clever–tenacious–precise

HIPAA Compliance Basics: Fundamental Knowledge for Practice Leaders

Healthcare provider wearing a medical mask writing “HIPAA,” symbolizing HIPAA compliance, HIPAA security rule requirements, and PHI protection for growing medical practices, as explained by Scorpion Five Technologies.

Key Takeaways

  • HIPAA compliance requires adherence to three main rules: Privacy Rule, Security Rule, and Breach Notification Rule, with the Privacy and Security Rules having the greatest operational impact on practices

  • Risk assessments must be conducted on all digital systems owned by covered entities using structured frameworks like NIST SP 800-30, with nine specific elements required by the Department of Health and Human Services

  • Business Associate Agreements (BAAs) are mandatory legal contracts extending HIPAA obligations to third-party vendors, making full compliance unavoidable for functioning practices

  • Administrative, physical, and technical safeguards form the Security Rule foundation, with modern cloud-based tools making implementation more achievable than it appears

  • Civil penalties range from approximately $100 to $50,000 per violation across four tiers, with potential criminal charges carrying up to 10 years imprisonment for malicious violations

Intro: Understanding the Basics of HIPAA Compliance

As the leader of a practice, you don’t need to be an expert in every line of the health insurance portability and accountability act (HIPAA) regulations, but you do need to understand the basics to make smart decisions.

HIPAA, briefly defined, serves as the foundational privacy and security regulations for health information technology in the United States. The law comprises three main rules that structure compliance obligations:

  • The Privacy Rule governs how and when protected health information can be disclosed, establishing patient rights and organizational responsibilities for information handling.

  • The Security Rule mandates specific administrative, physical and technical safeguards to protect electronic protected health information (ePHI) stored or transmitted by covered entities.

  • The Breach Notification Rule defines what constitutes a reportable breach and establishes notification requirements when unauthorized access occurs.

A key insight is that HIPAA compliance isn’t a prescriptive checklist, and it never could be. Entities that must comply with HIPAA come in so many sizes and organizational patterns that no regulatory body could ever create a list of to-dos that encompass every scenario. Instead HIPAA is a collection of regulations that are effectively asking you to balance Confidentiality, Integrity, and Availability (CIA) of protected health information (PHI).

Health and Human services (HHS) expects each covered entity to assess risk and create controls commensurate to its operations. This risk-based approach means that a small family practice and a large health system will have different implementations of the same underlying requirements, but both must demonstrate systematic attention to protecting individually identifiable health information.

Title 45 is a large regulatory text that governs public safety at a federal level. The text is broken into several subparts and subchapters, with various federal agencies having dominion over the portions of the regulation that they have statutory authority over. The Department of Health and Human services has statutory authority over Subtitle A. Under this subtitle we find Subchapter C, which is the locus of most HIPAA regulatory language.

HIPAA compliance can generally be though of as adherence to Parts 160, 162, and 164 under Subchapter C. Within the regulations, we find 3 overarching “HIPAA Rules” that structure most compliance obligations. The Privacy Rule and the Security Rule will have the greatest bearing on your business operations, as they contain the largest share of required, regularly occurring activities.

Note that HIPAA implementations come in both “required” and “addressable” form. Required are those things that must be in place from day one, while addressable items can be implemented as part of longer-running plan, or have documented justification for why they aren’t applicable in your specific case. Consider reading this article to learn about the System Security Plan (SSP) approach.

It’s crucial to understand that “addressable” does not mean optional—it means practices must justify not implementing a given control, or have a concrete plan that they follow.

If the entity you manage fits the definition of a Covered Entity in the Subpart C regulatory text, you are legally bound to comply with HIPAA. Covered entities include health plans, healthcare clearinghouses, and healthcare providers who transmit health information electronically. The scope is broader than many realize—even small practices that use electronic health records or submit electronic claims are typically covered entities.

Business associates became directly liable under the HITECH Act of 2009. This brought about the concept that there must be an agreement detailing each party’s responsibility in protecting PHI between covered entities and the service providers they engage with—these agreements are called Business Associate Agreements (BAA).

BAAs further bind your operations to HIPAA requirements, because you will eventually need some service that requires you to sign a a BAA—e.g., Google Cloud services or HIPAA-compliant messaging apps. This creates a web of compliance obligations that extends throughout the healthcare ecosystem, making complete compliance with HIPAA unavoidable, no matter the size and maturity of the operation.

HIPAA Privacy Rule: How and When PHI Can be Disclosed (45 CFR Part 164 Subpart E)

The basic purpose of the Privacy Rule is to govern how protected health information and electronic protected health information can and should be disseminated.

The Privacy Rule requires documented policies and controls governing how protected health information is used, shared, or disclosed within and outside your organization.

Core principles include patient consent for most disclosures, minimum necessary use (limiting access to only what’s needed for specific purposes), patient rights to access or amend records, and accounting of disclosures for six years.

These privacy principles create the need for small and large practices alike for secure messaging systems, formal record release procedures, and comprehensive staff training programs.

Operationally, compliance is mostly achieved through documented policies and procedures that specify when staff can access or share patient information, how to handle patient requests for records, and what constitutes appropriate authorization for non-routine disclosures.

The complete regulation can be viewed at the Privacy Rule text.

HIPAA Security Rule: Required PHI Protections (45 CFR Part 164 Subpart C)

For ease of understanding, we are splitting this rule into subsections, as the HIPAA Security Rule encompasses multiple categories of security measures.

All systems and software owned and managed by a covered entity must have these safeguards in place, even if they will never store electronic protected health information. For example, In cases where a system will never contain electronic protected health information, compliance might be as simple as noting in policy documents that electronic protected health information must never be on said system, and the training can briefly state that policy. However, the system is indeed in HIPAA scope simply because the covered entity owns and manages it.

The complete regulation can be viewed at the Security Rule text.

Administrative Safeguards

Administrative safeguards are the policies, procedures, and governance processes that manage the selection, development, implementation, and maintenance of security measures. These safeguards ensure that the right people have appropriate access to systems and that everyone understands their security responsibilities.

The administrative safeguards include 9 standards, with specific required and addressable implementation specifications for each:

  • Security Officer designation (required)

  • Workforce training and access management (required)

  • Information access management (addressable)

  • Access authorization procedures (addressable)

  • Workforce clearance procedures (addressable)

  • Information system activity review (required)

  • Security incident procedures (required)

  • Contingency plan development (required)

  • Regular security evaluations (addressable)

Security roles like that of the HIPAA Security Officer can be contractors and don’t necessarily need to be employees, allowing leaders the flexibility to have a more medical-focused staff and hire qualified firms like S5T to perform these duties.

However, those designated security roles must receive unwavering support from leadership—if the security officer says “no” to something, that has to stand, even if it was an owner they said no to.

Training is also a recurring requirement—not a one-time event. Everyone handling protected health information must complete annual training and sign policy acknowledgments. Documentation of all acknowledgements, policies, risk assessment, and training must be retained for at least six years.

Technical Safeguards

Technical safeguards focus on technology and how it is configured to protect electronic protected health information and control access to it.

The technical safeguards include 5 standards:

  • Access controls with unique user identification (required)

  • Audit controls and activity logging (required)

  • Integrity controls to prevent improper alteration (addressable)

  • Person or entity authentication (required)

  • Transmission security for data in transit (addressable)

With modern cloud-based tools and platforms, achieving all these technical safeguards is more possible than it seems on the surface, particularly if you are working with a firm that has a strong background in building compliant systems and procedures.

Modern cloud-based tools have come a long way, and users will not have a burdensome experience using HIPAA-hardened systems when properly implemented.

Physical Safeguards

Physical safeguards protect the physical facilities and equipment where electronic protected health information is stored or accessed. These safeguards ensure that unauthorized individuals cannot gain physical access to systems or data.

The physical safeguards include 4 standards covering:

  • Facility access controls with locks, badges, and visitor procedures (addressable)

  • Workstation use policies and procedures (required)

  • Workstation security and device security (addressable)

  • Device and media controls for asset management and disposal (required)

Many of these physical safeguards that are required for workstation use, as well as workstation and device security are accomplished automatically when a qualified provider implements the security controls of technical safeguards.

Devices can be attached to centralized and cloud-based endpoint management systems and identity management systems that together also control physical access ipso facto.

For example, enabling and centrally requiring two-factor authentication protects a physical laptop from being logged into by anyone who shouldn’t be logging into it, and requiring disk encryption means that even if someone ran off with the laptop, they could never read what is on the hard drive.

Breach Notification Rule: What Happens When Things Go Wrong (45 CFR Part 164 Subpart D)

The Breach Notification Rule establishes what must happen when there is unauthorized access to or disclosure of protected health information. These rules specify who must be notified of a breach, when notifications must occur, and what information must be included in breach notifications.

Notification requirements stipulate timelines for when notification must happen based on the number of individuals’ data involved in the breach, but also who must be notified. The HHS Office for Civil Rights (OCR) Secretary must always be notified, as well as the affected individuals, but in cases where more than 500 individuals are affected in a given state or jurisdiction, prominent media outlets must also be notified. Details can be found at the HHS breach reporting guidance page.

Importantly, notification is only required for unsecured protected health information breaches, giving you discretion in whether you need to report the breach based on risk assessment and the nature of the unauthorized access. Examples where reporting may not be required include:

  • Risk assessment outcomes showing a low probability of compromise

  • Unintentional acquisition by authorized workforce members acting in good faith

  • Cases where it can reasonably be determined that those who gained access to the protected health information cannot retain it

More details about these exceptions can be found in the HHS breach notification guidance.

The complete regulation can be viewed at the Breach Notification Rule text.

HIPAA Risk Assessment Requirements (45 CFR 164.308(a)(1)(ii)(A))

Every digital system owned by a covered entity—even those not storing protected health information—must undergo risk assessment, no exceptions. This foundational requirement drives most other security measures and demonstrates your systematic approach to identifying and managing security risks.

Conducting risk assessment needs to be a structured and thorough process, so using a framework is highly advisable. There are many frameworks to choose from, like NIST CSF, RMF, HITRUST CSF, and more, each with their own unique approach to organizing and conducting comprehensive security reviews.

No matter which framework you choose, there is generally going to be some high-level set of steps you follow beginning to end and then document your findings along the way. This documentation becomes crucial evidence of your due diligence and systematic approach to compliance.

HHS defines nine elements of a risk analysis that must be present:

  • Scope of the Analysis – Clearly define which systems, data, and processes are included in your assessment, ensuring you cover all areas where electronic protected health information might exist

  • Data Collection – Gather information about your current systems, data flows, access controls, and existing security measures to understand your current state

  • Identify and Document Potential Threats and Vulnerabilities – Systematically identify what could go wrong, from technical failures to human error to malicious attacks

  • Assess Current Security Measures – Evaluate what protections you currently have in place and how effective they are at mitigating identified risks

  • Determine Likelihood of Threat Occurrence – Estimate how probable each identified threat scenario is, considering your environment and existing controls

  • Determine Potential Impact of Threat Occurrence – Assess what would happen if each threat materialized, including operational, financial, and reputational consequences

  • Determine Level of Risk – Combine likelihood and impact to prioritize risks and guide your remediation efforts toward the most critical areas first

  • Finalize Documentation – Create formal documentation that demonstrates your methodology, findings, and planned responses to identified risks

  • Periodic Review and Updates to the Risk Assessment – Establish a schedule for reviewing and updating your assessment as your environment changes or new threats emerge

The HHS frequently cites the NIST SP 800-30 publication as a recommended guide for risk assessment implementation, and this publication is free to use and will scale from the smallest practices all the way up to large ones.

The complete regulation can be viewed at the risk assessment requirement.

Business Associate Agreements (BAAs) and Requirements (45 CFR 164.504(e))

A Business Associate Agreement is a legally binding contract that defines the responsibilities of business associates with respect to protected health information under HIPAA. These agreements are required anytime a third party accesses, stores, or transmits protected health information on behalf of your practice.

Third parties requiring business associate agreements include everything from vendors to cloud service providers, to 1099 contractors. Common examples include billing software companies, email service providers, cloud storage services, software and web developers, healthcare providers working as 1099 contractors, and analytics providers.

The BAA defines the security responsibilities of each party and legally binds each party to those responsibilities. By simply signing a business associate agreement with anyone, you are also legally binding yourself to fully adhere to the HIPAA Security Rule requirements in their entirety.

Because of the wide scope of applicability, your business will never be able to function without signing a business associate agreement at some point. This means that even if the HHS definition of a covered entity somehow did not apply to you and bind you to HIPPA compliance—and that wouldn’t ever be the case, to be clear—a business associate agreement soon will.

There are also due diligence requirements for each party with regards to business associate agreements, including reviewing security policies, confirming that compliance training is in place, verifying they have breach notification procedures, and ensuring they have adequate risk management and audit practices in place.

The complete regulation can be viewed at the BAA requirements.

Real World BAA Example: Google Cloud BAA

In the case of Google, the end user agreements that you sign when using their products mandate that, if you are a covered entity, you must sign their business associate agreements or not use their services. This requirement demonstrates how pervasive business associate agreements have become in modern healthcare operations.

Google has a standardized business associate agreements covering Google Workspace and the Google Cloud Platform. This means services like Google Workspace or Google Drive can achieve HIPAA compliance if a business associate agreements is signed and configurations meet the required controls.

There are a multitude of security configurations that must be implemented in these Google services, and doing so will become your responsibility, per the business associate agreement. Google is merely taking responsibility in the BAA to make these configurations available on their platform.

This is important to understand, as it does not mean you automatically have a HIPAA-compliant, Google-based information system simply because you signed the Google business associate agreement.

The business associate agreement creates the legal framework, but proper implementation requires systematic configuration and ongoing management of security controls, ideally by a qualified professional.

Using NIST Publications to Guide HIPAA Compliance

As the author mentioned previously, HIPPA requirements lack detailed technical instructions, so NIST frameworks can help fill that gap with concrete guidance for implementing required security measures. These publications provide the technical depth that HIPAA rules intentionally leave flexible.

NIST 800-66 provides guidance on implementing HIPAA Security Rule safeguards with specific technical recommendations and implementation approaches that have been tested across thousands of organizations.

NIST 800-30 provides a framework for conducting the risk assessments required by the HIPAA Security Rule with step-by-step methodology that ensures you meet the nine elements required by HHS, while creating documentation that will withstand regulatory scrutiny.

NIST 800-53 offers a more detailed checklist for cybersecurity hardening with comprehensive security controls that can be mapped directly to HIPAA requirements and scaled appropriately for different organization sizes.

Small practices should use these as roadmaps to facilitate strategic and well-organized compliance progress, knowing that the programs these frameworks help them put in place will scale larger than they may ever care to grow. This approach ensures that initial compliance investments provide long-term value and adaptability.

Enforcement and Penalties

HHS’ Office for Civil Rights enforces civil money penalties for HIPAA violations, while DOJ handles criminal cases. Understanding the penalty structure helps practices appreciate the importance of systematic compliance efforts and the potential consequences of neglecting their obligations.

The four-tier civil penalty structure outlined by the AMA includes:

  • Tier 1 – Lack of knowledge – Approximately $100 – $50,000 per violation for situations where the covered entity did not know and would not have known of the violation by exercising reasonable diligence

  • Tier 2 – Reasonable cause (not willful neglect) – Approximately $1,000 – $50,000 per violation for situations where the violation was due to reasonable cause but not willful neglect

  • Tier 3 – Willful neglect, corrected within 30 days – Approximately $10,000-$50,000 per violation for situations involving willful neglect that was corrected within the required time period

  • Tier 4 – Willful neglect, not corrected within 30 days – Approximately $50,000 per violation for incidents stemming from willful neglect that was not corrected

It is worth noting that you will not qualify for tier 1 by stating that you are not tech savvy, or that you didn’t really understand your regulatory responsibilities. The “exercising reasonable diligence” part of that bullet means that you should have acquired expert compliance help if you didn’t or couldn’t understand these things, and you needed to adhere to what they said if you did hire them.

There are also cases where criminal charges can be filed by DOJ. One could be imprisoned for up to 10 years when HIPAA violations are committed with the intent to use protected health information for commercial advantage, personal gain, or malicious harm, as explained by the ADA in this article.

These penalties underscore why systematic compliance programs focused on risk management, staff training, and vendor management are essential investments rather than optional expenses for healthcare organizations.

Conclusion

HIPAA compliance can appear intimidating, but practice leaders do not need to become regulatory experts to manage it effectively and make side decisions. What they do need is a firm grasp of the fundamentals: the three HIPAA rules, the centrality of confidentiality, integrity, and availability, and the fact that HIPAA is ultimately a risk-reduction-focused regulation, not a rigid cybersecurity or operational checklist.

By understanding how the Privacy Rule governs the use and disclosure of PHI, how the Security Rule translates into administrative safeguards, physical safeguards, and technical safeguards, and how the Breach Notification Rule applies when things go wrong, you can make informed decisions instead of reacting in crisis.

Structured risk assessments, thoughtful use of Business Associate Agreements, and disciplined training and documentation practices form the backbone of a defensible compliance program.

NIST publications and similar frameworks exist to help you turn abstract requirements into concrete actions, scaling from a small practice to a complex health system.

Likewise, modern cloud platforms and managed services, when properly configured, make it increasingly realistic for even modestly sized practices to meet security expectations without stifling operations.

Enforcement and penalty structures underscore that HIPAA is not optional. Civil and, in some circumstances, criminal consequences are real, but so is the opportunity: well-run compliance programs not only reduce regulatory risk, they also improve operational discipline, data quality, and patient trust.

If you treat HIPAA as an ongoing risk management discipline—rather than a one-time project—you will be far better positioned to protect your patients, your staff, and your practice as it grows.

FAQ

How often should covered entities update their HIPAA risk assessments?

While the Security Rule requires “ongoing” risk assessment without specifying exact frequency, best practice is to conduct comprehensive assessments annually and whenever significant environmental changes occur. This includes new systems, major software updates, changes in business processes, or after security incidents. Quarterly vulnerability scans help maintain continuous monitoring between formal assessments.

Can small practices use the same compliance approach as large health systems?

Yes, but the implementation will be scaled appropriately. HIPAA requirements are risk-based and proportionate to organizational size and complexity. A small practice might use cloud-based solutions and simplified policies, while a large system requires enterprise-grade infrastructure and extensive procedures. However, the fundamental requirements—risk assessment, safeguards implementation, staff training, and vendor management—remain the same across all sizes.

What happens if a business associate has a data breach?

The business associate must notify the covered entity without unreasonable delay and no more than 60 days after discovery. The covered entity then has its own notification obligations to patients and regulators, depending on the breach’s scope and impact. This is why due diligence in selecting business associates and maintaining strong business associate agreements is crucial—their security failures become your compliance problems.

Do HIPAA requirements apply to telemedicine and remote work arrangements?

Yes, all HIPAA rules apply regardless of where care is delivered or work is performed. Remote work requires additional attention to physical safeguards (secure home office spaces), technical safeguards (VPN access, encrypted devices), and administrative safeguards (remote work policies, training on home security). Telemedicine platforms must meet the same security standards as in-office systems and typically require signed business associate agreements.

How do state privacy laws interact with HIPAA compliance?

State laws can impose additional requirements beyond HIPAA minimums, and covered entities must comply with both federal and state regulations. Some states have stronger breach notification requirements, different patient access rights, or special protections for certain types of health information. When state and federal requirements conflict, the more stringent requirement typically applies, making it essential to understand your state’s specific healthcare privacy laws alongside federal HIPAA obligations.

Picture of Eddie "Hildy" Hildebrandt

Eddie "Hildy" Hildebrandt

Hildy Hildebrandt is the founder of Scorpion Five Technologies, specializing in advanced software engineering, cloud development, and cybersecurity solutions. A U.S. Army veteran and enterprise systems architect, he is dedicated to helping businesses and government agencies achieve technological excellence.

how would you like to connect with us?

Use the button below to open our booking page and select a time that works for you. 

Privacy Policy

This Privacy Policy (“Policy”) applies to scorpionfivetech.com, and Scorpion Five Technologies (“Company”) and governs data collection and usage. For the purposes of this Privacy Policy, unless otherwise noted, all references to the Company include scorpionfivetech.com. The Company’s website is a business site. By using the Company website, you consent to the data practices described in this statement.

Collection of your Personal Information

We do not collect any personal information about you unless you voluntarily provide it to us. However, you may be required to provide certain personal information to us when you elect to use certain products or services. These may include: (a) registering for an account; (b) entering a sweepstakes or contest sponsored by us or one of our partners; (c) signing up for special offers from selected third parties; (d) sending us an email message; (e) submitting your credit card or other payment information when ordering and purchasing products and services. To wit, we will use your information for, but not limited to, communicating with you in relation to services and/or products you have requested from us. We also may gather additional personal or non-personal information in the future.

Sharing Information with Third Parties

The Company does not sell, rent, or lease its customer lists to third parties.

The Company may share data with trusted partners to help perform statistical analysis, send you email or postal mail, provide customer support, or arrange for deliveries. All such third parties are prohibited from using your personal information except to provide these services tothe Company, and they are required to maintain the confidentiality of your information.

The Company may disclose your personal information, without notice, if required to do so by law or in the good faith belief that such action is necessary to: (a) conform to the edicts of the law or comply with legal process served on the Company or the site; (b) protect and defend the rights or property of the Company; and/or (c) act under exigent circumstances to protect the personal safety of users of the Company, or the public.

Automatically Collected Information

The Company may automatically collect information about your computer hardware and software. This information can include your IP address, browser type, domain names, access times, and referring website addresses. This information is used for the operation of the service, to maintain quality of the service, and to provide general statistics regarding the use of the Company’s website.

Security of your Personal Information

The Company secures your personal information from unauthorized access, use, or disclosure. The Company uses the following methods for this purpose:

SSL Protocol

When personal information (such as a credit card number) is transmitted to other websites, it is protected through the use of encryption, such as the Secure Sockets Layer (SSL) protocol.

We strive to take appropriate security measures to protect against unauthorized access to or alteration of your personal information. Unfortunately, no data transmission over the Internet or any wireless network can be guaranteed to be 100% secure. As a result, while we strive to protect your personal information, you acknowledge that: (a) there are security and privacy limitations inherent to the Internet that are beyond our control; and (b) the security, integrity, and privacy of any and all information and data exchanged between you and us through this site cannot be guaranteed.

Right to Deletion

Subject to certain exceptions set out below, on receipt of a verifiable request from you, we will:

Delete your personal information from our records; and

Direct any service providers to delete your personal information from their records.

Please note that we may not be able to comply with requests to delete your personal information if it is necessary to:

Complete the transaction for which the personal information was collected, fulfill the terms of a written warranty or product recall conducted in accordance with federal law, and provide a good or service requested by you, or reasonably anticipated within the context of our ongoing business relationship with you, or otherwise perform a contract between you and us;

Detect security incidents, protect against malicious, deceptive, fraudulent, or illegal activity; or prosecute those responsible for that activity;

Debug to identify and repair errors that impair existing intended functionality;

Exercise free speech, ensure the right of another consumer to exercise his or her right of free speech, or exercise another right provided for by law;

Comply with the California Electronic Communications Privacy Act;

Engage in public or peer-reviewed scientific, historical, or statistical research in the public interest that adheres to all other applicable ethics and privacy laws, when our deletion of the information is likely to render impossible or seriously impair the achievement of such research, provided we have obtained your informed consent;

Enable solely internal uses that are reasonably aligned with your expectations based on your relationship with us;

Comply with an existing legal obligation; or

Otherwise use your personal information, internally, in a lawful manner that is compatible with the context in which you provided the information.

Children Under Thirteen

The Company does not knowingly collect personally identifiable information from children under the age of 13. If you are under the age of 13, you must ask your parent or guardian for permission to use this website.

Email Communications

From time to time, the Company may contact you via email for the purpose of providing announcements, promotional offers, alerts, confirmations, surveys, and/or other general communication.

Changes to This Statement

The Company reserves the right to change this Policy from time to time. For example, when there are changes in our services, changes in our data protection practices, or changes in the law. When changes to this Policy are significant, we will inform you. You may receive a notice by sending an email to the primary email address specified in your account, by placing a prominent notice on our Scorpion Five Technologies, and/or by updating any privacy information. Your continued use of the website and/or services available after such modifications will constitute your: (a) acknowledgment of the modified Policy; and (b) agreement to abide and be bound by that Policy.

Contact Information

The Company welcomes your questions or comments regarding this Policy. If you believe that the Company has not adhered to this Policy, please contact the Company at:

Scorpion Five Technologies

Louisburg, North Carolina 27549

Email Address: privacy@scorpionfivetech.com

Effective as of May 24, 2024