Consideration article
How to Build a HIPAA Policy Review Workflow
How to move from having written HIPAA policies to having a system that reviews, updates, and re-attests them on schedule—covering ownership, review triggers, the review cycle, and evidence requirements.
Short answer
Having written HIPAA policies is necessary but not sufficient—HIPAA requires that policies be reviewed and updated periodically, and that workforce members be notified of material changes. This guide walks through building a review process that produces the evidence a covered entity needs to demonstrate an active, maintained compliance program.
Most small clinics have written HIPAA policies. Fewer have a system for reviewing and updating those policies on schedule. And fewer still can produce evidence that workforce members were notified of changes and re-attested their understanding.
The gap between having policies and maintaining them is where most policy-related OCR findings originate. A policy written in 2020 and never revisited may have been accurate at the time. If the clinic’s technology, workforce, or operations have changed since then, the policy no longer describes how PHI is actually handled. That disconnect is a compliance problem whether or not anyone has noticed it yet.
The regulatory basis for policy review
45 CFR § 164.316 is the Security Rule’s documentation standard. It requires covered entities to:
- Maintain written policies and procedures implementing the Security Rule’s standards
- Maintain written records of any required action, activity, or assessment
- Review documentation periodically, and update as needed in response to environmental or operational changes affecting the security of electronic PHI
The regulation does not define “periodically” with a fixed interval. OCR’s guidance and audit protocol treat annual review as the expected baseline, with triggered reviews whenever circumstances change in a way that affects PHI handling.
The Privacy Rule contains a parallel requirement at 45 CFR § 164.530(i), which requires covered entities to implement policies and procedures and to change them as necessary to comply with the Privacy Rule.
The practical implication is the same for both: a policy that was accurate when written but has not been reviewed as the clinic’s environment changed is a stale document. Stale policies expose the clinic to findings when investigators compare the written procedure against current practice.
Policies that require regular review
Not all clinic documents are subject to HIPAA’s policy review requirement. The following categories are:
| Policy | Regulatory basis | Typical review owner |
|---|---|---|
| Privacy policy (internal) | 45 CFR Part 164, Subpart E | Privacy Officer |
| Security policies and procedures | 45 CFR Part 164, Subpart C | Security Officer |
| Breach Notification policy | 45 CFR Part 164, Subpart D | Privacy Officer |
| Notice of Privacy Practices (patient-facing) | 45 CFR § 164.520 | Privacy Officer |
| Business Associate Agreement template | 45 CFR § 164.308(b) | Privacy Officer |
| Workforce sanctions policy | 45 CFR § 164.530(e) | Privacy Officer |
| Device and media disposal policy | 45 CFR § 164.310(d) | Security Officer |
| Workstation use policy | 45 CFR § 164.310(b) | Security Officer |
| Emergency access procedure | 45 CFR § 164.312(a)(2)(ii) | Security Officer |
Notice of Privacy Practices. The NPP is the patient-facing document that describes how the clinic uses and discloses PHI. It must be revised whenever the clinic’s privacy practices change materially. The NPP posted on the clinic’s website and distributed to patients must match the clinic’s actual practices. An outdated NPP that no longer describes how PHI is handled is a regulatory gap and a patient trust issue.
BAA template. The clinic’s standard BAA template should be reviewed annually to confirm it reflects current HHS guidance on business associate obligations. BAA requirements have evolved since the HITECH amendments, and older templates may be missing provisions OCR now expects.
Sanctions policy. The sanctions policy must describe the range of disciplinary actions the clinic will take for HIPAA violations. If the clinic has modified its disciplinary procedures in the past year, the sanctions policy needs to reflect those changes.
Assigning policy ownership
Every policy needs a named owner. At a small clinic, the Privacy Officer and Security Officer are usually the same person or two people splitting a handful of roles. That is acceptable, but each policy must still have a specific named owner — not “the compliance team.”
Ownership means:
- Initiating the review on schedule and when triggered
- Coordinating input from affected department leads
- Drafting or reviewing proposed changes
- Obtaining officer sign-off
- Overseeing workforce notification and attestation collection
- Archiving the completed review record
Ownership does not mean the owner is the sole author or subject-matter expert. For the device disposal policy, the Security Officer may rely on input from the IT support contact or the EHR vendor. Ownership means ensuring the review happens and is documented.
Defining review triggers
Annual review is the floor. The review cycle should also define the specific events that trigger an out-of-cycle review:
Legal or regulatory change. When HHS issues new guidance, updates the audit protocol, or Congress amends HIPAA’s underlying statute, affected policies must be reviewed and updated. The Breach Notification Rule’s definition of a reportable breach, for example, has been interpreted through guidance that postdates many clinics’ original policies.
Technology change. Adopting a new EHR module, adding a patient portal, moving to cloud-based storage, or engaging a new telehealth platform changes how PHI is created, received, maintained, or transmitted. The workstation use policy, access control procedures, and potentially the Security policy itself must be reviewed when these changes occur.
Organizational change. Adding a new clinic location, hiring a remote workforce member, or restructuring administrative roles may require updates to policies that describe who is authorized to handle PHI and how.
Security incident. A security incident or near-miss often reveals a gap between written policy and actual practice. After any incident investigation, the clinic should review the policies most relevant to the incident type and update them if the investigation identified a procedural gap.
The review cycle
A policy review cycle has five steps. Each step must produce a dated record.
Step 1: Draft review
The policy owner reviews the current version of the policy against the clinic’s actual current practices. The owner notes:
- Whether the policy still accurately describes how the clinic operates
- Whether any regulatory guidance issued since the last review affects the policy
- Whether any technology, vendor, or organizational changes affect the policy
- Proposed changes, if any
This step produces a review memo or marked-up draft that documents what was considered, even if the outcome is “no changes needed.” A no-change determination still needs a dated record — it shows the review happened.
Step 2: Department input
For policies that affect specific departments — billing, clinical staff, front desk — the policy owner collects input from the relevant department lead before finalizing proposed changes. This step catches the practical gaps invisible from the compliance desk: how does the billing team actually handle PHI in transit? Does the front desk’s check-in practice match what the Privacy policy describes?
Step 3: Officer sign-off
The Privacy Officer (for Privacy Rule policies) or Security Officer (for Security Rule policies) reviews the proposed changes and formally approves the revised policy. Approval must be documented: a dated signature, an electronic approval record, or a meeting log entry that identifies the approver, the policy version, and the approval date.
Step 4: Workforce notification
When a policy changes materially, the workforce must be notified directly — not by posting an updated document to a shared drive and assuming people will find it.
Notification should:
- Identify which policy was changed
- Describe what changed and why (in plain language the workforce can understand)
- State the effective date of the change
- Tell workforce members what they are expected to do differently, if anything
Step 5: Attestation collection
After notification, each affected workforce member must attest that they received notice of the change and understand their obligations under the revised policy. For material changes, attestation is not optional — it is the evidence that workforce training on the updated policy occurred.
Attestation records must identify:
- The workforce member’s name
- The policy and version number they attested to
- The date of attestation
- The method of attestation (signature, electronic acknowledgment)
Evidence requirements for the review record
Each completed policy review cycle should produce a review record containing:
- What was reviewed: the policy name, current version number, and effective date of the version under review
- Who reviewed it: the policy owner, department leads consulted, and the approving officer
- When it was reviewed: the date the review was initiated and the date approval was granted
- What changed: a summary of changes made, or an explicit notation that no changes were needed
- Version control: the new version number and effective date of the revised policy
- Workforce notification record: the date notification was sent and the method used
- Attestation records: completion records showing which workforce members attested and when
These records must be retained for six years from the date of creation or last effective date, per the Security Rule’s documentation requirements.
Version control in practice
Version control means every policy document carries an unambiguous version identifier and a clear effective date, and prior versions are archived—not deleted. When OCR requests documentation of a policy as it existed during a complaint period, the clinic must be able to produce the specific version in effect at that time.
A simple version numbering convention: v1.0 for the original, v1.1 for minor updates, v2.0 for major revisions. The effective date appears on the document face and in the review record.
Prior versions are stored in the evidence archive with a notation of the date each version was superseded. The current version is clearly marked as current.
The most common failure mode
The most common policy-related compliance failure is updating the policy document without completing the review cycle. The Privacy Officer updates the Privacy policy to reflect a new disclosure category, marks it as version 2.0, posts it to the shared drive, and stops there. No workforce notification. No attestation collection. No review record.
The updated document creates a record that a change was made without producing evidence that the workforce was informed. If a workforce member later makes a disclosure inconsistent with the new policy, the clinic cannot show the training obligation was met.
Treat “attestations collected” as the done state for any policy review. That’s the only way to prevent the truncated cycle from becoming the norm.
Triggered reviews after incidents
Security incidents are one of the most important review triggers — and one of the most frequently missed at small clinics. When an incident investigation reveals that a workforce member did not know the correct procedure, or that the written procedure did not match how the system works, the clinic must review and update the relevant policy before closing the incident file.
The incident closure record should document:
- Whether any policies were reviewed as part of the incident investigation
- Whether any policies were updated as a result
- The version and effective date of any updated policies
- Whether workforce notification and re-attestation occurred
Treating policy review as part of incident closure ensures incidents drive policy improvement rather than produce only an incident log entry.
Compliance Operations
Audit trails, access controls, policy acknowledgements, evidence handling, and vendor workflows for clinics that need defensible follow-through.
The Anti-Kickback Statute: What Clinic Owners Need to Know
Anti-kickback statute explained for small clinics: what it prohibits, what 'remuneration' covers, safe harbor regulations, and how it differs from the Stark...
California's CMIA: When State Law Is Stricter Than HIPAA
California CMIA vs HIPAA: key differences in scope, enforcement, and liability. California clinics must comply with both — the stricter standard controls.