Running a small or medium practice means wearing a lot of hats. Between seeing patients, managing staff, and chasing reimbursements, compliance rarely feels like the most pressing item on the list, until something goes wrong.
In 2026, the stakes are higher than ever. By early 2026, the Office for Civil Rights (OCR) had already settled or imposed penalties in over 50 HIPAA violation cases under initiatives targeting risk analysis and the Right of Access, and the average healthcare data breach now costs $7.42 million, according to IBM's 2025 Cost of a Data Breach Report. What often surprises smaller practices: 55% of OCR's financial penalties in 2022 were imposed on small medical practices, not large hospital systems. Independent practices are very much in the crosshairs.
The good news is that most compliance gaps are fixable, with the right EHR in place and a few clear habits built into your daily workflows. This checklist walks you through what matters most, without the legal jargon.
What EHR Compliance Actually Covers
EHR compliance means your electronic health record system, and how your team uses it, meets the legal and regulatory requirements for protecting patient data, sharing it appropriately, and reporting accurately.
For independent practices, that breaks down into three areas:
-
Patient data privacy and security (HIPAA/HITECH): the rules around who can access patient records, how data is stored and transmitted, and what happens when something goes wrong
-
Interoperability and patient access (21st Century Cures Act / ONC): the requirement that patients and other providers can access health data without barriers
-
Quality reporting (CMS Promoting Interoperability Program): meeting federal reporting requirements, especially if your practice participates in Medicare or Medicaid
Getting these right protects your patients, your practice's finances, and your reputation.
The EHR Compliance Checklist
1. Data Security & Access Controls
-
Role-based access is configured, staff only see what their role requires
-
Multi-factor authentication (MFA) is enabled on all ePHI access points
-
Patient data is encrypted at rest and in transit (confirm this with your vendor in writing)
-
Workstations auto-lock after a period of inactivity
-
Vulnerability scans are conducted at least every six months (required under the proposed 2025 HIPAA Security Rule updates)
-
Remote access to patient data is secured, especially for staff working from home or on mobile devices
Why it matters: Hacking and IT incidents account for 79% of all large healthcare breaches, with ransomware as the dominant attack type. MFA alone significantly reduces the risk of unauthorized access, even when passwords are compromised.
2. Audit Trails
-
Your EHR logs all access and changes to patient records in real time
-
Logs are tamper-proof and can be exported when needed for audits
-
Someone at your practice reviews logs periodically, monthly is a reasonable cadence
-
Logs are retained for at least six years (HIPAA requirement)
Why it matters: Incomplete or missing audit logs were a direct factor in multiple 2025 OCR enforcement actions. Having logs isn't enough, you need to be able to produce them quickly and show they've been actively monitored.
3. Interoperability & Patient Access
-
Your EHR is ONC-certified
-
Patients can access their own health records electronically via a patient portal
-
You are not blocking or delaying access to health information, even unintentionally
-
Your system supports data exchange with referral partners and payers
Why it matters: In September 2025, The U.S. Department of Health and Human Services (HHS) stepped up enforcement of information blocking provisions under the 21st Century Cures Act. Penalties can reach $1 million per violation. Many small practices run into this unintentionally, for example, by having a patient portal that's difficult to use or inactive.
4. Vendor & Third-Party Risk
-
A signed Business Associate Agreement (BAA) is in place with your EHR vendor
-
BAAs exist with all vendors that handle patient data, billing companies, labs, transcription services, cloud storage providers
-
Your EHR vendor holds SOC 2 or HITRUST certification
-
You review vendor relationships at least annually
Why it matters: Business associates are involved in 34% of healthcare breaches. A missing BAA is itself a HIPAA violation, regardless of whether a breach has actually occurred. Many practices have agreements in place with their main EHR vendor but overlook smaller third-party tools that touch patient data.
5. Backup & Disaster Recovery
-
Automated backups are running without requiring manual intervention
-
You have a documented downtime procedure your staff knows and can follow
-
Backups have been tested, at least once a year
-
Recovery time and recovery point objectives (RTO/RPO) are defined, even informally
Why it matters: A ransomware attack or system failure without a tested backup plan can mean days or weeks of downtime, and potentially permanent data loss. Small practices are often the least prepared for this scenario.
6. Staff Training & Documentation
-
All staff completed HIPAA training in the last 12 months, with records to prove it
-
Your practice has written Privacy and Security Policies that staff have acknowledged
-
An annual Security Risk Assessment (SRA) has been completed
-
You have a written incident response plan, even a simple one
Why it matters: The SRA is the single most commonly cited gap in OCR investigations. A 2025 case involving a surgery center resulted in a $250k penalty partly because the practice could not produce evidence it had ever conducted a risk analysis.
The Most Common Compliance Gaps in Small Practices
These issues come up repeatedly in audits and breach investigations:
No Security Risk Assessment: Checking a box in your EHR portal is not the same as a proper SRA. It must cover all systems, devices, and workflows where ePHI lives, including mobile devices and personal computers used for remote access.
Missing or outdated BAAs: Review every vendor relationship once a year. If someone touches your patient data and there's no signed BAA, you're already non-compliant, whether or not a breach has happened.
Weak staff offboarding: When someone leaves your practice, are their credentials deactivated the same day? Former employee access is one of the most overlooked vulnerabilities in small practices.
Audit logs that nobody reads: Many practices turn on logging and then never look at it. A monthly review doesn't need to take long, even a quick scan can surface issues early.
Inactive patient portals: If your patient portal is technically available but practically unusable, that can be treated as information blocking. Keep it functional and make sure patients know how to use it.
How Amazing Charts Supports Compliance
Amazing Charts is an ONC-certified EHR built by a physician for independent practices. That origin matters, the platform was designed around how real small practices actually work, not around the needs of large health systems.
On the compliance side, that means:
-
Built-in, tamper-proof audit trails that meet HIPAA requirements
-
Role-based access controls you can configure without IT support
-
Patient portal that supports 21st Century Cures Act requirements
-
BAA included with every practice, no negotiation required
-
FHIR-ready interoperability for CMS data exchange requirements
-
MIPS support services for quality reporting
Over 2,000 practices and 3,500 providers trust Amazing Charts. Compliance is built into the tools they already use every day, not bolted on as an afterthought.
Compliance doesn't have to be complicated. The right EHR takes care of most of the technical requirements, what's left is building a few good habits around training, vendor management, and regular reviews.
Try Amazing Charts for free for Seven Days
Frequently Asked Questions
At minimum, once a year. You should also run one after any major system change, after adding a new vendor, or following a security incident of any kind, even a minor one.
Yes, it's a HIPAA requirement. Every vendor or third party that handles electronic protected health information (ePHI) must sign a BAA with your practice. If one isn't in place, that's a violation regardless of whether a breach has occurred.
Civil penalties range from $141 to $71,162 per violation, with a maximum of $1.5 million per violation category per year for willful neglect that goes uncorrected. Criminal penalties can include fines up to $250,000 and prison time. The average HIPAA settlement in 2025 was $7.42 million.
Yes, if the vendor uses encryption, MFA, audit logging, and signs a BAA. Always confirm these specifics in writing before signing a contract.
Information blocking is any practice that prevents patients or other providers from accessing health data. It's prohibited under the 21st Century Cures Act, and HHS significantly stepped up enforcement in 2025.
HIPAA compliance is about how your practice handles patient data: security, access, and breach response. ONC certification is about the EHR software itself: whether it meets federal technical standards for interoperability and documentation. You need both. Using a certified EHR doesn't automatically make your practice HIPAA compliant; you also need the right internal policies and training.