This site provides independent HIPAA compliance cost estimates for informational purposes only. We are not affiliated with HHS, OCR, or any compliance vendor. This is not legal or regulatory advice. Consult a qualified HIPAA compliance professional for guidance specific to your organization.

HIPAA Compliance Requirements Checklist for 2026

A complete checklist of HIPAA requirements organized by rule. Items flagged with "2026 New" are additions from the proposed Security Rule update. Effort ratings help you prioritize implementation.

8

Privacy Rule Items

18

Security Rule Items

6

Breach Notification

7

2026 Additions

Privacy Rule Requirements

Designate a Privacy Officer responsible for privacy policy development and implementation
Low
Develop and distribute a Notice of Privacy Practices (NPP) to all patients
Medium
Implement minimum necessary standard for all PHI use and disclosure
Medium
Establish patient rights procedures: access, amendment, accounting of disclosures, restriction requests
High
Obtain valid authorizations for uses and disclosures not covered by treatment, payment, or healthcare operations
Medium
Implement and document workforce sanctions policy for privacy violations
Low
Maintain PHI accounting records for at least 6 years
Medium
Execute Business Associate Agreements with all vendors that handle PHI
Medium

Security Rule Requirements

Administrative Safeguards

Designate a Security Officer responsible for security policy development
Low
Conduct a comprehensive risk assessment covering all systems with ePHI
High
Develop and implement a risk management plan addressing identified risks
High
Implement workforce security procedures: authorization, supervision, clearance, termination
Medium
Establish and enforce information access management controls
Medium
Provide security awareness training to all workforce members
Medium
Develop incident response and reporting procedures
Medium
Establish contingency plan: data backup, disaster recovery, emergency mode operations
High

Physical Safeguards

Implement facility access controls: locks, visitor management, workstation security
Medium
Establish device and media controls: disposal, re-use, accountability, data backup
Medium

Technical Safeguards

Implement unique user identification for all ePHI access
Medium
Establish emergency access procedures for ePHI during emergencies
Medium
Implement automatic logoff after periods of inactivity
Low
Implement audit controls to record and examine ePHI access activity
High
Implement integrity controls to protect ePHI from improper alteration
Medium
Implement transmission security (encryption for ePHI in transit)
High
Implement person or entity authentication mechanisms
Medium
Implement encryption for ePHI at rest on all systems and devices
High

2026 Security Rule Additions

These items are from the proposed 2026 Security Rule update. All addressable safeguards become required, and these new requirements are added:

Implement multi-factor authentication for all ePHI access points2026 New
High
Mandate encryption for all ePHI without risk-based exceptions2026 New
High
Create and maintain a technology asset inventory with network maps2026 New
High
Conduct vulnerability scanning at least every 6 months2026 New
Medium
Conduct penetration testing at least annually2026 New
High
Achieve 72-hour system restoration capability for all critical ePHI systems2026 New
High
Conduct formal compliance audits at least annually2026 New
High

See the full 2026 rule change analysis with cost estimates →

Breach Notification Rule Requirements

Establish procedures to detect and investigate potential breaches of unsecured PHI
Medium
Notify affected individuals within 60 days of discovering a breach
Medium
Notify HHS within 60 days for breaches affecting 500+ individuals, annually for smaller breaches
Low
Notify prominent media outlets for breaches affecting 500+ individuals in a state or jurisdiction
Low
Notify covered entity partners (if business associate) without unreasonable delay
Low
Maintain breach documentation, risk assessments, and notification records for at least 6 years
Medium

Frequently Asked Questions

What are the main HIPAA compliance requirements?
HIPAA compliance requires adherence to three main rules. The Privacy Rule governs how PHI is used and disclosed, including patient rights to access their records. The Security Rule establishes safeguards for electronic PHI across administrative, physical, and technical domains. The Breach Notification Rule requires timely notification to affected individuals, HHS, and media (for breaches affecting 500+ individuals) when unsecured PHI is compromised. Each rule contains specific implementation standards that organizations must meet.
What changes in the 2026 HIPAA Security Rule?
The proposed 2026 Security Rule eliminates the distinction between addressable and required safeguards, meaning all safeguards become mandatory. Key additions include mandatory encryption for all ePHI, multi-factor authentication for all ePHI access, technology asset inventories with network maps, vulnerability scanning every six months, annual penetration testing, 72-hour system restoration capability, and mandatory annual compliance audits. These changes represent the most significant HIPAA update in over a decade.
How do I know if my organization is HIPAA compliant?
Start with a risk assessment that evaluates your organization against all HIPAA requirements. Work through the checklist on this page, documenting your status for each item. Pay particular attention to the six items OCR requests most frequently: risk analysis documentation, risk management plan, policies and procedures, training records, BAA inventory, and breach notification procedures. If you can produce current documentation for all six, you have a strong compliance foundation.
Is there an official HIPAA compliance certification?
No. There is no official government-issued HIPAA compliance certification. Organizations that claim to be "HIPAA certified" are referring to third-party assessments or vendor compliance seals, which carry varying levels of credibility. What matters to OCR is documented evidence of compliance: a current risk assessment, implemented policies, training records, and evidence of ongoing monitoring. Third-party audits provide valuable validation but do not create a legal safe harbor.

Updated 2026-05-11