top of page
Search

Texas Small‑Business Tech Checklist – HIPAA, FERPA, PCI‑DSS, and CMMC Made Simple

Why These Four Frameworks Matter

Even if you run a boutique coffee shop or a local consulting firm, you may still fall under one—or more—of the following regulations because of the data you handle:

Regulation

Typical Texas‑business examples

Core “must‑do” focus

HIPAA (Health Insurance Portability & Accountability Act)

Medical clinics, dental offices, physical‑therapy centers, health‑tech startups, tele‑health services.

Protect protected health information (PHI) with administrative, physical, and technical safeguards.

FERPA (Family Educational Rights and Privacy Act)

Private schools, tutoring centers, after‑school programs, education‑technology platforms that store student records.

Secure student education records and limit unauthorized disclosures.

PCI‑DSS (Payment Card Industry Data Security Standard)

Any business that accepts credit‑card payments—retail stores, restaurants, e‑commerce sites, subscription services.

Encrypt cardholder data, maintain a secure network, and regularly test security controls.

CMMC (Cybersecurity Maturity Model Certification)

Contractors and subcontractors working with the U.S. Department of Defense (DoD) or handling Controlled Unclassified Information (CUI).

Meet a maturity level (1‑5) of cybersecurity practices defined by the DoD.

Missing any of these requirements can trigger hefty fines, loss of contracts, or even criminal liability. Below is a practical, step‑by‑step guide that tells you exactly what to know and what to do with your technology to stay compliant.

1. HIPAA – Protecting Patient Health Information

1.1 Know When HIPAA Applies

  • You are a covered entity (health‑care provider, health‑plan, or health‑care clearinghouse) or

  • You are a business associate (any vendor that creates, receives, transmits, or stores PHI on your behalf).

1.2 Core Technical Controls

Control

What It Looks Like in Practice

Encryption (at rest & in transit)

Use TLS 1.2+ for email, web portals, and VPN connections; enable full‑disk encryption on laptops and mobile devices.

Access Controls

Role‑based permissions, unique user IDs, and strong passwords (≥12 characters) plus Multi‑Factor Authentication (MFA) for any remote access.

Audit Logging

Enable detailed logs for all systems that store PHI (EHR, file servers, email). Retain logs for at least 6 years.

Backup & Disaster Recovery

Perform encrypted backups daily, store them off‑site (or in a HIPAA‑compliant cloud), and test restores quarterly.

Secure Disposal

Use shredding or cryptographic wiping when decommissioning devices that held PHI.

1.3 Administrative Steps

  • Risk Assessment: Conduct a formal HIPAA risk analysis at least annually. Document findings and remediation plans.

  • Policies & Training: Adopt a HIPAA Privacy and Security Policy; train all staff (including contractors) on handling PHI.

  • Business Associate Agreements (BAAs): Sign a BAA with every vendor that touches PHI (cloud storage, email, transcription services, etc.).

2. FERPA – Safeguarding Student Records

2.1 When FERPA Applies

  • You receive federal funding (directly or indirectly) and maintain education records for students.

  • You are a private K‑12 school that voluntarily complies with FERPA (many do to assure parents).

2.2 Technical Safeguards

Control

Implementation Tips

Encryption

Secure any portal where grades, transcripts, or disciplinary records are accessed. Use HTTPS with HSTS and encrypt stored files.

Access Controls

Assign role‑based access (e.g., teachers vs. administrators). Require MFA for any remote login.

Logging

Log all accesses to student records; review logs weekly for unusual activity.

Secure File Sharing

Use encrypted file‑transfer services (e.g., Proton Drive) instead of unsecured email attachments.

Device Management

Enforce full‑disk encryption on school laptops/tablets; implement mobile device management (MDM) to remotely wipe lost devices.

2.3 Administrative Actions

  • FERPA Notice: Publish a clear notice describing parents’ and students’ rights to inspect and amend records.

  • Consent Management: Obtain written consent before disclosing personally identifiable information (PII) from education records, unless an exception applies.

  • Staff Training: Conduct annual FERPA awareness sessions for teachers, administrators, and support staff.

3. PCI‑DSS – Securing Credit‑Card Transactions

3.1 Determine Your PCI Scope

  • Identify cardholder data environment (CDE): any system that stores, processes, or transmits credit‑card numbers.

  • Reduce scope wherever possible (e.g., use tokenization or third‑party payment gateways that keep card data off your network).

3.2 Mandatory Technical Controls

Requirement

Practical Implementation

Build & Maintain a Secure Network

Install a firewall, change default passwords, and segment the CDE from the rest of your network.

Protect Cardholder Data

Store only the last four digits of PAN; use AES‑256 encryption for any stored data; enforce TLS 1.2+ for transmission.

Vulnerability Management

Run quarterly vulnerability scans (external) and monthly internal scans; patch OS and applications within 30 days.

Access Control

Implement least‑privilege access, unique IDs, and MFA for all personnel with CDE access.

Monitoring & Testing

Enable real‑time intrusion detection/prevention (IDS/IPS); maintain logs for at least 1 year and review them daily.

Security Policies

Document an information‑security policy and incident‑response plan; train staff on secure card‑handling procedures.

3.3 Validation Options

  • SAQ A – If you outsource all payment processing to a PCI‑validated provider (e.g., Stripe, Square) and never touch card data.

  • SAQ D – If you host your own e‑commerce platform and store card data.

Tip: Most small Texas retailers qualify for SAQ A by using a hosted checkout page, dramatically simplifying compliance.

4. CMMC – Meeting DoD Cybersecurity Requirements

4.1 Who Needs CMMC?

  • Any defense contractor or subcontractor that handles Controlled Unclassified Information (CUI) for the Department of Defense.

4.2 Choosing a Maturity Level

  • Level 1 – Basic “Foundational” cyber hygiene (mostly for low‑risk, non‑CUI work).

  • Level 2 – Intermediate (acts as a transition to higher levels).

  • Levels 3‑5 – Advanced to “Expert” (required for high‑value CUI).

Most small Texas firms start at Level 2 or Level 3.

4.3 Core Practices (Common Across Levels)

Domain

Example Controls

Access Control (AC)

MFA, least‑privilege, session timeout.

Awareness & Training (AT)

Quarterly security awareness, phishing simulations.

Audit & Accountability (AU)

Centralized logging, log retention ≥ 90 days, regular review.

Configuration Management (CM)

Hardened baseline images, change‑control process.

Identification & Authentication (IA)

Strong passwords, password vaults, hardware tokens.

Incident Response (IR)

Formal IR plan, designated response team, post‑incident lessons learned.

Maintenance (MA)

Remote maintenance secured via VPN and MFA.

Media Protection (MP)

Encrypted removable media, controlled disposal.

Physical Protection (PE)

Locked server rooms, visitor logs.

Personnel Security (PS)

Background checks for personnel with CUI access.

Risk Management (RM)

Annual risk assessments aligned with NIST SP 800‑171.

System & Communications Protection (SC)

End‑to‑end encryption, segmented networks.

System & Information Integrity (SI)

Anti‑malware, patch management, integrity checks.

4.4 Getting Certified

  1. Self‑Assess against the chosen CMMC level using the official model.

  2. Remediate Gaps (most gaps involve MFA, encryption, and documentation).

  3. Engage a CMMC Third‑Party Assessor Organization (C3PAO) for an official audit.

Tip for Texas SMEs: Partner with an MSP that already holds a CMMC certification. They can extend their compliant environment to your organization, reducing the cost and effort of a standalone audit.

5. Putting It All Together – A Unified Tech‑Compliance Roadmap

Phase

Action Items (All Regulations)

1️⃣ Discover & Classify

Run an automated asset inventory. Tag each system as PHI, Student Data, Cardholder Data, CUI, or None.

2️⃣ Harden the Foundation

Deploy firewalls, enable MFA, encrypt disks, and enforce strong password policies across every device.

3️⃣ Segment & Isolate

Create network zones: HIPAA zone, PCI zone, CUI zone. Use VLANs or separate subnets to prevent cross‑contamination.

4️⃣ Implement Specific Controls

• HIPAA – BAAs, audit logs, secure email.<br>• FERPA – role‑based access, encrypted portals.<br>• PCI – tokenization, quarterly scans.<br>• CMMC – documentation, incident‑response playbook.

5️⃣ Document & Train

Write concise policies for each regulation. Conduct quarterly staff trainings (phishing, data‑handling, incident reporting).

6️⃣ Continuous Monitoring

Enable a 24/7 SOC or managed detection service. Receive alerts for any unauthorized access to PHI, student records, or card data.

7️⃣ Test & Audit

Perform quarterly mock breach drills, annual risk assessments, and internal audits against each framework’s checklist.

8️⃣ Review Contracts

Ensure every vendor you work with signs the appropriate BAA, PCI‑DSS Attestation, or CMMC‑aligned subcontractor agreement.

6. How TodoSecure Can Be Your Compliance Co‑Pilot

Service

How It Aligns With the Four Frameworks

Managed Security Operations Center (SOC)

24/7 monitoring, log aggregation, and incident response for HIPAA, PCI, FERPA, and CMMC environments.

Secure Cloud Migration

Moves email, file storage, and backup to Proton‑encrypted services, automatically generating BAAs for HIPAA and PCI.

Network Segmentation & Firewall Management

Designs VLANs that isolate PHI, CUI, and cardholder data, satisfying both PCI scope reduction and CMMC segmentation requirements.

Patch‑Management & Vulnerability Scanning

Automated OS/application patching and quarterly external scans—critical for PCI‑DSS and CMMC Level 2+.

Policy & Training Suite

Customizable HIPAA, FERPA, PCI, and CMMC policy templates plus quarterly staff training modules.

Compliance Audits & Documentation

Generates audit‑ready reports (risk assessments, log retention, BAA inventories) that you can hand to regulators or auditors.

CMMC Readiness Program

Provides pre‑assessment, gap remediation, and connects you with a vetted C3PAO for final certification.

Result: You focus on growing your business while TodoSecure keeps your technology compliant, secure, and audit‑ready.

7. Quick‑Start Checklist for Texas Small Businesses

  1. Identify which regulations apply (HIPAA, FERPA, PCI, CMMC).

  2. Inventory all devices, apps, and data flows.

  3. Enable MFA everywhere (email, VPN, cloud apps).

  4. Encrypt data at rest and in transit.

  5. Sign BAAs / PCI contracts / CMMC clauses with every vendor.

  6. Deploy a firewall and segment networks by data type.

  7. Schedule quarterly vulnerability scans and monthly patch cycles.

  8. Document policies and run staff training within 30 days.

  9. Set up automated backups and test restores quarterly.

  10. Partner with an MSP (like TodoSecure) for continuous monitoring and compliance reporting.

Closing Thought

Compliance isn’t a one‑time project; it’s an ongoing discipline that protects your reputation, your customers, and your bottom line. By mastering the technology fundamentals—encryption, access control, monitoring, and documentation—you’ll meet HIPAA, FERPA, PCI‑DSS, and CMMC requirements without sacrificing agility.

Need a hand getting started? Contact TodoSecure today for a free compliance health check and let us turn your tech stack into a certified, secure foundation for growth.

 
 
 

Comments


bottom of page