Consideration article

How to Build a HIPAA Policy Review Workflow

How to move from having written HIPAA policies to having a system that reviews, updates, and re-attests them on schedule—covering ownership, review triggers, the review cycle, and evidence requirements.

Short answer

Having written HIPAA policies is necessary but not sufficient—HIPAA requires that policies be reviewed and updated periodically, and that workforce members be notified of material changes. This guide walks through building a review process that produces the evidence a covered entity needs to demonstrate an active, maintained compliance program.

Most small clinics have written HIPAA policies. Fewer have a system for reviewing and updating those policies on schedule. And fewer still can produce evidence that workforce members were notified of changes and re-attested their understanding.

The gap between having policies and maintaining them is where most policy-related OCR findings originate. A policy written in 2020 and never revisited may have been accurate at the time. If the clinic’s technology, workforce, or operations have changed since then, the policy no longer describes how PHI is actually handled. That disconnect is a compliance problem whether or not anyone has noticed it yet.


The regulatory basis for policy review

45 CFR § 164.316 is the Security Rule’s documentation standard. It requires covered entities to:

  • Maintain written policies and procedures implementing the Security Rule’s standards
  • Maintain written records of any required action, activity, or assessment
  • Review documentation periodically, and update as needed in response to environmental or operational changes affecting the security of electronic PHI

The regulation does not define “periodically” with a fixed interval. OCR’s guidance and audit protocol treat annual review as the expected baseline, with triggered reviews whenever circumstances change in a way that affects PHI handling.

The Privacy Rule contains a parallel requirement at 45 CFR § 164.530(i), which requires covered entities to implement policies and procedures and to change them as necessary to comply with the Privacy Rule.

The practical implication is the same for both: a policy that was accurate when written but has not been reviewed as the clinic’s environment changed is a stale document. Stale policies expose the clinic to findings when investigators compare the written procedure against current practice.


Policies that require regular review

Not all clinic documents are subject to HIPAA’s policy review requirement. The following categories are:

PolicyRegulatory basisTypical review owner
Privacy policy (internal)45 CFR Part 164, Subpart EPrivacy Officer
Security policies and procedures45 CFR Part 164, Subpart CSecurity Officer
Breach Notification policy45 CFR Part 164, Subpart DPrivacy Officer
Notice of Privacy Practices (patient-facing)45 CFR § 164.520Privacy Officer
Business Associate Agreement template45 CFR § 164.308(b)Privacy Officer
Workforce sanctions policy45 CFR § 164.530(e)Privacy Officer
Device and media disposal policy45 CFR § 164.310(d)Security Officer
Workstation use policy45 CFR § 164.310(b)Security Officer
Emergency access procedure45 CFR § 164.312(a)(2)(ii)Security Officer

Notice of Privacy Practices. The NPP is the patient-facing document that describes how the clinic uses and discloses PHI. It must be revised whenever the clinic’s privacy practices change materially. The NPP posted on the clinic’s website and distributed to patients must match the clinic’s actual practices. An outdated NPP that no longer describes how PHI is handled is a regulatory gap and a patient trust issue.

BAA template. The clinic’s standard BAA template should be reviewed annually to confirm it reflects current HHS guidance on business associate obligations. BAA requirements have evolved since the HITECH amendments, and older templates may be missing provisions OCR now expects.

Sanctions policy. The sanctions policy must describe the range of disciplinary actions the clinic will take for HIPAA violations. If the clinic has modified its disciplinary procedures in the past year, the sanctions policy needs to reflect those changes.


Assigning policy ownership

Every policy needs a named owner. At a small clinic, the Privacy Officer and Security Officer are usually the same person or two people splitting a handful of roles. That is acceptable, but each policy must still have a specific named owner — not “the compliance team.”

Ownership means:

  • Initiating the review on schedule and when triggered
  • Coordinating input from affected department leads
  • Drafting or reviewing proposed changes
  • Obtaining officer sign-off
  • Overseeing workforce notification and attestation collection
  • Archiving the completed review record

Ownership does not mean the owner is the sole author or subject-matter expert. For the device disposal policy, the Security Officer may rely on input from the IT support contact or the EHR vendor. Ownership means ensuring the review happens and is documented.


Defining review triggers

Annual review is the floor. The review cycle should also define the specific events that trigger an out-of-cycle review:

Legal or regulatory change. When HHS issues new guidance, updates the audit protocol, or Congress amends HIPAA’s underlying statute, affected policies must be reviewed and updated. The Breach Notification Rule’s definition of a reportable breach, for example, has been interpreted through guidance that postdates many clinics’ original policies.

Technology change. Adopting a new EHR module, adding a patient portal, moving to cloud-based storage, or engaging a new telehealth platform changes how PHI is created, received, maintained, or transmitted. The workstation use policy, access control procedures, and potentially the Security policy itself must be reviewed when these changes occur.

Organizational change. Adding a new clinic location, hiring a remote workforce member, or restructuring administrative roles may require updates to policies that describe who is authorized to handle PHI and how.

Security incident. A security incident or near-miss often reveals a gap between written policy and actual practice. After any incident investigation, the clinic should review the policies most relevant to the incident type and update them if the investigation identified a procedural gap.


The review cycle

A policy review cycle has five steps. Each step must produce a dated record.

Step 1: Draft review

The policy owner reviews the current version of the policy against the clinic’s actual current practices. The owner notes:

  • Whether the policy still accurately describes how the clinic operates
  • Whether any regulatory guidance issued since the last review affects the policy
  • Whether any technology, vendor, or organizational changes affect the policy
  • Proposed changes, if any

This step produces a review memo or marked-up draft that documents what was considered, even if the outcome is “no changes needed.” A no-change determination still needs a dated record — it shows the review happened.

Step 2: Department input

For policies that affect specific departments — billing, clinical staff, front desk — the policy owner collects input from the relevant department lead before finalizing proposed changes. This step catches the practical gaps invisible from the compliance desk: how does the billing team actually handle PHI in transit? Does the front desk’s check-in practice match what the Privacy policy describes?

Step 3: Officer sign-off

The Privacy Officer (for Privacy Rule policies) or Security Officer (for Security Rule policies) reviews the proposed changes and formally approves the revised policy. Approval must be documented: a dated signature, an electronic approval record, or a meeting log entry that identifies the approver, the policy version, and the approval date.

Step 4: Workforce notification

When a policy changes materially, the workforce must be notified directly — not by posting an updated document to a shared drive and assuming people will find it.

Notification should:

  • Identify which policy was changed
  • Describe what changed and why (in plain language the workforce can understand)
  • State the effective date of the change
  • Tell workforce members what they are expected to do differently, if anything

Step 5: Attestation collection

After notification, each affected workforce member must attest that they received notice of the change and understand their obligations under the revised policy. For material changes, attestation is not optional — it is the evidence that workforce training on the updated policy occurred.

Attestation records must identify:

  • The workforce member’s name
  • The policy and version number they attested to
  • The date of attestation
  • The method of attestation (signature, electronic acknowledgment)

Evidence requirements for the review record

Each completed policy review cycle should produce a review record containing:

  1. What was reviewed: the policy name, current version number, and effective date of the version under review
  2. Who reviewed it: the policy owner, department leads consulted, and the approving officer
  3. When it was reviewed: the date the review was initiated and the date approval was granted
  4. What changed: a summary of changes made, or an explicit notation that no changes were needed
  5. Version control: the new version number and effective date of the revised policy
  6. Workforce notification record: the date notification was sent and the method used
  7. Attestation records: completion records showing which workforce members attested and when

These records must be retained for six years from the date of creation or last effective date, per the Security Rule’s documentation requirements.


Version control in practice

Version control means every policy document carries an unambiguous version identifier and a clear effective date, and prior versions are archived—not deleted. When OCR requests documentation of a policy as it existed during a complaint period, the clinic must be able to produce the specific version in effect at that time.

A simple version numbering convention: v1.0 for the original, v1.1 for minor updates, v2.0 for major revisions. The effective date appears on the document face and in the review record.

Prior versions are stored in the evidence archive with a notation of the date each version was superseded. The current version is clearly marked as current.


The most common failure mode

The most common policy-related compliance failure is updating the policy document without completing the review cycle. The Privacy Officer updates the Privacy policy to reflect a new disclosure category, marks it as version 2.0, posts it to the shared drive, and stops there. No workforce notification. No attestation collection. No review record.

The updated document creates a record that a change was made without producing evidence that the workforce was informed. If a workforce member later makes a disclosure inconsistent with the new policy, the clinic cannot show the training obligation was met.

Treat “attestations collected” as the done state for any policy review. That’s the only way to prevent the truncated cycle from becoming the norm.


Triggered reviews after incidents

Security incidents are one of the most important review triggers — and one of the most frequently missed at small clinics. When an incident investigation reveals that a workforce member did not know the correct procedure, or that the written procedure did not match how the system works, the clinic must review and update the relevant policy before closing the incident file.

The incident closure record should document:

  • Whether any policies were reviewed as part of the incident investigation
  • Whether any policies were updated as a result
  • The version and effective date of any updated policies
  • Whether workforce notification and re-attestation occurred

Treating policy review as part of incident closure ensures incidents drive policy improvement rather than produce only an incident log entry.

FAQ

Questions related to this topic

How often does HIPAA require policy review?

45 CFR § 164.316(b)(2)(iii) requires periodic review and update of policies. The regulation does not specify a fixed interval, but OCR guidance and the audit protocol treat annual review as the expected minimum. Review must also be triggered by changes in law, technology, or operations that affect PHI handling.

What counts as a material policy change requiring workforce re-attestation?

A material change is one that meaningfully affects what workforce members are expected to do or not do. Adding a new EHR module that changes how PHI is accessed, updating the sanctions policy to reflect a new category of violation, or revising the breach notification procedure following a regulatory change would all be material changes requiring workforce notification and re-attestation.

Who should approve updated policies at a small clinic?

The Privacy Officer approves Privacy Rule-related policies; the Security Officer approves Security Rule-related policies. At many small clinics these are the same person. The approval must be documented—a dated signature or electronic approval record—not simply assumed from the officer's general oversight role.

What is version control for HIPAA policies?

Version control means each policy document carries a version number and effective date, and prior versions are retained in the evidence archive for the six-year retention period. When a policy is updated, the old version is not deleted—it is archived with a record of when it was superseded. This preserves the historical record OCR may request in an investigation.

Can workforce attestation be collected electronically?

Yes. Electronic attestation is acceptable provided the system used creates a timestamped, attributable record showing which workforce member attested, which policy version they attested to, and when. Email acknowledgment threads and shared-document signature fields generally do not produce a reliable audit trail.

Operational assurance

Move from policy documents to a working compliance program.

PHIGuard turns these workflows into repeatable tasks, audit evidence, and role-based processes for small clinics.

No credit card required. Add billing details later if you want service to continue after the trial.