Skip to content

Free Healthcare Template

Free HIPAA Compliance Procedure

Data handling for [system/process] with PHI rules and breach reporting

Purpose & Regulatory Basis PHI Definition & Scope Access Control Minimum Necessary Standard Audit & Monitoring Breach Identification & Reporting Workforce Training

HIPAA Compliance Procedure

Use this template to data handling for [system/process] with PHI rules and breach reporting.

Template Metadata

Field Details
Category Healthcare
Owner [Team or owner]
Version [Version number]
Effective Date [Date]
Review Cycle [Monthly / Quarterly / Annual / Event-based]
Status [Draft / In Review / Approved]

Purpose & Regulatory Basis

Cite applicable HIPAA rules (Privacy Rule, Security Rule, Breach Notification Rule) and the system or process covered.

Item Details Owner Status
[Item or requirement] [Describe the relevant detail, evidence, or decision] [Owner] [Open / Complete]
[Item or requirement] [Describe the relevant detail, evidence, or decision] [Owner] [Open / Complete]

Notes

[Add context, assumptions, exceptions, evidence links, screenshots, calculations, or reviewer comments.]

PHI Definition & Scope

Define Protected Health Information in the context of this procedure. List the 18 HIPAA identifiers relevant to the system. Specify what data elements are present.

Item Details Owner Status
[Item or requirement] [Describe the relevant detail, evidence, or decision] [Owner] [Open / Complete]
[Item or requirement] [Describe the relevant detail, evidence, or decision] [Owner] [Open / Complete]

Notes

[Add context, assumptions, exceptions, evidence links, screenshots, calculations, or reviewer comments.]

Access Control

Role-based access levels table showing each role, data access scope, and authentication requirements. Include provisioning and de-provisioning procedures.

Item Details Owner Status
[Item or requirement] [Describe the relevant detail, evidence, or decision] [Owner] [Open / Complete]
[Item or requirement] [Describe the relevant detail, evidence, or decision] [Owner] [Open / Complete]

Notes

[Add context, assumptions, exceptions, evidence links, screenshots, calculations, or reviewer comments.]

Minimum Necessary Standard

How the minimum necessary standard is enforced for this system, with examples for each user role.

Item Details Owner Status
[Item or requirement] [Describe the relevant detail, evidence, or decision] [Owner] [Open / Complete]
[Item or requirement] [Describe the relevant detail, evidence, or decision] [Owner] [Open / Complete]

Notes

[Add context, assumptions, exceptions, evidence links, screenshots, calculations, or reviewer comments.]

Audit & Monitoring

Audit log requirements, log retention period, review frequency, and automated alerting for suspicious access patterns.

Item Details Owner Status
[Item or requirement] [Describe the relevant detail, evidence, or decision] [Owner] [Open / Complete]
[Item or requirement] [Describe the relevant detail, evidence, or decision] [Owner] [Open / Complete]

Notes

[Add context, assumptions, exceptions, evidence links, screenshots, calculations, or reviewer comments.]

Breach Identification & Reporting

Breach risk assessment methodology, notification timelines (60-day rule for individuals, immediate for HHS), and breach response team contacts.

Item Details Owner Status
[Item or requirement] [Describe the relevant detail, evidence, or decision] [Owner] [Open / Complete]
[Item or requirement] [Describe the relevant detail, evidence, or decision] [Owner] [Open / Complete]

Notes

[Add context, assumptions, exceptions, evidence links, screenshots, calculations, or reviewer comments.]

Workforce Training

Required HIPAA training topics, frequency, documentation, and new hire onboarding timeline.

Item Details Owner Status
[Item or requirement] [Describe the relevant detail, evidence, or decision] [Owner] [Open / Complete]
[Item or requirement] [Describe the relevant detail, evidence, or decision] [Owner] [Open / Complete]

Notes

[Add context, assumptions, exceptions, evidence links, screenshots, calculations, or reviewer comments.]

Sanctions

Sanctions for non-compliance aligned with organizational policy. Use tables for access levels and audit requirements. Reference specific CFR sections.

Item Details Owner Status
[Item or requirement] [Describe the relevant detail, evidence, or decision] [Owner] [Open / Complete]
[Item or requirement] [Describe the relevant detail, evidence, or decision] [Owner] [Open / Complete]

Notes

[Add context, assumptions, exceptions, evidence links, screenshots, calculations, or reviewer comments.]

Review and Signoff

Document review conclusions, approvals, unresolved items, and next review date.

Role Name Date Notes
Preparer [Name] [Date] [Notes]
Reviewer [Name] [Date] [Notes]
Approver [Name] [Date] [Notes]

Template Structure

What the HIPAA Compliance Procedure Includes

Use this healthcare template as a starting point, then customize each section to match your internal workflow, evidence, and signoff needs.

1

Purpose & Regulatory Basis

Cite applicable HIPAA rules (Privacy Rule, Security Rule, Breach Notification Rule) and the system or process covered.

2

PHI Definition & Scope

Define Protected Health Information in the context of this procedure. List the 18 HIPAA identifiers relevant to the system. Specify what data elements are present.

3

Access Control

Role-based access levels table showing each role, data access scope, and authentication requirements. Include provisioning and de-provisioning procedures.

4

Minimum Necessary Standard

How the minimum necessary standard is enforced for this system, with examples for each user role.

5

Audit & Monitoring

Audit log requirements, log retention period, review frequency, and automated alerting for suspicious access patterns.

6

Breach Identification & Reporting

Breach risk assessment methodology, notification timelines (60-day rule for individuals, immediate for HHS), and breach response team contacts.

7

Workforce Training

Required HIPAA training topics, frequency, documentation, and new hire onboarding timeline.

8

Sanctions

Sanctions for non-compliance aligned with organizational policy. Use tables for access levels and audit requirements. Reference specific CFR sections.

Recommended Structure

Write a HIPAA Compliance Procedure referencing specific HIPAA regulations (45 CFR Parts 160, 162, 164). Use formal compliance language. Structure with these sections:

Purpose & Regulatory Basis

Cite applicable HIPAA rules (Privacy Rule, Security Rule, Breach Notification Rule) and the system or process covered.

PHI Definition & Scope

Define Protected Health Information in the context of this procedure. List the 18 HIPAA identifiers relevant to the system. Specify what data elements are present.

Access Control

Role-based access levels table showing each role, data access scope, and authentication requirements. Include provisioning and de-provisioning procedures.

Minimum Necessary Standard

How the minimum necessary standard is enforced for this system, with examples for each user role.

Audit & Monitoring

Audit log requirements, log retention period, review frequency, and automated alerting for suspicious access patterns.

Breach Identification & Reporting

Breach risk assessment methodology, notification timelines (60-day rule for individuals, immediate for HHS), and breach response team contacts.

Workforce Training

Required HIPAA training topics, frequency, documentation, and new hire onboarding timeline.

Sanctions

Sanctions for non-compliance aligned with organizational policy.

Use tables for access levels and audit requirements. Reference specific CFR sections.

Example Filled Template

HIPAA Compliance — Electronic Health Records Access Control

Document ID: HIPAA-AC-2026-001 | Effective: 2026-01-15 | Owner: Privacy Officer System: MedChart EHR v12.3 | Regulation: 45 CFR § 164.312 (Technical Safeguards)

Purpose & Regulatory Basis

This procedure establishes access control requirements for the MedChart Electronic Health Records system in compliance with the HIPAA Security Rule (45 CFR § 164.312(a)(1)) and the Privacy Rule's minimum necessary standard (45 CFR § 164.502(b)). It satisfies the Unique User Identification, Emergency Access, Automatic Logoff, and Encryption requirements.

PHI Definition & Scope

The MedChart EHR contains the following Protected Health Information elements: - Patient demographics (name, DOB, address, SSN, MRN) - Clinical data (diagnoses, lab results, medications, imaging reports) - Insurance and billing information (policy numbers, claim data) - Provider notes and clinical narratives

Access Control

Role Access Scope Authentication Session Timeout
Attending Physician Full chart access for assigned patients SSO + MFA (hardware token) 15 minutes
Resident/Fellow Full chart access for assigned patients; read-only for service patients SSO + MFA 15 minutes
Registered Nurse Assigned unit patients: vitals, medications, care plans, orders SSO + MFA 10 minutes
Pharmacist Medication records, allergy data, lab values (no clinical notes) SSO + MFA 15 minutes
Registration Clerk Demographics, insurance, scheduling (no clinical data) SSO + MFA 10 minutes
IT Support System administration only; no clinical data access SSO + MFA + privileged access approval 5 minutes

Provisioning: Access requests require manager approval and Privacy Office review. New accounts provisioned within 2 business days. Role assignment based on job function per HR classification.

De-provisioning: Access terminated within 4 hours of separation notice. Quarterly access review by department managers to identify orphan accounts.

Audit & Monitoring

Requirement Specification
Audit events logged Login/logout, record access, print, export, modification, failed login
Log retention 6 years (per 45 CFR § 164.530(j))
Routine review Monthly automated report; quarterly manual review by Privacy Officer
Break-the-glass alerts Real-time alert when emergency access override is used
Celebrity/VIP monitoring Proactive monitoring for high-profile patient records

Breach Identification & Reporting

  1. Discovery: Any workforce member who suspects unauthorized PHI access must report to the Privacy Officer within 24 hours
  2. Risk Assessment: Privacy Officer conducts a 4-factor risk assessment per 45 CFR § 164.402: - Nature and extent of PHI involved - Unauthorized person who accessed the PHI - Whether PHI was actually viewed or acquired - Extent of risk mitigation
  3. Individual Notification: Within 60 days of discovery for breaches affecting fewer than 500 individuals
  4. HHS Notification: Immediately for breaches affecting 500+ individuals; annual log for smaller breaches
  5. Media Notification: Required for breaches affecting 500+ residents of a single state/jurisdiction
Skip Manual Drafting

Generate a HIPAA Compliance Procedure from a Video

Record a walkthrough, training session, or process demonstration. Docsie AI turns it into structured documentation using this template as the starting framework.

Use the template manually, or let Docsie generate the first draft from source footage.

DOCX, PDF, and Markdown downloads
Works with process and training videos

Template FAQ

HIPAA Compliance Procedure FAQ

Common questions about using and generating a hIPAA Compliance Procedure.

Using This Template

Q: What is a hIPAA Compliance Procedure?

A: A hIPAA Compliance Procedure is a structured document for data handling for [system/process] with phi rules and breach reporting.

Q: Can I download this hIPAA Compliance Procedure as Word or PDF?

A: Yes. This page includes free downloads in DOCX, PDF, and Markdown formats so you can edit, share, or import the template into your documentation system.

Q: Can Docsie generate this from a video?

A: Yes. Upload a process walkthrough, training recording, or screen capture to Docsie, then use this template structure to generate a first draft automatically.