Skip to main content
RSS Feed
·9 min read

HIPAA Risk Assessment Requirements: What Your Practice Actually Needs (2026)

The risk assessment is the single most-cited deficiency in OCR enforcement actions. Not because the requirement is new — it has been in the Security Rule since 2003. Because most practices either skip it, treat it as a checkbox, or do it once and never revisit it.

The actual regulatory requirement

The HIPAA Security Rule at 45 CFR § 164.308(a)(1)(ii)(A) requires covered entities and business associates to "conduct an accurate and thorough assessment of the potential risks and vulnerabilities to the confidentiality, integrity, and availability of electronic protected health information held by the covered entity or business associate."

That is the full text of the implementation specification. It does not tell you how to do it. It does not tell you how often. It does not give you a template. This is by design — HHS wrote the Security Rule to be scalable across a two-physician clinic and a hospital system with 40,000 employees. The tradeoff is that "scalable" also means "ambiguous," and ambiguity leads to mistakes.

What OCR actually expects

OCR has published guidance (most recently updated in 2024) that fills in what the regulation leaves out. Based on that guidance and settlement agreements, a compliant risk assessment must:

How often you need to do this

The regulation says the risk assessment must be conducted "regularly." OCR has clarified through guidance and enforcement that this means at least annually and whenever there is a significant change to your environment. Significant changes include:

If your last risk assessment is from 2022 and nothing has changed since then, you are already overdue. If your last risk assessment is from 2022 and you switched EHR vendors in 2023, you are significantly overdue.

Common mistakes that lead to enforcement

OCR has imposed penalties ranging from $100,000 to over $4 million for risk assessment failures. The patterns repeat:

1. Never doing one at all

This is the most common finding in small practice investigations. The practice assumed their IT vendor "handled security" and never conducted a formal assessment. Your IT vendor may manage your firewall, but they are not conducting your HIPAA risk assessment unless you specifically hired them to do so under a documented agreement.

2. Doing a checklist instead of an assessment

A yes/no compliance checklist is not a risk assessment. A risk assessment identifies specific threats to your specific environment, evaluates how likely they are, and documents what you are doing about them. Checking a box that says "We have antivirus software" does not address whether that software is current, whether it covers all endpoints, or whether antivirus alone is sufficient for the threats you face.

3. Assessing but not remediating

Identifying risks and then putting the report in a drawer is arguably worse than not assessing at all. In the 2018 Anthem settlement ($16 million), OCR specifically cited the failure to address risks that had been identified in prior assessments. If you know about a vulnerability and do nothing, that is willful neglect under HITECH — which carries mandatory penalties.

4. Scoping too narrowly

The assessment must cover all ePHI, not just the EHR. If your front desk staff emails appointment reminders containing patient names, that email system is in scope. If physicians text each other about patients, those phones are in scope. If you use a cloud-based scheduling tool, that tool is in scope.

What to actually do

If you are a small or mid-size healthcare practice, here is a practical path forward:

  1. Inventory your ePHI. Walk through every system and process that touches patient data. Write it down.
  2. Use the HHS SRA Tool or equivalent. The free SRA Tool from HHS walks you through every Security Rule standard. It is not perfect, but it covers the bases and produces documentation OCR recognizes.
  3. Document everything. The assessment itself, your risk ratings, your remediation plan, your timeline. Store it where you can find it in three years when OCR asks.
  4. Act on the findings. Prioritize high risks. Set deadlines. Assign responsibility. Track completion.
  5. Schedule the next one. Put it on the calendar. Annual minimum.

How BlackSheep fits in

BlackSheep's HIPAA compliance platform includes a guided risk assessment that maps directly to 45 CFR § 164.308(a)(1). It walks your team through asset inventory, threat identification, risk scoring, and remediation tracking — then stores everything with timestamps and version history so you have an audit trail when you need one.

It does not replace your judgment about your own environment. It gives you structure so you are not starting from a blank page every year.

Stop guessing whether your risk assessment is compliant.

Start your risk assessment with BlackSheep

Free download: SEC Reg S-P compliance checklist

27-point checklist covering every Reg S-P requirement. Know exactly where your firm stands before the June 2026 deadline.

No spam. Unsubscribe anytime.