Building a Customer Assurance & Continuous Control Monitoring Program that earns customer trust. Access on-demand →

Empowered by HIPAA: The groundbreaking rules protecting patient privacy

Richa Tiwari

Jun 23, 2021

HIPAA was introduced at a time when healthcare systems were transitioning from paper records to digital files, a shift that brought new risks for privacy breaches. Over the decades, HIPAA has evolved into a comprehensive framework that not only mandates data protection but also empowers individuals with rights over their health information. By exploring its historical origins, legislative framework, and real-world implications, we can fully appreciate how HIPAA continues to play a critical role in modern healthcare.

Regulated by the United States Department of Health and Human Services’ Office for Civil Rights (OCR), the Health Insurance Portability and Accountability Act of 1996 (HIPAA) is a federal law that established national standards to protect sensitive patient health information from being disclosed without the patient’s consent or knowledge.

In this post, we will explain the basic concepts involved in the process of becoming HIPAA compliant, outline what you can expect as you work towards compliance, and provide guidance based on our cumulative experience working closely with our customers and auditor partners.

Historical context and the birth of HIPAA

The origins of HIPAA can be traced back to the early 1990s, a period characterized by rapid advances in technology and a growing recognition of the need to protect personal data in all sectors, including healthcare. Enacted in 1996, HIPAA initially focused on health insurance portability, ensuring that individuals could maintain their insurance coverage when changing or losing jobs, and addressing concerns about discrimination based on health status.

However, as digital information management took center stage, HIPAA’s scope was expanded to address issues of privacy and security.

The shift was not merely technical; it was symbolic of a broader recognition that patient data deserved the same level of protection as traditional personal information. Prior to HIPAA, many patients were left vulnerable to unauthorized disclosures, often resulting in harm ranging from financial exploitation to social stigmatization. By codifying rules and responsibilities, HIPAA provided a legal backbone to enforce privacy measures, build trust, and foster a culture of confidentiality in healthcare environments.

Over time, amendments and clarifications have ensured that HIPAA remains relevant despite the continuous evolution of technology. The incorporation of standards for electronic transactions, privacy notices, and methods for safeguarding digital records highlights HIPAA’s adaptive nature. In this way, HIPAA reflects both the technological capabilities of its time and an ongoing commitment to patient privacy.

What is Protected Health Information (PHI)?

Protected Health Information (PHI) refers to any information in a medical record or health-related document that can be used to identify an individual and that was created, used, or disclosed in the course of providing healthcare services, such as diagnosis or treatment.

Under the Health Insurance Portability and Accountability Act (HIPAA), PHI includes individually identifiable health information in any form, electronic, paper, or oral. This means that if data connects a person’s identity with their health condition, healthcare provision, or payment history, it qualifies as PHI.

Examples of PHI include:

  1. Personal identifiers
    Name, address, phone number, or Social Security number.
  2. Medical data
    Test results, diagnoses, or treatment plans.
  3. Billing information
    Insurance details and payment records related to healthcare.
  4. Digital health records
    Data stored in electronic health systems (EHRs).
  5. Communications
    Emails or messages between patients and healthcare providers that contain health information.

PHI is central to HIPAA regulations because it ensures that patients’ personal health information remains confidential, secure, and used only for authorized purposes. Healthcare organizations and their business associates are legally required to protect PHI through administrative, technical, and physical safeguards.

What constitutes Protected Health Information (PHI)?

PHI is any personal health information that potentially identifies an individual that was created, used, or disclosed in the course of providing healthcare services, including, but not limited to:

  1. Names
  2. Addresses
  3. Date of birth
  4. Social security number
  5. Payment or billing information
  6. Medical records (electronic or paper)

Depending on your organization’s function in the healthcare ecosystem, you may be handling PHI either directly or indirectly. While certain organizations have a greater obligation to safeguard patient information under HIPAA, you should be doing your part to ensure that this information is secure and well-protected.

TrustCloud
TrustCloud

Looking for automated, always-on IT control assurance?

TrustCloud keeps your compliance audit-ready so you never miss a beat.

Learn More

Empowerment and the rights of patients

One of the most revolutionary aspects of HIPAA is the empowerment it offers to patients concerning their own health information. Prior to the enactment of HIPAA, patients had little to no legal recourse if their personal health information was misused or disclosed without consent. Today, HIPAA ensures that patients not only have rights over their data but also a clear pathway to assert those rights.

Patients now have the right to receive a copy of their medical records, request amendments if errors are found, and obtain an accounting of disclosures, a record detailing which entities have accessed their data and for what reasons. This transparency is instrumental in building confidence in the healthcare system. When individuals know that they can monitor who has seen their personal information and can correct any inaccuracies, they are more likely to trust the institutions that process and store their data.

Moreover, HIPAA’s commitment to confidentiality also creates a safer environment for people to seek treatment without fear of discrimination or social repercussions. By ensuring that sensitive information, such as mental health diagnoses or HIV statuses, is tightly controlled, HIPAA helps reduce the stigma that can be associated with certain medical conditions.

Beyond direct rights to information, providers under HIPAA are required to implement stringent measures that protect patient data from misuse. This dual focus on patient empowerment and provider accountability has helped reshape the dynamics of trust in the doctor-patient relationship, underscoring the principle that privacy is a right, not a privilege.

Who are you?

HIPAA categorizes PHI-handling organizations into three categories: covered entities, business associates, and subcontractors. While the specifics differ, all of these organizations must safeguard PHI.

Without getting too existential, before we discuss the specifics of the regulation, we’ll determine whether you are a covered entity, a business associate, or a subcontractor.

Covered entities include:

  1. Healthcare providers such as hospitals, clinics, doctors’ offices, pharmacies, and home health agencies.
  2. Health plans such as government programs that pay for healthcare, health insurance companies, health maintenance programs, and military and veterans’ health programs.
  3. Healthcare clearinghouses, i.e., organizations that act as the go-betweens for healthcare providers and insurance providers.

If you are a covered entity, you are subject to, and legally required to, comply with all the standards set forth by HIPAA.

Particularly given the digital nature of today’s health landscape, covered entities do not carry out all their healthcare-related activities and functions by themselves. They often use the services of other organizations, known as business associates.

What is a business associate?

A business associate is an entity that provides services to, or performs certain functions involving the use or disclosure of PHI on behalf of, a covered entity.

Examples of organizations considered to be business associates include:

  1. Third-party administrators
  2. Billing companies
  3. Transcriptionists
  4. Cloud service providers
  5. Data storage firms, electronic and physical records
  6. EHR providers
  7. Consultants
  8. Pharmacy benefits managers
  9. Claims processors
  10. Collections agencies
  11. Medical device manufacturers

In case all of this wasn’t complex enough…

A business associate may delegate a function, activity, or service to a subcontractor.

What is a subcontractor?

A Subcontractor is an entity to whom a Business Associate delegates a function, activity, or service, other than in the capacity of a member of the workforce of the business associate. For example, a Business Associate could hire a media shredding company to securely dispose of printed medical records or a software developer to work on a part of the platform that handles PHI. Subcontractors can be accountants, attorneys, transcription services, email encryption providers, file sharing vendors, backup storage services, and more.

Business associates are required to ensure that subcontractors are implementing and maintaining the systems needed to safeguard PHI.

HIPAA rules demystified

There are four rules designed to keep PHI safe and secure and to properly notify affected parties in case of a data breach.

The HIPAA regulation is composed of four rules: Privacy, Security, Breach Notification, and Omnibus.

Privacy Rule

The Privacy Rule was developed to:

  1. Ensure that organizations that create and store health information take appropriate steps to protect this information from misuse or wrongful disclosure.
  2. Provide individuals with the ability to understand and control how their health information is being used.

Complying with the Privacy Rule assures individuals seeking care that an organization is committed to keeping their information private and secure. Even if they’re not dealing directly with you, these individuals can rely on the HIPAA framework to ensure the privacy of their data across all relevant parties.

Security Rule

The Security Rule protects a subset of information covered by the Privacy Rule and sets the standard for the protection of electronically stored and transmitted PHI (ePHI). It does so by requiring the implementation of administrative, technical, and physical safeguards.

Complying with the security rule demonstrates that you are committed to protecting the confidentiality, integrity, and security of ePHI and have taken the necessary steps to protect your systems from security threats and unauthorized disclosures.

Breach Notification Rule

Any PHI usage or disclosure that isn’t permitted under the Privacy Rule is considered a breach. When a breach occurs, Covered Entities are required to notify affected individuals.

Whether or not you are required to comply with this rule, you can help your Covered Entity customers maintain their compliance by monitoring any impermissible use or disclosure of PHI and promptly notifying affected parties when a breach is detected. Being transparent is a great way to build trust with your customers. Trust us on this.

Omnibus Rule

The HIPAA Omnibus Rule, which became effective in 2013, contains modifications and edits to the Security, Privacy, and Breach Notification Rules and their enforcement. These modifications are intended to enhance confidentiality and security in data sharing and strengthen the protection of protected health information, especially in electronic form.

One major change is the omnibus rule makes business associates and subcontractors liable for non-compliance with HIPAA!

Prepare to pass your HIPAA audit

A successful HIPAA audit shows customers and prospects that you’re serious about protecting their data. TrustCloud helps you achieve HIPAA certification faster, with less stress on each subsequent audit.

Schedule a Demo

How do I know if HIPAA applies to me?

Covered entities must comply with all rules. Otherwise, follow our handy table below to see what’s required and what’s optional. Even if you’re not required to follow a rule, it’s still a good idea if you’re in or working with companies in the healthcare space.

By law, if you are a covered entity, you are required to be compliant with the privacy, Security and breach notification rules.

If you are a business associate, you are only required to be compliant with the Security Rule. However, if you’re working with a covered entity (or want to), you will need to show reasonable proof that you’re able to safeguard the PHI you receive or create on behalf of the covered entity.

Pro tip for healthcare startups

As a startup in the health space, it is important to keep the HIPAA regulations in mind. Identify whether your product is performing a function or service on behalf of a covered entity, and then determine whether or not you process any PHI. If either of these is true, we recommend that you plan to comply with the Security Rule and consider complying with the Privacy and Breach Notification Rules as well.

A Handy-dandy cheat sheet

That’s a lot to take in. If your head is spinning a little, just identify what type of organization you are and follow this table:

 Security RulePrivacy RuleBreach Notification RuleSigning BAA*
Covered EntityRequiredRequiredRequired 
Business AssociateRequiredOptionalOptionalRequired (with Covered Entity)
SubcontractorOptionalOptionalOptionalRequired (with Business Associate)

 

Read the “Effortless HIPAA compliance for telemedicine success” article to learn more!

How do I prove compliance?

HIPAA does not require an assessment to be performed, and there is also no such thing as an official HIPAA certification; the OCR does not endorse or recognize any such “certifications” provided by private organizations. There is no standard or implementation specification that requires a covered entity to “certify” compliance.

The OCR does not endorse or recognize the ‘certifications’ provided by private organizations. As long as it is done, the regulating body doesn’t care if the HIPAA assessment is performed internally or by an external organization. Though being evaluated by an independent third party is still ideal. Some companies may choose to manage compliance internally and that is fine.

If you are seeking to demonstrate HIPAA compliance to your customers and potential customers, there are several options you can consider:

  1. Conduct a self-assessment against the HIPAA requirements.
  2. An independent HIPAA gap assessment with a consultant.
  3. An independent HIPAA compliance attestation report.

Even though it’s not required, an attestation report holds more weight than a self-assessment, so you may want to consider going down this path if you need to demonstrate the highest level of compliance.

What will it cost me to become compliant?

Traditionally, HIPAA can cost anywhere from $20,000 to $75,000 when you factor in the cost of an audit firm as well as internal costs, including loss of productivity, staff training, and resources needed to meet specific requirements.

At TrustCloud, we believe compliance shouldn’t cost an arm and a leg. We want to make the readiness and audit process both affordable and simple. We’ve broken the cost down into two areas:

  1. A compliance automation platform. By automating much of the process, platforms such as TrustOps help you reduce and better manage your internal costs. We’ve developed a transparent and straightforward pricing structure to make it easier for you to manage the overall cost of the program (read: $8,000/year for HIPAA with no hidden consulting fees.)
  2. An auditor. We’ve developed strong relationships with a number of audit firms. Not only does this mean that they are trained on the platform and know how to evaluate your business, but they are also able to pass along sizable discounts as a result of a referral from TrustCloud. HIPAA audit partners in the TrustCloud network charge between $10,000 and $20,000 for HIPAA audits, based on the maturity and complexity of the engagement.

How to prepare for a self-assessment or a gap assessment?

Appoint a compliance and/or security officer to lead the effort. Ensure that the team and you understand all the requirements, prepare the appropriate controls and policies, and complete a thorough internal review.

If you’ve been through an audit in the past, you are well aware of how tedious and time-consuming the process can be for you and your team. If not, think of the great joy brought on by lots and lots of spreadsheets.

The People

When pursuing HIPAA compliance, you may want to consider appointing a compliance and/or a security officer to lead the effort. These functions can be done by the same individual, or the work can be divided within the team.

The role of compliance officer will be responsible for developing any required procedures, conducting a risk assessment in coordination with senior management, investigating any incidents resulting in a breach, and reporting when a breach occurs.

The role of security officer will be responsible for developing security policies, conducting training, creating a disaster recovery plan, testing systems, and implementing mechanisms to prevent unauthorized access to PHI.

The Process

The process can be broken down into three major components:

  1. Understanding Requirements
    It is important for you to know what constitutes a breach of ePHI and how to report a breach to the OCR should it occur. You must develop a risk management program, perform a risk assessment, document data management policies, and create security and training plans against these requirements.
  2. Prepare Materials
    In this next phase, you will create a list of controls and policies to adopt, gather required evidence artifacts, document all necessary procedures, and provide adequate training to your team. If you’re a TrustOps user, we’ve got your back. TrustOps helps you automate much of this process and automatically maps your controls to the Code of Federal Regulations to make it easy for you to assess your systems, policies, and procedures. If you’re not a TrustOps user yet, call us… We’d love to have your back, too.
  3. Complete Internal Review
    Whether or not you choose to do an independent assessment, you must first conduct a thorough internal review to ensure that you are meeting all requirements. The internal audit review you get when you work with us analyzes your gaps against HIPAA (as well as other compliance standards such as SOC 2) and could be used as your self-assessment.

How to choose your independent HIPAA assessor?

If you opt to be independently assessed, you will find that the audit process can be nerve-racking. The auditor will review controls, policies, and other artifacts in your program, verify them against submitted evidence, and conduct tests of their own to ensure that you are meeting the requirements for the HIPAA rule(s) you want to achieve.

How to choose your independent HIPAA assessor

Here are a few things you should consider when selecting an auditor:

  1. Accreditation: An independent attestation report is issued under the AICPA attestation standards, which are designed to allow a CPA firm to determine an organization’s compliance with the HIPAA requirements.
  2. Find a reputable firm. It doesn’t have to be a brand-name firm. One with a good reputation will suffice. If you need guidance in this area, we’re happy to provide some recommendations.
  3. Experience matters. An auditor with more experience is likely to have a better and more thorough understanding of HIPAA, how to evaluate your controls against its requirements, and any applicable best practices.
  4. Fit. Auditors are like snowflakes; no two are alike. It’s important that your auditor understands your business, so they can expertly assess if there are any gaps or deficiencies.

What does the assessor look for?

Auditors are guided by the IIA standard Code of Ethics, which tasks auditors with being independent and objective. The documentation you developed as evidence is seen by an auditor as proof that a particular control exists, and helps them evaluate operational effectiveness (whether or not the control is performing as it should).

Using a combination of techniques, an auditor obtains an in-depth understanding of your program and how it fits into the HIPAA framework. These techniques may include:

  1. Observation: Observing you perform a task relevant to specific control.
  2. Inquiry: Interviewing you or your team to learn about a specific process.
  3. Inspection: Requesting evidence of compliance with a control.

In order to satisfy the auditor’s needs, it’s imperative that documentation is both complete and accurate. The source of the information in the document has to be identified and verified, the content of the document must be written with integrity, and the documentation has to be easily accessible and retrievable for audit purposes. At the end of the day, you want your auditor to come to the same conclusion about the state and health of your information security program as you would. It’s your job to help them come to that conclusion.

Once an auditor has determined that your controls, policies, and procedures meet all applicable requirements, they will give you their stamp of approval. You have now achieved HIPAA compliance. Congratulations!

But… wait. There’s more.

What is a HIPAA violation?

A HIPAA violation occurs when an individual or organization fails to adhere to the requirements set forth under the Health Insurance Portability and Accountability Act. Even after completing a HIPAA audit, there remains an ongoing responsibility to comply with all HIPAA Privacy, Security, and Breach Notification Rules.

These violations can happen due to negligence, oversight, or deliberate actions that compromise the confidentiality, integrity, or availability of protected health information (PHI). They can lead to serious consequences, including financial penalties, legal action, and loss of trust from patients or clients. Maintaining compliance requires continuous monitoring, regular training, and proper documentation of all security and privacy measures in place.

Common causes of HIPAA violations

Here are six common causes of HIPAA violations often seen in digital environments:

  1. Failure to conduct a risk analysis
    Not performing regular and thorough risk assessments to identify and address vulnerabilities in systems that store or process PHI.
  2. Failure to provide HIPAA and security awareness training
    Not educating employees on HIPAA rules, PHI handling procedures, and emerging cyber risks.
  3. Failure to maintain and monitor PHI access logs
    Not tracking and reviewing who accesses PHI, when, and why, which can lead to undetected unauthorized access.
  4. Failure to terminate PHI access rights
    Allowing former employees, contractors, or vendors to retain access to PHI after their role no longer requires it.
  5. Failure to document compliance efforts
    Not keeping thorough records of HIPAA policies, audits, training sessions, and corrective actions taken to maintain compliance.
  6. Improper disposal of PHI
    Discarding physical or electronic records containing PHI without following secure destruction methods, leaving sensitive data exposed.

How TrustCloud helps you achieve HIPAA compliance

Navigating HIPAA’s complex requirements no longer needs to be a strain on your team. TrustCloud streamlines the entire compliance journey by automating gap assessments, documentation, policy management, and evidence collection, letting you move from chaos to audit-ready with less effort. It continuously monitors your compliance posture across systems and cloud environments and keeps your documentation current and organized. That means you’re not just ready for your initial HIPAA audit; you’re always ready for the next one, with less stress and more confidence.

Read the “Top HIPAA violations to avoid for patient trust” article to learn more!

Challenges and criticisms of HIPAA

While HIPAA has set the gold standard for protecting patient privacy, it continues to face challenges and criticisms, particularly in today’s fast-evolving digital landscape. Many healthcare providers find the regulations complex, resource-intensive, and difficult to navigate. Smaller organizations often struggle to meet compliance demands due to limited budgets and technical expertise.

Challenges and criticisms of HIPAA

Additionally, balancing strong data protection with efficient information sharing remains a persistent issue. Critics argue that HIPAA’s rigidity can slow innovation in healthcare technology. However, despite its limitations, HIPAA remains a cornerstone of patient trust, and ongoing efforts to modernize its framework are crucial for maintaining relevance and resilience.

  1. Complexity and administrative burden
    HIPAA’s detailed regulations can be daunting, especially for smaller healthcare providers. Understanding and implementing its administrative, technical, and physical safeguards require significant effort and expertise. Many organizations struggle with documentation, reporting, and employee training requirements, which can consume valuable time and resources. The complexity often leads to confusion and inconsistent compliance across healthcare entities.
  2. Resource and cost challenges
    Achieving HIPAA compliance involves investments in security technologies, risk assessments, and ongoing staff education. Smaller clinics or independent practices may find these expenses overwhelming, forcing them to choose between compliance and patient service improvements. The cost of implementing encryption, audit systems, and regular training programs can significantly impact operational budgets and resource allocation.
  3. Barriers to information sharing
    While HIPAA prioritizes data protection, strict privacy rules can sometimes hinder the timely exchange of information among healthcare providers. For instance, delays in data sharing during emergencies or referrals can affect patient care coordination. Providers often err on the side of caution to avoid penalties, inadvertently slowing down vital communication and decision-making in critical care situations.
  4. Adaptability in a digital era
    As technology evolves, critics question whether HIPAA can keep pace with emerging risks such as telehealth, AI-driven diagnostics, and IoT medical devices. While updates like the HITECH Act improved enforcement, many experts argue that HIPAA needs continuous modernization. The challenge lies in ensuring HIPAA remains flexible enough to protect data without stifling healthcare innovation.
  5. Need for continuous dialogue and evolution
    To address HIPAA’s limitations, collaboration between regulators, healthcare professionals, and technology experts is essential. Ongoing dialogue ensures the law evolves with changing cybersecurity threats and digital advancements. A balanced approach, combining strong privacy protection with operational flexibility, can help healthcare organizations maintain compliance while improving efficiency, patient outcomes, and technological innovation.

What is the cost of a HIPAA violation?

Penalties for HIPAA are applicable to Covered Entities and Business Associates alike. The OCR is currently using a 4-tier system to gauge the level of non-compliance and determine if any financial penalties are to be levied.

What is the cost of a HIPAA violation

Tier 1: Organizations in this tier have made a reasonable amount of effort to comply with HIPAA, but they may not have known about a breach and could not have avoided it. Financial penalties could range from $100 to $50,000 per violation, with a maximum penalty of $25,000 per year.
Tier 2: Organizations in this tier have made a reasonable amount of effort to comply with HIPAA and were aware, or should have been aware, that a breach occurred. Financial penalties could range from $1000 to $50,000 per violation, with a maximum penalty of $100,000 per year.
Tier 3: A breach occurred as a result of “willful neglect” on the organization’s part. However, attempts have since been made to correct the violation. Financial penalties for organizations in this tier are $10,000 – $50,000 per violation, with a maximum penalty of $250,000 per year.
Tier 4: A breach has occurred as a result of willful neglect, but no attempts have been made to correct the violation. The financial penalty for organizations that fall into this tier is $50,000 per violation, with a maximum penalty of $1.5 million per year.

What do I do when I become aware of a breach, and how does this affect my compliance status?

Under the HIPAA Breach Notification Rule, you are required to notify relevant parties of any breach. As a first step, you should evaluate the severity of the breach. Once you have the full picture, you have 60 days to notify affected individuals, the OCR, and any other relevant parties. It’s important to note that you must provide these notifications even if you are unsure whether PHI has been compromised. Any violations of the HIPAA Breach Notification Rule will result in financial penalties and in noncompliance. The OCR publishes a list of cases currently under investigation (a bit of public shaming, if you will), and you should make it your goal to never be on it.

Trust Issues: Your Trusted Source for GRC & Security News. Subscribe Now!

Complying with the HIPAA standards, rules, and regulations is an ongoing effort that requires careful monitoring of your information security program against known, suspected, and unknown threats. Maintaining continuous compliance helps you build trust with your customers, proving that safeguarding their information is in your best interest as well as theirs.

And you’re in luck; it just so happens continuous compliance is what we do.

The future of patient privacy and HIPAA

As technology continues to reshape the healthcare industry, the future of HIPAA and patient privacy remains a key area of interest and innovation. With the rapid emergence of telehealth services, wearable health devices, and personalized medicine, maintaining and enhancing privacy safeguards has never been more critical. The next generation of HIPAA-compliant solutions will likely leverage blockchain technologies, improved encryption methods, and real-time monitoring systems to create an even more secure healthcare ecosystem.

Policymakers and industry experts are actively engaging in discussions about how HIPAA can be refined to better protect patients in this dynamic digital landscape. One proposal involves greater integration of automated compliance monitoring systems that can detect and respond to anomalies in real time. Such systems would not only improve security but also reduce the administrative burden on healthcare providers, allowing them to focus more on direct patient care.

Another promising development is the potential for international collaboration. As data privacy concerns transcend national borders, HIPAA’s principles of transparency, accountability, and strict data protection are influencing global standards. Countries worldwide that are in the process of upgrading their own healthcare privacy laws are looking to HIPAA as a model that balances security with the need for data accessibility.

Ultimately, the future of patient privacy under HIPAA lies in a collaborative approach. By encouraging continuous dialogue between regulatory authorities, healthcare institutions, and technology innovators, HIPAA can evolve to meet the challenges of tomorrow. The ongoing commitment to protecting patient data while fostering an environment of innovation will ensure that HIPAA remains a cornerstone of modern healthcare.

Summing it up

Preparing for a SOC 2 audit begins with a comprehensive readiness assessment, a strategic evaluation to verify how existing policies, processes, and controls align with SOC 2 requirements. This early diagnostic phase identifies compliance gaps before launching a formal audit, allowing time for remediation and refinement. It typically involves scoping the systems to be audited, mapping risks and controls to assessed criteria, gathering evidence, and addressing identified discrepancies. Whether conducted internally or with outside experts, this structured approach builds confidence and improves audit readiness.

Undertaking a readiness assessment also creates several practical advantages: it minimizes surprises during the actual audit, offers a realistic timeline for resource planning, and lowers costs by avoiding last-minute fixes. Organizations that proactively assess their environment are better positioned to pass SOC 2 Type I or Type II audits smoothly and demonstrate ongoing reliability to customers and partners. It lays the groundwork for a stronger, more sustainable compliance program and elevated trust.

FAQs

What is HIPAA and who must comply?

HIPAA, the Health Insurance Portability and Accountability Act of 1996, sets federal rules for protecting the privacy and security of health-related information in the U.S. It defines covered entities (like healthcare providers, insurers, and clearinghouses) and their business associates who handle Protected Health Information (PHI).

HIPAA enforces standards across four regulatory areas: the Privacy Rule, Security Rule, Breach Notification Rule, and Omnibus Rule. It mandates administrative, physical, and technical safeguards for managing and disclosing PHI while also granting individuals the right to access, correct, or restrict disclosure of their information. Noncompliance may result in civil or criminal penalties depending on the type and severity of the violation.

Protected Health Information (PHI) includes any individually identifiable health data that relates to a person’s past, present, or future physical or mental health, treatment, or payment. Covered identifiers include names, addresses, Social Security numbers, diagnosis details, medical records, billing histories, and electronic health records (EHRs).

Both written and electronic formats are covered. HIPAA regulates the collection, storage, transmission, and use of PHI, ensuring it is only shared with authorized individuals or for permissible purposes. Disclosures to law enforcement, breach notifications, or third-party sharing require specific protocols and patient authorizations unless permitted under HIPAA exceptions.

HIPAA applies to “covered entities,” healthcare providers, health plans, and billing services known as clearinghouses and it also includes their “business associates.” These are outside vendors or partners that handle Protected Health Information (PHI) on behalf of the main organizations. Companies that support healthcare operations, like tech vendors, billing services, or cloud-hosting providers, must comply with HIPAA when they access, store, or transmit PHI. That includes operating under a Business Associate Agreement (BAA) that imposes the same privacy and security responsibilities as covered entities. Together, this framework ensures that the chain of data protection extends across the entire healthcare service ecosystem.

Protected Health Information, or PHI, refers to any data relating to an individual’s health condition or treatment, combined with information that identifies them, whether the format is electronic, verbal, or on paper. This includes names, addresses, medical records, lab results, payment details, and more. The key is identifiability: if the data could reasonably pinpoint an individual, it falls under HIPAA’s protection. This broad definition ensures that virtually any information tied to a person’s health remains private unless proper procedures or authorizations allow its use or disclosure. It’s the core focus of HIPAA’s rules, so identifying and safeguarding PHI is essential.

Got Trust?®

TrustCloud makes it effortless for companies to share their data security, privacy, and governance posture with auditors, customers, and board of directors.
Trusty