
Compliance & Security
How can we help you?

Understanding HIPAA Requirements
The Health Insurance Portability and Accountability Act (HIPAA) establishes the national framework for protecting sensitive patient health information. WithinEHR maintains comprehensive compliance with both the HIPAA Privacy Rule and Security Rule, ensuring that electronic protected health information (ePHI) remains confidential, integral, and accessible only to authorized parties.
HIPAA Compliance Checklist
Achieving and maintaining HIPAA compliance requires ongoing attention across multiple domains. Use this comprehensive checklist to assess your compliance posture and identify areas requiring attention.
Designate compliance oversight personnel.
Every covered entity must assign responsibility for HIPAA compliance to specific individuals. Smaller practices may consolidate the Privacy Officer and Security Officer roles into a single position, while larger organizations typically separate these functions. Document these assignments formally and ensure designated individuals have adequate authority and resources to fulfill their responsibilities.
Establish a compliance committee or review process.
For organizations with multiple departments or locations, create a structured approach to compliance oversight that includes regular meetings, documented decisions, and clear escalation pathways for identified issues.
Document organizational structure and PHI data flows.
Map how protected health information moves through your organization, identifying all systems, personnel, and business associates who interact with PHI. This documentation forms the foundation for risk assessment and policy development.
Develop comprehensive written policies.
Create policies addressing PHI access, disclosure, storage, transmission, and disposal. Policies should cover routine operations as well as exceptional circumstances such as emergencies, law enforcement requests, and research activities. Review and update policies at least annually or whenever significant operational changes occur.
Create and distribute a Notice of Privacy Practices.
This document must clearly explain how your organization uses and discloses PHI, patient rights regarding their information, and how individuals can exercise those rights or file complaints. Provide this notice to all patients and post it prominently in your facility and on your website.
Maintain authorization and consent forms.
Develop standardized forms for patients to authorize disclosure of their PHI beyond permitted uses. These forms must include specific required elements and provide meaningful choice to patients about how their information is shared.
Establish record request and amendment procedures.
Document clear processes for patients to access their records, request corrections, and obtain an accounting of disclosures. Ensure staff understand these procedures and can guide patients through them efficiently.
Conduct comprehensive risk assessments.
Perform thorough evaluations of potential vulnerabilities to PHI at least annually. Assessments should examine administrative, physical, and technical safeguards, identifying threats, vulnerabilities, and the likelihood and impact of potential breaches. Document findings and remediation plans.
Implement a risk management program.
Based on assessment findings, develop and execute plans to address identified risks. Prioritize remediation efforts based on risk severity and available resources, and track progress toward completion of corrective actions.
Perform ongoing security monitoring.
Establish continuous monitoring processes to detect new vulnerabilities, configuration changes, and potential security incidents before they result in breaches.
Provide initial and ongoing HIPAA training.
All workforce members who access PHI must receive training on HIPAA requirements and organizational policies before being granted system access. Conduct refresher training at least annually and whenever significant policy changes occur.
Implement workforce sanctions policies.
Document consequences for HIPAA violations and ensure consistent enforcement. Sanctions should be proportionate to the severity of violations and applied regardless of position within the organization.
Manage workforce access appropriately.
Implement procedures for granting, modifying, and terminating access to PHI based on job responsibilities. Review access levels periodically and promptly revoke access when workforce members change roles or leave the organization.
Deploy strong authentication controls.
Require unique user identifiers for all system access and implement multi-factor authentication for remote access and privileged accounts. Establish password policies requiring complexity, regular changes, and prohibition of password sharing.
Encrypt PHI at rest and in transit.
Utilize current encryption standards for stored data and all network transmissions containing PHI. WithinEHR employs AES-256 encryption for storage and TLS 1.3 for data transmission.
Implement automatic session controls.
Configure systems to automatically log off users after periods of inactivity and require re-authentication to resume sessions.
Maintain comprehensive audit trails.
Enable logging of all access to and actions upon PHI, including who accessed information, when, and what actions were taken. Retain logs for a minimum of six years and review them regularly for suspicious activity.
Establish backup and recovery procedures.
Implement regular data backup processes and test recovery procedures to ensure PHI remains available in the event of system failures, natural disasters, or security incidents.
Control facility access.
Implement policies and procedures limiting physical access to areas where PHI is stored or accessible. Use appropriate controls such as key cards, visitor logs, and escort requirements for non-employees.
Secure workstations and devices.
Position workstations to prevent unauthorized viewing of screens, implement automatic screen locks, and establish policies for securing portable devices and removable media containing PHI.
Address device disposal and reuse.
Before disposing of or repurposing equipment that stored PHI, ensure all data is irretrievably destroyed using appropriate methods such as secure wiping or physical destruction.
Identify all business associates.
Document all third parties who create, receive, maintain, or transmit PHI on your behalf. This includes EHR vendors, billing services, cloud storage providers, shredding companies, and consultants with PHI access.
Execute Business Associate Agreements.
Before sharing PHI, obtain signed BAAs that clearly define permitted uses, required safeguards, breach notification obligations, and termination procedures. WithinEHR provides comprehensive BAAs to all covered entity clients.
Monitor business associate compliance.
Periodically verify that business associates maintain appropriate safeguards. Request evidence of security assessments, certifications, or audit reports as appropriate to the nature and sensitivity of shared PHI.
Develop an incident response plan.
Create documented procedures for identifying, containing, investigating, and reporting potential breaches. Assign specific roles and responsibilities and ensure key personnel are trained on response procedures.
Establish breach notification protocols.
Document processes for notifying affected individuals, HHS, and media (when required) without unreasonable delay and in no case later than 60 calendar days from discovery under current HIPAA rules. Many organizations adopt internal targets of 30 days or less to align with state breach laws and best practices.
Conduct post-incident analysis.
After any security incident or near-miss, perform a thorough review to identify root causes and implement measures to prevent recurrence.
Stay current with regulatory changes.
Monitor HHS announcements, regulatory updates, and industry guidance for changes affecting HIPAA compliance obligations. WithinEHR provides regular compliance updates to help clients stay informed.
Perform periodic compliance audits.
Conduct internal audits at least annually to verify policies are being followed and controls are operating effectively. Consider engaging external auditors periodically for independent assessment.
Document everything.
Maintain records of all compliance activities including training, risk assessments, policy reviews, incidents, and corrective actions. HIPAA requires retention of compliance documentation for at least six years.
Our Three-Layered Safeguard Approach
Comprehensive protection through administrative, technical, and physical safeguards

WithinEHR implements robust administrative controls, including designated security officials, training programs, and documented policies, to manage and protect patient data.
Our technical infrastructure employs encryption, unique user identifiers, automatic logoff features, audit trail capabilities, and multi-factor authentication to ensure data security.
WithinEHR's physical security measures for data centers include 24/7 monitoring, biometric access controls, and redundant systems to protect data from physical threats.
Audit Trails and Monitoring
Comprehensive logging across three critical levels for complete visibility

Captures login attempts, access patterns, and system modifications to detect unauthorized activity.
Records all user actions within the EHR, including creating, reading, updating, and deleting patient records.
Tracks individual user activities and commands to ensure accountability and facilitate compliance reviews.

Business Associate Agreements
As your EHR vendor, WithinEHR functions as a business associate under HIPAA regulations. We enter into comprehensive Business Associate Agreements (BAAs) with all covered entities, clearly delineating our responsibilities for protecting PHI and our obligations in the event of a breach, including protocols for breach notification.
2025 Compliance Updates
WithinEHR stays ahead of regulatory changes, actively monitoring proposed rulemaking from HHS/OCR, including changes to patient access timeframes and HIPAA Security Rule modernization (encryption, multi-factor authentication). Our platform is designed to seamlessly adapt when these rules are finalized.

Looking for more guidance?
Explore our full range of support resources to maximize your WithinEHR experience.
Visit the help center