What HIPAA Auditors Actually Look For (And How to Pass)
Most practices donât fail HIPAA audits because they donât care about compliance. They fail because they donât know what auditors actually look for until itâs too late.
Iâve seen practices with expensive compliance software still get dinged. Iâve seen tiny offices sail through audits because they had the basics locked down. The difference? Understanding what matters and what doesnât.
Hereâs what auditors actually examine â and how to make sure you pass.
The Audit Isnât a Surprise Test
HIPAA audits follow a pattern. The Office for Civil Rights (OCR) uses a protocol that covers specific areas, and they publish it. You can literally read the audit protocol before you get audited. Yet most practices never look at it.
The protocol covers three main rule sets:
- Privacy Rule â How you handle PHI access, minimum necessary standards, and patient rights
- Security Rule â Administrative, physical, and technical safeguards for electronic PHI
- Breach Notification Rule â How you detect, report, and respond to breaches
Each area has specific âkey activitiesâ auditors evaluate. Thatâs your checklist. Use it.
What Auditors Actually Examine
1. Risk Assessments
This is the number one finding in HIPAA audits. Not having a current, comprehensive risk assessment.
An auditor wants to see:
- A written risk analysis covering all systems that touch ePHI
- Identification of threats and vulnerabilities
- An assessment of the likelihood and potential impact of each risk
- A documented plan to address each identified risk
- Evidence the plan is being executed
Most practices either have no risk assessment, one thatâs years old, or one thatâs so generic itâs useless. Your risk assessment needs to be specific to your practice, your systems, and your workflows.
2. Policies and Procedures
Auditors donât just want to see policies exist. They want to see policies that match what you actually do.
Key policies auditors examine:
- Access management and user authentication
- Workforce training requirements
- Incident response procedures
- Data backup and disaster recovery
- Mobile device and remote access policies
- Sanction policies for workforce violations
The gap that kills practices: writing policies nobody follows. If your policy says you rotate passwords every 90 days but nobody actually does it, thatâs worse than not having the policy. Auditors interview staff. Inconsistencies surface fast.
3. Business Associate Agreements
Every vendor that touches PHI needs a signed BAA. Not a handshake. Not an email. A proper, current, signed agreement.
Common BAAs failures:
- Missing BAAs entirely for vendors handling PHI
- Outdated BAAs that donât reflect current arrangements
- BAAs that donât include required provisions
- Assuming your EHR vendorâs agreement covers all their subcontractors (it doesnât always)
Audit your vendor list. If a company can access, transmit, or store PHI, you need a BAA. That includes your IT support, cloud backup provider, email hosting, billing service, and anyone else who might touch patient data.
4. Training Documentation
Auditors want proof that every workforce member â including volunteers and temporary staff â has received HIPAA training. Not just once. Ongoing.
What they look for:
- Initial training for all new workforce members
- Annual refresher training
- Training on policy changes and new threats
- Signed acknowledgments
- Training on breach notification procedures
âI think we did training last yearâ doesnât count. You need dates, attendance records, and content outlines.
5. Physical Safeguards
Donât overlook the physical environment. Auditors check:
- Workstation positioning â can patients or visitors see screens displaying PHI?
- Door locks and access controls for areas where PHI is stored
- Visitor sign-in logs and escort policies
- Disposal procedures for paper records and equipment
- Clean desk policies and enforcement
6. Technical Safeguards
Auditors evaluate:
- Access controls â unique user IDs, automatic logoff, emergency access procedures
- Audit controls â logs showing who accessed what and when
- Integrity controls â how you ensure ePHI isnât altered improperly
- Transmission security â encryption for data in transit
- Encryption at rest for stored ePHI
Common Findings That Get Practices in Trouble
Based on OCR enforcement data and audit results, these come up repeatedly:
No risk assessment. This is the single most common finding. If you donât have one, you fail. Period.
Insufficient BAAs. Practices routinely miss vendors that need agreements, especially cloud services and IT providers.
No sanctions policy or unenforced sanctions. Having a policy you never use is a finding.
Inadequate training. One-time training at hire isnât sufficient. Neither is training with no documentation.
Missing or incomplete incident response plan. When a breach happens, you need a written plan that tells your team exactly what to do. Not a mental note.
Failure to conduct periodic reviews. Policies, risk assessments, and BAAs arenât set-it-and-forget-it. They need regular review and updates.
The Penalty Reality
HIPAA violations carry civil monetary penalties from $100 to $50,000 per violation, up to $1.5 million per category per year. Willful neglect with no correction? Thatâs the top tier.
But the real cost isnât always the fine. Itâs the corrective action plan that OCR can impose, requiring you to:
- Hire a compliance officer
- Implement specific technical controls
- Submit regular reports to HHS for years
- Pay for annual independent audits
A practice I consulted with spent more on remediation than they would have on compliance â by a factor of ten.
Your Pass-the-Audit Checklist
- Complete a risk assessment â Use the NIST framework or hire someone who knows what theyâre doing. Update it annually.
- Write policies that match reality â Donât document aspirations. Document what you actually do. Then do what you documented.
- Get BAAs for every vendor â Audit your full vendor list. If they touch PHI, get the agreement signed.
- Train your people â Initial training, annual refreshers, and documentation for every session.
- Implement technical safeguards â Encryption, access controls, audit logs. These arenât optional.
- Create an incident response plan â Write it, test it, and update it.
- Document everything â If itâs not documented, it didnât happen. Auditors work on evidence, not intentions.
- Review periodically â Set calendar reminders for annual reviews of your risk assessment, policies, and BAAs.
The Bottom Line
HIPAA compliance isnât about perfection. Itâs about reasonable and appropriate efforts. Auditors understand that small practices have different resources than hospital systems. What they donât excuse is willful neglect.
Start with the risk assessment. Fix the gaps you find. Document what youâre doing. Then maintain it.
Thatâs how you pass an audit. Not with expensive software or consultant reports, but with consistent execution of the basics.
If you need help getting your compliance house in order, thatâs what we do. Reach out and letâs make sure youâd pass tomorrow.

Discussion
Be the first to share your thoughts on this article!