HIPAA Compliance for Small Practices
Article by
HIPAA Guidelines Editorial Team
Most HIPAA guidance is written for large health systems with dedicated compliance departments, IT security teams, and legal counsel on retainer. But the majority of healthcare in America is delivered by small practices — solo physicians, dental offices, physical therapy clinics, and community pharmacies that operate with limited staff and even more limited budgets.
This guide is written for them.
Start Here: The Risk Analysis
Everything in HIPAA compliance begins with a risk analysis. This is not optional. It is a required administrative safeguard under 45 CFR § 164.308(a)(1)(ii)(A) , and it is the single most common deficiency cited in OCR enforcement actions.
A risk analysis does not require expensive consultants. The HHS Office of the National Coordinator for Health IT provides a free Security Risk Assessment Tool that walks small practices through the process.
What to Evaluate
- Where does your practice create, receive, store, and transmit PHI?
- What systems touch ePHI? (EHR, email, scheduling software, billing systems)
- Who has access to PHI and why?
- What physical safeguards protect paper records and workstations?
- What technical safeguards protect electronic systems?
Document Your Findings
Write everything down. The analysis itself, the risks identified, the likelihood and impact of each risk, and your plan for addressing them. OCR will want to see this documentation during an investigation.
Build Your Policies and Procedures
HIPAA requires documented policies and procedures covering six key areas:
1. Privacy Policies
- Notice of Privacy Practices — given to every patient
- Policies for uses and disclosures of PHI
- Patient rights procedures (access, amendment, accounting)
- Minimum necessary standard implementation
2. Security Policies
- Access control and user management
- Workstation use and security
- Audit log review procedures
- Data backup and disaster recovery
3. Breach Response
- How to identify a potential breach
- The four-factor risk assessment
- Notification procedures and timelines
- Documentation requirements
4. Workforce Training
- Initial training for new hires
- Annual refresher training
- Security awareness updates
- Documentation of attendance
5. Business Associate Management
- Inventory of all vendors with PHI access
- Executed BAAs for each vendor
- Periodic review of vendor compliance
6. Sanction Policy
- Disciplinary procedures for workforce violations
- Progressive discipline framework
- Documentation requirements
Implement Affordable Technical Safeguards
Small practices do not need enterprise-grade security infrastructure. But they do need these basics:

Access Controls
- Unique user accounts for every employee
- Role-based access — staff should only see what they need
- Strong password requirements (12+ characters)
- Automatic screen lock after inactivity
Encryption
- Encrypt all devices that store or access PHI (laptops, phones, USB drives)
- Use encrypted email for transmitting PHI
- Ensure your EHR encrypts data at rest and in transit
Audit Controls
- Enable audit logging in your EHR
- Review logs periodically for unusual access patterns
- Document your review process
Backup
- Automated daily backups of all systems containing PHI
- Store backups in a separate, secure location
- Test backup restoration regularly
Physical Safeguards on a Budget
- Position computer screens away from patient view
- Use privacy screens on monitors in reception areas
- Lock file cabinets containing paper records
- Implement a clean desk policy
- Secure the server room or network closet
- Use a sign-in process for visitors in clinical areas
- Shred all documents containing PHI before disposal
The Most Common Mistakes Small Practices Make
Skipping the Risk Analysis
This is the number one deficiency in OCR investigations. A risk analysis is not a suggestion — it is a requirement.
No Written Policies
HIPAA compliance must be documented. Verbal policies do not count.
Sharing Login Credentials
Every user must have a unique identifier. Shared logins eliminate accountability and violate the access control requirements.
Texting PHI on Personal Devices
Standard SMS is not encrypted. Use a secure messaging platform approved by your organisation.
Ignoring Business Associates
If your billing company, IT provider, or cloud storage vendor touches PHI, you need a signed BAA.
A Realistic Timeline
Small practices can establish a baseline compliance programme in 8 to 12 weeks:
- Weeks 1–2: Complete the risk analysis
- Weeks 3–4: Draft policies and procedures (use HHS templates)
- Weeks 5–6: Implement technical and physical safeguards
- Weeks 7–8: Execute BAAs with all vendors
- Weeks 9–10: Train all workforce members
- Weeks 11–12: Review, test, and refine
Compliance Is a Process, Not a Project
HIPAA compliance is not something you finish and forget. It requires ongoing attention:
- Review and update your risk analysis annually
- Conduct regular workforce training
- Monitor audit logs
- Update policies when regulations or technology change
- Re-evaluate business associate relationships periodically
The goal is not perfection. It is reasonable diligence — demonstrating that your organisation takes its obligation to protect patient information seriously and has made a good-faith effort to comply with the rules.
Further Reading
Article by
HIPAA Guidelines Editorial TeamThe editorial team at HIPAA Guidelines researches and writes authoritative guides on HIPAA compliance, privacy regulations, and healthcare data protection.
Related Articles
What Is HIPAA?
A clear, comprehensive guide to HIPAA: what it is, who must comply, the five core rules, what counts as protected health information, and how to start your compliance journey.