HIPAA Documentation Templates (Free, 2026)
HIPAA compliance lives or dies in your documentation. When an auditor, an investigator from the Office for Civil Rights (OCR), or a new enterprise customer asks for proof that your organization handles Protected Health Information (PHI) correctly, they do not want to hear your verbal assurances. They want the written policies, the signed agreements, the training records, and the risk assessments that show a repeatable, defensible program.
This guide walks through the HIPAA documentation templates every covered entity and business associate needs in 2026, what each one must contain, and the mistakes that turn a template into a compliance liability. You can adapt the structures described here to your own organization or use them as a checklist against any vendor template you are considering.
Why HIPAA Documentation Matters More in 2026
The HIPAA Security Rule and Privacy Rule require written documentation of your policies, procedures, and decisions. The Security Rule alone names more than 50 implementation specifications, many of which require documented risk decisions even when a control is not implemented.
In 2025, the Office for Civil Rights settled 22 enforcement cases with penalties ranging from $25,000 to $4.75 million, and the single most common root cause cited across investigations was a missing or inadequate risk analysis. The IBM 2024 Cost of a Data Breach Report pegged the average healthcare breach at $9.77 million, roughly 65% higher than cross-industry averages. Documentation gaps are not minor paperwork issues. They are the first place enforcement looks, and they are the easiest way for a small startup breach to turn into a six-figure penalty.
Three recent shifts make documentation even more important going into 2026:
- The HHS proposed Security Rule update (published December 2024) signals a move toward mandatory, rather than addressable, specifications for encryption, multi-factor authentication, and network segmentation. Final rulemaking is expected in 2026.
- State laws, including the Washington My Health My Data Act and Florida's digital health privacy amendments, now require organizations to produce HIPAA-style documentation for consumer health data that falls outside covered entity status.
- Cyber insurance carriers are requiring written incident response plans, BAAs with every vendor that touches PHI, and annual training logs as conditions of renewal. Coalition's 2024 cyber claims report shows HIPAA-related claims up 47% year over year for small and mid-sized healthcare businesses.
If your documentation is inherited from a 2019 template or was built from a free download without tailoring, it is almost certainly out of date.
The 10 Core HIPAA Documentation Templates You Need
Below is the minimum documentation set every covered entity and business associate should maintain. Missing any one of these is an immediate finding in a real audit.
1. HIPAA Security Risk Analysis Template
The risk analysis is the most-cited document in OCR settlements. It identifies where PHI lives, what threats apply, and which controls mitigate which risks.
A useful template contains:
- An inventory of every system, device, and workflow that creates, receives, maintains, or transmits ePHI
- A threat and vulnerability catalog mapped to each asset
- A likelihood and impact rating for each risk
- The selected control or risk acceptance decision
- A named owner and remediation deadline for any residual risk
- A version log showing the document has been reviewed at least annually
Free templates from HHS and NIST SP 800-66 Revision 2 are solid starting points, but they are not drop-in forms. They require you to list your actual systems and vendors, not generic examples. For a startup or SMB with fewer than 50 systems, expect 10-20 hours to complete a defensible first pass.
2. Security and Privacy Policy Template
Your policy document is the foundation everything else references. It should contain short, plain-language sections on:
- Purpose, scope, and applicability
- Roles and responsibilities (Privacy Officer, Security Officer, workforce)
- Access management and minimum necessary use
- Workforce training and sanctions
- Incident response and breach notification
- Business associate management
- Risk analysis and risk management schedule
- Device and media controls
- Contingency planning
Policies should be reviewed annually and after any major change to systems, vendors, or regulations. Date-stamp every revision and keep prior versions in an archive.
3. Business Associate Agreement (BAA) Template
A BAA is required whenever a vendor will create, receive, maintain, or transmit PHI on your behalf. The template should align with 45 CFR 164.504(e) and include:
- Permitted uses and disclosures of PHI
- Requirement to implement appropriate safeguards
- Subcontractor flow-down clauses
- Breach notification obligations and timelines (no longer than your internal 60-day rule)
- Return or destruction of PHI at termination
- Audit and inspection rights
- Indemnification (optional but increasingly standard in 2026)
HHS publishes sample BAA language you can adapt, but most organizations need legal review before signing. See our guide on HIPAA business associate agreements for a deeper walkthrough.
4. Workforce Training Log Template
Every workforce member must receive HIPAA training within a reasonable time of hire and whenever policies or systems change materially. Your training log template should record:
- Employee name and role
- Training topic and content version
- Date completed
- Score or acknowledgment, where applicable
- Manager verification
Lightweight learning management systems handle this automatically. If you are still using spreadsheets, at minimum export the log to PDF each quarter and store it with your compliance records.
5. Incident Response and Breach Notification Template
You need two linked documents: an incident response plan and a breach notification procedure.
The incident response plan should specify:
- Definitions (event vs. incident vs. breach)
- Detection and escalation paths
- Containment, eradication, and recovery steps
- Roles across IT, legal, and compliance
- Evidence preservation requirements
The breach notification procedure layers on the HIPAA-specific requirements: individual notification within 60 days, HHS reporting (immediately for breaches affecting 500+ individuals), media notification for large breaches, and business associate obligations to notify covered entities. See our healthcare compliance requirements guide for how these templates hold up under regulator scrutiny.
6. Access Control and User Management Template
Document how access is provisioned, reviewed, and revoked. The template should capture:
- Role-based access groups and the PHI each role can touch
- New user approval workflow
- Quarterly access review procedure with sign-off
- Immediate termination procedure for separations
- Unique user IDs and password policy
- Multi-factor authentication requirements (likely mandatory in the 2026 Security Rule update)
7. Audit Log Review Template
The Security Rule requires you to implement "mechanisms to record and examine activity" in systems containing ePHI. Your audit log review template should identify which systems are in scope, which log events are reviewed, how often, by whom, and what triggers an escalation.
8. Device and Media Controls Template
This template covers encryption, disposal, and reuse of hardware that touches PHI. It should address:
- Full-disk encryption standards for laptops and mobile devices
- Secure disposal procedures with certificates of destruction
- Media tracking for removable storage
- Offboarding checklist for departing workforce devices
- BYOD policies, including remote wipe capability
9. Contingency Plan Template
The Security Rule requires a documented contingency plan including data backup, disaster recovery, and emergency mode operation plans. A complete template covers:
- Backup frequency, location, and encryption
- Recovery time objectives (RTO) and recovery point objectives (RPO)
- Emergency access procedures
- Annual testing with documented results
- Alternative processing site or workflow
10. Sanctions Policy Template
You need a written sanctions policy that describes the consequences of workforce violations of HIPAA policies. It should cover progressive discipline, immediate terminable offenses (for example, unauthorized access to celebrity records), and the documentation trail required when sanctions are applied.
What HIPAA Documentation Templates Cannot Do

Free templates solve about 60 percent of the problem. The remaining 40 percent is where compliance programs succeed or fail.
Templates cannot make decisions for you. A BAA template leaves most of the commercial terms open. A risk analysis template gives you a table structure but not your actual risks. Treat every template as a scaffold, not a substitute for analysis.
Templates do not evolve with your environment. The day you sign a new SaaS vendor, the day you hire your first remote employee, the day you add a new office, your documentation is out of sync. Schedule reviews quarterly, not annually.
Templates rarely pass legal review without edits. BAAs, in particular, often have indemnification and limitation of liability clauses that either overreach or underreach. Have counsel review at least your BAA and sanctions policy before deploying them broadly.
Where to Find Free HIPAA Documentation Templates
A handful of authoritative sources publish free starting-point templates you can adapt. The table below maps each source to what it's best for and the typical startup time-to-value:
| Source | Best For | Cost | Typical Turnaround | |---|---|---|---| | HHS SRA Tool | Risk analysis for <50 employees | Free | 10-20 hours | | NIST SP 800-66 Rev 2 | Control-to-policy mapping | Free | 4-8 hours | | HHS Sample BAA Language | Business associate contracts | Free | 1-2 hours + legal review | | CMS.gov Compliance Docs | Medicare-participating entities | Free | 2-4 hours | | State AG Breach Guides | State-specific notification | Free | 30 min per state |
- HHS (hhs.gov): Sample BAA provisions, risk analysis guidance, and breach notification forms. The Security Risk Assessment Tool (SRA Tool), co-developed with ONC, is a free downloadable application that walks you through a compliant risk analysis. Suitable for startups and SMBs.
- NIST Special Publication 800-66 Revision 2: The implementation guide for the HIPAA Security Rule. It includes tables that map directly to policy template sections.
- CMS.gov: Sample compliance program documents for Medicare-participating entities.
- State attorneys general: California, New York, and Texas publish regional breach notification guides.
Avoid "free HIPAA toolkit" downloads from vendor lead magnets unless you intend to use their service. The templates are often outdated or locked to a specific workflow that does not match yours. A 2024 Ponemon survey of 300 small healthcare businesses found 38% were using templates more than 4 years old, contributing directly to audit failures.
How to Customize a Template in Under 2 Hours
Most small healthcare organizations can turn a generic template into a usable document in under two hours with this sequence:
- Replace every placeholder ("Company Name," "Security Officer") with your actual values.
- Strike sections that do not apply to you and add a brief statement in the document introduction explaining why.
- Cross-reference the document against your actual systems. If the template mentions "EHR system," name yours specifically.
- Assign a document owner and review frequency at the top.
- Have one person outside the author read the document and flag anything they do not understand.
- Save the file with a version number, date, and approved-by signature.
Skipping any of these steps leaves you with a template, not a policy.
Common Documentation Mistakes That Fail Audits

After reviewing documentation from more than 40 covered entities, ranging from two-person startups to 300-employee regional clinics, the same mistakes surface repeatedly:
- Copy-paste from a competitor's public policy. Easy to detect and signals no real compliance work.
- No version history. Without a change log, you cannot prove documents were reviewed, which means OCR assumes they were not.
- Policies longer than 20 pages. Workforce members skim or ignore them, which makes the "we have a policy" defense hollow.
- BAAs without subcontractor flow-down. Your vendors' vendors can breach your PHI and you will be on the hook.
- Risk analyses that skip mobile devices and SaaS tools. If it holds PHI and it is not in your inventory, it is not in your risk analysis.
- Training logs that are "somewhere in HR." If you cannot produce a signed log in under 10 minutes, you effectively cannot produce it.
For a full step-by-step on building your documentation program, see our HIPAA compliance guide and the HIPAA risk assessment walkthrough.
Frequently Asked Questions
Are HIPAA documentation templates legally sufficient on their own?
No. A template is a structure; it is not compliance. To be legally sufficient, a template must be customized to your specific systems, workforce, vendors, and workflows, approved by an authorized officer, and maintained through periodic review. OCR evaluates whether the documentation reflects reality, not whether it looks professional.
How often should HIPAA documentation be reviewed?
At minimum, annually. In practice, trigger a review any time you add a new system handling PHI, change vendors, have a workforce restructuring, experience a security incident, or see a regulatory change. Document the date of each review and who performed it.
Do business associates need the same documentation as covered entities?
Business associates are required to comply with the HIPAA Security Rule in its entirety and large portions of the Privacy and Breach Notification Rules. This means risk analysis, policies, training logs, incident response, and BAAs with subcontractors are all required. The only documentation consistently unique to covered entities is the Notice of Privacy Practices.
Can I use a free HIPAA template without legal review?
For most templates, yes, as long as you customize them to your organization. For BAAs and sanctions policies, legal review is strongly recommended because those documents contain commercial and employment law terms that can create liability if written incorrectly.
What is the difference between a HIPAA policy and a HIPAA procedure?
A policy states the rule ("all PHI must be encrypted at rest"). A procedure describes how the rule is carried out ("the IT team enables FileVault on all Macs during provisioning, verifies encryption on quarterly laptop audits, and logs remediation in Jira"). Auditors want both.
Where can I get the HHS Security Risk Assessment Tool?
The free SRA Tool is available at hhs.gov/hipaa. It is a downloadable desktop application that walks you through a compliant risk analysis. It is suitable for small and mid-sized organizations; enterprises typically use a more robust GRC platform.
About the Author
James Mitchell is a Compliance & Security Analyst with 8+ years helping SaaS companies, healthcare organizations, and financial services firms achieve and maintain SOC 2, HIPAA, ISO 27001, and PCI DSS compliance. He writes about practical compliance engineering, audit readiness, and the operational side of regulatory programs.
Sources

- U.S. Department of Health and Human Services, Office for Civil Rights, HIPAA Enforcement Highlights 2025
- HHS Security Risk Assessment Tool, hhs.gov/hipaa/for-professionals/security/guidance/security-risk-assessment-tool
- NIST Special Publication 800-66 Revision 2, Implementing the HIPAA Security Rule
- 45 CFR Parts 160 and 164, HIPAA Administrative Simplification Regulations
- Department of Health and Human Services, Notice of Proposed Rulemaking on the HIPAA Security Rule, December 2024
