HIPAA Privacy & Security Compliance Assessment
🏥 US Healthcare Compliance ✧

HIPAA Compliance
Checker

Health Insurance Portability and Accountability Act

Assess your organization's HIPAA compliance covering the Privacy Rule, Security Rule, and Breach Notification Rule. Essential for covered entities and business associates handling PHI.

HIPAA Guardian

HIPAA Compliance Assessment

Privacy Rule • Security Rule • Breach Notification

📋 About HIPAA

HIPAA establishes national standards for protecting sensitive patient health information (PHI). Enforced by HHS Office for Civil Rights (OCR), it applies to covered entities and their business associates.

🔐 Privacy Rule
45 CFR Part 160, 164
🛡️ Security Rule
45 CFR §164.302-318
🚨 Breach Rule
45 CFR §164.400-414
0 of 20 questions answered
Privacy

🔐 Privacy Rule Compliance

PHI use, disclosure, and patient rights

45 CFR Part 160, Part 164 Subparts A & E
1

Do you have written policies governing PHI use and disclosure?

Required: Notice of Privacy Practices (NPP)
2

Do you apply the "minimum necessary" standard when using or disclosing PHI?

3

Can patients access, amend, and request accounting of disclosures of their PHI?

4

Do you obtain written authorization before using PHI for marketing or selling PHI?

Admin

📋 Administrative Safeguards

Security management, workforce, and access controls

45 CFR §164.308
5

Have you conducted a comprehensive risk analysis of ePHI?

Required: Document threats, vulnerabilities, and likelihood
6

Do you have a designated Security Officer responsible for HIPAA compliance?

7

Do you provide regular security awareness training to all workforce members?

8

Do you have contingency plans including data backup and disaster recovery?

Physical

🏢 Physical Safeguards

Facility access, workstation, and device security

45 CFR §164.310
9

Do you have facility access controls limiting physical access to ePHI systems?

10

Do you have policies for workstation use and physical security?

11

Do you have procedures for device disposal and media re-use ensuring ePHI removal?

Technical

💻 Technical Safeguards

Access control, audit, integrity, transmission security

45 CFR §164.312
12

Do you implement unique user identification for all users accessing ePHI?

13

Do you encrypt ePHI at rest and in transit?

Addressable but strongly recommended
14

Do you maintain audit logs tracking access to ePHI?

15

Do you have automatic logoff and session timeout for systems with ePHI access?

Breach

🚨 Breach Notification Rule

Incident response and notification requirements

45 CFR §164.400-414
16

Do you have documented breach identification and response procedures?

17

Can you notify affected individuals within 60 days of discovering a breach?

BA

🤝 Business Associate Agreements

Third-party vendor compliance

45 CFR §164.502(e), §164.504(e)
18

Do you have Business Associate Agreements (BAAs) with all vendors accessing PHI?

19

Do your BAAs include required provisions (permitted uses, safeguards, breach reporting)?

20

Do you periodically assess business associate compliance?

0%
HIPAA Compliance Score
Calculating...

✨ Recommendations ✨

Need Help with HIPAA Compliance? 🏥

Our consultants help healthcare organizations implement HIPAA-compliant systems, conduct risk assessments, and prepare for OCR audits.

💬 Get Free Consultation
Copied!

Understanding HIPAA Compliance

What is HIPAA?

The Health Insurance Portability and Accountability Act (HIPAA), enacted in 1996, establishes national standards for protecting sensitive patient health information. The law includes the Privacy Rule, Security Rule, Enforcement Rule, and Breach Notification Rule.

Who Must Comply?

HIPAA Penalties

Penalties range from $100 to $50,000 per violation (up to $1.5 million annually per category). Criminal penalties include up to $250,000 and 10 years imprisonment for willful violations.

Frequently Asked Questions

What is Protected Health Information (PHI)?
PHI includes any individually identifiable health information held by covered entities: medical records, test results, diagnoses, treatment information, and payment data. It includes 18 identifiers such as names, addresses, SSN, and medical record numbers.
What are HIPAA's main rules?
(1) Privacy Rule - PHI use/disclosure standards and patient rights; (2) Security Rule - administrative, physical, and technical safeguards for ePHI; (3) Breach Notification Rule - mandatory notification to individuals, HHS, and media for breaches affecting 500+ individuals.
Is encryption required under HIPAA?
Encryption is "addressable" under the Security Rule, meaning organizations must implement it or document why an equivalent alternative is used. However, OCR strongly recommends encryption, and unencrypted PHI breaches are presumed reportable.
🔮

Free Security Scan for Your Website

Our Mewtwo Security Scanner checks your site for HTTPS, SSL certificates, security headers, and vulnerabilities—instantly and free.

✓ HTTPS Check ✓ SSL Analysis ✓ Security Headers ✓ Instant Results
Scan Now Free