Data Backup and Storage
To meet HIPAA’s Data Backup and Storage requirement, you must be able to create a retrievable, exact copy of ePHI, when needed, before you move equipment that stores or processes it. Operationalize this by embedding a “backup-before-move” gate into IT asset moves, verifying restore success for the impacted ePHI, and retaining evidence that the copy was created and is retrievable. 1
Key takeaways:
- “Before movement of equipment” is a trigger: treat any relocation, shipment, redeployment, or disposal workflow as a control point. 1
- “Retrievable, exact copy” means you must prove you can restore the data accurately, not just that a backup job ran. 1
- The fastest path is procedural: add approvals, technical checks, and required artifacts to your change/asset process so moves cannot proceed without evidence. 1
This requirement is narrower than a general “backup policy.” It targets a specific operational risk: losing ePHI during equipment movement. Under 45 CFR § 164.310(d)(2)(iv), you must create a retrievable, exact copy of electronic protected health information (ePHI), when needed, before moving equipment. 1
For a CCO or GRC lead, the practical question is: what events count as “movement,” what systems are in scope, and what evidence will satisfy an auditor that you can produce an exact, retrievable copy before the move occurs. The control succeeds or fails in day-to-day IT operations: asset management tickets, data center work orders, laptop swaps, hardware returns to third parties, cloud-to-cloud migrations, and decommissioning.
This page gives you requirement-level implementation guidance: who it applies to, how to translate it into workflows, what artifacts to retain, and the audit questions that commonly expose weak spots. It also includes a pragmatic execution plan you can run with IT, Security, and Facilities without waiting for a full program overhaul. 1
Regulatory text
Regulatory excerpt: “Create a retrievable, exact copy of electronic protected health information, when needed, before movement of equipment.” 1
Operator interpretation (what you must do):
- Identify equipment movements that could affect ePHI (shipping, relocation, redeployment, storage, disposal, repair, replacement, or return to a third party). 1
- Before the move happens, create an exact copy of the ePHI that could be impacted, and make sure you can retrieve it. The standard is not “we think it’s backed up,” but “we can produce and restore the needed data accurately if something goes wrong during the move.” 1
- Apply judgment to “when needed.” If the equipment contains no ePHI, or ePHI is already protected through other mechanisms that make loss during movement unlikely, document the rationale. If the move increases risk of loss or inaccessibility, treat the backup as required. 1
Plain-English interpretation of the requirement
You need a repeatable “backup-before-move” process for any device or system that stores or runs workloads containing ePHI. If the box gets dropped, lost, erased, or fails during the move, you must still be able to recover the ePHI from a copy you made beforehand. 1
Focus on two words that auditors care about:
- Exact: the copy must preserve the content of ePHI as maintained in the system, not a partial export that drops fields, metadata, or attachments that you rely on. 1
- Retrievable: you must be able to get it back in a usable way. A backup that cannot be restored within your operational needs fails the purpose of the safeguard. 1
Who it applies to
Entities: Covered Entities and Business Associates. 1
Operational contexts most often in scope:
- Data center or closet equipment moves (servers, storage arrays, network-attached storage that holds ePHI).
- End-user device lifecycle where ePHI may be locally stored (laptops used for clinical operations, imaging review stations, managed mobile devices with offline content).
- Infrastructure refresh and redeployments (moving workloads to new hardware, new locations, or new hosting arrangements).
- Decommissioning and disposal workflows (equipment sent for recycling, buy-back, return to leasing company, or RMA).
- Third-party service events (equipment shipped to a repair depot, sent to a managed service provider, or returned to a cloud/hosting provider).
If you are a Business Associate, pay attention to contract-driven operational moves (moving your hosting footprint, changing subcontractors, or migrating platforms that process ePHI for a Covered Entity). 1
What you actually need to do (step-by-step)
1) Define “movement events” and make them non-optional triggers
Create a short list of triggering events in your procedures and align them to existing workflows:
- Asset relocation (building-to-building, rack-to-rack, site-to-site).
- Shipping offsite (repair, storage, disposal, return).
- Hardware swap or refresh.
- Decommissioning and retirement.
Practical control design: No movement ticket closes (or no work begins) until the backup evidence is attached or the exception is approved with documented rationale. 1
2) Map where ePHI can exist on the equipment being moved
For each movement request, require the requestor/owner to answer:
- Does this equipment store ePHI at rest (databases, file shares, images, message queues, backups)?
- Does this equipment cache ePHI locally (sync folders, offline patient lists, print spools)?
- Is ePHI accessible only through network services with no local storage? If yes, document that the move does not impact ePHI storage, and confirm no local logs or exports contain ePHI. 1
This step is where many programs fail because “movement” gets handled by facilities or IT logistics without data ownership involvement.
3) Select the “exact copy” method appropriate to the system
Examples of acceptable approaches depend on architecture:
- Storage snapshot or image-level backup for servers hosting ePHI repositories.
- Database backup that preserves full schema and required logs where relevant to recovery objectives.
- Endpoint backup for laptops/desktops that may store ePHI locally.
- Export + checksum approach only if it preserves completeness and you can prove integrity and retrievability. 1
Avoid ambiguous backups (“we sync to a folder”) unless you can show that it is complete and reliably restorable.
4) Prove “retrievable” with a restore validation step tied to the move
Build a restore validation requirement into the movement workflow. What “validation” means can scale by risk:
- For high-risk systems, require an actual restore test to a controlled location or confirmation that a recent restore test covers the same dataset and configuration.
- For lower-risk equipment, require evidence that backup completed successfully and that the restore path is documented and accessible to the team that will need it. 1
Auditors often ask, “How do you know you can retrieve it?” A green checkmark from a backup job is weaker than a validated restore path.
5) Control access and chain of custody during movement
This requirement sits in the HIPAA Physical Safeguards section; treat movement as a physical risk moment:
- Track who approved the move, who handled the equipment, and where it went.
- If a third party ships or stores the equipment, confirm the third party relationship is governed appropriately for ePHI exposure, and keep shipping/transfer documentation. 1
6) Document exceptions, not “tribal knowledge”
If you decide a backup is “not needed,” require a short exception record:
- Equipment ID, system owner, rationale, and what compensating factors exist (for example, no ePHI present; system is stateless; ePHI resides only on centralized storage already protected). 1
7) Make it auditable: integrate with ITSM and asset management
Operationally, this control works best as a checklist in your service management tool:
- Mandatory fields: equipment ID, ePHI determination, backup method, backup completion evidence, restore validation evidence, approval, movement date/time, destination, chain-of-custody notes. 1
If you use Daydream to manage control execution, treat “backup-before-move” as a tracked requirement with assigned owners, recurring evidence requests, and exception workflows so you can produce proof quickly during an audit.
Required evidence and artifacts to retain
Keep artifacts that show the control ran before movement and that the copy is retrievable:
- Movement request/ticket with timestamps and approvals.
- Asset inventory record showing equipment identifier and owner.
- ePHI scoping decision for the asset (in-scope/out-of-scope and why).
- Backup evidence: logs or reports showing backup job completion for the relevant dataset or image.
- Integrity/retrievability evidence: restore test record, verification notes, checksum validation, or other documented proof that retrieval is possible.
- Chain-of-custody evidence: shipping label, tracking, handoff form, receiving confirmation, or internal transfer form.
- Exception approvals and rationale where backup was deemed not needed. 1
Common exam/audit questions and hangups
Expect these questions, and build your artifacts to answer them cleanly:
- Define “movement of equipment.” Show your triggers and workflow gates. 1
- How do you determine whether ePHI is on the device/system? Auditors look for ownership, not guesswork. 1
- Show me proof you created an exact copy before the move. Timestamped evidence matters. 1
- How do you know the backup is retrievable? Provide restore validation records. 1
- What happens with third parties handling equipment? Show chain-of-custody and governance over the third party interaction. 1
Frequent implementation mistakes and how to avoid them
-
Mistake: Treating this as “general backup exists.”
Fix: Tie it to movement events with a hard stop in the workflow. 1 -
Mistake: Backing up the wrong thing (partial exports, wrong volume, missing attachments).
Fix: Define “exact copy” per system type and have system owners sign off on backup scope. 1 -
Mistake: No restore evidence.
Fix: Require restore validation evidence or a documented, recent restore test that covers the same ePHI dataset. 1 -
Mistake: Facilities or desktop teams move devices without security oversight.
Fix: Put movement triggers in procurement/asset workflows and require security or IT approvals for in-scope assets. 1 -
Mistake: Exceptions live in email.
Fix: Centralize exceptions in the ticketing system and retain them as audit artifacts. 1
Enforcement context and risk implications
No public enforcement cases were provided in the source catalog for this specific requirement. Your risk posture still depends on whether you can prevent loss of availability and integrity of ePHI during routine operational events like moves, replacements, and disposals. A failed move without a retrievable copy can trigger operational disruption and compliance exposure because you cannot produce needed ePHI on demand. 1
A practical 30/60/90-day execution plan
First 30 days (Immediate)
- Inventory movement workflows: data center moves, desktop refresh, disposal, RMA/repair, storage transfers. 1
- Add a temporary manual gate: require security/IT approval before any equipment move involving systems likely to store ePHI. 1
- Draft a one-page “backup-before-move” SOP with triggers, owner responsibilities, and required evidence list. 1
- Identify high-risk repositories of ePHI and confirm backup methods and restore paths exist. 1
Days 31–60 (Near-term)
- Implement ticketing checklist fields and required attachments (backup proof, restore validation, chain-of-custody). 1
- Define standard backup patterns per asset class (servers/storage/endpoints) and publish runbooks. 1
- Train the teams that actually move equipment (IT operations, desktop support, facilities, data center staff) on triggers and stop conditions. 1
- Stand up an exception workflow with required rationale and approvals. 1
Days 61–90 (Operationalize and harden)
- Run a tabletop or controlled exercise: simulate an equipment move failure and prove you can retrieve the exact ePHI copy. Retain the exercise record. 1
- Sample completed movement tickets and perform an internal audit for missing artifacts or weak restore evidence. 1
- Embed metrics that matter operationally (for example, move tickets missing backup evidence) without relying on external statistics. 1
- If you use Daydream, configure recurring evidence requests and control attestations so the process stays consistent across teams and sites.
Frequently Asked Questions
Does “movement of equipment” include sending a server back to the manufacturer for repair?
Yes if the server stores or processes ePHI or could contain ePHI on local storage. Create a retrievable, exact copy before it leaves your control, and retain chain-of-custody documentation. 1
If we use cloud hosting, does this requirement still matter?
It can. Equipment movement can occur in colocation, hybrid, and even in cloud migration events you initiate (like moving workloads between environments). Apply the control to the assets and migration steps you control, and document scope decisions. 1
What counts as an “exact copy” for a database?
The copy must preserve the ePHI as maintained, so a backup method that supports full restoration is typically easier to defend than a partial export. Document what is included and how you would restore it. 1
Do we need to perform a restore test every time we move a device?
The rule requires a “retrievable” copy when needed, so you should define what evidence is sufficient per risk level. For higher-risk moves, require restore validation; for lower-risk moves, document how retrievability is assured. 1
We encrypt drives before shipping. Does that remove the backup requirement?
Encryption reduces confidentiality risk during transit but does not address loss of availability if equipment is damaged or lost. If the move could impair access to ePHI, keep the backup-before-move step or document why it is not needed. 1
What evidence do auditors usually reject?
Screenshots or email statements without timestamps, system identifiers, or linkage to the moved asset often fail. Tie backup evidence and restore evidence directly to the movement ticket and the equipment ID. 1
Footnotes
Frequently Asked Questions
Does “movement of equipment” include sending a server back to the manufacturer for repair?
Yes if the server stores or processes ePHI or could contain ePHI on local storage. Create a retrievable, exact copy before it leaves your control, and retain chain-of-custody documentation. (Source: 45 CFR Parts 160, 162, 164)
If we use cloud hosting, does this requirement still matter?
It can. Equipment movement can occur in colocation, hybrid, and even in cloud migration events you initiate (like moving workloads between environments). Apply the control to the assets and migration steps you control, and document scope decisions. (Source: 45 CFR Parts 160, 162, 164)
What counts as an “exact copy” for a database?
The copy must preserve the ePHI as maintained, so a backup method that supports full restoration is typically easier to defend than a partial export. Document what is included and how you would restore it. (Source: 45 CFR Parts 160, 162, 164)
Do we need to perform a restore test every time we move a device?
The rule requires a “retrievable” copy when needed, so you should define what evidence is sufficient per risk level. For higher-risk moves, require restore validation; for lower-risk moves, document how retrievability is assured. (Source: 45 CFR Parts 160, 162, 164)
We encrypt drives before shipping. Does that remove the backup requirement?
Encryption reduces confidentiality risk during transit but does not address loss of availability if equipment is damaged or lost. If the move could impair access to ePHI, keep the backup-before-move step or document why it is not needed. (Source: 45 CFR Parts 160, 162, 164)
What evidence do auditors usually reject?
Screenshots or email statements without timestamps, system identifiers, or linkage to the moved asset often fail. Tie backup evidence and restore evidence directly to the movement ticket and the equipment ID. (Source: 45 CFR Parts 160, 162, 164)
Authoritative Sources
Operationalize this requirement
Map requirement text to controls, owners, evidence, and review workflows inside Daydream.
See Daydream