HIPAA Compliance Starter Kit for Small Practices

Google “HIPAA rule-keeping cost” and the first page of results will convince you that getting in line requires $10,000 to $50,000 and a six-month consulting engagement.

If you’re running a small clinic or solo practice, that picture makes HIPAA feel impossible. So you buy a generic policy template, stick it in a binder, and hope nobody asks about it. Or you do nothing and tell yourself you’ll get to it next quarter.

Both approaches leave you exposed. And neither reflects what OCR — the Office for Civil Rights, the agency that enforces HIPAA — actually expects from a practice your size.

OCR doesn’t expect you to operate like a 500-bed hospital. They expect you to show that you’ve thought about the risks to your patients’ data and taken fair steps to address them. For a small practice, that’s achievable — and it doesn’t have to cost five figures.

What OCR Actually Looks For in a Small Practice

When OCR investigates a small practice — usually after a breach report or patient complaint — they want to see six things:

  1. A written down risk review
  2. Written policies and steps
  3. Signed Business Associate Agreements
  4. Evidence of team training
  5. An incident response plan
  6. Breach notice steps

Six categories. None require enterprise software. None require a dedicated rule-keeping officer. All require written records — because in HIPAA’s world, if you didn’t record it, you didn’t do it.

Let’s break down each one with realistic costs, time estimates, and exactly what “good enough” looks like for a 1-50 person practice.

1. The HIPAA Risk review: The One Thing You Cannot Skip

The risk review is the single most important record in your HIPAA rule-keeping program. It’s also the most commonly missing one.

Risk analysis failures are the most frequently cited breach in OCR enforcement actions. In 2025, OCR launched a dedicated risk analysis enforcement effort and announced 10 penalties by May alone, most targeting groups that never ran a risk review or hadn’t updated theirs in years. In 2026, OCR is expanding that effort to include risk management as well.

What it involves: Inventorying every system that stores or transmits ePHI — EHR, email, cloud storage, laptops, phones, fax machines. For each, you identify threats, estimate likelihood and impact, and record what controls you have in place.

The free option: HHS released a Security Risk review tool namely for small habits — updated to version 3.6 in September 2025. It walks you through the process step by step and produces written records that satisfies OCR. A focused person can complete it in a day.

The paid option: A consultant-led review runs $1,500 to $5,000 for a small practice. Worth it if you’ve never done this before and want written records that holds up under scrutiny.

Critical: Your review must be current. A risk review from 2021 that hasn’t been reviewed is a liability, not an asset. HIPAA requires review whenever major changes occur, and best practice is at least annually.

2. Written HIPAA Policies: Three Documents, Not Three Hundred Pages

For a small practice, three core policies cover the essential ground:

Privacy Policy: How you use and disclose PHI, who can access it, patient rights. Ties directly to your Notice of Privacy Practices, which patients must receive. (Updated NPP rules took effect February 16, 2026 under the new HIPAA rules.)

Security Policy: How you protect digital PHI — access controls, passwords, device policies, data scrambling, incident handling. This is where “addressable” specs live — and no, addressable doesn’t mean optional.

Breach notice Policy: How you determine if a breach occurred, the 60-day notice timeline, when HHS gets notified, what notices must contain. Know the March 1 small breach reporting deadline for breaches affecting fewer than 500 people.

Three to five pages each. Written in plain language specific to your practice. Actually distributed to staff. Reviewed annually. An OCR investigator can spot a generic template downloaded from the internet with the name swapped out — and it won’t help you.

Cost: DIY using NIST and HHS templates is free. Custom policies from a consultant run $500 to $2,000.

3. Business Associate Agreements: Your Vendor Liability Shield

Every vendor that touches ePHI on your behalf needs a signed BAA. Your list probably includes more vendors than you think: EHR provider, billing service, clearinghouse, transcription service, IT company, answering service, cloud storage, shredding company.

Not having signed BAAs is one of the most common HIPAA breaches — and the cheapest to fix.

Why this matters right now: In 2025, over 80% of stolen healthcare records came through third-party vendors and business associates. There were 130 confirmed ransomware attacks on healthcare businesses with an average ransom demand of $532,000. When your vendor gets hacked, the BAA is what defines who’s responsible for what.

Cost: Nothing but time. Work through your vendor list, confirm BAAs are on file, request them where they’re missing. Most healthcare vendors have standard templates ready to sign.

4. Employee HIPAA Training: Annual, Documented, Non-Negotiable

Every team member who handles PHI must receive HIPAA training. “We’re a small team, everyone just knows” doesn’t satisfy the rule.

Cover what PHI is, how your practice protects it, how to recognize phishing and security incidents, and each person’s duties under your policies. Document who was trained, when, and on what.

Why it’s urgent: Hacking incidents accounted for over 80% of healthcare breaches in 2025, and lack of trained staff was the number one factor in successful ransomware attacks, cited in 42% of incidents. Training is the cheapest control you can deploy against the biggest category of attacks.

Cost: Online platforms run $15 to $50 per employee per year. For 10 people, that’s $150 to $500. You can also train in-house for free — just record it with sign-off sheets.

5. Incident Response Plan: Your Breach Playbook

When a laptop gets stolen or your billing company calls to say they’ve been hacked, you need a plan that already exists — not one you’re writing in the middle of a crisis.

For a small practice, this is a two to three page record: who is your Privacy Officer, how do incidents get reported internally, how do you determine if it’s a reportable breach, and what are the notice steps. If you want a deep-dive on what those first key hours look like, read our guide on the first 72 hours after a ransomware attack.

Cost: An hour of focused time.

6. Physical protections: The Afternoon Walk-Through

Walk your office and check: Are screens visible from waiting areas? Do computers auto-lock after inactivity? Is paper PHI in locked storage? Are devices secured when taken offsite? How do you dispose of old records and equipment?

Fix what’s easy. Document what you found and what you fixed. One of the highest-impact rule-keeping actions you can do in a single afternoon, and it costs nothing.

What Your Small Practice Does NOT Need (Yet)

Small habits get sold services they don’t need. OCR does not require:

  • SOC 2 audits. Voluntary certifications for tech companies, not required for covered groups.
  • Penetration testing. The proposed HIPAA Security Rule changes may eventually require weak spot scanning, but formal pen testing isn’t a current small-practice rule.
  • A dedicated CISO. You need a named Security Officer. That can be you or your office manager — just record the appointment.
  • Enterprise rule-keeping platforms. Software is convenient but not required. A well-organized file system works fine.
  • $10,000+ consulting engagements. A 5-person dental practice does not need the same rule-keeping program as a 200-bed hospital.

The Realistic HIPAA Compliance Cost Breakdown

Approach Estimated Cost Best For
Full DIY (your time + free HHS tools) $0 - $500 Solo practitioners with time
Template-based with consultant review $500 - $2,000 Small habits wanting validation
Enterprise rule-keeping platform (annual) $3,000 - $10,000/year Mid-size groups, 50+ employees
Large consulting firm engagement $15,000 - $50,000+ Hospital systems, large group habits

The bottom two rows are for hospital networks and large group habits. A 10-person family medicine practice does not need a $50,000 rule-keeping engagement.

The Cost of Doing Nothing Is Much Higher

OCR’s 2026 penalty tiers — updated January 28, 2026 for inflation — break down like this:

breach Level Minimum Per breach Maximum Per breach Annual Cap
Tier 1: Lack of knowledge $145 $73,011 $2,190,294
Tier 2: fair cause $1,461 $73,011 $2,190,294
Tier 3: Willful neglect, corrected $14,602 $73,011 $2,190,294
Tier 4: Willful neglect, not corrected $73,011 $2,190,294 $2,190,294

OCR imposed 21 financial penalties in 2025, collecting $9.4 million since the start of 2024. Their enforcement is increasingly targeting smaller groups — a $103,000 fine hit a substance abuse clinic with just a handful of staff.

Beyond fines, healthcare groups hit by cyberattacks in 2025 were four times more likely to incur losses exceeding $200,000 compared to the year before. Forensic review, legal counsel, patient notice, and lost business add up fast when you don’t have a health system’s resources behind you.

An affordable rule-keeping starter kit versus a possible six-figure breach response cost isn’t a close calculation.

What’s in the affordable Starter Package

One Guy Consulting built this package namely for independent habits and small clinics that need to get in line without spending five figures. Here’s what’s included:

Risk review Templates and Guidance - Pre-built risk review worksheet mapped to all HIPAA Security Rule rules - Asset list template for cataloging every system that touches ePHI - Threat and weak spot finding guides with healthcare-specific examples - Step-by-step instructions that work alongside the free HHS SRA tool

Three Core Policy Documents - Privacy Policy customizable to your practice size and specialty - Security Policy covering access controls, device management, data scrambling, and incident handling - Breach notice Policy with the 60-day timeline, HHS reporting thresholds, and notice templates

Business Associate Agreement Kit - BAA template that covers current HIPAA rules - Vendor list checklist — every vendor category that often handles ePHI - Tracking spreadsheet so you know which BAAs are signed, pending, or missing

Employee Training Materials - HIPAA knowledge training outline covering PHI basics, security habits, and phishing recognition - Training attendance log template with date, topic, and sign-off fields - Annual training schedule to keep your written records current

Incident Response Framework - Two-page incident response plan template for small habits - Breach decision flowchart — is it reportable or not? - notice checklist covering patient notices, HHS reporting, and state rules

Compliance Calendar - Month-by-month schedule of what needs to happen: annual risk review review, policy updates, training, BAA audits, small breach reporting deadlines - Built so nothing falls through the cracks

Everything is written in plain English, not legal jargon. Customizable to your practice. Designed to produce the written records OCR actually asks for during an review.

Starting From Zero: The Exact 7-Step Sequence

If you have nothing in place today, here’s the order that matters:

Step 1: Designate a Privacy and Security Officer

Can be you. Can be your office manager. Make it official and write it down. This takes five minutes and satisfies a specific HIPAA rule.

Step 2: Complete Your Risk review

Use the free HHS SRA tool or get help. Everything else builds on this. Your policies, training, and protections should all flow from the risks you identify here.

Step 3: Write Your Three Core Policies

Privacy, Security, Breach notice. Customize them to your practice — your specific EHR, your specific workflows, your specific team. Generic templates with swapped names don’t hold up under OCR scrutiny.

Step 4: Train Staff and Document It

Names, dates, topics covered, signatures. Do this quarterly, not just annually. The 2025 breach data shows that untrained staff are the number one factor in successful attacks.

Step 5: Audit Vendors and Get BAAs Signed

Work through the list step by step. EHR, billing, clearinghouse, IT support, cloud storage, answering service, shredding company. If they touch patient data, they need a signed BAA.

Step 6: Walk Your Office for Physical protections

Screen visibility, auto-lock settings, locked storage, device security, disposal steps. Fix and record. One afternoon, zero dollars.

Step 7: Create Your Incident Response Plan

Two to three pages covering who does what when something goes wrong. Include contact information, reporting steps, and breach decision criteria. Don’t wait until you’re in the first 72 hours of a ransomware attack to figure this out.

That’s the starter kit. It won’t make you invincible, but it puts you in a at its core different position than having nothing. If OCR investigates, this written records is the difference between a conversation and a penalty.


You can do this yourself — the HHS tools are free, templates exist, and the rules for a small practice are achievable. Or you can let someone handle it. One Guy Consulting put together a affordable starter package for exactly this situation — risk review templates, core policies, training items, and incident response frameworks built for habits that need to get in line without spending five figures. See what’s included risk assessment tool affordable HIPAA training policy templates gap analysis

Related: How long HIPAA compliance takes