Data Backup Plan
HIPAA’s data backup plan requirement means you must have written, implemented procedures that create and maintain retrievable exact copies of ePHI so you can restore systems and data after an outage, incident, or human error (45 CFR Parts 160, 162, 164). Operationalize it by defining ePHI backup scope, setting backup methods and frequency, testing restores, and retaining evidence that backups are complete, protected, and recoverable.
Key takeaways:
- You need procedures that produce retrievable exact copies of ePHI, not a vague “we back up data” statement (45 CFR Parts 160, 162, 164).
- Auditors look for restore capability (proof you can recover), not just backup jobs that ran.
- Treat third-party platforms (cloud EHR, billing, data warehouse) as in-scope; your responsibility is shared, not transferred.
“Data Backup Plan” under the HIPAA Security Rule is a requirement-level control that examiners can validate quickly because it leaves an evidence trail. The rule expects more than technology settings: it expects procedures that reliably create and maintain retrievable exact copies of ePHI, across the systems where ePHI lives, and in a form you can actually restore (45 CFR Parts 160, 162, 164).
Most breakdowns are operational. Teams back up some servers but miss SaaS data, endpoint data, or cloud databases. Backups “succeed” but restores fail because encryption keys are unavailable, identity controls block access, or the backup set is incomplete. Another common gap is governance: no named owner, no inventory, no testing record, and no linkage between backup scope and where ePHI actually resides.
This page translates the regulatory text into an implementation checklist you can run as a CCO, Compliance Officer, or GRC lead. It focuses on what to decide, what to document, what to test, and what evidence to retain so you can defend the control in an audit, security assessment, or post-incident review.
Regulatory text
Requirement (verbatim): “Establish and implement procedures to create and maintain retrievable exact copies of electronic protected health information.” (45 CFR Parts 160, 162, 164)
Operator interpretation:
You must (1) define procedures, (2) implement them in practice, and (3) demonstrate that backups produce exact copies of ePHI that are retrievable on demand. “Retrievable” is the operative word for audit readiness: you need to show you can restore ePHI within your operational needs during system failures, ransomware events, accidental deletion, bad deployments, or third-party outages (45 CFR Parts 160, 162, 164).
Plain-English interpretation (what the requirement really expects)
A compliant data backup plan answers five questions in a way you can prove:
- What ePHI is backed up? (systems, datasets, configurations, and identity dependencies)
- How is it backed up? (method, where copies live, segregation, encryption, immutability where applicable)
- How often and how long is it kept? (frequency and retention aligned to business and clinical operations)
- Who can restore, and how do they do it safely? (roles, access controls, approvals, break-glass)
- How do you know it works? (restore tests, results, corrective actions)
The rule is not satisfied by “we have snapshots” or “our cloud provider backs things up” unless you can show the procedure, confirm coverage, and demonstrate successful retrieval (45 CFR Parts 160, 162, 164).
Who it applies to (entity + operational context)
Applies to:
- Covered Entities that create, receive, maintain, or transmit ePHI (45 CFR Parts 160, 162, 164).
- Business Associates that handle ePHI for a Covered Entity (45 CFR Parts 160, 162, 164).
Where it shows up operationally:
- EHR/EMR platforms (hosted or on-prem)
- Practice management, scheduling, patient portals
- Imaging systems and ancillary systems
- Cloud data stores (object storage, databases, data lake/warehouse) containing ePHI
- File shares and collaboration platforms where ePHI is stored
- Workstations/endpoints used in care delivery workflows
- Integration engines, APIs, and message queues that persist ePHI
- Backups and logs that themselves contain ePHI (these become ePHI copies)
Third-party reality check: If a third party hosts your ePHI, you still need a backup procedure that covers that environment. Sometimes that means configuring provider-native backups; sometimes it means contractual requirements plus periodic evidence collection. A Business Associate also needs its own plan, not just a statement that a hosting provider has redundancy.
What you actually need to do (step-by-step)
Step 1: Define backup scope from your ePHI map
- Start with your system inventory and data flow diagrams and mark every location where ePHI is stored or cached.
- Include: production databases, file stores, attachments, exports, analytics copies, and integration staging areas.
- Identify dependencies required for retrieval: encryption keys, KMS/HSM access, directory services/IdP, and application configurations.
Deliverable: “ePHI Backup Scope Register” listing system, data types, source-of-truth, backup method, owner, and restore priority.
Step 2: Choose backup methods that can produce “retrievable exact copies”
For each in-scope system, document:
- Backup type: full, incremental, snapshot, database dump, SaaS export, image-based backup.
- Backup location(s): separate account/tenant where feasible; isolation from primary environment.
- Integrity controls: checksums, validation jobs, or application-level consistency checks.
- Protection controls: encryption, access control, logging, and change control for backup configurations.
Keep the language plain: what runs, where it writes, and how you restore.
Step 3: Set a frequency and retention rule you can defend operationally
The regulation does not prescribe a specific frequency in the excerpt you provided (45 CFR Parts 160, 162, 164). Your job is to set a cadence based on:
- clinical/business tolerance for data loss,
- system criticality,
- volume of change,
- and outage/ransomware scenarios.
Write the rule system-by-system, not as one generic statement.
Example decision: “EHR database backups run more frequently than departmental file shares because the transaction rate and operational impact are different.” Document the rationale.
Step 4: Build the restore procedure, not just the backup job
Audits fail on restores, not backups. Your restore procedure should include:
- Restore authority: who can approve, who can execute, who validates completeness.
- Restore targets: same environment, alternate environment, isolated recovery environment.
- Security steps: malware scan where relevant, credential rotation where required, post-restore access verification.
- Validation: what “successful restore” means (record counts, application health checks, user acceptance).
Step 5: Test retrieval and record the results
Run restore tests for representative systems and scenarios:
- single file restore,
- database point-in-time restore,
- SaaS data export and re-import (or equivalent retrieval proof),
- full environment recovery for critical systems where feasible.
Each test needs a record: what you tested, who ran it, what you restored, outcome, and follow-up actions. This is your clearest evidence that backups are “retrievable” (45 CFR Parts 160, 162, 164).
Step 6: Operationalize with monitoring, ticketing, and exceptions
- Monitor backup job status and alert on failures.
- Create an exception process for missed backups and failed tests with documented remediation.
- Tie changes (new systems, migrations, new SaaS tools) to a “backup impact review” in your change management flow.
Step 7: Address third-party hosted systems explicitly
For each third party that stores ePHI:
- document the backup approach (provider-native, customer-managed, or contractually required),
- define what evidence you collect (attestations, configuration screenshots, test results, or restore logs),
- define how you ensure retrieval if the third party is unavailable (contractual right to export, escrow where appropriate, continuity playbooks).
Practical option: Tools like Daydream can centralize third-party due diligence evidence requests and recurring collection, so you can consistently pull backup and recovery proof from ePHI-hosting third parties without reinventing questionnaires each cycle.
Required evidence and artifacts to retain
Keep artifacts that show both procedure and performance:
- Data Backup Plan document (scope, roles, methods, frequency, retention, restoration, escalation) (45 CFR Parts 160, 162, 164)
- ePHI Backup Scope Register (system-by-system mapping)
- Backup configuration exports or screenshots (where appropriate)
- Backup job logs/reports showing completion and failures
- Restore test plans, test execution records, and results
- Tickets/incidents for failed backups with remediation notes
- Access control evidence: who can access backup consoles/storage, break-glass procedure
- Change management records for backup-impacting changes
- For third parties: contracts/BAAs plus collected evidence of backup and restore capability (as applicable to your operating model)
Common exam/audit questions and hangups
Expect questions like:
- “Show me where ePHI is stored, and show me the backup method for each location.”
- “When was your last restore test for the EHR database? Who approved it and what was restored?”
- “How do you ensure backups are exact and complete (application consistency)?”
- “Who can delete backups, and how do you prevent a compromised admin account from wiping them?”
- “How do SaaS platforms get backed up? Show me your evidence, not marketing documentation.”
Hangups that slow reviews:
- No single list of in-scope systems.
- Confusion between high availability and backups.
- Backups encrypted, but encryption keys not recoverable under the same incident conditions.
- Third-party backups assumed but not contractually or operationally verified.
Frequent implementation mistakes (and how to avoid them)
-
Mistake: treating “DR” as “backup.”
Avoidance: Document distinct controls. DR reduces downtime; backups prevent data loss and enable retrieval (45 CFR Parts 160, 162, 164). -
Mistake: ignoring SaaS and managed platforms.
Avoidance: Add a line item for every ePHI-hosting third party in the scope register, with an evidence collection cadence. -
Mistake: backup success ≠ restore success.
Avoidance: Require periodic restore validation records and track corrective actions to closure. -
Mistake: no protection against backup tampering.
Avoidance: Restrict admin access, log administrative actions, and separate duties for backup deletion approvals. -
Mistake: missing “hidden ePHI copies.”
Avoidance: Include exports, reports, shared drives, analytics stores, and integration staging areas in scope.
Enforcement context and risk implications
No public enforcement cases were provided in the source catalog for this requirement, so this page does not cite specific actions. Practically, backup failures tend to surface after security incidents (including ransomware), system outages, or data corruption events. If you cannot produce retrievable exact copies of ePHI, patient care operations, breach response, and legal defensibility all deteriorate at the same time. Treat backup and restore as a clinical continuity control, not just an IT task (45 CFR Parts 160, 162, 164).
Practical 30/60/90-day execution plan
First 30 days (stabilize and scope)
- Assign an accountable owner for the data backup plan and a technical owner for execution.
- Build the ePHI Backup Scope Register from your inventory and data maps.
- Collect current-state evidence: existing backup configs, job reports, any restore records.
- Identify highest-risk gaps: systems with ePHI and no confirmed backups, or no proven restores.
Next 60 days (implement procedures and evidence)
- Publish the Data Backup Plan document with system-by-system rules.
- Implement monitoring and failure escalation workflow for backup jobs.
- Formalize third-party evidence collection for ePHI-hosting providers (contract check + recurring evidence request).
- Run initial restore tests for critical systems and document results and fixes.
By 90 days (prove retrieval and harden operations)
- Expand restore testing to representative scenarios across platforms (files, databases, SaaS exports).
- Close corrective actions from failed tests and missed backups.
- Embed “backup impact review” into change management and onboarding for new tools.
- Prepare an audit-ready package: plan, scope register, latest backup reports, restore test evidence, and third-party proof.
Frequently Asked Questions
Do we need “exact copies” if data is encrypted or tokenized?
Yes, as long as you can retrieve and restore the ePHI to an exact, usable state. Document how encryption keys and access are preserved so restores remain possible (45 CFR Parts 160, 162, 164).
If our cloud provider says they do backups, is that enough?
Only if your procedures define what is backed up, how you retrieve it, and you retain evidence that retrieval works. For third parties, collect proof and define how you will restore or export data under outage conditions.
What evidence best proves “retrievable” in an audit?
Restore test records and the supporting logs are the most persuasive artifacts. Pair them with the written procedure and the system-by-system scope register (45 CFR Parts 160, 162, 164).
Do backups themselves become ePHI?
Yes, backups that contain ePHI must be protected as ePHI copies. That means access controls, encryption, and logging should apply to backup storage and backup administration paths (45 CFR Parts 160, 162, 164).
How do we cover endpoints where staff download or export ePHI?
Decide whether endpoints are allowed to store ePHI; then align controls accordingly. If endpoints can store ePHI, include endpoint backup or containment controls in scope and document the approach in your backup plan.
How should a Business Associate approach this if the Covered Entity controls the application?
Define your ePHI handling footprint and back up the ePHI you store or control. Where the Covered Entity’s platform is involved, document shared responsibilities and retain evidence for the controls you own (45 CFR Parts 160, 162, 164).
Frequently Asked Questions
Do we need “exact copies” if data is encrypted or tokenized?
Yes, as long as you can retrieve and restore the ePHI to an exact, usable state. Document how encryption keys and access are preserved so restores remain possible (45 CFR Parts 160, 162, 164).
If our cloud provider says they do backups, is that enough?
Only if your procedures define what is backed up, how you retrieve it, and you retain evidence that retrieval works. For third parties, collect proof and define how you will restore or export data under outage conditions.
What evidence best proves “retrievable” in an audit?
Restore test records and the supporting logs are the most persuasive artifacts. Pair them with the written procedure and the system-by-system scope register (45 CFR Parts 160, 162, 164).
Do backups themselves become ePHI?
Yes, backups that contain ePHI must be protected as ePHI copies. That means access controls, encryption, and logging should apply to backup storage and backup administration paths (45 CFR Parts 160, 162, 164).
How do we cover endpoints where staff download or export ePHI?
Decide whether endpoints are allowed to store ePHI; then align controls accordingly. If endpoints can store ePHI, include endpoint backup or containment controls in scope and document the approach in your backup plan.
How should a Business Associate approach this if the Covered Entity controls the application?
Define your ePHI handling footprint and back up the ePHI you store or control. Where the Covered Entity’s platform is involved, document shared responsibilities and retain evidence for the controls you own (45 CFR Parts 160, 162, 164).
Authoritative Sources
Operationalize this requirement
Map requirement text to controls, owners, evidence, and review workflows inside Daydream.
See Daydream