| HIPAA 164.308(a)(1)(ii)(A) | Conduct an accurate and thorough assessment of the potential risks and vulnerabilities to the confidentiality, integrity, and availability of electronic protected health information held by the covered entity. | AI-system inventory with PHI-exposure classification per system — ChatGPT (no BAA at consumer/Plus/Team tiers), Claude (BAA available at Enterprise only), Gemini (no BAA at Workspace Business, available at select Enterprise tiers). Feeds the risk analysis directly. |
| HIPAA 164.308(a)(1)(ii)(B) | Implement security measures sufficient to reduce risks and vulnerabilities to a reasonable and appropriate level. | Redaction evidence — all 18 HIPAA Safe Harbor identifiers redacted from outbound prompts; security measure application log per prompt. |
| HIPAA 164.308(a)(5) | Implement a security awareness and training program for all members of the workforce. | Workforce training notice log — per-employee first-use notice delivery with acknowledgment timestamp; policy-refresh notice delivery on dictionary updates. |
| HIPAA 164.312(b) | Audit controls — implement hardware, software, and/or procedural mechanisms that record and examine activity in information systems that contain or use electronic protected health information. | Prompt-level audit log — employee, timestamp, AI system, redaction categories, policy version. Hash-based event replay. 12+ month retention. |
| HIPAA 164.502(a) | Minimum necessary standard — a covered entity must make reasonable efforts to limit protected health information to the minimum necessary. | Minimum-necessary evidence per prompt — raw-vs-redacted delta showing only necessary content crossed the browser boundary, context tag for use-case justification. |
| HIPAA 164.514(b)(2) | Safe Harbor de-identification — 18 identifier categories must be removed for information to be de-identified. | Per-prompt redaction evidence across all 18 Safe Harbor categories: names, geographic subdivisions smaller than state, dates, telephone, fax, email, SSN, MRN, health plan account, account numbers, certificate/license, VIN/license plate, device identifiers, URLs, IP addresses, biometric identifiers, full-face photos, any other unique ID. |
| HITECH Breach Notification Rule | Notify individuals and HHS in the event of a breach of unsecured PHI. | Incident-record template pre-populated with event metadata, unsecured-PHI assessment, notification-clock evidence for 60-day individual notification and 60-day HHS notification (for breaches affecting 500+ individuals) or annual batch (under 500). |
| HIPAA 164.308(a)(7) | Contingency plan — establish policies and procedures for responding to an emergency or other occurrence that damages systems containing ePHI. | Incident-response playbook for AI-related PHI events with tabletop exercise evidence; partial evidence — covers the AI-specific surface, broader contingency planning is customer-authored. |