Risk Management

HIPAA Audit Checklist

An interactive internal audit tool based on OCR's official HIPAA audit protocol. Review 32 provisions across the Privacy Rule, Security Rule, and Breach Notification Rule. Mark each item, document findings, and generate a printable audit report with corrective action recommendations.

What Is a HIPAA Audit?

A HIPAA audit is a systematic examination of a healthcare organization's compliance with the Privacy Rule, Security Rule, and Breach Notification Rule. The Office for Civil Rights (OCR) conducts external audits under its HIPAA Audit Program, but organizations should also perform internal audits regularly to identify and correct gaps before OCR comes knocking.

Unlike the broader HIPAA compliance checklist, an audit checklist follows the structure of OCR's official audit protocol — examining specific regulatory provisions, evaluating evidence of compliance, and documenting findings with corrective action recommendations.

OCR Audit Protocol Structure

This tool mirrors the structure of OCR's official HIPAA audit protocol, organized into three major areas. Each audit item maps to a specific CFR provision with guidance on what evidence to collect.

Privacy Rule (10 items)

Uses and disclosures of PHI, individual rights, Notice of Privacy Practices, Privacy Officer designation.

Security Rule (16 items)

Administrative, physical, and technical safeguards for electronic PHI. Risk analysis, access controls, encryption, audit logs.

Breach Notification Rule (6 items)

Breach determination, individual and HHS notification procedures, breach logging, BA reporting requirements.

How to Use This Audit Checklist

  1. 1Enter your organization name and auditor details for the report header
  2. 2Work through each section — Privacy Rule, Security Rule, then Breach Notification
  3. 3Mark each item as Compliant (evidence verified), Finding (gap identified), or Not Reviewed
  4. 4Add notes to document evidence reviewed, observations, and corrective actions needed
  5. 5Click "Generate Report" to view identified gaps with recommended corrective actions
  6. 6Print or copy the report for your compliance documentation files

For a deeper security-focused analysis, use our HIPAA Risk Assessment Template which scores risks using the NIST SP 800-30 methodology. To track remediation timelines, our Compliance Work Plan helps organize corrective actions by month.

Most Common OCR Audit Findings

Based on OCR's published enforcement data and settlement agreements, these are the areas where healthcare organizations most frequently fall short:

1

Incomplete or missing risk analysis

45 CFR §164.308(a)(1)

The single most-cited deficiency in OCR enforcement actions. Many practices have never conducted one, or their analysis doesn't cover all ePHI systems.

2

Lack of access management

45 CFR §164.312(a)

Shared logins, over-broad access to PHI, and failure to revoke access when employees leave.

3

Missing or outdated BAAs

45 CFR §164.308(b)

Organizations fail to identify all business associates or let agreements expire without renewal.

4

Insufficient audit logging

45 CFR §164.312(b)

Systems lack audit trails, or logs are never reviewed for suspicious access patterns.

5

Denial of patient access to records

45 CFR §164.524

OCR has issued over $10M in settlements through its Right of Access Initiative since 2019.

For a complete list of enforcement examples, see our guide on most common HIPAA violations.

How Often Should You Conduct a HIPAA Audit?

At least annually

OCR expects organizations to conduct a thorough internal audit at least once per year, with documentation retained for six years.

After significant changes

New EHR system, office relocation, merger, new business associate relationships, or adoption of new technology all trigger re-evaluation.

Before regulatory deadlines

The proposed 2026 Security Rule update will require more frequent assessments. Start auditing now to identify gaps before new requirements take effect.

Enforcement reality: In the 2024-2025 audit cycle, OCR specifically focused on Security Rule provisions related to hacking and ransomware attacks. Penalties range from $145 to $73,011 per violation, with an annual maximum of $2,190,294 per violation category (2026 figures).

Related Tools & Guides