HIPAA Checkup: How to Spot and Fix the 5 Biggest Compliance Gaps Now
- Soendeep Kaur

- Sep 30
- 6 min read
The business of medicine is simple: provide care, get paid. But there’s a critical layer of work that underpins it all—protecting patient data.

In the world of private practice, HIPAA compliance isn’t a one-time project; it’s a non-negotiable, continuous habit. A single, careless mistake can trigger a federal investigation, massive fines, and irreparable damage to patient trust.
The penalties are not theoretical. The Office for Civil Rights (OCR) is increasing enforcement, with fines ranging from $141 to over $71,000 per violation depending on the level of culpability—and these are per violation category, per year, often totaling millions for larger breaches [4,6]. In 2022, small medical practices received 55% of the financial penalties imposed by the OCR [8].
The question isn't whether HIPAA matters to you. The question is: are you unknowingly leaving the back door open?
Here are the five most obvious signs your practice is out of compliance and the practical steps you can take to close those gaps today.
1. The Missing Risk Analysis (The Blind Spot)
A HIPAA-compliant Security Risk Analysis (SRA) is the foundation of all your protection. It’s the process of identifying where your electronic protected health information (ePHI) lives, what threats it faces, and what you’ve done to mitigate those risks.
The Sign: No Annual, Documented SRA
If you haven’t conducted a documented risk analysis in the past 12 months, or if your last one was just a quick check of a checklist, you have a critical, primary compliance failure [4,5]. The failure to conduct an accurate and thorough risk assessment is one of the most common HIPAA Security Rule violations cited by the OCR [1,5].
What | Why | How | Impact |
Complete the SRA. | It’s the mandatory first step of the HIPAA Security Rule. It reveals vulnerabilities before a breach does. | Use the free Security Risk Assessment (SRA) Tool provided by the Office of the National Coordinator for Health Information Technology (HealthIT.gov), which is designed for small to medium-sized practices [5,9]. | You move from having a “willful neglect” vulnerability (Tier 4 fine risk) to demonstrating “reasonable efforts” (Tier 1 risk), significantly lowering your penalty exposure. |
2. No Business Associate Agreements (The Unsecured Handshake)
A Business Associate (BA) is any third-party vendor who accesses, creates, receives, or maintains PHI on your behalf. This includes your EHR vendor, billing company, shredding service, cloud storage provider, and many IT consultants.
The Sign: Sharing PHI Without a Signed BAA
If your practice transmits patient data to a third-party vendor without a written, HIPAA-compliant Business Associate Agreement (BAA) in place, you are out of compliance [1,2]. The BAA contractually obligates the vendor to safeguard the PHI, transferring some of the legal risk.
What | Why | How | Impact |
Audit and Execute BAAs. | Failure to obtain a BAA is one of the most common HIPAA violations and can lead to massive fines if a business associate causes a breach [2]. | Create a master list of all vendors who touch PHI. Request and sign a BAA with every single one before sharing any data. | You legally secure the entire chain of custody for your patient data, preventing your practice from being liable for your vendor's security failures. |
3. Insufficient Staff Training (The Human Error Trap)
Most data breaches are not caused by hackers; they are caused by human error [7]. An employee who clicks a phishing link, mis-mails a file, or discusses a patient in the elevator is the most common vulnerability in any small practice.
The Sign: Annual-Only, Undocumented, or Unfocused Training
If your staff training is a one-time, perfunctory annual video, or if you don't track which specific employees completed it and when, it is inadequate [2,3]. Impermissible use and disclosure of PHI—often the result of inadequate training—is the number one category of alleged HIPAA violations [3].
What | Why | How | Impact |
Implement Quarterly, Role-Based Training. | HIPAA requires ongoing security and privacy awareness training to mitigate the greatest risk: staff mistakes [1]. | Conduct short, focused training sessions quarterly on real-world topics (e.g., recognizing phishing, proper record disposal, the "Minimum Necessary" standard). Document every session with sign-in sheets. | You directly reduce the chance of high-frequency, low-level breaches, and you have documented proof of due diligence if the OCR investigates a violation. |
4. Unsecure Physical and Technical Practices (The Obvious Gaps)
HIPAA’s physical and technical safeguards are often common sense, yet they are frequently overlooked in the busy clinic environment. They deal with protecting both the physical paper and the electronic data from unauthorized access.
The Sign: Unencrypted Devices and Visible PHI
Do you see patient charts on the counter, computer screens visible from the waiting room, or unencrypted laptops/flash drives used for work? These are all clear, daily violations [2]. The loss of unencrypted devices has resulted in significant fines for private practices [1].
What | Why | How | Impact |
Secure All Endpoints. | Unencrypted data on lost or stolen devices (laptops, phones, flash drives) constitutes an immediate, reportable breach [1]. | Encrypt all portable computing devices. Implement automatic screen locks and strong, non-shared passwords. Re-position monitors and use privacy screens so PHI is not viewable by the public [1]. | You eliminate a high-impact breach risk and build a culture where securing PHI is a reflexive, automatic habit. |
5. Denial of Patient Access (The Right of Access Failure)
The HIPAA Privacy Rule grants patients a fundamental right to access and obtain a copy of their medical records in a timely manner. The OCR has a specific enforcement initiative targeting these violations.
The Sign: Delayed or Denied Record Requests
If your practice frequently takes longer than 30 days to fulfill a patient's request for their medical records, or if you deny access because of an outstanding patient balance, you are violating the patient’s right of access [1,7]. The OCR has issued financial penalties to practices specifically for these delays [4].
What | Why | How | Impact |
Create a 15-Day Fulfillment Policy. | You must provide access without delay and within a 30-day maximum limit (and the OCR enforces this aggressively) [1]. | Designate one staff member to manage all records requests. Set a practice-wide goal to fulfill all requests within 15 calendar days and train the staff member on the permitted cost-based fee structure. | You avoid the focus of a major OCR enforcement initiative and build patient goodwill by respecting their fundamental right to their own health information. |
Expected Outcomes
When you shift from a fear-based, reactive approach to a proactive, habit-based compliance system, you should expect:
A 90%+ Reduction in Risk: By addressing the top five pain points, you eliminate the most common causes of OCR complaints and data breaches [3].
Zero-Hassle Auditing: Your documented SRA, BAAs, and training logs become an instant, audit-ready portfolio, proving your "reasonable efforts" and lowering liability risk [4].
Increased Revenue Security: Avoidance of a single HIPAA fine (which often starts in the five figures) is a direct, measurable win for your bottom line.
Quick 3-Item HIPAA Compliance Checklist
SRA in Hand: Have you completed and documented a comprehensive Security Risk Analysis using the HealthIT.gov SRA Tool within the last 12 months? Here is a free tool to do it yourself.
BAA Master List: Do you have a physical list of all vendors that touch PHI, and is there a signed Business Associate Agreement on file for every one?
Active Safeguards: Are all work devices (laptops, servers, remote access points) encrypted, and are all staff current on quarterly, documented HIPAA training?
HIPAA compliance is not a burden; it is a business strategy. It’s the cost of doing business in a trusted profession. Make the necessary changes automatic, and the threat of a violation will disappear into the background.
Book a free 30-minute RCM checkup to identify your practice's hidden compliance risks and revenue leakage points.
Sources
CMS. "HIPAA Basics for Providers: Privacy, Security, & Breach Notification Rules." MLN Fact Sheet [1.1].
Secureframe. "HIPAA Violation Examples in 2025: 20 Common Violations With Real-World Enforcement Cases" [1.4].
The HIPAA Journal. "What is a HIPAA Violation? Updated for 2025" [1.2].
The HIPAA Journal. "HIPAA Violation Cases - Updated 2024" [4.3].
California Medical Association. "HHS releases updated HIPAA security risk assessment tool." [3.2].
HHS.gov. "Enforcement Highlights - September 2024" [4.2].
The HIPAA Journal. "Healthcare Data Breach Statistics" [4.1].
Dialog Health. "85 Insightful HIPAA Compliance Statistics: What Do The Numbers Say?" [4.4].
AAPC Knowledge Center. "Free Security Risk Assessment Tool Gets an Update." [5.4].



