Awareness article

What Is an Audit Trail Under HIPAA?

HIPAA requires audit controls for systems containing PHI and a compliance documentation record for the program itself. This article explains both and what clinics must actually maintain.

Short answer

An audit trail under HIPAA refers to two distinct things: system-level logs of who accessed PHI and when, and the operational compliance documentation record showing the clinic ran a functional program. Both are reviewed in OCR investigations.

Two different things get called “audit trails” in a HIPAA context, and a clinic needs both: system-level logs of who accessed PHI, and the operational compliance record showing the clinic ran a real program.

System-Level Audit Controls

The HIPAA Security Rule (45 CFR § 164.312(b)) requires covered entities to implement hardware, software, and procedural mechanisms that record and examine activity in information systems containing or using electronic PHI.

Every system that stores or processes electronic PHI — the EHR, the scheduling system, the billing system, cloud storage where scanned records live — must have mechanisms to log activity.

What a system audit log captures:

ActivityWhat the Log Records
User loginUser ID, timestamp, IP address or device
Record accessWhich patient record was accessed, by whom, at what time
Record modificationWhat was changed, when, and by which user
Record export or printWhich records were exported, by whom
Failed login attemptsUser ID, timestamp, source
Privileged actionsAdmin account changes, user creation/deletion

What Clinics Must Do with This

Most modern EHR systems generate these logs automatically. The clinic’s responsibility is to:

  1. Confirm audit logging is enabled. Some EHR systems have audit logging turned off by default or set to a limited configuration. Confirm with your vendor that logging is active.

  2. Retain the logs. System logs should be retained for the same period as compliance documentation, typically six years.

  3. Review them periodically. The requirement to “examine” activity means the clinic should have a process for periodic log review. Reviewing every entry is not required. A quarterly review focused on anomalous patterns (after-hours access, access from unfamiliar IP addresses, unusually high record volumes per user) satisfies the requirement.

  4. Act on findings. If a log review reveals unexpected access, that finding should trigger an incident investigation.

The Operational Compliance Record

Separate from system logs, the clinic must maintain a documentation record of its compliance program — sometimes called the “operational audit trail.” It shows the clinic ran a real program, not just an EHR with logging turned on.

The operational compliance record contains:

Training records. A log of every workforce member’s HIPAA training completion: who trained, when, what content was covered, and a signature or electronic attestation confirming completion. This must exist for current and departed employees, retained for six years.

Policy versions. A record of the clinic’s current privacy and security policies, plus prior versions with effective dates and any revision notes. When a policy is updated, the prior version should be retained, not destroyed.

Executed BAAs. Signed business associate agreements with every vendor who handles PHI. The clinic should maintain copies with execution dates and know where to find them quickly.

Risk analysis documentation. The written risk analysis documenting the assessment of threats and vulnerabilities, along with the corresponding risk management plan. Its absence is cited in nearly every OCR resolution agreement.

Incident log. A record of every security incident the clinic has experienced, whether or not it rose to the level of a reportable breach. Each entry should document what happened, the four-factor breach risk assessment outcome, and what action was taken.

Sanction log. Documentation of workforce sanctions applied for HIPAA policy violations. Even minor sanctions (a verbal warning, required re-training) should be recorded.

Why Immutability Matters

An audit trail is only useful as evidence if it cannot be retroactively changed. A training log in a shared spreadsheet — where any staff member can quietly edit past entries — is not audit-quality evidence. When OCR asks for training records and the clinic hands over a spreadsheet, the first follow-up question is how the clinic can show entries were never altered.

Audit-quality compliance records should be stored in a system where:

  • Entries, once created, cannot be silently modified (changes create a visible revision history, or entries are locked)
  • Access to add or modify entries is controlled (not every staff member can edit the training log)
  • The system itself has a record of who created each entry and when

Compliance platforms designed for healthcare produce records that hold up as evidence. Generic task and document tools produce records that are convenient but not audit-quality.

What OCR Asks for in Investigations

In a complaint investigation or audit, OCR requests:

  1. The covered entity’s current privacy and security policies
  2. Training records for workforce members
  3. The executed BAA with any vendor connected to the incident (if applicable)
  4. The most recent risk analysis and risk management plan
  5. Incident log entries related to the complaint period
  6. System audit logs showing PHI access during the period in question

A clinic that maintains both types of records is in a position to respond to OCR’s requests. A clinic that has one but not the other is partially exposed — and OCR will find out which half is missing.

The Practical Starting Point

For most small clinics, EHR systems handle the system audit log automatically. The gap is the operational compliance record. If your clinic doesn’t currently have a training log showing every employee’s completion history, an organized set of executed BAAs, a written risk analysis from the past two years, and an incident log — those are the priority.

The system logs from the EHR can be retrieved when needed. The operational records have to be built and maintained over time. They cannot be reconstructed after the fact.

FAQ

Questions related to this topic

Is the EHR's built-in audit log enough to satisfy HIPAA?

It satisfies the system-level audit control requirement for the EHR, provided the audit logging is enabled, the logs are retained, and there is a process for reviewing them. It does not substitute for the operational compliance record — training logs, policies, BAAs, and risk analysis — which is a separate documentation requirement.

How long must audit logs be retained?

HIPAA's record retention rule (45 CFR § 164.530(j)) requires covered entities to retain documentation required under the Privacy and Security Rules for six years from the date of creation or last effective date. This applies to compliance documentation. System audit logs should be retained for the same period under a consistent retention policy.

Do we need to review the audit logs, or just keep them?

Both. The Security Rule's audit control requirement is about implementing mechanisms to record and examine activity. 'Examine' implies review, not just storage. Clinics should have a periodic process for reviewing EHR audit logs — at minimum, reviewing for anomalous access patterns (after-hours logins, access from unexpected locations, unusually high record volumes).

What if a staff member modifies the training log after the fact?

A training log that can be freely edited by anyone is not audit-quality evidence. Compliance documentation should be stored in a system where entries are either immutable or where changes create a visible revision history. Spreadsheets shared across a team with no edit history do not meet this standard.

Operational assurance

Move from policy documents to a working compliance program.

PHIGuard turns these workflows into repeatable tasks, audit evidence, and role-based processes for small clinics.

No credit card required. Add billing details later if you want service to continue after the trial.