Purpose & Regulatory Basis
Cite applicable HIPAA rules (Privacy Rule, Security Rule, Breach Notification Rule) and the system or process covered.
Free Healthcare Template
Data handling for [system/process] with PHI rules and breach reporting
Use this template to data handling for [system/process] with PHI rules and breach reporting.
| Field | Details |
|---|---|
| Category | Healthcare |
| Owner | [Team or owner] |
| Version | [Version number] |
| Effective Date | [Date] |
| Review Cycle | [Monthly / Quarterly / Annual / Event-based] |
| Status | [Draft / In Review / Approved] |
Cite applicable HIPAA rules (Privacy Rule, Security Rule, Breach Notification Rule) and the system or process covered.
| Item | Details | Owner | Status |
|---|---|---|---|
| [Item or requirement] | [Describe the relevant detail, evidence, or decision] | [Owner] | [Open / Complete] |
| [Item or requirement] | [Describe the relevant detail, evidence, or decision] | [Owner] | [Open / Complete] |
[Add context, assumptions, exceptions, evidence links, screenshots, calculations, or reviewer comments.]
Define Protected Health Information in the context of this procedure. List the 18 HIPAA identifiers relevant to the system. Specify what data elements are present.
| Item | Details | Owner | Status |
|---|---|---|---|
| [Item or requirement] | [Describe the relevant detail, evidence, or decision] | [Owner] | [Open / Complete] |
| [Item or requirement] | [Describe the relevant detail, evidence, or decision] | [Owner] | [Open / Complete] |
[Add context, assumptions, exceptions, evidence links, screenshots, calculations, or reviewer comments.]
Role-based access levels table showing each role, data access scope, and authentication requirements. Include provisioning and de-provisioning procedures.
| Item | Details | Owner | Status |
|---|---|---|---|
| [Item or requirement] | [Describe the relevant detail, evidence, or decision] | [Owner] | [Open / Complete] |
| [Item or requirement] | [Describe the relevant detail, evidence, or decision] | [Owner] | [Open / Complete] |
[Add context, assumptions, exceptions, evidence links, screenshots, calculations, or reviewer comments.]
How the minimum necessary standard is enforced for this system, with examples for each user role.
| Item | Details | Owner | Status |
|---|---|---|---|
| [Item or requirement] | [Describe the relevant detail, evidence, or decision] | [Owner] | [Open / Complete] |
| [Item or requirement] | [Describe the relevant detail, evidence, or decision] | [Owner] | [Open / Complete] |
[Add context, assumptions, exceptions, evidence links, screenshots, calculations, or reviewer comments.]
Audit log requirements, log retention period, review frequency, and automated alerting for suspicious access patterns.
| Item | Details | Owner | Status |
|---|---|---|---|
| [Item or requirement] | [Describe the relevant detail, evidence, or decision] | [Owner] | [Open / Complete] |
| [Item or requirement] | [Describe the relevant detail, evidence, or decision] | [Owner] | [Open / Complete] |
[Add context, assumptions, exceptions, evidence links, screenshots, calculations, or reviewer comments.]
Breach risk assessment methodology, notification timelines (60-day rule for individuals, immediate for HHS), and breach response team contacts.
| Item | Details | Owner | Status |
|---|---|---|---|
| [Item or requirement] | [Describe the relevant detail, evidence, or decision] | [Owner] | [Open / Complete] |
| [Item or requirement] | [Describe the relevant detail, evidence, or decision] | [Owner] | [Open / Complete] |
[Add context, assumptions, exceptions, evidence links, screenshots, calculations, or reviewer comments.]
Required HIPAA training topics, frequency, documentation, and new hire onboarding timeline.
| Item | Details | Owner | Status |
|---|---|---|---|
| [Item or requirement] | [Describe the relevant detail, evidence, or decision] | [Owner] | [Open / Complete] |
| [Item or requirement] | [Describe the relevant detail, evidence, or decision] | [Owner] | [Open / Complete] |
[Add context, assumptions, exceptions, evidence links, screenshots, calculations, or reviewer comments.]
Sanctions for non-compliance aligned with organizational policy. Use tables for access levels and audit requirements. Reference specific CFR sections.
| Item | Details | Owner | Status |
|---|---|---|---|
| [Item or requirement] | [Describe the relevant detail, evidence, or decision] | [Owner] | [Open / Complete] |
| [Item or requirement] | [Describe the relevant detail, evidence, or decision] | [Owner] | [Open / Complete] |
[Add context, assumptions, exceptions, evidence links, screenshots, calculations, or reviewer comments.]
Document review conclusions, approvals, unresolved items, and next review date.
| Role | Name | Date | Notes |
|---|---|---|---|
| Preparer | [Name] | [Date] | [Notes] |
| Reviewer | [Name] | [Date] | [Notes] |
| Approver | [Name] | [Date] | [Notes] |
Template Structure
Use this healthcare template as a starting point, then customize each section to match your internal workflow, evidence, and signoff needs.
Cite applicable HIPAA rules (Privacy Rule, Security Rule, Breach Notification Rule) and the system or process covered.
Define Protected Health Information in the context of this procedure. List the 18 HIPAA identifiers relevant to the system. Specify what data elements are present.
Role-based access levels table showing each role, data access scope, and authentication requirements. Include provisioning and de-provisioning procedures.
How the minimum necessary standard is enforced for this system, with examples for each user role.
Audit log requirements, log retention period, review frequency, and automated alerting for suspicious access patterns.
Breach risk assessment methodology, notification timelines (60-day rule for individuals, immediate for HHS), and breach response team contacts.
Required HIPAA training topics, frequency, documentation, and new hire onboarding timeline.
Sanctions for non-compliance aligned with organizational policy. Use tables for access levels and audit requirements. Reference specific CFR sections.
Write a HIPAA Compliance Procedure referencing specific HIPAA regulations (45 CFR Parts 160, 162, 164). Use formal compliance language. Structure with these sections:
Cite applicable HIPAA rules (Privacy Rule, Security Rule, Breach Notification Rule) and the system or process covered.
Define Protected Health Information in the context of this procedure. List the 18 HIPAA identifiers relevant to the system. Specify what data elements are present.
Role-based access levels table showing each role, data access scope, and authentication requirements. Include provisioning and de-provisioning procedures.
How the minimum necessary standard is enforced for this system, with examples for each user role.
Audit log requirements, log retention period, review frequency, and automated alerting for suspicious access patterns.
Breach risk assessment methodology, notification timelines (60-day rule for individuals, immediate for HHS), and breach response team contacts.
Required HIPAA training topics, frequency, documentation, and new hire onboarding timeline.
Sanctions for non-compliance aligned with organizational policy.
Use tables for access levels and audit requirements. Reference specific CFR sections.
Document ID: HIPAA-AC-2026-001 | Effective: 2026-01-15 | Owner: Privacy Officer System: MedChart EHR v12.3 | Regulation: 45 CFR § 164.312 (Technical Safeguards)
This procedure establishes access control requirements for the MedChart Electronic Health Records system in compliance with the HIPAA Security Rule (45 CFR § 164.312(a)(1)) and the Privacy Rule's minimum necessary standard (45 CFR § 164.502(b)). It satisfies the Unique User Identification, Emergency Access, Automatic Logoff, and Encryption requirements.
The MedChart EHR contains the following Protected Health Information elements: - Patient demographics (name, DOB, address, SSN, MRN) - Clinical data (diagnoses, lab results, medications, imaging reports) - Insurance and billing information (policy numbers, claim data) - Provider notes and clinical narratives
| Role | Access Scope | Authentication | Session Timeout |
|---|---|---|---|
| Attending Physician | Full chart access for assigned patients | SSO + MFA (hardware token) | 15 minutes |
| Resident/Fellow | Full chart access for assigned patients; read-only for service patients | SSO + MFA | 15 minutes |
| Registered Nurse | Assigned unit patients: vitals, medications, care plans, orders | SSO + MFA | 10 minutes |
| Pharmacist | Medication records, allergy data, lab values (no clinical notes) | SSO + MFA | 15 minutes |
| Registration Clerk | Demographics, insurance, scheduling (no clinical data) | SSO + MFA | 10 minutes |
| IT Support | System administration only; no clinical data access | SSO + MFA + privileged access approval | 5 minutes |
Provisioning: Access requests require manager approval and Privacy Office review. New accounts provisioned within 2 business days. Role assignment based on job function per HR classification.
De-provisioning: Access terminated within 4 hours of separation notice. Quarterly access review by department managers to identify orphan accounts.
| Requirement | Specification |
|---|---|
| Audit events logged | Login/logout, record access, print, export, modification, failed login |
| Log retention | 6 years (per 45 CFR § 164.530(j)) |
| Routine review | Monthly automated report; quarterly manual review by Privacy Officer |
| Break-the-glass alerts | Real-time alert when emergency access override is used |
| Celebrity/VIP monitoring | Proactive monitoring for high-profile patient records |
Record a walkthrough, training session, or process demonstration. Docsie AI turns it into structured documentation using this template as the starting framework.
Use the template manually, or let Docsie generate the first draft from source footage.
Study protocol for [trial/procedure] with endpoints and assessments
Prevention procedures for [pathogen/setting] with screening and isolation precautions
Testing procedure for [assay/test] with specimen requirements and QC protocols
Operating instructions for [device] with setup, alarms, and troubleshooting
Care procedure for [condition/treatment] with milestones and discharge criteria
Compounding process for [medication] with ingredients, equipment, and QC checks
Template FAQ
Common questions about using and generating a hIPAA Compliance Procedure.
Q: What is a hIPAA Compliance Procedure?
A: A hIPAA Compliance Procedure is a structured document for data handling for [system/process] with phi rules and breach reporting.
Q: Can I download this hIPAA Compliance Procedure as Word or PDF?
A: Yes. This page includes free downloads in DOCX, PDF, and Markdown formats so you can edit, share, or import the template into your documentation system.
Q: Can Docsie generate this from a video?
A: Yes. Upload a process walkthrough, training recording, or screen capture to Docsie, then use this template structure to generate a first draft automatically.