Privacy Officer 101

The Complete Guide for New Privacy Officers

Whether the role was handed to you unexpectedly or you stepped into it by choice, this guide walks you through everything you need to know to build and maintain a HIPAA-compliant privacy program.

If you are reading this, there is a good chance someone recently added "Privacy Officer" to your list of responsibilities and you are trying to figure out what that actually means. We built this guide for exactly that situation. We are going to walk you through the role, the regulations behind it, and what a functioning privacy program looks like in practice, starting with the basics and working toward the more complex operational responsibilities you will take on over time. Take it one section at a time.

What Is a Privacy Officer

Let us start with what this role is before we get into what it requires. The privacy officer is the person inside a covered entity who is responsible for the organization's compliance with the HIPAA Privacy Rule. That means you are the one who develops the policies, oversees their implementation, handles privacy-related complaints, and makes sure the workforce understands what they are required to do with protected health information.

In a large health system, this is a full-time role with a team behind it. In a smaller covered entity, it is often one person wearing several hats. Neither version is wrong. The regulatory requirement is the same regardless of organizational size: you need a designated privacy official, and that official needs to be doing the work the role requires.

What does that work look like day to day? It varies, but in a typical week a privacy officer might be reviewing a vendor contract for PHI handling language, responding to a patient request for their medical records, updating a training acknowledgment log, or walking a new employee through the organization's privacy policies during onboarding. Some weeks are administrative. Others involve an incident that requires immediate attention. The role requires both routine diligence and the ability to shift quickly when something unexpected happens.

The six core areas of responsibility below represent the full scope of what a privacy officer owns. These responsibilities are not independent of each other. Policies and procedures form the foundation. Training builds on those policies. Complaints and breach response depend on both. Think of them as a program that builds on itself over time, not six separate tasks to tackle simultaneously. This guide covers each area in turn: documents in Section 3, the regulatory framework in Section 4, training in Section 5, and breach response in Section 6.

Policy and Procedures

Developing, maintaining, and updating the written policies and procedures that govern how your organization handles protected health information. This is the foundation everything else is built on.

Workforce Training

Ensuring all workforce members receive privacy training appropriate to their role and that training records are documented and retained. Training without documentation is the same as no training in a compliance context.

Patient Rights

Managing requests from patients to access, amend, or restrict their records, and ensuring your organization responds within the timeframes required under 45 CFR 164.524 and related provisions.

Vendor Oversight

Identifying business associates, ensuring signed agreements are in place, and monitoring vendor compliance with PHI handling requirements before and after the relationship begins.

Complaints and Investigations

Receiving and documenting privacy complaints, investigating potential violations, and coordinating corrective action when issues are identified. Every complaint must be documented regardless of outcome.

Breach Response

Managing the organization's response to potential breaches of unsecured PHI, including required notifications to individuals, HHS, and in some cases the media under 45 CFR Part 164, Subpart D.

A note on documentation: as you take on each of these responsibilities, document what you do as you go. In a HIPAA compliance context, work that is not documented is work that cannot be demonstrated. That habit, started early, will protect your organization and you when an audit or investigation eventually occurs.

The Federal Requirement Behind the Role

The privacy officer requirement is not optional and it is not informal. It comes directly from the HIPAA Privacy Rule, codified at 45 CFR Part 164, Subpart E. Specifically, 45 CFR 164.530(a)(1) requires every covered entity to designate a privacy official who is responsible for the development and implementation of the policies and procedures required by the Privacy Rule.

Covered entities include health plans, healthcare clearinghouses, and most healthcare providers who transmit health information electronically. If your organization falls into any of those categories and handles protected health information, the requirement applies to you regardless of how many employees you have or how many patients you see.

What the regulation actually says: 45 CFR 164.530(a)(1) states that a covered entity must designate a privacy official who is responsible for the development and implementation of the policies and procedures of the entity. There is no size threshold. There is no exemption for organizations that are new to compliance. The requirement exists from the moment you qualify as a covered entity.

The authoritative source for the Privacy Rule is the U.S. Department of Health and Human Services Office for Civil Rights at hhs.gov/hipaa. When in doubt, go there first.

Privacy Officer vs. Security Officer: Understanding the Distinction

HIPAA requires two separate designated officials: a privacy official under the Privacy Rule and a security official under the Security Rule at 45 CFR 164.308(a)(2). In many smaller covered entities, both roles are held by the same person. Either arrangement is permissible under the regulation.

Privacy Officer

Responsible for the use and disclosure of protected health information. Focuses on patient rights, workforce policies, notice requirements, and the administrative and operational handling of PHI under the Privacy Rule.

Security Officer

Responsible for the safeguarding of electronic protected health information. Focuses on technical controls, access management, risk analysis, and the physical and technical safeguards required under the Security Rule.

If you hold both titles, you are responsible for both programs. If a separate security officer exists in your organization, establish a working relationship with them early. Breach response in particular requires coordination between both functions, and gaps between the two programs are where organizations most commonly get into trouble.

Your Role Within the Organization

Your role is to build and maintain the program infrastructure, identify gaps and risks, and bring issues to the appropriate level of leadership when action is needed above your authority. You are not the sole decision-maker for every compliance matter in your organization. You are the person who ensures those decisions get made, documented, and acted on.

If you do not already have clarity on who you report to and what decisions require executive sign-off, that conversation belongs in your first 30 days. A privacy program without organizational backing is difficult to enforce and harder to sustain. Leadership alignment is not a nice-to-have. It is a program requirement.

A practical note on leadership communication: When you bring compliance gaps or risks to leadership, put it in writing. A brief email summarizing what you found, what the risk is, and what you are recommending is more useful than a verbal conversation. It creates a record that your organization was informed and that you fulfilled your responsibility to escalate. That record matters if the issue ever surfaces in an audit or investigation.

What This Role Is Not

You do not need to be an attorney. The privacy officer role is an operational compliance function, not a legal one. You will encounter situations where legal counsel is appropriate, and we cover those later in this guide. But the day-to-day work of maintaining a privacy program does not require a law degree.

You do not need to have built a compliance program before. Most privacy officers at smaller covered entities learned the role by doing it. What matters is that you approach the work methodically, document what you do, and stay current on regulatory guidance as it evolves.

You are also not solely responsible for every privacy outcome in your organization. Your role is to build and maintain the program infrastructure. The workforce, leadership, and vendors each carry responsibilities of their own.

The most important thing to understand about this role: You are not expected to fix everything immediately. You are expected to know where the gaps are, have a plan for addressing them, and be able to demonstrate that your organization is making a good-faith effort toward compliance. That is exactly what this guide is designed to help you do.

Ready to get started? Now that you have a clear picture of what the privacy officer role is, the next section walks you through your first 30 days on the job — exactly what to assess, what to prioritize, and how to build a realistic picture of where your program stands today.

Your First 30 Days →

Privacy Officer 101 — Section 2

Your First 30 Days as a Privacy Officer

You just got the role. Here is exactly where to start.

We have worked with a lot of compliance programs that started the same way: someone got handed the privacy officer title on a Tuesday with no training, no manual, and a list of responsibilities they had never seen before. If that sounds familiar, this section is for you. Here is what we would tell you in your first month on the job.

First, a Word About Where You Are

Being handed the privacy officer role without a clear roadmap is more common than you might think. In smaller covered entities, it happens regularly. Someone needs to hold the title, and you were the right person at the right time. That does not mean you are expected to have all the answers immediately.

The privacy officer role is not a single task. It is an ongoing program responsibility that covers policies, training, patient rights, vendor relationships, and breach response, among other things. On any given week you might be reviewing a vendor contract, answering a patient records request, and updating a workforce training log. That breadth can feel overwhelming at first.

We also know that for many people reading this, this is not your only job. You may be managing the privacy officer responsibilities alongside another role entirely. That is a real constraint and it shapes how you have to prioritize. The goal of your first 30 days is not to finish everything. It is to understand where you stand and identify the gaps that carry the most risk.

Why the First 30 Days Matter

The Privacy Rule under HIPAA (45 CFR Part 164, Subpart E) requires covered entities to designate a privacy official responsible for developing and implementing privacy policies and procedures. That is you now. OCR enforcement patterns show consistently that organizations get into trouble not because they had imperfect policies, but because they had no policies at all, or had policies that were never implemented or maintained. Your first 30 days should leave you with a clear picture of where your organization stands on both counts.

Think of this phase as an inventory and triage exercise, not a build. You are surveying the landscape before you start construction.

Your 30-Day Priority Checklist

Priority note

Items 2 and 3 below carry the highest enforcement risk and should be addressed first if your time is limited. The remaining items are important but carry more flexibility on timeline.

  • 1
    Locate every existing privacy document your organization has. Pull together policies, procedures, forms, notices, training records, and any vendor agreements that involve protected health information. Do not assume anything is current or complete. Your job right now is inventory, not evaluation. Even a partial picture is more useful than starting blind. The list you produce from this exercise is your gap inventory — it becomes the foundation of your remediation plan and is referenced throughout this guide.
  • 2
    Highest priority
    Confirm your Notice of Privacy Practices is posted and current. Under 45 CFR 164.520, covered entities must provide patients with a Notice of Privacy Practices and make it available on request. If your organization has a website, it must be posted there. If you cannot find a current version, this is your first priority to address. OCR has cited missing or outdated NPPs in numerous enforcement actions, including settlements against small covered entities.
  • 3
    Highest priority
    Identify your business associates and check for signed agreements. Any vendor or contractor that creates, receives, maintains, or transmits PHI on your behalf is a business associate under 45 CFR 164.502(e). A signed Business Associate Agreement is required before they touch your data. Missing BAAs are one of the most common findings in OCR investigations and one of the fastest gaps to close once you know where the holes are.
  • 4
    Find out when workforce privacy training was last completed. HIPAA requires covered entities to train all workforce members on privacy policies and procedures. Check whether training records exist and when they were last updated. If training has not happened recently, flag it for your remediation plan. You do not need to fix it in week one, but you do need to know the gap exists.
  • 5
    Understand your breach response process, or confirm one does not exist yet. Under the Breach Notification Rule (45 CFR Part 164, Subpart D), your organization has specific obligations when a breach of unsecured PHI occurs — meaning PHI that has not been rendered unusable through encryption or destruction — including notification timelines to affected individuals, HHS, and in some cases the media. Find out if a written incident response or breach notification procedure exists. If it does not, you need to know that now, before an incident occurs, not after.
  • 6
    Schedule time with your security officer if one exists separately. In many smaller covered entities the privacy and security officer roles are combined in one person. If your organization has a separate security officer, connect with them early. Privacy and security functions overlap significantly, particularly around breach response and access controls. Coordinating now prevents duplication and gaps later.

A note on what you find: If you complete this checklist and discover that most of these items are undocumented, outdated, or simply missing, that is not a crisis. It is information. The organizations that end up with the most serious compliance exposure are not the ones that found gaps early. They are the ones that never looked. The fact that you are taking this inventory puts you ahead of where many programs start.

Every compliance program we have seen built from scratch began with a gap assessment exactly like this one. What you find in the next 30 days becomes the foundation of a realistic, prioritized remediation plan.

What Comes Next

Once you have your baseline picture, the next phase is documentation. This means building or updating the core policies, procedures, and forms that your program depends on to function. Documentation is not busywork. It is the evidence that your program exists and operates as required. Without it, even a well-run program has no way to demonstrate compliance when it matters most.

In Section 3, we walk through the full inventory of documents a privacy officer is responsible for, what each one needs to accomplish, and how to think about sequencing the work so you are addressing the highest-risk items first.

Not sure where to start with your documentation?

Our Free HIPAA Starter Kit includes a sample policy and supporting templates to help you get your bearings fast.

Get the Free Starter Kit

Now that you have your gap inventory, Section 3 walks through every document a privacy officer is responsible for — what each one does, which ones are required by regulation, and how to prioritize the build when you cannot do everything at once.

Section 3: The Documents You Need →

Privacy Officer 101 — Section 3

The Core Documents You Are Responsible For

A complete reference to every document a functioning privacy program requires — organized by group, tagged as required or recommended, and grounded in the CFR provisions behind each one.

One of the first things a new privacy officer needs to understand is what a complete privacy program looks like on paper. Not every organization will have all of these documents on day one. Many will not. But knowing what belongs in a mature program gives you a clear picture of what you are building toward and helps you identify which gaps carry the most risk right now.
The documents below are organized into four groups that mirror how a real privacy program is structured. Required documents have a regulatory basis under HIPAA and must exist in some form at every covered entity. Recommended documents reflect established best practice and are commonly expected during OCR investigations and audits even where no specific regulation mandates a single named document.
Required Regulatory basis under HIPAA
Recommended Best practice, commonly expected

Retention and version control: two habits to establish from day one. HIPAA requires covered entities to retain privacy-related documentation for six years from the date of creation or the date it was last in effect, whichever is later, under 45 CFR 164.530(j). That requirement applies to policies, training records, complaint logs, BAAs, and the other documents listed in this section.

Version control matters for the same reason. When you update a policy, retain the prior version with a clear effective date. OCR may ask for the version of a document that was in effect at the time of an alleged violation, which could be two or three years ago. If only the current version exists, you cannot demonstrate what standard your organization was operating under at the relevant time. Date every document, maintain a revision history, and never delete a superseded version before the six-year retention window has closed.

Group 1: Policies and Procedures

Your policies and procedures are the foundation of your entire privacy program. Everything else, training, complaint handling, breach response, depends on having written policies that define how your organization handles protected health information. Without them, you have no documented standard to train to, enforce, or demonstrate during an investigation.

  • Privacy Policies and Procedures ManualRequired
    The master document that governs your organization's handling of PHI. It should cover uses and disclosures, minimum necessary standards, patient rights, workforce responsibilities, and sanctions for violations. This is the document OCR will ask to see first in an investigation. If your organization does not have one, building it is your top documentation priority.Regulatory basis: 45 CFR 164.530(i)Our Privacy Policies and Procedures templates give you a complete, CFR-grounded starting point. View the template library.
  • Uses and Disclosures PolicyRequired
    Defines when and how your organization is permitted to use or disclose PHI, including treatment, payment, and healthcare operations purposes as well as situations requiring patient authorization. This policy is the operational core of Privacy Rule compliance and should be specific enough to guide workforce decisions in real situations.Regulatory basis: 45 CFR 164.502, 164.506, 164.508
  • Minimum Necessary PolicyRequired
    Requires workforce members to access and share only the minimum amount of PHI necessary to accomplish the intended purpose. This is one of the most frequently cited gaps in OCR investigations involving internal workforce violations. The policy should define what minimum necessary means in practical terms for the roles in your organization.Regulatory basis: 45 CFR 164.514(d)
  • Patient Rights PolicyRequired
    Documents how your organization handles the full set of patient rights under the Privacy Rule, including the right to access records, request amendments, receive an accounting of disclosures, request restrictions, and request confidential communications. Each right has specific response timeframes and documentation requirements that this policy should address explicitly.Regulatory basis: 45 CFR 164.520 through 164.528
  • Workforce Sanctions PolicyRequired
    Defines the consequences for workforce members who violate your organization's privacy policies. HIPAA requires that covered entities apply appropriate sanctions against workforce members who fail to comply. The policy must exist, be documented, and be applied consistently.Regulatory basis: 45 CFR 164.530(e)
  • Privacy Complaints PolicyRequired
    Establishes your organization's process for receiving, documenting, and responding to privacy complaints from patients and others. HIPAA requires covered entities to have a process for individuals to file complaints and prohibits retaliation against anyone who does. Every complaint must be documented regardless of whether it results in a finding of violation.Regulatory basis: 45 CFR 164.530(d), 164.530(g)
  • Mitigation PolicyRecommended
    Defines how your organization responds when a harmful privacy violation has occurred, including steps taken to mitigate harm to the affected individual. While not prescribed as a standalone named document under the regulation, the mitigation obligation is explicit under HIPAA and OCR expects to see evidence of a defined process during investigations.Regulatory basis: 45 CFR 164.530(f)
Group 2: Patient-Facing Notices and Forms

These are the documents your patients interact with directly. They are also among the most visible compliance artifacts your organization produces. An outdated or missing Notice of Privacy Practices is something a patient can identify and report to OCR without any inside knowledge of your compliance program. Keep these current, make sure they are accessible, and retain prior versions when you update them.

  • Notice of Privacy PracticesRequired
    Informs patients of their rights under HIPAA and how your organization uses and discloses their PHI. Must be provided to patients at first service delivery, posted at your physical location, and posted on your website if you have one. The NPP must be written in plain language and must include specific content elements defined by the regulation. An outdated or missing NPP is one of the most common findings in OCR complaint investigations.Regulatory basis: 45 CFR 164.520Our Notice of Privacy Practices template is written in plain language with all required content elements included. View the template library.
  • Authorization FormRequired
    Required when your organization intends to use or disclose PHI for purposes that are not permitted without explicit patient consent, such as marketing, sale of PHI, or most psychotherapy notes. Authorizations are not required for treatment, payment, or healthcare operations disclosures. The form must contain specific core elements defined under the regulation and must be written in plain language.Regulatory basis: 45 CFR 164.508
  • Request for Access to Records FormRequired
    Provides patients with a standardized way to submit a request to access or obtain a copy of their medical records. Having a form ensures requests are captured consistently and that you have documentation of when each request was received, which starts the response clock under 45 CFR 164.524.Regulatory basis: 45 CFR 164.524
  • Amendment Request FormRecommended
    Allows patients to request corrections or additions to their medical records. Requests must be acted on within 60 days with one possible 30-day extension. A standardized form ensures these requests are documented consistently and that response timelines are trackable.Regulatory basis: 45 CFR 164.526
  • Request for Restriction FormRecommended
    Allows patients to request that your organization limit how it uses or discloses their PHI for treatment, payment, or healthcare operations purposes. Covered entities are not required to agree to most restrictions, but they are required to have a process for receiving and documenting the requests and for honoring restrictions they do agree to.Regulatory basis: 45 CFR 164.522
  • Accounting of Disclosures Request FormRecommended
    Allows patients to request a record of certain disclosures of their PHI made by your organization during the prior six years. Not all disclosures are subject to accounting requirements, but those that are must be tracked in a disclosure log.Regulatory basis: 45 CFR 164.528
  • Disclosure Tracking LogRequired
    An ongoing operational record of disclosures of PHI that are subject to the accounting requirement under HIPAA. Disclosures for treatment, payment, and healthcare operations are generally exempt from the accounting requirement, but disclosures made without authorization for other purposes must be logged. If you do not have a disclosure log in place, start one now.Regulatory basis: 45 CFR 164.528Our Disclosure Tracking Log template provides a ready-to-use format for capturing required disclosure records. View the template library.
Group 3: Workforce and Training Documents

Your workforce is your largest privacy risk and your most important compliance asset. These documents establish the training infrastructure that protects your organization when a workforce member makes a mistake and demonstrates to OCR that your program is active and maintained rather than theoretical.

  • Privacy Training Policy and ProgramRequired
    Defines your organization's approach to privacy training, including who must be trained, what the training covers, how often it occurs, and how completion is documented. HIPAA requires training for all workforce members within a reasonable period of hire and whenever material changes to policies occur.Regulatory basis: 45 CFR 164.530(b)Our Privacy Training materials include a complete PowerPoint deck and workforce handout built for covered entity use. View the Privacy Training Deck.
  • Training Acknowledgment FormRequired
    Documents that each workforce member completed privacy training and understood their obligations. This is the evidentiary record that your training program actually happened. Without signed acknowledgments on file, you have no way to demonstrate during an investigation that training was conducted. Retain these records for a minimum of six years per HIPAA documentation requirements.Regulatory basis: 45 CFR 164.530(b), 164.530(j)
  • Workforce Confidentiality AgreementRecommended
    A signed agreement in which workforce members acknowledge their obligation to protect patient information and understand the consequences of unauthorized use or disclosure. While not explicitly required as a standalone document by the Privacy Rule, confidentiality agreements are standard practice in healthcare compliance and are commonly reviewed during OCR investigations as evidence of workforce accountability.
  • Sanctions LogRequired
    A record of any sanctions applied to workforce members for privacy policy violations. If your sanctions policy exists but you have never documented applying it, OCR may question whether it is operational. The log does not need to be elaborate, but it must exist and be maintained consistently. Even a record showing no sanctions have been necessary is better than no log at all.Regulatory basis: 45 CFR 164.530(e), 164.530(j)
Group 4: Vendor and Third-Party Documents

Every vendor, contractor, or service provider that touches your PHI creates compliance exposure for your organization. Missing Business Associate Agreements are among the most cited findings in OCR enforcement actions, and they are also among the fastest gaps to close once you have identified them.

  • Business Associate AgreementRequired
    A written contract required between a covered entity and any business associate before the business associate creates, receives, maintains, or transmits PHI on the covered entity's behalf. The BAA must contain specific provisions defined under the regulation, including permitted uses and disclosures, safeguarding obligations, and breach notification requirements. A vendor agreement that does not contain these elements does not satisfy the BAA requirement regardless of what it is called.Regulatory basis: 45 CFR 164.502(e), 164.504(e)Our Business Associate Agreement template includes all required HIPAA provisions and is written for practical use. View the template library.
  • Business Associate InventoryRecommended
    A running log of every vendor and contractor that qualifies as a business associate, the nature of their PHI access, and the status of their signed BAA. You cannot manage what you have not identified. Many organizations discover during their first inventory that vendors they considered purely administrative actually qualify as business associates and have been operating without a signed agreement.
  • Business Associate Risk QuestionnaireRecommended
    A structured assessment used to evaluate a prospective or existing business associate's privacy and security practices before or during the relationship. While not required as a standalone document, it supports the due diligence expectation embedded in the BAA requirement and provides documented evidence that your organization evaluated vendor risk rather than simply assuming compliance.
  • Annual Vendor Review TemplateRecommended
    A structured process for periodically reviewing existing business associate relationships to confirm agreements are current, contact information is accurate, and the nature of PHI access has not changed. Vendor relationships evolve and BAAs can become stale. An annual review prevents a situation where a vendor has been performing a new function involving PHI for months without an updated agreement in place.

A realistic note on where most programs start: Very few covered entities have all of these documents in place when a new privacy officer arrives. If your inventory from Section 2 revealed significant gaps across multiple groups, address them in this order: missing or unsigned BAAs for active vendors first, a current Notice of Privacy Practices second, core policies and procedures third, and workforce documentation fourth. That sequence addresses the highest OCR enforcement risk first. Section 7 of this guide provides a full risk-based prioritization framework if you are working with significant gaps across multiple areas.

Building this document library takes time. The goal is not perfection on day one. The goal is a documented, good-faith program that is moving in the right direction and that you can demonstrate is active and maintained.

Ready-to-use templates for every document listed above.

Our library includes professionally built, CFR-grounded templates covering policies, notices, forms, training materials, and vendor documents. Built for covered entities by people who understand the compliance context.

Browse the Library

Now that you know what documents you need, Section 4 walks you through the Privacy Rule itself in plain language so you understand the regulatory framework behind the documents you are building. No legal background required.

Section 4: Understanding the Rules →

Privacy Officer 101 — Section 4

Understanding the Rules

A plain-language breakdown of the Privacy Rule, patient rights, and your administrative obligations under HIPAA — plus when state law is more protective and what that means for your program.

Most privacy officers encounter the Privacy Rule as a list of requirements before they ever read the regulation itself. This section does the opposite. We are going to walk through what the Privacy Rule actually says and what it means for how your organization operates day to day. No legal background required.
Part 1 of 6

What Is Protected Health Information

Before you can apply the Privacy Rule, you need to know what it covers. The rule governs protected health information, commonly called PHI. Not everything in a patient file is automatically PHI, and not all health information qualifies. Understanding exactly what the definition covers prevents both over-restriction (treating everything as PHI when it is not) and under-restriction (assuming something is not PHI when it is).

PHI is individually identifiable health information that is created, received, maintained, or transmitted by a covered entity or its business associates. All three elements need to be present: the information must relate to health, it must be identifiable, and it must be held by or on behalf of a covered entity. Information held by an employer about its employees in an HR capacity, for example, is not PHI even if it involves medical facts.

The 18 Identifiers

Health information becomes individually identifiable when it contains one or more of the 18 identifiers defined in the regulation. If any of these identifiers is present alongside health information in your organization's records, that information is PHI and the Privacy Rule applies to it.

Names
Geographic data smaller than a state
Dates (other than year) directly related to an individual
Telephone numbers
Fax numbers
Email addresses
Social Security numbers
Medical record numbers
Health plan beneficiary numbers
Account numbers
Certificate and license numbers
Vehicle identifiers and serial numbers
Device identifiers and serial numbers
Web URLs
IP addresses
Biometric identifiers including fingerprints and voiceprints
Full-face photographs and comparable images
Any other unique identifying number or code

A practical example: a spreadsheet containing appointment dates and diagnoses with no patient names attached still contains PHI if the dates are specific enough to identify individuals in context, or if the file includes any other identifier from the list above. When in doubt, treat it as PHI.

Regulatory basis: The definition of PHI and the 18 identifiers are established at 45 CFR 164.514(b)(2). The designated record set, which defines the specific subset of records to which patient access rights apply, is defined at 45 CFR 164.501. A designated record set includes medical records, billing records, and any other records used to make decisions about individuals.

De-Identified Information

Health information from which all 18 identifiers have been removed, and for which there is no remaining reasonable basis to believe the information could be used to identify an individual, is considered de-identified. De-identified information is not PHI and is not subject to the Privacy Rule.

There are two approved methods for de-identification. The first is the safe harbor method, which requires removing all 18 identifiers and having no actual knowledge that the remaining information could identify an individual. The second is statistical expert determination, where a qualified statistician certifies that the risk of identification is very small. Removing a patient's name alone does not de-identify a record if other identifiers remain.

Why this matters in practice: De-identification becomes relevant when your organization wants to use patient data for research, quality improvement, or public reporting without requiring individual authorizations. If someone in your organization is using patient data in ways that appear to remove identifying information, confirm that one of the two approved de-identification methods was actually applied. Informal removal of obvious identifiers is not sufficient.

Part 2 of 6

The Four HIPAA Rules You Need to Understand

HIPAA is not a single regulation. It is a framework made up of several rules, each governing a different aspect of how healthcare organizations handle protected information. As a privacy officer, your primary jurisdiction is the Privacy Rule, but you need to understand how it relates to the others.

Privacy Rule

Governs how PHI may be used and disclosed, establishes patient rights over their health information, and defines your organization's administrative obligations. This is your primary area of responsibility. 45 CFR Part 164, Subpart E.

Security Rule

Governs the safeguarding of electronic PHI through administrative, physical, and technical controls. Your security officer's primary domain, though privacy and security overlap significantly in practice. 45 CFR Part 164, Subparts A and C.

Breach Notification Rule

Requires covered entities to notify affected individuals, HHS, and in some cases the media when a breach of unsecured PHI occurs. Includes specific notification timelines your organization must be prepared to meet. 45 CFR Part 164, Subpart D.

Enforcement Rule

Establishes how OCR investigates complaints and violations, the civil money penalty structure, and the process for resolving enforcement actions. Understanding this rule helps you understand what is actually at stake when compliance gaps exist. 45 CFR Part 160, Subpart E.

Everything that follows in this section is about the Privacy Rule specifically. When we reference "the rule" without qualification, that is what we mean.

Where to find the source: The Privacy Rule is codified at 45 CFR Part 164, Subpart E. The most important provisions for day-to-day compliance are at 164.502 (general rules for uses and disclosures), 164.506 (treatment, payment, and operations), 164.508 (authorizations), 164.514 through 164.528 (patient rights), and 164.530 (administrative requirements). The full text is accessible at ecfr.gov and summarized at hhs.gov/hipaa.

Part 3 of 6

When Your Organization Can Use or Disclose PHI

The Privacy Rule establishes a general prohibition: your organization may not use or disclose PHI except in circumstances the rule permits or requires. In practice, most of what a covered entity does with health information falls into one of the permitted categories. The question is whether your organization has documented those permissions correctly and whether your workforce understands them.

There are two types of permitted uses and disclosures worth understanding separately.

Permitted Without Patient Authorization

The following categories do not require a signed patient authorization. They are permitted by the rule, but important conditions apply to several of them. The table below flags where conditions exist. Treating a use or disclosure as unconditionally permitted when it actually requires specific conditions to be met is a common source of violations.

PurposeStatusKey Conditions and Limitations
TreatmentPermittedPHI may be shared among providers involved in a patient's care, including referring physicians, specialists, labs, and others providing or coordinating treatment. Fewest conditions of any category.
PaymentPermittedPHI may be used or disclosed to obtain reimbursement for services, including billing, collections, and communications with health plans. Minimum necessary standard applies.
Healthcare operationsPermittedCovers quality assessment, training, auditing, and certain administrative functions. Not permitted between unrelated covered entities unless both have a treatment relationship with the patient or the disclosure involves quality and competency assurance activities. Minimum necessary applies. Do not assume all internal uses qualify as operations without reviewing the definition at 45 CFR 164.501.
To the individualPermittedDisclosure to the patient themselves is always permitted. This is the basis for fulfilling access requests.
Disclosures to business associatesPermittedPHI may be disclosed to vendors and contractors that qualify as business associates, but only when a signed Business Associate Agreement is in place before the disclosure occurs. A disclosure to a vendor without a BAA is a Privacy Rule violation regardless of the business purpose. Review Section 3 for BAA requirements.
Required by lawPermittedDisclosures required by statute, court order, or administrative process. Includes mandatory reporting obligations such as communicable disease and abuse reporting. The legal requirement must actually exist and must compel the disclosure.
Public health activitiesPermittedDisclosures to public health authorities for disease surveillance, injury reporting, and FDA oversight. Governed by specific conditions at 45 CFR 164.512(b). Confirm which authority you are disclosing to and that the purpose qualifies.
Serious threat to health or safetyPermittedPHI may be disclosed to prevent or lessen a serious and imminent threat. The threat must be serious and imminent, not speculative. The recipient must be able to act on it. Document your assessment of these conditions before disclosing.
Facility directoryPermittedLimited information about a patient's presence may be disclosed to people asking by name, provided the patient has not objected. Patients must be given the opportunity to restrict this use. If a patient has not been informed or given the option to restrict, the disclosure is not permitted.

Disclosures That Require Patient Authorization

Uses and disclosures that fall outside the permitted categories require a written authorization signed by the patient. Common situations requiring authorization include disclosures to employers, release of records to attorneys or insurers for non-treatment purposes, most marketing communications, and disclosures involving psychotherapy notes.

A HIPAA authorization is a specific document with required elements defined at 45 CFR 164.508. It must be written in plain language and must include: a description of the PHI to be disclosed, the name of the person or class of persons authorized to make the disclosure, the name of the person or class of persons to whom the disclosure may be made, a description of the purpose of the disclosure, an expiration date or event, and the individual's signature and date. It must also inform the patient of their right to revoke and any exceptions to revocation.

Defective authorizations: When your organization receives an authorization that is missing required elements, you may not treat it as valid. You should contact the requesting party and explain what is missing. Honoring a defective authorization and making the disclosure is itself a violation.

Revocation: Patients may revoke an authorization at any time in writing. Once revoked, your organization may no longer use or disclose PHI based on that authorization, except to the extent you have already taken action in reliance on it. Maintain signed authorizations and revocations in the patient's record and retain them for six years.

The Minimum Necessary Standard

Even when a use or disclosure is permitted without authorization, the minimum necessary standard at 45 CFR 164.502(b) requires covered entities to make reasonable efforts to limit PHI to the minimum necessary to accomplish the intended purpose. If a billing department needs a patient's diagnosis to process a claim, it does not need the full medical history. If a front-desk employee needs to confirm an appointment, they do not need access to clinical notes.

What minimum necessary requires in practice: Your policies should define what constitutes minimum necessary access for the different roles and functions in your organization. Access controls should reflect those role definitions. When responding to a disclosure request from outside your organization, you should have a process for assessing whether the amount of information requested is consistent with the stated purpose.

The minimum necessary standard does not apply to disclosures for treatment purposes, disclosures made to the patient themselves, or disclosures made pursuant to a valid authorization. For everything else, it applies.

Part 4 of 6

Patient Rights Under the Privacy Rule

One of the most operationally significant aspects of the Privacy Rule is the set of rights it grants patients over their own health information. As privacy officer, you are responsible for ensuring your organization can fulfill each of these rights within the required timeframes. That means having the forms, procedures, and response workflows in place before a patient exercises them, not after.

  • 1
    Right to Access
    Patients have the right to inspect and obtain a copy of their PHI held in your organization's designated record set. OCR has pursued enforcement against covered entities for delays, unreasonable fee demands, and refusals to provide records in the format requested. Your organization must respond within 30 days of receiving a request, with a single 30-day extension available if you provide written notice to the patient before the first deadline expires.

    On fees: you may charge a reasonable, cost-based fee that covers the labor of copying, supplies, and postage if applicable. You may not charge for retrieving or locating records, for reviewing records to determine what to provide, or for the cost of a workforce member's time spent preparing a response. If your organization has a standard fee schedule for records requests, confirm it is limited to actual copying costs before a request arrives.Regulatory basis: 45 CFR 164.524
  • 2
    Right to Request Amendment
    Patients may request that your organization amend PHI they believe is inaccurate or incomplete. You may deny a request if the records were not created by your organization, if the information is accurate and complete, if the information is not part of the designated record set, or if the patient would not have had a right to access the information. If you deny, you must provide a written denial that explains the basis, informs the patient of their right to submit a statement of disagreement, and describes your process for responding to that statement.Regulatory basis: 45 CFR 164.526
  • 3
    Right to an Accounting of Disclosures
    Patients have the right to receive a list of certain disclosures of their PHI made by your organization in the prior six years. The accounting requirement does not apply to disclosures for treatment, payment, or healthcare operations, or to disclosures made pursuant to a valid authorization. Your disclosure tracking log is the operational tool that makes fulfilling this right possible. If that log does not exist or is incomplete, you cannot produce an accounting even if your disclosures were all entirely appropriate.Regulatory basis: 45 CFR 164.528
  • 4
    Right to Request Restrictions
    Patients may request that your organization restrict certain uses or disclosures of their PHI. Your organization is generally not required to agree to a restriction, with one mandatory exception: if a patient pays out of pocket in full for a service and requests that information about that service not be disclosed to their health plan, you must comply. When a restriction is agreed to voluntarily or required by the rule, it must be honored, documented in the patient's record, and followed by every workforce member with access to that record.Regulatory basis: 45 CFR 164.522(a)
  • 5
    Right to Confidential Communications
    Patients may request that your organization communicate with them through a specific means or at a specific location. Healthcare providers must accommodate reasonable requests of this kind without requiring the patient to explain why. The right exists to protect patients who may face safety risks or other consequences if health information reaches an unintended person at their household.Regulatory basis: 45 CFR 164.522(b)
  • 6
    Right to a Notice of Privacy Practices
    Patients have the right to receive written notice of your organization's privacy practices. The NPP must describe how your organization may use and disclose PHI, explain all patient rights, describe how to file a complaint, identify your privacy contact, and include the effective date. It must be provided to patients at first service delivery and posted at your facility and on your website if you have one. If your NPP does not reflect your actual current practices, that gap is a compliance exposure whether or not a complaint is ever filed.Regulatory basis: 45 CFR 164.520

Document every rights request, including verbal ones: Each patient right requires a corresponding intake and response workflow. If a patient submits a rights request verbally, document it immediately and treat it as a written request. There is no provision in the rule that permits verbal requests to be handled informally or without documentation. The date the request was received starts the clock on your response deadline regardless of how it was submitted.

Part 5 of 6

Your Administrative Obligations Under the Privacy Rule

Beyond the use and disclosure rules and patient rights, the Privacy Rule imposes a set of administrative requirements at 45 CFR 164.530 that define how a compliance program must be structured and maintained. These requirements are the direct regulatory foundation for most of the operational work you do as privacy officer.

Designate a Privacy Official

45 CFR 164.530(a)(1) requires every covered entity to designate a privacy official responsible for the development and implementation of privacy policies and procedures. The designation should be documented with a written description of the role and its scope of authority. This document also serves as evidence that the requirement has been met if OCR ever asks.

Provide a Point of Contact

45 CFR 164.530(a)(2) requires covered entities to designate a contact person or office to receive complaints about privacy policies and to provide information about privacy practices. This is often the privacy officer. The designation must be communicated to patients through your Notice of Privacy Practices and must reflect whoever actually handles incoming complaints in practice.

Develop and Implement Policies and Procedures

45 CFR 164.530(i) requires written policies and procedures that comply with the Privacy Rule. They must be implemented, not just written. If a policy exists on paper but is not being followed, it does not satisfy the requirement and can work against you in an investigation by demonstrating that your organization was aware of the standard and failed to meet it.

Train the Workforce

45 CFR 164.530(b) requires all workforce members to be trained on privacy policies and procedures as necessary and appropriate for them to carry out their functions. New workforce members must be trained within a reasonable time of joining. Existing workforce members must receive updated training when material changes to policies occur. Training must be documented and records must be retained. Section 5 of this guide covers the training requirement in full detail.

Apply Appropriate Sanctions

45 CFR 164.530(e) requires covered entities to apply appropriate sanctions against workforce members who fail to comply with privacy policies and procedures. A sanctions policy must exist, and when violations occur, the sanctions applied must be documented. A sanctions policy that has never been used and is never referenced is difficult to defend as operational.

Mitigate Harmful Effects of Violations

45 CFR 164.530(f) requires covered entities to mitigate, to the extent practicable, any harmful effects of a use or disclosure that violates the Privacy Rule or your own policies. This obligation exists even when the violation was unintentional. Your breach response procedures and mitigation policy are the mechanisms for meeting this requirement.

Establish a Complaint Process and Prohibit Retaliation

45 CFR 164.530(d) requires covered entities to have a process for individuals to file complaints about privacy policies and practices. That process must be documented, communicated to patients through the Notice of Privacy Practices, and actually followed when complaints arrive. Every complaint must be documented regardless of how it is resolved.

45 CFR 164.530(g) prohibits covered entities from retaliating against any individual who exercises a right under the Privacy Rule, files a complaint with OCR or with the covered entity itself, or participates in any proceeding related to HIPAA. Retaliation includes intimidation, threats, coercion, discrimination, and any other action that penalizes someone for asserting their rights. A written non-retaliation policy is the standard mechanism for documenting this requirement.

Maintain Documentation

45 CFR 164.530(j) requires covered entities to maintain privacy policies, notices, written communications, and documentation of compliance activities for six years from the date of creation or the date the document was last in effect, whichever is later. If you cannot produce a document when OCR requests it, the absence will be treated as evidence that the requirement was not met.

The administrative requirements are where most enforcement starts: When OCR investigates a complaint or conducts an audit, they begin by requesting your policies and procedures, your Notice of Privacy Practices, your training records, and your BAAs. Before they assess whether a specific violation occurred, they assess whether a compliance program exists. Organizations that cannot produce these documents face significantly greater exposure than those that had a gap but can demonstrate an active, maintained program around it.

Building your administrative infrastructure is not a regulatory checkbox. It is the foundation that makes everything else defensible when it matters most.

Part 6 of 6

When State Law Is More Protective Than HIPAA

HIPAA is a federal floor, not a ceiling. State laws frequently impose stricter requirements than HIPAA for certain categories of health information or certain patient rights. When a state law is more protective of patient privacy than HIPAA, the state law applies. This is called the preemption principle, and it is one of the most practically important things a new privacy officer needs to understand.

You cannot assume HIPAA is your only compliance obligation. In most states, specific categories of health information are subject to additional protections that restrict when and how they can be disclosed, require separate written consent beyond a standard HIPAA authorization, or impose shorter response timelines than HIPAA allows.

Categories Most Commonly Subject to Stricter State Protection

The following types of information are the most frequent areas where state law imposes requirements beyond HIPAA. This is not an exhaustive list, and the specific rules vary by state.

Mental health and behavioral health records. Most states restrict disclosure of mental health records more tightly than HIPAA, often requiring separate written consent for any disclosure and limiting which parties may receive information even with consent.

Substance use disorder treatment records. Records related to substance use disorder treatment at programs covered under 42 CFR Part 2 are governed by federal confidentiality rules that are more restrictive than HIPAA in most respects. If your organization provides or refers patients for substance use treatment, confirm whether Part 2 applies.

HIV and AIDS-related information. Many states require specific consent and impose restrictions on disclosure of HIV status that go beyond the general HIPAA framework.

Reproductive health information. Several states have enacted laws in recent years specifically protecting reproductive health data from disclosure, including to law enforcement. These laws vary significantly and are evolving. Know your state's current framework.

Minor consent and access rights. In many states, minors may consent to certain categories of treatment without parental involvement. When a minor consents to treatment independently, the parent's right to access the minor's records for that treatment may be limited or eliminated under state law, even though HIPAA would otherwise permit parental access.

Genetic information. Several states impose restrictions on the disclosure of genetic test results beyond the protections in HIPAA and the federal Genetic Information Nondiscrimination Act.

Your practical obligation: Identify which categories of sensitive health information your organization handles, then confirm what your state requires for each one. State health department websites, state medical association resources, and legal counsel are your primary sources. The HHS summary of preemption principles at hhs.gov/hipaa is a useful starting point for understanding the framework, but it does not substitute for knowing your specific state's law.

Once you have identified applicable state requirements, make sure your policies reflect them. A policy that says "PHI may be disclosed for treatment purposes" without addressing state-specific restrictions on mental health or substance use records is incomplete and will not protect your organization if a disclosure is challenged.

What this section was designed to give you: A working understanding of the Privacy Rule's structure and the state law layer on top of it, not a comprehensive legal analysis. The CFR citations throughout are entry points for your own reading and for the conversations you will have with legal counsel when specific questions arise. The regulation is the authoritative source. This guide is an orientation.

Now that you understand the regulatory framework, Section 5 walks through the workforce training requirement in depth: what a compliant training program looks like, what it must cover, how to document it, and how to handle training for different workforce roles.

Section 5: Building Your Training Program →

Privacy Officer 101 — Section 5

Building Your Training Program

What HIPAA requires, who must be trained, what training must cover, and how to build a program that holds up when OCR asks for evidence.

Training is one of the most operationally exposed requirements in the entire Privacy Rule. It is not complex, but it is unforgiving in one specific way: if you cannot demonstrate that training happened, OCR treats it as if it did not happen. This section covers what a compliant training program requires, how to build one that holds up under scrutiny, and how to handle the situations that trip up most new privacy officers.
Part 1 of 7

What the Rule Actually Requires

The workforce training requirement comes from 45 CFR 164.530(b), one of the administrative requirements covered in Section 4. The regulation states that covered entities must train all members of their workforce on the policies and procedures with respect to PHI required by the Privacy Rule as necessary and appropriate for the members of the workforce to carry out their functions.

Three phrases in that sentence carry most of the practical weight: all members of the workforce, as necessary and appropriate, and to carry out their functions. Together they mean that training is not optional for anyone in your organization who touches PHI in any form, and that the training each person receives should reflect what they actually do.

The full regulatory text at 45 CFR 164.530(b)(1): A covered entity must train all members of its workforce on the policies and procedures with respect to protected health information required by this subpart, as necessary and appropriate for the members of the workforce to carry out their functions under the covered entity.

What the regulation does not specify: The rule does not mandate a particular format, a minimum number of training hours, a specific curriculum, or a fixed renewal interval. These decisions belong to the covered entity. That flexibility is an advantage for smaller organizations, but it also means the standard is set by what is reasonable and defensible, not what is minimal.

Two Rules, One Training Program

The Privacy Rule is not the only regulation that requires workforce training. The Security Rule imposes a parallel and equally binding obligation at 45 CFR 164.308(a)(5), which requires covered entities to implement a security awareness and training program for all workforce members. If you are also serving as your organization's security officer, or if you are coordinating with a separate security officer, both requirements must be satisfied.

Two training obligations your program must satisfy

Privacy Rule Training

45 CFR 164.530(b). Covers policies and procedures for handling PHI, patient rights, permitted uses and disclosures, minimum necessary, sanctions, and complaint processes. Administered by the privacy officer.

Security Rule Training

45 CFR 164.308(a)(5). Covers protection of electronic PHI, security awareness, malicious software prevention, log-in monitoring, and password management. Administered by the security officer, or by the privacy officer if both roles are held by the same person.

Most covered entities satisfy both requirements through a single combined annual training program that addresses Privacy Rule and Security Rule content in sequence. Running one program is more efficient and produces a single set of documentation that covers both obligations. If your organization currently trains on privacy but has no Security Rule training component, that is a separate compliance gap that needs to be addressed alongside your privacy training build-out.

Training without documentation is not training under HIPAA: 45 CFR 164.530(b)(2) requires that covered entities document that training has been provided. If training occurred but no record was made, OCR has no basis to credit it. The documentation requirement is not a formality. It is part of the training obligation itself.

Part 2 of 7

Who Must Be Trained

The training obligation applies to all members of your workforce. Under HIPAA, the workforce is defined broadly at 45 CFR 160.103 to include employees, volunteers, trainees, and other persons whose conduct in the performance of work for a covered entity is under the direct control of that entity, whether or not they are paid.

Workforce CategoryTraining Required?Notes
Full-time employeesYesAll roles, including administrative, clinical, and operational staff regardless of whether they regularly access clinical records.
Part-time employeesYesEmployment status does not change the obligation. A part-time front desk employee who handles patient check-in must be trained.
VolunteersYesVolunteers performing work under your organization's direction are workforce members under the HIPAA definition. This is a frequently missed gap, particularly in hospital and clinic settings with active volunteer programs.
Trainees and internsYesMedical students, nursing students, administrative interns, and other trainees placed in your organization are workforce members. Training must be completed before they begin working with PHI.
Contract staff working on-siteDependsContracted individuals whose conduct is under your organization's direct control are workforce members. If the individual is employed by an outside organization that qualifies as a business associate, training may be that organization's obligation under the BAA. Confirm the relationship before assuming coverage either way.
Business associatesNo — butBusiness associates are not your workforce and are not directly covered by your training obligation. However, under the Security Rule and through your BAA, business associates carry their own workforce training obligation. Your BAA should confirm this. Do not assume a vendor has trained their staff simply because a BAA is in place.
Leadership and executivesYesPrivacy training is not limited to front-line staff. Leaders and executives who have any exposure to PHI must be included. An untrained executive who receives a report containing patient-level data is a workforce member who should have been trained.

A note on board members: Board members are generally not workforce members under the HIPAA definition at 45 CFR 160.103 because they provide governance oversight rather than performing operational work under the organization's direct control. A board member with no operational role who does not access PHI is not subject to the training requirement.

However, two situations change that analysis. First, if a board member also holds an operational role, such as a physician who sits on the board and sees patients, they are a workforce member in their operational capacity and must be trained accordingly. Second, board members who receive reports, presentations, or materials containing patient-level data, even in aggregate form, have PHI exposure that creates real risk regardless of their governance role.

Most covered entities with active boards include board members in annual compliance training as an organizational policy decision rather than a strict regulatory mandate. OCR has noted in guidance that board-level compliance education reflects a mature compliance culture. If your board receives any reporting that touches patient information, the practical answer is to include them.

The gap that surfaces most often in small covered entities: Volunteers and long-tenured staff. Volunteers are frequently overlooked because they are not on payroll. Long-tenured staff are frequently overlooked because they have never been asked and it has never come up. Neither history nor tenure satisfies the training requirement. If someone cannot produce a signed acknowledgment, the training did not happen for compliance purposes.

Part 3 of 7

What Training Must Cover

The Privacy Rule requires training on your organization's policies and procedures with respect to PHI, not on HIPAA in the abstract. A workforce member who completes a generic online HIPAA course has not necessarily been trained on the specific policies your organization has in place, the forms they are expected to use, or the situations where they need to escalate. Both general regulatory awareness and organization-specific content belong in your training program.

Core Content for All Workforce Members

  • 1
    What PHI is and what forms it takes in your organization. Workforce members need to recognize PHI in the context of their actual job. A billing specialist should know that a spreadsheet with patient names and procedure codes is PHI. A receptionist should know that a voicemail from a patient asking about test results is PHI. General definitions alone are not enough.
  • 2
    What they are and are not permitted to do with PHI. Workforce members should understand the basic permitted uses and disclosures in plain terms relevant to their role, and know when they need to stop and ask rather than proceed on their own judgment. Most workforce-level violations happen not because someone intended to violate the rule but because they did not know the line existed.
  • 3
    The minimum necessary standard. Every workforce member who accesses PHI should understand that their access should be limited to what they need for the task in front of them, and that accessing records out of curiosity or for purposes unrelated to their job is a violation regardless of intent.
  • 4
    Patient rights and how to respond to requests. Front-line staff who interact with patients need to know what rights patients have and what to do when a patient exercises one. A patient asking for their records should be connected to the right process, not turned away. A patient filing a complaint should be directed to the privacy officer without resistance or delay.
  • 5
    How to recognize and report a potential privacy incident. Every workforce member should know what a potential privacy incident looks like, understand that they are obligated to report it, and know exactly how to do so within your organization. The reporting pathway should be named specifically during training, not described in general terms.
  • 6
    The consequences of violations. Workforce members should understand that violations carry consequences at both the organizational and individual level, including disciplinary action under your sanctions policy up to and including termination. Making this concrete during training is more effective than listing regulatory penalties in the abstract.

Role-Specific Training Content

In addition to the core content above, certain roles carry specific privacy obligations that general training does not adequately address.

Role or FunctionAdditional Training Content
Clinical staffVerbal disclosures in shared spaces, conversations with family members and caregivers, releasing records at the point of care, minimum necessary in clinical documentation, and the specific patient rights they will field directly.
Billing and codingWhat constitutes a permitted disclosure to payers, handling authorization requests from insurers, and identifying when a disclosure request goes beyond what payment purposes justify.
Front desk and registrationHandling incoming records requests, directing patient rights inquiries to the privacy officer, managing the facility directory, and protecting PHI at check-in where conversations can be overheard.
IT and systems staffAccess control responsibilities, handling PHI in electronic systems, what to do when they observe potential unauthorized access, and the intersection of their role with Security Rule obligations. Coordinate this content with your security officer. This role group should receive the most substantial Security Rule training component.
Management and supervisorsOversight obligations for workforce members under their direction, how to handle a report of a potential incident, their role in sanctions when a violation occurs, and escalation procedures to the privacy officer.
Privacy and compliance staffDeeper regulatory knowledge, investigation and complaint handling procedures, breach risk assessment process, and coordination with the security officer on incidents involving electronic PHI.
Part 4 of 7

When Training Is Required

The regulation identifies mandatory training situations and establishes a standard of reasonableness for timing. Understanding when each one applies prevents gaps that accumulate silently over time.

New Workforce Members: Before PHI Access, Not After

The regulation requires training within a reasonable period of time after a new workforce member joins the organization. In practice, reasonable means before the individual is operating with access to PHI. The standard is not a 30-day grace period. It is the point at which unsupervised PHI access begins.

A new employee who is accessing patient records on day one but does not receive training until day 28 has been operating out of compliance for nearly a month. Your onboarding process should require training to be completed and acknowledged before PHI access is granted, not within some number of days afterward.

The practical onboarding standard: Training completed, acknowledgment signed, record filed, PHI access granted — in that order. If your organization's onboarding process does not currently sequence these steps correctly, adjusting the process is one of the highest-value improvements a new privacy officer can make in the first 90 days.

When Policies or Procedures Change

Retraining is required when functions change in ways that affect a workforce member's interaction with PHI, and when policies or procedures change materially. Examples that typically require retraining include:

  • Retrain
    A revision to your uses and disclosures policy that changes what staff are permitted to share and with whom.
  • Retrain
    Adoption of a new electronic health record or patient portal that changes how PHI is accessed, stored, or transmitted.
  • Retrain
    A significant regulatory change, such as a new OCR final rule that modifies patient rights or expands required safeguards.
  • Retrain
    A workforce member changing roles and taking on new functions that involve different or greater PHI access.
  • Retrain
    A privacy incident or pattern of incidents that reveals a systemic gap in workforce understanding.
  • Retrain
    Expansion of services that introduces new categories of sensitive health information your workforce was not previously handling.

Periodic Retraining

The regulation does not mandate annual retraining as a fixed requirement, but periodic retraining is standard practice and is expected by OCR as evidence of an active, maintained program. Most covered entities conduct annual privacy and security training for the full workforce. Annual training provides a natural opportunity to update content to reflect regulatory changes, reinforce key concepts, and capture a fresh set of signed acknowledgments.

Part 5 of 7

Documentation: What to Capture, How Long to Keep It, and What to Do When Someone Will Not Sign

The documentation requirement at 45 CFR 164.530(b)(2) is explicit: training that is not documented does not satisfy the regulation. At minimum, your training records should allow you to answer four questions for every workforce member: what training they received, when they received it, what version of your policies the training reflected, and that they acknowledged completing it.

For each training completion

Name of the workforce member, date of training, description of content covered or title of training materials used, and the workforce member's signature or electronic acknowledgment of completion.

For training materials

A dated copy of all training materials used, including slides, handouts, or online course content. When you update materials, retain the prior version. OCR may ask what your workforce was trained on at a specific point in time.

For the training roster

A running log showing all workforce members and their training completion status. This allows you to identify gaps quickly and demonstrate program-wide coverage during an investigation without pulling individual records for every person.

Retention requirement

Training records must be retained for six years from the date of creation or the date last in effect, per 45 CFR 164.530(j). Do not purge records when an employee leaves. A former employee's training history may be relevant if a complaint surfaces after their departure.

Keeping Your Roster Current as Your Workforce Changes

The most practical approach is to connect your training roster directly to your onboarding and offboarding processes. When a new workforce member joins, they are added to the roster with a training-pending status. Training completion closes that status. When a workforce member leaves, their record is retained but flagged as inactive. When someone changes roles, the roster reflects the new role and triggers a review of whether additional training is required.

Verbal acknowledgment is not documentation: A workforce member telling you they read the policy or attended the session does not satisfy the documentation standard. The record must exist in a retrievable written or electronic form that you can produce on request.

When a Workforce Member Refuses to Sign or Complete Training

Refusal to complete required training is a failure to comply with your organization's privacy policies and procedures. Under 45 CFR 164.530(e), your organization is required to apply appropriate sanctions against workforce members who fail to comply. A refusal to train is a sanctions matter, not an administrative inconvenience.

When a workforce member does not complete training, document the following: the date training was assigned, any follow-up communications requesting completion, the workforce member's response or non-response, and whatever action was taken under your sanctions policy. Do not leave a blank in your training roster. A documented refusal with a documented response is a defensible record. An empty field with no explanation is a gap that OCR will treat as evidence that training was not provided.

The acknowledgment form language matters: A signature on a form that says "I received this document" is materially weaker than one that says "I have reviewed and understand my obligations under this organization's HIPAA privacy policies and procedures." Design your acknowledgment form to capture comprehension and understanding, not just receipt.

Part 6 of 7

Format, Delivery, and Comprehension

The Privacy Rule does not specify a required format for workforce training. In-person sessions, online courses, written materials, video, and hybrid approaches are all permissible. The standard is whether the training adequately prepares each workforce member to carry out their functions in compliance with your policies.

In-Person Training

Live sessions allow for questions, real-scenario discussion, and direct engagement with the content. They are particularly effective for onboarding, for retraining following an incident, and for role-specific content. The documentation challenge with live sessions is capturing a signed acknowledgment for every attendee at the time of the session. Build the acknowledgment step into the session itself, not as a follow-up.

Online and Self-Paced Training

Online platforms are efficient for distributed workforces and generate completion records automatically if configured correctly. The risk is that course completion does not guarantee comprehension, particularly when the content is generic rather than tailored to your organization's specific policies. If you use online training, supplement it with organization-specific materials covering your actual procedures, forms, and reporting pathways.

Written Materials

Distributing written policies with a signed acknowledgment is a common approach in very small covered entities. It satisfies the documentation requirement if the acknowledgment confirms the workforce member has reviewed and understood the material, not merely received it.

Comprehension Assessments

If your organization uses comprehension assessments as part of training, establish a clear policy for what happens when someone does not pass. The most defensible approach is a defined remediation path: the workforce member reviews the relevant content again and retakes the assessment, with both the initial result and the remediation completion documented. A failed assessment that goes unaddressed is worse than no assessment at all, because it creates a documented record that your organization knew a workforce member did not understand their obligations and took no action.

What makes training effective beyond the compliance minimum: The most useful training programs connect regulatory requirements to the specific situations workforce members actually encounter. Instead of explaining that PHI may not be disclosed without authorization, present a scenario: a patient's family member calls asking about their loved one's condition. What should the staff member say? What can they share? Who do they ask if they are unsure? Scenario-based training produces better workforce judgment than abstract rule recitation.

Part 7 of 7

Building Your Training Program from Scratch

  • 1
    Conduct a training inventory before you build anything. Pull every training record your organization has: signed acknowledgments, course completion certificates, session sign-in sheets, anything. Identify who has documented training, when it occurred, and what it covered. Build a gap list of who has no record at all, who has records more than a year old, and who changed roles since their last training.
  • 2
    Complete a full workforce training cycle before you refine the program. If your gap list reveals that a significant portion of your workforce has no documentation, prioritize getting everyone trained and documented over perfecting the curriculum. A complete set of adequate training records is more defensible than an excellent program with gaps. You can improve quality in subsequent cycles. You cannot retroactively create documentation.
  • 3
    Establish a standard acknowledgment form and use it without exception. Design a single form that captures the workforce member's name, date, a description of what was covered, and a statement confirming they have reviewed and understood their obligations. Use it for every training event, in every format, for every workforce member.
  • 4
    Fix your onboarding sequence so training precedes PHI access. Work with whoever manages new hire onboarding to make training completion a required step before system access is provisioned. New hire training gaps are among the most common findings in investigations involving recently hired workforce members.
  • 5
    Connect your training roster to your onboarding and offboarding processes. Your roster is only accurate if it reflects your actual current workforce. Establish a process where adding a new workforce member also adds them to the training roster with a pending status, and where a departure flags their record as inactive.
  • 6
    Build a training calendar and document it as a program policy. Establish your annual training cadence in writing, including when full-workforce training will occur each year, who is responsible for organizing it, and what triggers mid-cycle retraining. A documented training calendar that you follow is evidence of a systematic program.
  • 7
    Tie retraining triggers to your policy update process. When you update a policy in a way that materially changes workforce obligations, build retraining into the update workflow before the new policy takes effect. Your workforce cannot comply with a standard they have not been informed of.
Ready-to-use HIPAA training materials for your workforce.

Our Privacy Training Deck covers Privacy Rule requirements, patient rights, minimum necessary, and PHI handling in a fully editable PowerPoint format with speaker notes. Pair it with the Security Awareness Training Deck for combined Privacy and Security Rule coverage in a single annual program.

View Training Materials

With your training program in place, Section 6 covers breach response: what counts as a breach under HIPAA, the four-factor risk assessment you must perform when a potential incident occurs, and the notification obligations your organization must be prepared to meet before an incident happens.

Section 6: Breach Response →

Privacy Officer 101 — Section 6

Breach Response

What counts as a breach, how the notification clock works, the four-factor risk assessment, your notification obligations, and how to build readiness before an incident occurs.

Most privacy officers encounter their first breach before they feel ready for one. The goal of this section is to make sure that does not happen to you. Breach response is not complicated once you understand the structure, but it has specific timelines, definitions, and documentation requirements that leave no room for improvisation. You need to know the process before an incident occurs, not while one is unfolding.
Part 1 of 10

What Counts as a Breach Under HIPAA

The Breach Notification Rule at 45 CFR Part 164, Subpart D defines a breach as the acquisition, access, use, or disclosure of protected health information in a manner not permitted under the Privacy Rule that compromises the security or privacy of the PHI.

Two elements must both be present. First, the use or disclosure must have been impermissible under the Privacy Rule. Second, it must compromise the security or privacy of the information. The rule establishes a presumption that any impermissible use or disclosure compromises security or privacy unless your four-factor risk assessment, covered in Part 4, demonstrates a low probability of compromise. In practice, this means you begin from the assumption that a breach occurred and work through the assessment to determine whether that presumption can be rebutted.

A breach does not require a cyberattack, a stolen device, or malicious intent. A workforce member emailing patient records to the wrong address is a potential breach. A fax sent to the wrong provider is a potential breach. An employee accessing a patient's records out of personal curiosity without a treatment relationship is a potential breach. The threshold question is simply whether PHI was acquired, accessed, used, or disclosed in a way the Privacy Rule does not permit.

Regulatory basis: The Breach Notification Rule is at 45 CFR Part 164, Subpart D. The breach definition is at 164.402. Individual notification requirements are at 164.404, media notification at 164.406, HHS notification at 164.408, and the law enforcement delay provision at 164.412. Authoritative HHS guidance is at hhs.gov/hipaa/for-professionals/breach-notification.

Three Exceptions to the Breach Definition

The regulation identifies three circumstances excluded from the definition of breach. Each is narrow, each requires specific conditions to be met, and each requires documentation. Do not treat them as broad exemptions or apply them informally.

Unintentional access by a workforce member acting in good faith. An unintentional acquisition, access, or use of PHI by a workforce member acting under the authority of a covered entity is not a breach if the access was made in good faith and within the scope of authority, and the PHI is not further used or disclosed impermissibly. A nurse who accidentally opens the wrong patient record, recognizes the mistake immediately, and closes it without reading or using the information may qualify. This exception does not apply if any unauthorized further disclosure results.

Inadvertent disclosure between authorized persons. An inadvertent disclosure by someone authorized to access PHI to another person authorized to access PHI at the same covered entity or organized health care arrangement is not a breach, provided the PHI is not further used or disclosed impermissibly. A clinician who sends an internal message containing PHI to the wrong colleague within the same organization may qualify.

Good-faith belief the unauthorized recipient cannot retain the information. A disclosure where the covered entity has a good-faith belief that the unauthorized person could not reasonably have retained the PHI. A misdirected fax returned unopened may qualify. This exception requires documented justification of the good-faith basis and is rarely available in practice.

The exceptions are not escape hatches: If there is any doubt whether an exception applies, conduct the four-factor risk assessment in Part 4. A documented assessment concluding no breach occurred is defensible. Informally deciding an event does not qualify, without documentation, is not.

Part 2 of 10

Secured vs. Unsecured PHI: Why It Changes Your Breach Exposure

The Breach Notification Rule applies specifically to unsecured PHI. This is a defined term, not a general description. PHI that has been rendered unusable, unreadable, or indecipherable to unauthorized individuals through one of the two approved methods is considered secured, and the Breach Notification Rule's notification obligations do not apply to it even if an impermissible disclosure occurs.

Secured PHI — Notification Rule Does Not Apply

PHI that has been encrypted consistent with NIST Special Publication 800-111 for data at rest, or NIST 800-52 or 800-77 for data in transit. Also includes PHI on paper, film, or other media that has been shredded or destroyed so that it cannot be reconstructed. If a laptop containing encrypted PHI is stolen, the Breach Notification Rule is not triggered because the PHI was secured.

Unsecured PHI — Notification Rule Applies

Any PHI that has not been rendered unusable, unreadable, or indecipherable through the approved methods above. Unencrypted files on a laptop, paper records, unencrypted email attachments, and PHI stored on unencrypted USB drives are all unsecured. A breach involving unsecured PHI triggers the full notification analysis.

The practical implication for your compliance program is significant. Organizations that encrypt PHI at rest and in transit have substantially reduced breach notification exposure compared to those that do not. When evaluating an incident, one of the first questions to answer is whether the PHI involved was secured. If it was, the notification obligations under the federal rule do not apply, though your four-factor assessment and documentation obligations still do. If it was not, the full framework applies.

Why this connects to the Security Rule: The requirement to encrypt PHI is addressed in the Security Rule, not the Privacy Rule. The Security Rule treats encryption as an addressable implementation specification, meaning covered entities must implement it or document why an equivalent alternative was chosen. Organizations that have not addressed encryption are exposed on two fronts: Security Rule compliance gaps and full Breach Notification Rule applicability to any incident involving electronic PHI. Coordinate with your security officer to confirm your organization's encryption posture before an incident occurs.

Part 3 of 10

What Triggers the Clock: Discovery

Notification timelines under the Breach Notification Rule are measured from the date of discovery, not the date the breach occurred. A breach is considered discovered on the first day the covered entity knows, or by exercising reasonable diligence would have known, that the breach occurred.

That second clause is the one that creates risk. If circumstances arose that a reasonable organization would have investigated, and that investigation would have revealed a breach, the discovery date can be set to when those circumstances first arose, not when someone eventually looked into them. Delayed internal reporting, failure to investigate a known anomaly, and inattention to system alerts can all result in OCR setting a discovery date earlier than when your organization formally acknowledged the incident. That earlier date governs your notification deadline.

When the Scope Is Unknown at Discovery

In practice, the full scope of a breach is frequently unclear at the moment it is first discovered. You may know that an incident occurred before you know how many individuals were affected, which specific records were involved, or whether all compromised data has been identified.

The answer is that investigation and notification preparation run in parallel, not in sequence. You do not need a complete and final count of affected individuals before you begin drafting notifications or preparing your HHS filing. Begin both as soon as you confirm a breach has occurred. Update the content as the investigation produces more complete information. What you may not do is delay beginning the notification process until the investigation is fully resolved. OCR expects good-faith, diligent effort toward timely notification even when the full picture is still developing. Documenting your investigation timeline and the steps taken to identify affected individuals demonstrates that effort.

What this means for your reporting culture: Every potential incident starts the reasonable diligence clock from the moment it becomes known to any member of your workforce. A report that arrives at your desk two weeks after the event began has already consumed a significant portion of your notification window. Your incident reporting pathway and the expectation that it be used immediately should be covered in workforce training, posted where PHI is handled, and reinforced periodically. Delayed workforce reporting is one of the most common causes of notification deadline exposure in small covered entities.

Part 4 of 10

The Four-Factor Risk Assessment

The Breach Notification Rule presumes that any impermissible use or disclosure of unsecured PHI is a breach requiring notification. A covered entity may rebut that presumption only by demonstrating through a documented risk assessment that there is a low probability that the PHI has been compromised. If you cannot make that demonstration in writing, notification is required.

The assessment must evaluate all four factors defined in the regulation. An informal judgment that nothing bad probably happened does not satisfy the standard. The assessment must be in writing, must address each factor with specific evidence or reasoning, and must be retained as part of your breach documentation regardless of the conclusion it reaches.

Factor 1

Nature and extent of the PHI involved. What types of information were exposed? Were clinical diagnoses, financial data, Social Security numbers, or other sensitive categories present? How many identifiers were included? The more sensitive and complete the information, the higher the probability of harm to the individual if it were misused.

Factor 2

Who accessed or could have accessed the PHI. Was the unauthorized recipient another covered entity, a healthcare provider, a business associate, or a member of the general public? Was the access internal or external to your organization? A misdirected fax received by another physician's office is evaluated differently than information sent to an unrelated third party with no healthcare connection.

Factor 3

Whether the PHI was actually acquired or viewed. Is there evidence the information was actually accessed, read, or used by the unauthorized person? Or is there a reasonable basis to believe the disclosure did not result in the PHI being seen? A fax returned unopened by the recipient is evaluated differently than an email confirmed opened by an unintended recipient.

Factor 4

Extent to which risk has been mitigated. Were steps taken to reduce potential harm after the disclosure? Did the recipient confirm the information was destroyed or returned? Documented mitigation does not eliminate the assessment obligation but affects the overall probability conclusion.

How to reach a conclusion: After evaluating all four factors, your written assessment must reach one of two conclusions.

  1. Low probability of compromise: The assessment supports a conclusion that PHI has not been compromised based on the totality of the four factors. Notification is not required, but the written assessment and your reasoning must be retained.
  2. Cannot demonstrate low probability: You cannot establish with documented support that the probability of compromise is low. The presumption of breach applies and notification is required.

When in doubt, notify. The cost of providing notification when it may not have been strictly required is far lower than the cost of failing to notify when it was. OCR evaluates both whether notification occurred and whether any decision not to notify was supported by a documented assessment.

Part 5 of 10

Notification Obligations: Who, What, When, and How

When a breach has occurred and notification is required, the rule establishes distinct obligations for three potential recipients: affected individuals, HHS, and in some cases the media. Each carries different content requirements, timing requirements, and delivery methods.

RecipientDeadlineMethodRequired Content
Affected individualsWithout unreasonable delay, no later than 60 days after discoveryFirst-class mail to last known address. Email if the individual has agreed to electronic notice. Substitute notice if contact information is insufficient for 10 or more individuals.Brief description of what happened and when. Description of PHI involved. Steps the individual should take to protect themselves. What your organization is doing to investigate and prevent recurrence. Contact information for questions.
HHS — fewer than 500 individualsNo later than 60 days after the end of the calendar year in which the breach was discoveredHHS online breach reporting portal at hhs.gov/hipaa/for-professionals/breach-notification/breach-reportingCompleted HHS breach report covering dates, description of the breach, PHI involved, number of individuals affected, and safeguards in place at the time.
HHS — 500 or more individualsWithout unreasonable delay, no later than 60 days after discoveryHHS online breach reporting portal. Breaches at this scale are posted permanently on the HHS public breach notification list. Simultaneous media notification also required when 500 or more residents of a single state or jurisdiction are affected.Same as above. The public HHS posting is permanent and searchable by anyone.
Prominent media outletsWithout unreasonable delay, no later than 60 days after discoveryPress release to major print or broadcast media serving the affected state or jurisdiction. See below for what this means in practice for smaller covered entities.Required only when 500 or more residents of a single state or jurisdiction are affected. Same content elements as individual notification.

The 60-day deadline is a ceiling, not a target: OCR has consistently held that waiting the full 60 days when earlier notification is feasible is not acceptable practice. Begin preparing individual notices as soon as you have confirmed a breach and identified affected individuals. Reserve the full window only for situations where identification and preparation genuinely require that time, and document why.

When Contact Information Is Insufficient

If your organization lacks sufficient contact information for 10 or more affected individuals, substitute notice is required through either a conspicuous posting on your website for at least 90 days or notification in major print or broadcast media in the geographic areas where affected individuals likely reside. Substitute notice must include a toll-free number, active for at least 90 days, that individuals can call to learn whether their information was involved. For fewer than 10 individuals with insufficient contact information, substitute notice may be provided by alternative written notice, telephone, or other means.

What Individual Notifications Must Contain

Individual notifications must be written in plain language and must include five elements: a brief description of what happened including the date of the breach and the date of discovery; a description of the types of PHI involved; the steps individuals should take to protect themselves from potential harm; a description of what your organization is doing to investigate the breach, mitigate harm, and prevent future incidents; and contact information including a toll-free telephone number, email address, website, or postal address where individuals can ask questions or obtain additional information.

Media Notification in Practice for Smaller Covered Entities

The media notification requirement applies when 500 or more residents of a single state or jurisdiction are affected. For most small covered entities, reaching that threshold is unlikely, but you should understand how the requirement works before it becomes relevant.

"Prominent media outlets" means major print or broadcast media serving the geographic area where the affected individuals reside — in practice, the major newspaper of record, primary television news stations, and any dominant regional news platforms serving your state or the relevant metropolitan area. Notification takes the form of a press release sent directly to the news desk of each identified outlet. The press release should contain the same five required content elements as the individual notification. Your obligation is to send the notification. Whether it is reported is outside your control.

Law Enforcement Delay

Under 45 CFR 164.412, a covered entity may delay notification if a law enforcement official has requested the delay in writing and has stated that providing notification would impede a criminal investigation or cause damage to national security. If the request is in writing and specifies a delay period, you may delay notification for the period specified. If the request is made orally, you may delay for no more than 30 days, and you must document the request. Consult legal counsel before acting on any law enforcement request to delay notification.

Part 6 of 10

Business Associate Breaches

A breach can originate at a business associate rather than within your organization, and when it does, the notification obligations still rest with you as the covered entity.

The business associate's notification obligation to you: Under 45 CFR 164.410, a business associate must notify the covered entity of a breach of unsecured PHI without unreasonable delay and no later than 60 days after the business associate discovers the breach. They must provide the information you need to complete your notification obligations, including the identities of affected individuals if known and any other details required for your HHS filing and individual notifications.

Your clock runs from your discovery, not theirs: Once your business associate notifies you, your 60-day window starts from the date you received that notification. However, if your organization knew or should have known that a business associate experienced a breach before formal notification was provided, OCR may set your discovery date to that earlier date. A business associate's delayed notification does not extend your deadline if you had reason to know sooner.

What your BAA should specify: Your Business Associate Agreements should require notification to you within a defined timeframe shorter than 60 days, identify the contact person for breach notification on both sides, and define what adequate notification content includes. A BAA silent on notification timing leaves you dependent on the business associate's interpretation of "without unreasonable delay." Review your existing BAAs for this language and address gaps at the next renewal opportunity.

Part 7 of 10

State Breach Notification Laws

HIPAA's Breach Notification Rule is a federal floor, not a ceiling. Most states have their own breach notification laws, and many impose requirements that go beyond what the federal rule requires. Operating in compliance with the federal rule alone does not guarantee compliance with applicable state law.

Shorter notification timelines. Several states require notification to affected individuals within a period shorter than the federal 60-day window. Some require notification within 30 days of discovery, and a few require even faster action in specific circumstances. If your state has a shorter timeline, that deadline governs for state law compliance, even if you are still within the federal window.

Broader definitions of personal information. Many state breach notification laws cover categories of information beyond HIPAA-defined PHI, including financial account numbers, driver's license numbers, and other personal identifiers. An incident that does not involve PHI as HIPAA defines it may still trigger a state notification obligation if other personal information was exposed.

Notification to state regulators. Several states require covered entities or healthcare organizations to notify the state attorney general, state insurance commissioner, or a dedicated state health privacy regulator in addition to or instead of HHS. These parallel filings have their own timing and content requirements.

Stricter standards for specific data categories. Some states impose heightened breach notification obligations for specific categories of health information, including mental health records, substance use disorder treatment records, HIV status, and reproductive health information.

Your practical obligation is to identify the state breach notification laws applicable to your organization's operations and to confirm how they interact with your federal compliance program. State health department websites, state attorney general resources, and legal counsel are your primary sources.

Part 8 of 10

Documentation: What to Capture for Every Incident

Every potential breach must be documented from the moment it is reported, regardless of whether it ultimately results in a notification obligation. Your documentation creates the evidentiary record that your organization assessed the matter properly and responded appropriately. In an OCR investigation, the absence of documentation is treated as evidence that the process was not followed, not as evidence that nothing happened.

  • 1
    Initial incident report. Capture the date and time the incident was reported, who reported it, how it was reported, and a factual description of what is known at that point. Document what you know, what you do not yet know, and what your next steps are.
  • 2
    Written four-factor risk assessment. A complete written assessment addressing all four factors with specific evidence or reasoning for each, and a stated conclusion about whether the presumption of breach has been rebutted. Required for every incident involving an impermissible use or disclosure of unsecured PHI.
  • 3
    Investigation findings and timeline. A record of what your investigation revealed: the root cause, the specific PHI involved, the number of individuals affected, the scope of any unauthorized access or disclosure, and the corrective actions taken or planned. Document the investigation timeline as it develops so you can demonstrate that identification of affected individuals was pursued diligently from discovery forward.
  • 4
    Copies of all notifications sent. Retain copies of every individual notification, every media notification, and every HHS filing, along with the dates they were sent or submitted. These records confirm notification occurred within the required timeframe and that the content met regulatory requirements.
  • 5
    Mitigation actions taken. Document every step taken to limit harm: retrieval of misdirected records, notifications to recipients requesting destruction, system changes, and any corrective actions implemented in response. This documentation satisfies the mitigation obligation at 45 CFR 164.530(f).
  • 6
    Incident log entry. Every incident, including those that did not result in notification, must be entered into your incident tracking log with sufficient detail to reconstruct the event, the assessment, and the outcome. An incomplete log or no log at all is itself a finding.

Retention: All breach-related documentation must be retained for six years from the date of creation or the date it was last in effect, per 45 CFR 164.530(j). This includes incident reports, risk assessments, investigation records, notification copies, and log entries. Do not purge breach files after notification is complete. OCR may request documentation of past incidents during an investigation triggered by an entirely separate complaint years later.

Part 9 of 10

Post-Incident Review: Closing the Loop

Completing your notification obligations does not close a breach incident. The final step that most new privacy officers overlook is the post-incident review, sometimes called a root cause analysis. This is the process that determines what allowed the incident to occur, what failed in your policies, processes, or training, and what corrective action will prevent a recurrence.

The post-incident review matters for two distinct reasons. First, it is the mechanism that actually improves your program. A breach that is reported, documented, and notified but never analyzed is a missed opportunity to fix the gap that caused it. Second, your individual notification letters are required to describe what your organization is doing to investigate the breach and prevent future incidents. If you have not conducted a review, that statement in the notification is incomplete at best and misleading at worst.

What a Post-Incident Review Should Cover

Root cause identification. What specific failure caused this incident? Be specific. A root cause identified as "human error" is not useful. The same event described as "workforce member did not verify recipient fax number before transmitting because the verification step is not documented in the current policy" is actionable.

Policy or procedure gap. Is there a written policy that addresses this situation? If yes, was it followed? If not, was the gap in the policy itself or in workforce knowledge of it? If there is no policy that addresses this situation, that is the gap to close first.

Training gap. Did the workforce member involved receive training that should have prevented this? If yes, what does that tell you about training effectiveness? If no, what does that tell you about your training coverage or scheduling?

Corrective action plan. What specific, time-bound actions will your organization take in response? Assign ownership, set deadlines, and document completion. Vague commitments to "improve awareness" are not corrective action plans.

Follow-up verification. How will you confirm that the corrective action was actually implemented and effective? Build a verification step into your review process, and document when and how you confirmed the action was completed.

When to involve your security officer in the post-incident review: If the incident involved electronic PHI, your security officer should be part of the post-incident review. The root cause may involve technical controls or Security Rule compliance gaps that fall within the security officer's domain. A privacy review that does not assess the security dimensions of an electronic PHI incident is incomplete.

Part 10 of 10

Building Readiness Before an Incident Happens

The organizations that handle breach incidents most effectively built their response infrastructure before they needed it. When an incident is unfolding, you should not be simultaneously deciding who is responsible for notification, locating your templates, learning the HHS portal, or researching your state's breach law for the first time. All of that work belongs in the preparation phase.

  • 1
    Write your breach response procedure before you need it. Document your organization's incident response process from initial report through post-incident review. Assign specific roles to specific individuals for each phase. Define what triggers escalation to leadership or legal counsel.
  • 2
    Prepare notification templates in advance. Draft individual notification letters, HHS filing documentation, and media notification templates before they are needed. The content will be incident-specific, but the structure, required elements, and approval workflow should already be established.
  • 3
    Know the HHS reporting portal before you need it. Create an account at the OCR breach reporting portal, review the form fields, and understand what information will be required to complete a report. Encountering the portal for the first time during an active incident is an avoidable source of delay and error.
  • 4
    Research your state's breach notification requirements now. Identify whether your state has a breach notification law that imposes requirements beyond the federal rule, including shorter timelines, additional reporting recipients, or broader definitions of covered information. Do not discover a 30-day state deadline in the middle of an incident you thought you had 60 days to address.
  • 5
    Establish your incident reporting pathway and communicate it to your workforce. Every workforce member should know exactly how to report a potential incident, to whom, and with what urgency. Post the pathway where PHI is regularly handled, reinforce it during training, and make reporting easy and consequence-free.
  • 6
    Start your incident log now, not after your first incident. Your log should exist and be in active use before any incidents are recorded in it. Start it from your first day. Record any privacy-related questions, near-misses, or potential incidents even when they conclude with no breach finding.
  • 7
    Identify in advance when legal counsel should be involved. Establish the threshold for involving outside counsel, who initiates that contact, and how to reach them outside business hours. Incidents involving large numbers of individuals, law enforcement contact, media attention, or potential litigation all warrant early legal consultation.
Breach response documentation built for covered entities.

Our Breach Documentation Kit includes a breach risk assessment form, incident report template, notification letter templates for individuals and media, and an incident tracking log. Everything you need to respond correctly and document completely.

View the Breach Documentation Kit

With breach response covered, Section 7 brings everything together: how to build a privacy program that is not just compliant on paper but operational, maintainable, and capable of demonstrating its own effectiveness when it matters most.

Section 7: Building a Program That Holds Up →

Privacy Officer 101 — Section 7

Building a Program That Holds Up

How to move from initial build to sustained operation — including how to prioritize when resources are limited, how to conduct an internal audit, and what to do if OCR comes knocking.

You have now covered the full scope of the privacy officer role: what it is, what your first 30 days should look like, what documents you are responsible for, the regulatory framework behind them, how to build and maintain a training program, and how to respond to a breach. This final section is about what happens after the initial build. A compliance program that exists on paper but is not actively maintained will not protect your organization when it matters. This section covers how to make your program operational, how to prioritize when resources are limited, how to demonstrate the program is working, and how to sustain it over time.
Part 1 of 9

The Difference Between a Paper Program and an Operational One

There is a meaningful distinction between a compliance program that exists on paper and one that actually operates. Most organizations that face serious OCR enforcement exposure have policies. Many have training records on file and BAAs in their vendor folders. What they often lack is a program that is actively maintained, consistently followed, and periodically evaluated to confirm it is working.

A Paper Program

Policies exist but have not been reviewed or updated in years. Training happened once and records were kept but retraining has not occurred. BAAs were signed when vendors were onboarded but have never been revisited. The NPP on the website is the same one that was posted at launch. Complaints have been handled informally without documentation. No one has assessed whether the program is actually working.

This program looks compliant until something goes wrong. When OCR investigates, outdated policies, stale training records, and the absence of ongoing monitoring tell a clear story about an organization that treated compliance as a one-time event.

An Operational Program

Policies are reviewed on a documented schedule and updated when regulations or practices change. Training occurs annually with documented completion for the full workforce. BAAs are inventoried and reviewed periodically. The NPP reflects current practices. Complaints are logged and resolved with documented outcomes. The privacy officer can demonstrate, with records, that the program is active and maintained.

This program is defensible not because it is perfect but because it is demonstrably real. When OCR investigates, the documentation tells a story of an organization that takes compliance seriously and acts on it continuously.

The goal of everything in this guide has been to help you build the second kind of program. This section gives you the tools to keep it that way over time.

Part 2 of 9

The Three Pillars of a Sustainable Program

A compliance program that holds up over time is built on three activities that repeat on a regular cycle: monitoring, auditing, and corrective action. These are the mechanism by which your program identifies its own gaps before OCR does.

Monitoring

Ongoing observation of your program's operation. Are workforce members following access controls? Are complaints being documented? Are vendors operating under current BAAs? Are training completions being recorded? Monitoring is the day-to-day awareness that your program is functioning as designed. It does not require formal procedures for every activity, but it does require that someone is paying attention and noting what they observe.

Auditing

Periodic structured review of specific program elements. Unlike monitoring, auditing involves deliberately sampling records, testing processes, and evaluating whether your written policies reflect actual practice. Auditing answers the question of whether the program is doing what it is supposed to do. Part 4 of this section walks through how to conduct an internal privacy audit step by step.

Corrective Action

The documented response to gaps identified through monitoring and auditing. A corrective action is not a verbal commitment to do better. It is a written plan with a specific action, an assigned owner, a deadline, and a verification step. Corrective actions close the loop between finding a gap and fixing it, and they provide documentation that your organization responds to identified problems rather than ignoring them.

These three activities form a cycle. Monitoring surfaces potential issues. Auditing evaluates them structurally. Corrective action resolves them. The next round of monitoring confirms the resolution held. An organization that runs this cycle consistently and documents it is demonstrating exactly what OCR looks for when it evaluates whether a compliance program is operational.

Part 3 of 9

When You Cannot Do Everything at Once: A Risk-Based Approach

Most privacy officers at small covered entities are managing compliance alongside other responsibilities with limited time, no dedicated staff, and a budget that was not designed with a full compliance program in mind. This is the reality for a significant portion of the audience this guide is written for. The calendar in Part 5 and the audit framework in Part 4 describe what a mature program looks like. This part tells you how to get there when you cannot do everything at once.

OCR itself operates on a risk-based approach: it prioritizes enforcement activity based on the severity of the potential harm to patients and the systemic nature of the failure. Your remediation planning should follow the same logic. Not all compliance gaps carry equal risk. Addressing the highest-risk gaps first produces the greatest reduction in your organization's exposure per unit of effort invested.

A Framework for Prioritizing Gaps

When your gap inventory from Section 2 reveals more problems than you can address simultaneously, evaluate each gap against two questions: how likely is this gap to result in a privacy violation, and how serious would the harm be if it did? Gaps that score high on both dimensions belong in your first wave of remediation.

TierWhat Belongs HereWhy It Comes First
Tier 1 — ImmediateMissing or unsigned BAAs for active vendors currently handling PHI. No Notice of Privacy Practices or an NPP that materially misrepresents your practices. No written breach response procedure when incidents are already occurring or likely. No designated privacy officer on record.These gaps create exposure on every day they exist and are among the most commonly cited findings in OCR enforcement actions. They are also the fastest to close with the right templates and a clear process.
Tier 2 — Near-termMissing or significantly outdated core policies, particularly uses and disclosures, minimum necessary, and patient rights. No documented training or training records more than two years old for a significant portion of the workforce. Missing patient rights forms and intake processes.These gaps directly affect day-to-day PHI handling and patient rights fulfillment. They carry meaningful enforcement exposure and affect workforce behavior.
Tier 3 — Ongoing buildIncomplete vendor risk assessment documentation. Complaint log exists but needs process formalization. Training program adequate but not role-differentiated. Monitoring activities informal rather than structured. Annual self-audit not yet conducted.These gaps represent the difference between a functional program and a mature one. They are important for long-term sustainability but do not create the same immediate enforcement exposure as Tier 1 and 2 gaps.

Document your prioritization decision as part of your compliance record: When you make a deliberate decision to address Tier 1 gaps before Tier 3 gaps because of resource constraints, write that down. A documented remediation plan showing that you identified all gaps, assessed them by risk level, and are working through them in priority order is evidence of a good-faith compliance effort. An organization that can show OCR a written remediation plan in progress is in a substantially better position than one with the same gaps and no plan at all.

What to Do When an Audit Reveals Significant Gaps

When your annual self-audit reveals that multiple areas of the program have fallen behind simultaneously, the response is the same as the initial gap assessment: triage by risk, document your plan, report it to leadership, and work through it methodically. Do not attempt to fix everything at once and do not treat the finding as a reason to delay action while you figure out the optimal approach. Start with Tier 1. Document every step.

Significant audit findings should be reported to leadership promptly, in writing, with a proposed remediation timeline. A brief memo summarizing what was found, what the risk level is, what you are proposing to do, and what resources or decisions you need from leadership converts an uncomfortable finding into a managed response. The finding itself is not the problem. The finding without a plan is.

Part 4 of 9

How to Conduct an Internal Privacy Audit

An internal privacy audit is a structured review of your program's compliance with the Privacy Rule requirements. You do not need an external consultant to conduct one. What you do need is a consistent methodology, a record of what you reviewed and what you found, and a documented response to what the audit reveals.

  1. 1
    Define the scope before you start. Decide which program elements you are reviewing in this audit cycle. For an annual audit, the standard scope covers: policies and procedures, training records, BAA inventory, NPP currency, complaint log, incident log, and patient rights response processes. Document your scope in writing at the start of the audit.
  2. 2
    Gather your documentation before you evaluate it. Pull every document in scope: current versions of each policy, the training log with completion dates, the BAA inventory with agreement dates, the NPP with its effective date, the complaint log, the incident log, and a sample of patient rights request responses if any occurred in the period. Gathering before evaluating prevents you from reaching conclusions before you have the full picture.
  3. 3
    Evaluate each element against a defined standard. For each document or process in scope, assess it against the relevant requirement. Is the policy current and consistent with the regulation it implements? Is the training log complete with entries for every current workforce member? Does the BAA inventory include every vendor currently handling PHI, and are all agreements signed and current? For each element, your finding is one of three things: compliant, compliant with minor gaps, or non-compliant with a description of the specific deficiency.
  4. 4
    Sample, do not review everything. For high-volume items like training records or patient rights requests, you do not need to review every single record. A sample of 10 to 20 percent of records is sufficient to identify patterns. If your sample reveals a pattern of gaps, expand the sample to confirm the scope. Document your sampling methodology and the size of your sample as part of the audit record.
  5. 5
    Document findings in a written audit report. Your audit report needs to cover: the scope of the audit, the date it was conducted, what was reviewed, findings for each element reviewed, and your recommended corrective actions for each finding. This report is a compliance record. Retain it for six years.
  6. 6
    Build a corrective action plan from the findings and track it to completion. For every non-compliant or gap finding, your corrective action plan assigns a specific action, an owner, and a deadline. The plan is a living document, not a report appendix. Update it as actions are completed. When all items are closed, note the completion date and retain the closed plan as part of the audit record.
  7. 7
    Report the findings to leadership in writing. A brief written summary of audit findings and the corrective action plan should go to your supervisor or compliance committee. Even if the findings are mostly positive, the written report demonstrates that the audit occurred and that leadership was informed. If the findings reveal significant gaps, the written report is your documentation that you identified them and brought them forward.
Part 5 of 9

The Privacy Officer's Annual Calendar

A written annual calendar of recurring compliance activities is one of the most practical tools you can build. Activities that are not calendared have a way of not happening. The calendar captures what happens, when it happens, and who is responsible. That last column matters: some activities belong to the privacy officer alone, and others require coordination with HR, IT, or management.

CadenceActivityPrimary OwnerWhat It Produces
AnnualFull workforce privacy and security trainingPrivacy Officer + Security Officer; HR coordinates schedulingSigned acknowledgments for every workforce member, updated training log, training materials retained
AnnualPolicy and procedure reviewPrivacy Officer; legal counsel as needed for material changesDocumented review of each policy, updated effective dates, revised versions retained alongside prior versions
AnnualBusiness associate inventory reviewPrivacy Officer; department heads identify new vendorsUpdated BAA inventory, renewals completed, new vendors identified and agreements executed
AnnualNotice of Privacy Practices reviewPrivacy Officer; legal counsel if material changesConfirmed NPP reflects current practices, updated effective date if revised, patient notification if material change
AnnualInternal privacy program self-auditPrivacy OfficerWritten audit report, corrective action plan, leadership briefing
QuarterlyComplaint log reviewPrivacy OfficerDocumented review confirming all complaints investigated and resolved, open items assigned
QuarterlyIncident log reviewPrivacy OfficerDocumented review of all incidents, risk assessments confirmed complete, open post-incident actions tracked
QuarterlyTraining completion status checkPrivacy Officer; HR provides roster updatesUpdated roster confirming all current workforce members have documented training, gaps identified and addressed
QuarterlyLeadership compliance reportPrivacy OfficerWritten summary of training status, complaint and incident activity, policy updates, open items
As triggeredPolicy update and retrainingPrivacy Officer; department heads for affected workforce groupsRevised policy with new effective date, retraining documentation, updated acknowledgments
As triggeredNew hire onboarding trainingHR schedules; Privacy Officer delivers or assigns; completed before PHI access grantedSigned acknowledgment, roster updated, PHI access provisioned only after completion
As triggeredBreach incident responsePrivacy Officer leads; Security Officer for electronic PHI; legal counsel as warrantedIncident report, four-factor risk assessment, investigation findings, notifications as required, post-incident review, corrective action plan

Document the calendar itself as a program record: Keep a copy of your calendar in your compliance files and note when each activity was completed. When OCR requests evidence of your compliance program's ongoing activity, this calendar with a completion record is one of the clearest demonstrations that your program runs continuously. The calendar is not just a planning tool. It is part of your compliance documentation.

Part 6 of 9

If OCR Comes Knocking: What to Expect and How to Respond

OCR investigations are initiated in two primary ways: a complaint filed by a patient, workforce member, or other individual, and OCR's audit program, which selects covered entities for review outside of any complaint process. Most small covered entities encounter OCR through a complaint.

Who Can File a Complaint and When

Anyone may file a complaint with OCR alleging a violation of the Privacy Rule. A complaint must be filed within 180 days of the date the complainant knew or should have known that the alleged violation occurred. OCR may extend this deadline for good cause. OCR screens every complaint it receives and does not investigate all of them. Complaints that fall outside HIPAA's scope, involve no covered entity, or are filed after the 180-day window will generally not proceed.

The Sequence of an OCR Investigation

  1. 1
    Initial contact and document request. OCR sends a written notice identifying the complaint and requesting specific documents. This typically includes your privacy policies and procedures, your Notice of Privacy Practices, training records, BAAs relevant to the complaint, and documentation related to the specific events at issue. You will be given a response deadline, typically 30 days. Contact legal counsel before responding to anything.
  2. 2
    OCR reviews your documentation. OCR evaluates whether your program exists and operates as required, and whether the specific conduct at issue violated the Privacy Rule. Complete, current documentation that is consistent with your actual practices works in your favor at this stage. Outdated policies, incomplete training records, or documentation that does not match what actually happened deepens exposure.
  3. 3
    OCR may request additional information or conduct interviews. Depending on complexity, OCR may request follow-up documentation, submit questions in writing, or request interviews with relevant individuals. Consistency between what your documentation shows and what your workforce says matters significantly at this stage.
  4. 4
    Resolution. OCR investigations resolve as a finding of no violation, voluntary compliance where the covered entity corrects identified issues, a resolution agreement with corrective action commitments and sometimes a monetary settlement, or in serious cases a civil money penalty. The large majority of investigations that result in findings are resolved through voluntary compliance or resolution agreements, particularly when the covered entity cooperates fully and demonstrates a good-faith compliance effort.

How to respond when OCR contacts you: Contact legal counsel before responding to anything. Do not communicate informally with an OCR investigator. Do not volunteer information beyond what is requested. Gather the requested documents carefully and review them before submitting. If your documentation reveals gaps, consult with counsel about how to address them before the submission deadline. Cooperating fully and honestly while being methodical is the correct approach.

What Good Documentation Does in an Investigation

A covered entity that can produce current policies, complete training records, a maintained BAA inventory, a functioning complaint log, and documented incident responses is in a fundamentally different position than one that cannot. Even where a violation occurred, an organization with a demonstrated operational compliance program shows OCR that the violation was an exception to a functioning system rather than evidence that no system exists. That distinction affects outcomes. Everything in this guide that involves documentation has ultimately been building toward this: a record that demonstrates your organization understood its obligations and actively worked to meet them.

Part 7 of 9

Reporting to Leadership

A privacy program that exists only in the privacy officer's files is missing organizational backing. Leadership cannot support a program they do not know about, and they cannot make informed decisions about compliance gaps, resource needs, or risk tolerance without regular reporting. Communication with leadership is not a formality. It is what gives the privacy officer the standing to do the job.

What to Report and How Often

A brief written update to your supervisor or compliance committee on a quarterly cadence covers the previous period's activities and flags anything requiring a decision or resource. It needs to be written, retained, and cover five areas.

Training program status. Current completion rate, any gaps being addressed, and upcoming training activities.

Complaint activity. Number of complaints received, nature of each, resolution status, and any patterns worth flagging. Zero complaints in a period is a valid data point. A pattern of similar complaints is a signal that warrants leadership awareness.

Incident activity. Incidents logged, risk assessment outcomes, any breach notifications made, and status of post-incident corrective actions.

Policy and procedure status. Policies updated in the period, triggers for updates, whether retraining was conducted, and any policies identified as needing revision with a proposed timeline.

Open items and resource needs. Compliance gaps identified, what addressing them requires, and any decisions or resources that need to come from leadership. This is where you escalate rather than absorb.

Write it down every time: A verbal briefing is better than no communication, but it does not create a record. A brief written report creates documentation that leadership was informed. If a compliance issue surfaces later that you reported months earlier, that record demonstrates you fulfilled your escalation obligation. Write it down.

Part 8 of 9

Staying Current as Regulations Evolve

HIPAA has been amended multiple times since its original enactment, and OCR guidance continues to evolve through rulemaking, guidance documents, and enforcement actions. A program built on your organization's current understanding of the rules becomes outdated as those rules change. Staying current is a basic operational requirement, not an advanced activity.

Primary Sources to Monitor

HHS Office for Civil Rights (hhs.gov/hipaa). The authoritative source for Privacy Rule, Security Rule, and Breach Notification Rule guidance. OCR publishes final rules, guidance documents, frequently asked questions, and enforcement summaries. Sign up for OCR email updates to receive notice of new publications directly.

Federal Register (federalregister.gov). Where proposed and final rules are published. When OCR issues a proposed rule, the Federal Register contains the full text, comment period timeline, and proposed effective date. Following rulemaking from the proposed stage helps you plan for changes before they become compliance obligations.

OCR enforcement actions and resolution agreements. Published at hhs.gov/hipaa/for-professionals/compliance-enforcement/agreements. These summaries identify exactly what failures triggered enforcement, what documentation was missing, and what corrective actions OCR required. Reading them regularly is the closest practical equivalent to a map of where compliance programs actually break down.

State health regulatory agencies. For state law changes affecting privacy or breach notification, your state health department, attorney general's office, and state medical or healthcare association are the relevant sources. State changes are not announced through federal channels and require separate monitoring.

How Regulatory Changes Affect Your Program

When a significant change occurs, the response follows a consistent sequence: assess which parts of your program are affected, update relevant policies with a new effective date, determine whether the change requires retraining and conduct it before the new standard takes effect, and update your NPP if the change affects how your organization uses PHI or affects patient rights. A regulatory change addressed in your policies but not in your training or NPP leaves your program inconsistent at the point where it matters most.

Do not rely on secondary sources alone: Industry newsletters and legal alerts are useful for awareness, but they are interpretations, not authoritative guidance. When a change affects your organization, read the primary source. The original OCR guidance or Federal Register text is what your program must comply with, not a summary of it.

Part 9 of 9

You Are Not Doing This Alone

Your job is not to be the sole enforcer of every privacy obligation in your organization. It is to build and maintain the infrastructure that makes privacy compliance possible, and to ensure that the right people have the right information to carry out their responsibilities. A program run entirely by one person, without organizational backing or professional support when specific situations require it, is both unsustainable and fragile. You are the architect and the steward. You are not the only person responsible for the outcomes.

When to Involve Legal Counsel

Policy development and review benefit from legal input, particularly where regulatory language is ambiguous or state law interacts with the federal framework. Breach response at any scale with meaningful exposure warrants early legal consultation. OCR communications of any kind should involve counsel before you respond. Questions about whether a situation constitutes a violation, your organization's liability exposure, or how to handle a sensitive patient rights request are all appropriate reasons to involve an attorney. The cost of involving counsel routinely is almost always lower than the cost of handling something incorrectly and then involving counsel to address the consequences.

When to Involve Your Security Officer

Any incident involving electronic PHI, any question about access controls or system-level safeguards, any Security Rule compliance gap identified during auditing, and any retraining triggered by a Security Rule change all require coordination with your security officer. If you hold both roles, address the privacy and security dimensions separately and document both. The two programs have different regulatory foundations and different documentation requirements, and conflating them creates gaps in both.

Professional Resources for Privacy Officers

Health Care Compliance Association (hcca-info.org). The primary professional organization for healthcare compliance professionals. Offers training, certification programs including the CHPC (Certified in Healthcare Privacy Compliance), and a community of peers navigating the same challenges you are.

American Health Information Management Association (ahima.org). Focuses on health information management and privacy. Offers resources, certifications, and practice guidance relevant to privacy officers in clinical settings.

HHS Office for Civil Rights guidance library (hhs.gov/hipaa/for-professionals). Authoritative, free, and regularly updated. OCR publishes practical guidance documents, FAQ pages, and educational materials on specific privacy topics. This is the resource you return to most often over the course of your career.

State and local healthcare associations. Many state medical associations, hospital associations, and specialty societies publish privacy guidance specific to their state's legal framework. These are essential for addressing the state law layer that federal sources do not cover.

A Final Word

Every compliance program built from scratch by a new privacy officer started the same way: with someone who did not have all the answers but was methodical enough to find them, document what they learned, and build something that would hold up over time. That is what this guide was designed to help you do.

The standard you are working toward is not perfection. OCR does not expect perfection. It expects a good-faith, documented, active program that demonstrates your organization understands its obligations and is making a genuine effort to meet them. A program with gaps that is actively addressing them is in a fundamentally different position than one with the same gaps that never noticed them.

You have finished the guide. Here is what to do next, in order:

  • If you have not completed the Section 2 gap inventory, do it now. That list is your starting point for everything else.
  • Use the Tier 1 priorities from Part 3 of this section to identify your first wave of remediation. Close those gaps before anything else.
  • Set up your compliance calendar using the table in Part 5. Put the first quarterly review date on your actual calendar today.
  • Start your incident log and complaint log if they do not already exist. Both should be active before the first entry is needed.
  • Get the documents you need to close your Tier 1 and Tier 2 gaps. Our template library covers every required document referenced in this guide, built for covered entities and grounded in the CFR citations you have seen throughout.