25% off all training courses Offer ends May 29, 2026
View HIPAA Courses
25% off all training courses
View HIPAA Courses
Offer ends May 29, 2026

The HIPAA Journal is the leading provider of HIPAA training, news, regulatory updates, and independent compliance advice.

HIPAA Compliance for Practice Managers

Practice managers occupy one of the most compliance-exposed positions in a healthcare organization because they are responsible for both the structural integrity of the HIPAA program and the accuracy of its daily execution across every function the practice performs. The HIPAA Privacy Rule, HIPAA Security Rule, and HIPAA Breach Notification Rule impose obligations that run through hiring, onboarding, vendor contracting, patient interactions, IT system management, and incident response, all of which fall within the practice manager’s operational scope. A practice manager who understands these obligations at a working level, rather than relying on policy documents alone, is the single most effective compliance control a small or mid-sized practice has.

Building and Maintaining the HIPAA Compliance Program

Assigning Compliance Roles
The HIPAA Privacy Rule requires every HIPAA Covered Entity to designate a HIPAA Privacy Officer responsible for developing and implementing privacy policies and procedures. The Rule also requires the designation of a point of contact for patients who have questions about the practice’s privacy practices or who wish to exercise their HIPAA rights or submit a complaint. In most small practices, both functions are assigned to the practice manager.
The HIPAA Security Rule separately requires the designation of a HIPAA Security Officer responsible for security policies, the HIPAA Security Risk Analysis, and the security awareness training program. HIPAA permits one individual to hold both roles, but each carries distinct obligations and operational accountability during an HHS Office for Civil Rights investigation. Practice managers who hold both designations without adequate training or documentation support carry disproportionate organizational risk.

In small medical practices, the roles of HIPAA Privacy Officer and HIPAA Security Officer will often both be assigned to the practice manager.

Developing Policies That Reflect Practice Operations

HIPAA requires written policies and procedures that address each applicable standard and implementation specification under the HIPAA Privacy Rule and HIPAA Security Rule. Generic, templated policies that do not reflect how the practice actually operates provide limited protection during a regulatory review and may be treated as evidence that the compliance program exists on paper only.
Practice managers must ensure that policies describe real workflows, real staff responsibilities, and real system configurations. Policies must be reviewed and updated when the practice changes its technology, modifies its service delivery model, responds to new regulatory guidance, or experiences a breach that reveals a procedural gap. All policy documents must be retained for a minimum of six years from the date of creation or the date they were last in effect.

Get The FREE
HIPAA Compliance Checklist

Immediate Delivery of Checklist Link To Your Email Address

Please Enter Correct Email Address

Your Privacy Respected

HIPAA Journal Privacy Policy

Scheduling and Documenting Workforce Training

The HIPAA Privacy Rule requires new workforce members to receive HIPAA training within a reasonable period after joining the practice and whenever material changes to policies or procedures affect their role. The HIPAA Security Rule requires an ongoing security awareness and training program for every member of the workforce, including staff who do not handle patient records directly.
Practice managers must integrate HIPAA training into onboarding, schedule regular security awareness training, and ensure that updated training is delivered whenever policies or procedures change.
Training records must document who completed training, what the training covered, and when completion occurred. Annual privacy training and quarterly security training is the accepted standard across the healthcare sector, and practices that cannot produce training records during an audit or compliance investigation face enforcement exposure regardless of whether a breach has occurred.
Conducting and Acting on the Security Risk Analysis
The HIPAA Security Rule requires Covered Entities to perform an accurate and thorough assessment of the risks and vulnerabilities to electronic Protected Health Information across the practice’s systems, devices, and operational environment. The HIPAA Security Risk Analysis (SRA) is not a one-time obligation. It must be reviewed and updated whenever the practice introduces new technology, changes its network configuration, expands to a new location, or modifies workflows in ways that affect how electronic Protected Health Information is created, accessed, or transmitted.
The SRA must inform a documented risk management plan that tracks how each identified vulnerability is being addressed. The HHS Office for Civil Rights identifies an incomplete or absent Security Risk Analysis as one of the most common deficiencies in investigated breaches, and it is typically the first document requested when an audit or compliance investigation is opened.

Day-to-Day HIPAA Compliance Across Practice Operations

Limiting Access to Protected Health Information
Access control is governed primarily by the HIPAA Security Rule’s Administrative and Technical Safeguards, which require practices to authorize access based on job responsibilities, assign unique user IDs, and restrict system access to authorized users. The Minimum Necessary Standard under the HIPAA Privacy Rule reinforces the principle that staff should access only the information needed to perform their duties, but the HIPAA Security Rule establishes the actual permission requirements.
Practice managers must ensure that system permissions match real job functions and must review those permissions regularly. Responsibilities shift informally in small practices, and outdated access accumulates quickly. Access must be modified when roles change and revoked immediately when a staff member leaves the practice. All access changes must be documented, including those attributable to terminations.
Responding to Patient Rights Requests
Under the HIPAA Privacy Rule, patients have the right to access their records, request corrections, and obtain an accounting of certain disclosures. Practice managers must maintain documented procedures for handling each type of request and ensure that designated staff understand how to apply them, when not directly handling patient access requests themselves.
Access requests must be fulfilled within 30 days, with one 30‑day extension available if the patient is notified in writing before the original deadline. Amendment requests must be accepted or denied in writing, following specific procedural requirements. Practices that handle these requests informally, without documentation or defined timelines, are frequently cited in patient complaints filed with the HHS Office for Civil Rights, and those complaints often trigger broader compliance reviews. State law may impose shorter timelines, and practice managers must account for those requirements as well.
Managing IT System Security Across the Workforce
The HIPAA Security Rule requires practice managers to ensure that the administrative, physical, and technical safeguards protecting electronic Protected Health Information (ePHI) are functioning in day‑to‑day operations, even when IT services are outsourced. In small practices, the most common failures occur not in advanced cybersecurity controls but in basic physical and configuration‑level safeguards that fall squarely within the practice manager’s oversight.
Physical safeguards are the foundation of system security. Workstations must be positioned to prevent unauthorized viewing, especially in reception areas, hallways, and shared clinical spaces. Screens must lock automatically when unattended, and staff must be trained to prevent “shoulder surfing” and unauthorized observation. Portable devices that store or access ePHI must be subject to documented handling procedures, including secure storage, transport, and disposal. Server rooms, networking equipment, and backup media must be kept in controlled areas with restricted access.
Administrative safeguards require the practice to assign unique user identifiers, maintain role‑based access permissions, and ensure that system activity can be traced to individual users. Practice managers must verify that user accounts are created, modified, and terminated according to documented procedures, and that access rights reflect actual job responsibilities. Shared login credentials remain one of the most frequently cited failures in healthcare investigations because they undermine auditability and make it impossible to determine who accessed what information.
Technical safeguards depend heavily on correct system configuration. Practice managers must ensure that audit logging is enabled on all systems that create, receive, maintain, or transmit ePHI, and that logs are retained for an appropriate period. Automatic logoff settings must be configured to activate after a reasonable period of inactivity. Remote access tools, email systems, and practice management platforms must be configured to use secure connections, and any system that stores ePHI must be set up according to the vendor’s security recommendations. Even when an IT vendor performs the technical work, the practice manager is responsible for confirming that configurations align with the practice’s risk analysis and documented policies.
The Security Rule does not require practice managers to be cybersecurity experts, but it does require them to ensure that the safeguards the practice relies on are in place, configured correctly, and functioning. Many breaches in small practices stem from preventable issues that fall within the practice manager’s operational oversight.
Contracting with Vendors and Managing Business Associate Agreements
Any third party that creates, receives, maintains, or transmits Protected Health Information while providing services to the practice must sign a Business Associate Agreement before work begins and before any Protected Health Information is shared. Practice managers are responsible for identifying which vendors require an agreement, executing those agreements in advance of service delivery, and retaining signed copies for the duration of the relationship and for six years after it ends.
A breach involving a vendor that operates without a current Business Associate Agreement exposes the practice to enforcement action regardless of where the fault lies. Agreements must be reviewed when a vendor’s scope of services changes, when the practice renews its contracts, and whenever updated regulatory requirements affect the terms that Business Associate Agreements must contain.
Identifying and Managing Potential HIPAA Breaches
The HIPAA Breach Notification Rule requires Covered Entities to notify affected individuals and the HHS Office for Civil Rights following a breach of unsecured Protected Health Information, with individual notifications due within 60 days of discovery. Practice managers are typically the first point of escalation when a staff member reports a potential incident, and the quality of the response in those early hours directly affects the practice’s regulatory position.
Every reported incident must be documented, investigated, and assessed against the four-factor harm analysis the HIPAA Breach Notification Rule prescribes. Incidents that do not meet the definition of a breach must still be documented, along with the reasoning that supports that determination, because that documentation is subject to audit. Practice managers must ensure that staff understand both how to recognize a potential breach and how to report it internally without delay, because unreported incidents that surface later are treated by regulators as evidence of a compliance failure.

HIPAA Software and Training Tools for Practice Managers

Practice managers overseeing compliance programs benefit from HIPAA compliance software that consolidates policy generation, Security Risk Analysis, Business Associate Agreement management, and workforce training documentation into a single platform. Purpose-built HIPAA compliance software generates policies based on the practice’s specific operational profile rather than generic templates, guides managers through a tailored Security Risk Analysis, automates Business Associate Agreement renewal reminders, and tracks workforce training completion in real time. These capabilities reduce the manual administration burden and ensure that the documentation practice managers need to demonstrate compliance is organized, current, and accessible when regulators ask for it.
For workforce training, The HIPAA Journal’s HIPAA Training for Small Medical Practice Employees provides scenario-based instruction on the HIPAA Privacy Rule, HIPAA Security Rule, and HIPAA Breach Notification Rule, with lesson-level assessments and an administration dashboard that gives practice managers visibility into completion status across the entire workforce. For security awareness training obligations, The HIPAA Journal’s Cybersecurity Training for Healthcare Employees addresses the specific threat patterns that drive healthcare data breaches and is available alongside the HIPAA training course at a combined discount, providing a single integrated program that satisfies both training obligations.

Author: Steve Alder is the editor-in-chief of The HIPAA Journal. Steve is responsible for editorial policy regarding the topics covered in The HIPAA Journal. He is a specialist on healthcare industry legal and regulatory affairs, and has 10 years of experience writing about HIPAA and other related legal topics. Steve has developed a deep understanding of regulatory issues surrounding the use of information technology in the healthcare industry and has written hundreds of articles on HIPAA-related topics. Steve shapes the editorial policy of The HIPAA Journal, ensuring its comprehensive coverage of critical topics. Steve Alder is considered an authority in the healthcare industry on HIPAA. The HIPAA Journal has evolved into the leading independent authority on HIPAA under Steve’s editorial leadership. Steve manages a team of writers and is responsible for the factual and legal accuracy of all content published on The HIPAA Journal. Steve holds a Bachelor’s of Science degree from the University of Liverpool. You can connect with Steve via LinkedIn or email via stevealder(at)hipaajournal.com

x

Is Your Organization HIPAA Compliant?

Find Out With Our Free HIPAA Compliance Checklist

Get Free Checklist