access Control Policy
A
B

27. Password Management Policy

Requirements for password strength, expiration, reuse, and MFA enforcement
27. Password Management Policy
A
B

28. Encryption Policy

Standards for encrypting PHI in transit (TLS) and at rest (AES-256)
28. Encryption Policy
A
B

29. Secure Software Development Policy

S-SDLC, code reviews, SAST/DAST, and vulnerability tracking in development
29. Secure Software Development Policy
A
B

30. Malware Protection Policy

Endpoint protection, antivirus, real-time scanning, and remediation workflows
30. Malware Protection Policy
A
B

31. Vulnerability Management Policy

Automated scans, critical patch timelines, and remediation plans
31. Vulnerability Management Policy
A
B

32. Backup Policy

Backup frequency, storage, testing, and restoration documentation
32. Backup Policy
A
B

33. Business Continuity & Disaster Recovery Policy

Wider resilience plan including infrastructure recovery and business continuity
33. Business Continuity & Disaster Recovery Policy
A
B

34. Physical and Environmental Security Policy

Facility access control, secured areas, and visitor logging
34. Physical and Environmental Security Policy
A
B

35. Mobile Devices Usage Policy

Device encryption, remote wipe, mobile device management (MDM)
35. Mobile Devices Usage Policy
A
B

36. Asset Management Policy

Inventory tracking, assignment, and device lifecycle management
36. Asset Management Policy
A
B

37. Clear Desk and Clear Screen Policy

Reduces exposure risk by protecting data in physical and digital formats
37. Clear Desk and Clear Screen Policy
A
B

38. Incident Response Policy

Roles, procedures, and notification timelines in the event of a breach
38. Incident Response Policy
A
B

39. Breach Notification Policy

Defines internal and external breach handling per HIPAA timelines
39. Breach Notification Policy
A
B

40. Workforce Sanctions Policy

Disciplinary actions for privacy violations or security negligence
40. Workforce Sanctions Policy
A
B

41. Workforce Training Records

Proof of HIPAA onboarding and annual training completions
41. Workforce Training Records
A
B

42. Business Associate Agreement (BAA) Template

Contract for PHI-handling vendors and partners
42. Business Associate Agreement (BAA) Template
A
B

43. Vendor Risk Management Policy

Due diligence process, compliance reviews, and vendor inventory
43. Vendor Risk Management Policy
A
B

44. Data Retention & Disposal Policy

Defines timelines and destruction methods for ePHI and backups
44. Data Retention & Disposal Policy
A
B

45. Security Testing Reports

Results from penetration tests, vulnerability scans, or SAST/DAST audits
45. Security Testing Reports
A
B

Never submit passwords through Tally forms.
Report malicious form