Identify and assess privacy and security risks under HIPAA Privacy Rule (45 CFR 160/164 Subpart E), Security Rule (45 CFR 164 Subpart C), and Breach Notification Rule by conducting systematic risk analyses of PHI handling practices, technical safeguards, and administrative controls. Use when performing HIPAA risk assessments, preparing for OCR audits, investigating potential breaches, evaluating new system implementations, or remediating compliance gaps.
Conduct systematic risk analysis of protected health information (PHI) handling practices across administrative, physical, and technical safeguard domains as required by the HIPAA Security Rule (45 CFR 164.308(a)(1)(ii)(A)). The Security Rule requires covered entities and business associates to conduct an accurate and thorough assessment of potential risks and vulnerabilities to the confidentiality, integrity, and availability of ePHI. This skill evaluates current controls against HIPAA requirements, identifies gaps, quantifies risk levels, and produces remediation plans aligned with OCR enforcement priorities and the NIST Cybersecurity Framework for healthcare.
| Input | Description | Format |
|---|---|---|
phi_inventory | Systems, applications, and locations where PHI is created, stored, transmitted, or disposed | Structured inventory |
current_controls | Existing administrative, physical, and technical safeguards | Structured object |
policies_procedures | HIPAA policies and procedures documentation | Document references |
workforce_data | Workforce roles, access levels, and training completion | Structured object |
incident_history | Prior privacy/security incidents and breach reports | Array of records |
business_associates | BA list with BAA status and compliance assessment dates | Structured array |
technical_environment | Network architecture, encryption status, access control systems | Structured object |
Identify all PHI touchpoints across the organization:
Data Flow Mapping:
Identify threats to PHI confidentiality, integrity, and availability:
Threat Categories:
| Category | Examples | Likelihood Assessment |
|---|---|---|
| External attacks | Ransomware, phishing, hacking, social engineering | Based on industry threat intelligence |
| Internal threats | Unauthorized access, snooping, insider theft | Based on workforce size and access controls |
| Environmental | Natural disaster, power failure, hardware failure | Based on geographic and infrastructure risk |
| Human error | Misdirected email/fax, lost devices, improper disposal | Based on incident history and training levels |
| Business associate | BA breach, unauthorized use, inadequate safeguards | Based on BA risk assessments |
Vulnerability Assessment Areas:
Evaluate existing controls against the Security Rule specification:
Administrative Safeguards (45 CFR 164.308):
| Standard | Key Requirements | Assessment |
|---|---|---|
| Risk Analysis (a)(1)(ii)(A) | Accurate, thorough risk assessment | Current/outdated/absent |
| Risk Management (a)(1)(ii)(B) | Implement measures to reduce risk | Documented plan with progress |
| Workforce Security (a)(3) | Authorization and supervision | Role-based access, termination procedures |
| Information Access (a)(4) | Access authorization policies | Minimum necessary implemented |
| Security Awareness (a)(5) | Training program | Annual training, phishing tests |
| Incident Procedures (a)(6) | Incident response plan | Documented, tested, exercised |
| Contingency Plan (a)(7) | Backup, recovery, emergency mode | Tested within 12 months |
| Evaluation (a)(8) | Periodic compliance evaluation | Scheduled and documented |
| BAA Management (b)(1) | Business associate agreements | Current for all BAs |
Physical Safeguards (45 CFR 164.310):
| Standard | Key Requirements | Assessment |
|---|---|---|
| Facility Access (a) | Access controls, visitor logs, restricted areas | Implemented/gaps |
| Workstation Use (b) | Policies for workstation use and positioning | Documented/enforced |
| Workstation Security (c) | Physical safeguards for workstations | Screen locks, privacy screens |
| Device and Media (d) | Disposal, re-use, media tracking | Documented procedures, certificates |
Technical Safeguards (45 CFR 164.312):
| Standard | Key Requirements | Assessment |
|---|---|---|
| Access Control (a) | Unique user ID, emergency access, auto-logoff, encryption | Implemented per standard |
| Audit Controls (b) | Record and examine system activity | Logging enabled, reviewed |
| Integrity (c) | Protect ePHI from improper alteration | Integrity controls in place |
| Authentication (d) | Verify person or entity identity | MFA implemented where appropriate |
| Transmission Security (e) | Encryption for ePHI in transit | TLS 1.2+, encrypted email |
Score each identified risk using likelihood and impact assessment:
Likelihood Scale:
Impact Scale:
Risk Score: Likelihood × Impact (1-25 scale)
| Risk Level | Score | Action Required |
|---|---|---|
| Critical | 20-25 | Immediate remediation required |
| High | 12-19 | Remediation within 30 days |
| Medium | 6-11 | Remediation within 90 days |
| Low | 2-5 | Address in next review cycle |
| Minimal | 1 | Accept risk with documentation |
For identified vulnerabilities, assess breach notification implications:
Develop prioritized remediation plans for identified risks:
Establish continuous compliance monitoring:
hipaa_risk_review:
assessment_date: string
scope: string
assessor: string
phi_inventory_summary:
total_systems: number
ephi_systems: number
ba_count: number
risk_summary:
total_risks_identified: number
critical: number
high: number
medium: number
low: number
findings:
- finding_id: string
category: string # administrative, physical, technical
hipaa_reference: string # 45 CFR citation
description: string
current_controls: string
gap: string
likelihood: number
impact: number
risk_score: number
risk_level: string
remediation:
action: string
responsible_party: string
deadline: string
estimated_cost: string
breach_risk_scenarios: array
remediation_plan_summary:
total_actions: number
estimated_timeline: string
estimated_budget: string
next_review_date: string
Focus assessment on areas most frequently cited in OCR enforcement actions:
| Priority Area | OCR Finding Frequency | HIPAA Reference |
|---|---|---|
| Risk analysis not conducted | Very High | 164.308(a)(1)(ii)(A) |
| Insufficient access controls | High | 164.312(a) |
| Lack of encryption | High | 164.312(a)(2)(iv) |
| Missing BAAs | High | 164.502(e) |
| Inadequate audit controls | Medium | 164.312(b) |
| Insufficient training | Medium | 164.308(a)(5) |
| No contingency plan | Medium | 164.308(a)(7) |
Example: Mid-Size Clinic HIPAA Risk Assessment