Army HIPAA Training Explained: Compliance Basics, Annual Requirements, and Updates

Check out the new compliance progress tracker


Product Pricing Demo Video Free HIPAA Training
LATEST
video thumbnail
Admin Dashboard Walkthrough Jake guides you step-by-step through the process of achieving HIPAA compliance
Ready to get started? Book a demo with our team
Talk to an expert

Army HIPAA Training Explained: Compliance Basics, Annual Requirements, and Updates

Kevin Henry

HIPAA

July 06, 2024

7 minutes read
Share this article
Army HIPAA Training Explained: Compliance Basics, Annual Requirements, and Updates

HIPAA and Privacy Act Training Requirements

Army HIPAA training ensures you protect protected health information (PHI) and electronic protected health information (ePHI) in accordance with the HIPAA Privacy and Security Rules and the Privacy Act. If your duties involve creating, accessing, transmitting, or storing PHI or ePHI, you must complete this training.

The requirement applies to Soldiers, Army civilians, and contractors supporting medical care, health benefits, research, readiness, or IT systems that handle electronic protected health information (ePHI). Commanders and supervisors are responsible for assigning the appropriate training and tracking completion for their personnel.

Complete initial training before you are granted access to records or systems containing PHI/ePHI, then complete refresher training on a recurring basis as directed by command policy. Most organizations require annual recertification and additional refreshers following significant policy updates or incidents.

What the course covers

Documentation and proof

  • Retain your certificate of completion and ensure it is recorded in your unit’s training system.
  • Verify your name, unit, and email are current so completions map correctly to readiness dashboards.
  • Coordinate with your privacy/compliance officer for any local supplements or scenario-based briefings.

Joint Knowledge Online (JKO) Training Access

Army personnel commonly complete HIPAA and Privacy Act training on Joint Knowledge Online (JKO). Access JKO with your government credentials, locate the current HIPAA/Privacy course designated by your organization, and enroll to begin.

Finish all modules and knowledge checks, then download and save your certificate. JKO records completions automatically, but you should keep a personal copy for audits and submit proof if your unit requires it.

Access tips

  • Confirm you are enrolled under your current unit to ensure training credit routes correctly.
  • Allow course pop-ups and complete modules in sequence to avoid progress loss.
  • After completion, verify credit appears in your training tracker; if not, follow unit procedures to resolve.

Department of Health and Human Services Proposed Regulations

For 2025, the Department of Health and Human Services (HHS) has outlined proposals intended to strengthen healthcare cybersecurity and modernize HIPAA Security Rule implementation. These proposals are not final but signal areas you should expect to see emphasized in policy and training.

2025 focus areas under consideration

  • More prescriptive security risk assessments and continuous risk management tied to current threat intelligence.
  • Multi-factor authentication (MFA) for remote, administrative, and other high-risk access to systems that create, receive, maintain, or transmit ePHI.
  • Modern encryption for ePHI in transit and at rest, with phase-out of obsolete protocols and ciphers.
  • Risk-based timelines for patching and vulnerability remediation, and improved logging and monitoring.
  • Timely reporting and response for material cybersecurity incidents, supported by tested incident playbooks.
  • Ransomware recognition and resilience measures such as segmented networks and immutable backups.
  • Stronger vendor oversight, including security requirements in contracts and continuous third-party risk management.
  • Workforce training updates addressing cybersecurity awareness, phishing, and AI-powered social engineering.

Follow official Army and DoD direction for implementation. Until final rules and service-level policies are issued, continue meeting current requirements and document your compliance activities.

Office for Civil Rights Updated Compliance Guidance

The Office for Civil Rights (OCR) periodically updates guidance to address new technologies and evolving practices. Army HIPAA training should incorporate these updates so you apply standards correctly in daily tasks.

Key themes emphasized by OCR

  • Applying the minimum necessary principle and enforcing role-based access.
  • Adopting and documenting recognized security practices to strengthen compliance posture.
  • Managing tracking technologies and third-party tools that could collect PHI from portals or websites.
  • Securing telehealth workflows, messaging, and remote work involving ePHI.
  • Conducting defensible breach risk assessments and issuing timely notifications when required.
  • Documenting sanctions for workforce violations and demonstrating consistent policy enforcement.

Command privacy and compliance officials will notify units when training content must be refreshed to reflect new guidance or interpretations.

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Annual Cybersecurity Awareness Training

Cybersecurity awareness complements HIPAA by protecting the systems and devices that handle ePHI. Annual training sharpens your ability to prevent, detect, and report threats before they lead to privacy or security incidents.

Threats to emphasize

  • Ransomware recognition, including early indicators and immediate isolation/reporting steps.
  • AI-powered social engineering that uses convincing email, voice, or video to harvest credentials or data.
  • Phishing, smishing, and vishing techniques designed to bypass skepticism and defeat MFA with fatigue attacks.
  • Malicious removable media and unauthorized cloud syncing that exfiltrate sensitive information.

Everyday controls you must practice

  • Use multi-factor authentication (MFA) and deny unexpected prompts.
  • Keep devices patched and report lost or stolen equipment immediately.
  • Encrypt ePHI in transit and at rest; never route ePHI through personal email or unapproved apps.
  • Verify recipient identity and apply minimum necessary before sharing any PHI.
  • Report suspected incidents within minutes through unit channels—do not attempt self-remediation.

Role-Based Training Importance

HIPAA expects training to reflect what you actually do. Role-based training ensures each group understands its specific risks, procedures, and decision points so compliance becomes part of routine operations.

Examples by role

  • Clinicians: secure clinical messaging, “minimum necessary” in hand-offs, and break-glass procedures.
  • Administrative staff: identity verification, release-of-information workflows, and secure printing/mailing.
  • IT/cybersecurity: provisioning, audit logging, backup/restore tests, endpoint hardening, and incident coordination for systems hosting ePHI.
  • Leaders: policy enforcement, sanctions, resource prioritization, and oversight of risk acceptance decisions.

Document completion of role-specific modules and periodic scenario-based exercises to demonstrate practical competency.

Security Risk Assessment and Vendor Oversight

Security risk assessments and vendor oversight are core to HIPAA Security Rule compliance. They help you identify where ePHI is at risk and ensure third parties meet Army expectations before, during, and after they access sensitive data.

What to include in an SRA

  • Asset and data-flow inventory for systems that create, receive, maintain, or transmit ePHI.
  • Threat and vulnerability analysis that includes ransomware and supply chain risks.
  • Evaluation of administrative, physical, and technical safeguards to pinpoint control gaps.
  • Risk ratings with remediation plans, owners, and target dates—tracked to closure.
  • Evidence of effectiveness such as MFA logs, encryption settings, and backup restore results.

Vendor oversight essentials

  • Pre-award due diligence on security posture and ability to protect ePHI.
  • Contractual requirements for HIPAA compliance, breach notification timelines, and audit rights.
  • Verification of encryption, MFA for remote access, least-privilege access, and secure development practices.
  • Continuous monitoring, periodic assessments, and offboarding to revoke access and ensure data disposition.

Conclusion

Army HIPAA training blends privacy fundamentals with practical security behaviors. Complete initial and annual requirements, access the current course on JKO, stay alert to HHS and OCR updates, reinforce cybersecurity awareness, and back it all with rigorous security risk assessments and vendor oversight.

FAQs.

What are the mandatory Army HIPAA training requirements?

Complete initial HIPAA and Privacy Act training before accessing PHI/ePHI and finish all assigned modules. Maintain proof of completion, follow unit supplements, and report incidents promptly; commanders track compliance and may require additional training after updates or events.

How often must Army civilian personnel complete HIPAA training?

Most Army organizations require annual refresher training within a 12-month cycle, with earlier refreshers if duties change, policies update, or corrective actions are directed by command.

What are the new cybersecurity regulations proposed for HIPAA in 2025?

HHS proposals for 2025 emphasize stronger security risk assessments, MFA for high-risk access, modern encryption, timely vulnerability remediation, enhanced incident reporting, ransomware resilience, and tighter vendor oversight. These items are proposals; follow official Army guidance for implementation timelines.

Where can Army personnel access their HIPAA training?

Use Joint Knowledge Online (JKO) to locate and complete the current HIPAA and Privacy Act course assigned by your unit. Save your certificate and confirm the completion posts to your training records.

Share this article

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Related Articles