๐Ÿšจ CMMC Phase One started November 10! Here's everything you need to know โ†’

How to Create and Maintain Written HIPAA Policies and Procedures (164.316(b)(1)) โ€” Practical Implementation Checklist

Step-by-step guidance for creating, documenting, and maintaining HIPAA-compliant written policies and procedures to meet 164.316(b)(1) and demonstrate ongoing Compliance Framework conformance.

โ€ข
December 09, 2025
โ€ข
4 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

HIPAA 45 C.F.R. ยง164.316(b)(1) requires covered entities and business associates to have written policies and procedures and to maintain documentation of their implementation โ€” a foundational requirement for any Compliance Framework program that wants to demonstrate consistent, auditable handling of protected health information (PHI).

Understanding 164.316(b)(1) in the context of a Compliance Framework

At its core, 164.316(b)(1) means your organization must (1) develop written policies and procedures that address HIPAA requirements, (2) implement them, and (3) retain evidence that they are current and followed. In a Compliance Framework this maps directly to Program Management controls (policy creation and approval), Implementation and Operations controls (enforcement, training, technical alignment), and Evidence and Audit controls (versioning, attestations, and records retention). The rule also implies a records-retention requirement: retain documentation for six years from creation or last effective date.

Practical implementation checklist โ€” step-by-step

1) Assign ownership and define scope

Designate a HIPAA Privacy Officer and a HIPAA Security Officer (can be the same person for very small organizations) and identify policy owners for each domain (e.g., access control, incident response, data retention). For a small dental practice, the practice manager might be the Privacy Officer and the IT vendor the Security Officer; explicitly document those roles in the policy manual and include contact information and escalation paths.

2) Inventory PHI flows and map policies to processes

Create a simple data flow diagram that shows where PHI is created, stored, transmitted, and disposed. Use this to define policy coverage: minimum necessary, access control, encryption-at-rest/transit, remote access, BYOD, email/telehealth, and disposal. For a 10-provider clinic, map the EHR, practice management system, patient portal, lab interfaces, and cloud backups so each policy cites the systems and responsibilities.

3) Write clear, actionable policies and corresponding procedures

Policies should be high level and approve organizational positions; procedures must be step-by-step operational instructions. Example: Policy โ€” "Access to EHR is role-limited and provisioned upon manager approval"; Procedure โ€” "To provision EHR access: submit access request form, manager approves via e-signature, IT creates account, enables MFA, logs provisioning event." Include templates for requests, change forms, and BAA verification checklists.

4) Version control, approval, and distribution

Keep a single source of truth (Confluence, SharePoint, or a controlled document repository) with enforced versioning. Each revision should record author, approver, effective date, and reason for change. Implement an approval workflow: policy author โ†’ Security/Privacy Officer review โ†’ executive approval. Distribute with mandatory attestation for staff on initial release and after substantive changes; retain attestations as evidence.

5) Review frequency, change control, and retention

Establish a review cycle (at least annually or sooner when laws/technology change). Use change control to capture updates when new systems are introduced, a breach occurs, or OCR guidance changes. Retain policies and evidence of implementation (attestations, training records, audit logs) for six years from the last effective date to satisfy documentation requirements.

Technical details and small-business scenarios

Include specific technical requirements in procedures so implementers know what to configure: require AES-256 encryption for PHI at rest, TLS 1.2+ for PHI in transit, enforce MFA for remote access, enable detailed audit logging in the EHR and retain logs in a tamper-evident storage for at least 1 year operationally and ensure availability for forensic review (longer retention for evidence as required). For a small telehealth startup using S3, specify server-side encryption with a KMS-managed key, bucket policies that restrict access by VPC endpoint, and lifecycle rules that securely delete objects per retention policy. Document the exact configuration screenshots or CLI commands in the procedure to make audits straightforward (e.g., "Enable AWS S3 SSE-KMS with key arn:aws:kms:... and set versioning and MFA-delete").

Compliance tips, best practices, and the risk of non-implementation

Best practices: keep policies concise and role-focused, automate attestations via an LMS, use templates mapped to your Compliance Framework controls, and schedule tabletop exercises for your incident response procedure. Real-world small-business example: a 6-person counseling practice implemented a "Remote Work" procedure that required encrypted laptops, company-managed VPN, and daily backups; after a staff laptop theft the documented procedure and backup logs allowed rapid containment and full data recovery, and simplified reporting to OCR. Risks of not implementing written and maintained policies include inability to demonstrate compliance during an OCR audit, larger fines (OCR enforcement can include civil monetary penalties and corrective action plans), higher breach impact due to inconsistent practices, loss of business associate trust, and reputational damage.

Actionable next steps: create a policy register, assign owners within 30 days, draft key policies (Access Control, Incident Response, Data Retention, Business Associate Management) within 60 days, and complete attestations and technical configuration evidence within 90 days. Use simple tools that provide audit trails (GRC platforms, Confluence with restricted editing, or a Git repo for technical procedures) and keep an evidence binder that includes version history, training logs, BAAs, and log extracts.

In summary, meeting 164.316(b)(1) means more than writing documents โ€” it requires assigning clear ownership, mapping policies to real processes and systems, enforcing procedures through technical and administrative controls, preserving evidence (including attestations and audit logs) for at least six years, and embedding review/change-control into your Compliance Framework. For small businesses, pragmatism matters: prioritize the highest-risk processes, document concrete steps (with screenshots or commands), and keep proof of implementation readily accessible for audits or incident response.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? ๐Ÿ˜ƒ

Chat with Lakeridge

We typically reply within minutes