HIPAA Compliance Checklist for 2026

Share
HIPAA Compliance Checklist for 2026 | OpenVPN
11:34

Navigating HIPAA regulations can feel overwhelming, especially with new guidance every year. 

Disclaimer: This article is for informational purposes only and does not constitute legal or professional advice. Laws and regulations, including HIPAA, may change, and interpretations can vary. For guidance on your specific situation, consult a qualified attorney or compliance profession.

Healthcare organizations, covered entities, and business associates all face the same challenge: turning complex rules into actionable steps. That’s why we’ve created this HIPAA compliance checklist—a practical, step-by-step guide to help you reduce risk, streamline compliance efforts, and protect patient data — with network security at the core of compliance.

Get the HIPAA Compliance Checklist Spreadsheet

1. Administrative safeguards

Administrative safeguards are the foundation of HIPAA compliance. They ensure that your organization has the right policies, procedures, and accountability structures in place. You may be thinking that administrative rules are a given in healthcare, but they may not be as clearly documented as you think, which is why they should be included in your checklist. 

What administrative safeguards are needed? At minimum: documented privacy and security policies, internal audits, breach planning, and assigned leadership roles.

Administrative Safeguard Checklist:

Create and maintain privacy and security policies

Assign a HIPAA compliance officer and define leadership accountability

Regularly update documentation

Conduct annual internal audits

Set breach response protocols

Why it matters: Many healthcare organizations struggle with administrative safeguards because the rules can feel vague. But these processes bridge the gap between theory and real-world application. Leadership accountability, consistent audits, and a living set of policies help avoid confusion and prepare your team to respond effectively when challenges arise.

Action step: Outdated policies are a high-risk gap. If your documentation hasn’t been updated in the last year, now is the time. For more detailed HIPAA compliance insights, explore our in-depth guide.

 

2. Physical safeguards

This one may seem obvious to anyone who has ever worked in a healthcare facility, but it bears repeating. Physical safeguards protect against unauthorized, in-person access to sensitive health data. While digital security often takes center stage, on-site weaknesses remain a common cause of compliance failures. This includes locking up server rooms, as well as restricting access to printed patient records, printed financial records, hard copies of test results, and even copies of X-rays and other tests recorded on film.  

How do I safeguard physical records for HIPAA?  Use locked cabinets, enforce visitor sign-in protocols, restrict access to sensitive areas, and apply workstation security rules.

Checklist:

Secure access to physical facilities

Restrict areas with sensitive data (locked cabinets, server rooms)

Maintain visitor logs and surveillance

Implement workstation security policies


Why it matters: Even the most advanced firewalls can’t stop someone from walking into an unsecured server room. HIPAA requires healthcare organizations to take physical security just as seriously as IT safeguards.

Action step: Conduct a walkthrough of your facility to identify overlooked risks. For practical steps, check out our access control policies guide.

Download our Access Control Policy Template3. Technical safeguards

HIPAA’s technical safeguards address the systems, software, and digital protections that keep electronic PHI (ePHI) secure. Personal Health Information (PHI) is highly sought after by threat actors, because it can be used for extortion. This information commands a pretty penny on the dark web. 

Data encryption and secure communications

How do I ensure encryption meets HIPAA requirements? You must apply industry-standard methods such as AES-256 encryption for storage and TLS for transmissions, then audit regularly. 

Checklist:

Encrypt stored and transmitted ePHI

Use secure email and messaging protocols

Adopt TLS and AES-256 encryption

Regularly audit encryption methods

Stay aware of VPNs and network security best practices

Why it matters: Encryption is one of the most effective tools in healthcare security. It ensures that even if data is intercepted, it remains unreadable to unauthorized users.

Action step: Check your current encryption settings, including those in your VPN. You should also check out our SOC 2 and HIPAA adherence announcement

Maintaining HIPAA compliant software

HIPAA compliance for software goes beyond choosing the right vendor—it also requires proper configuration and ongoing audits. The settings your vendor touts as HIPAA compliant should still be rigorously checked. 

How do I ensure HIPAA compliance for software? Review your systems regularly, confirm vendors meet HIPAA standards, and configure role-based permissions to limit access.

Checklist:

Use certified HIPAA-compliant software vendors

Audit EHR and patient portal configurations

Set up role-based access and permissions

Schedule software updates and log reviews

Why it matters: All of your vendors must be HIPAA compliant. Compliance goes beyond your company’s borders, and if a breach happens, responsibility rests on both the vendor and your business. 

Action step: Conduct an audit of all current software in use to check on data integrity and governance. 

Get the HIPAA Compliance Checklist Spreadsheet

4. Ongoing risk assessment and employee training

Compliance isn’t a one-and-done task—it’s an ongoing process. The fact is, in 2024, 74% of CISOs cited human error as their company’s top cybersecurity risk, and another study found that somewhere around 95% of all data breaches were tied to human error in the same year. 

Risk assessments and employee training are one of the most vital ways to ensure that security remains strong even as threats evolve. 

How do I train staff for HIPAA compliance? Set up recurring workplace cybersecurity  training sessions, track completion, and include simulations like phishing tests.

Checklist:

Conduct quarterly risk assessments

Keep documentation up to date

Train staff on HIPAA policies and phishing prevention

Track training completion

Why it matters: Human error is one of the leading causes of HIPAA breaches, and often these errors occur when employees are overwhelmed, rushing, or unaware of who in the company handles what. For example, if someone is phishing for patient data, they may pose as someone internal who needs the information, and if the employee doesn’t know who is actually in charge of that request, it may be easy to trust the wrong person. Regular training builds a culture of compliance, while risk assessments help uncover vulnerabilities before they turn into fines or data loss.

Action step: Create a training schedule or enroll your workforce in an accredited HIPAA training program. You can also check out our digital certificate best practices.

5. Business associate agreements and documentation

In healthcare, you very likely function through a variety of partners, vendors, and business associates like pharmacies and insurance carriers. Therefore, your compliance doesn’t stop at your organization—it extends to every partner that handles protected health information. That’s why you need a formal business associate agreement (BAA) policy. BAAs clarify responsibilities between you and your vendors, reducing liability in the event of a breach.

Are BAA documents needed for HIPAA compliance? Policies, risk assessments, BAAs, training logs, incident response plans, and version-controlled records are all needed for HIPAA compliance. 

Formalizing BAA Requirements

Checklist:

Draft BAA contracts with all third-party vendors

Include breach notification and liability clauses

Review and update BAAs annually

Store signed copies securely

Accurate Record-Keeping and Policies

Checklist:

Use consistent naming conventions

Schedule documentation reviews

Maintain secure digital backups

Track document version history

Explore other compliance frameworks like SOX

Why it matters: Should a breach occur, you will want to have all of the previously agreed upon terms in writing to make sure that your patients have proper recourse and you can communicate clearly and quickly what their next steps are. Additionally, this can provide legal protection for your organization. 

Action step: Audit your documentation today and reorganize it into a consistent, secure system.

6. Breach notification and incident response

Despite best efforts, breaches still occur. HIPAA requires that covered entities and business associates have a defined process for identifying, containing, and reporting incidents.

What should a HIPAA breach notification include? Notifications must explain what happened, what data was compromised, what containment actions were taken, and how individuals can protect themselves.

Checklist:

Build a written incident response plan

Establish breach containment protocols

Define notification timelines and templates

Assign response team responsibilities

Why it matters: If you fail to plan, you plan to fail (or so it’s been said). When an incident or breach has occurred, your team will be in crisis mode and knowing the correct legal way to handle the situation can be time consuming to research, discuss with your legal team, and enact. The time to make those decisions is now, before an incident or breach has occurred, so that you are prepared for the worst while hoping for the best. 

Action step: Draft and distribute an incident response plan today.

Get the HIPAA Compliance Checklist Spreadsheet

7. Mobile devices and remote work compliance

As healthcare becomes more mobile and remote-friendly, protecting PHI outside of traditional office environments is critical. Whether you have roving team members, different office locations for different days, telehealth, virtual assistants and receptionists, remote medical billers and coders, or a hybrid environment, there are risks that differ from a fully protected, in-office and on-network environment. 

How can I ensure HIPAA compliance in remote work? Use a HIPAA-compliant VPN, enforce MFA, and conduct regular endpoint audits to secure remote sessions. 

Securing Mobile Workflows

Checklist:

Encrypt mobile devices and apps

Require passcodes and remote wipe capabilities

Prohibit storing PHI on unapproved devices

Audit mobile use regularly

Centralizing Remote Access Controls

Checklist:

Require VPN or secure tunneling

Implement MFA and endpoint verification

Maintain real-time session logs

Audit access by user and device

Why it matters: Bad actors are looking for telehealth and remote workers to attack first — especially from an unsecured network. Simple safeguards can help prevent breaches, and should an attacker gain access, prevent lateral movement. 

Action step: Review our strategies for securing remote workforces and make sure that both the IT or security team and all remote or hybrid employees understand, and adhere to, said policy. 

Ready to boost your HIPAA compliance? 

Meeting HIPAA compliance doesn’t have to feel overwhelming. OpenVPN can help build the foundation of your HIPAA compliance with a Zero Trust VPN designed with compliance in mind. Explore HIPAA-compliant VPN solutions for healthcare. 

Don’t forget to grab a copy of our HIPAA compliance checklist before you go! 

Ready to see how OpenVPN can help protect your organization from attacks?

Try the self-hosted Access Server solution or managed CloudConnexa service for free - no credit card required.

See Which One is Right for You

Related posts from OpenVPN

Subscribe for Blog Updates