Covered Entities’ Guide to HIPAA Privacy and Security Rules: Requirements and Best Practices

Check out the new compliance progress tracker


Product Pricing Demo Video Free HIPAA Training
LATEST
video thumbnail
Admin Dashboard Walkthrough Jake guides you step-by-step through the process of achieving HIPAA compliance
Ready to get started? Book a demo with our team
Talk to an expert

Covered Entities’ Guide to HIPAA Privacy and Security Rules: Requirements and Best Practices

Kevin Henry

HIPAA

January 03, 2025

6 minutes read
Share this article
Covered Entities’ Guide to HIPAA Privacy and Security Rules: Requirements and Best Practices

This guide translates the HIPAA Privacy and Security Rules into clear, actionable steps for covered entities and their business associates. You will learn how to safeguard Protected Health Information (PHI) and Electronic Protected Health Information (ePHI) while meeting day‑to‑day operational needs.

Use these requirements and best practices to build a defensible compliance program: align policies with the Privacy Rule, implement Security Rule controls, formalize Business Associate Agreements, and prepare for the Breach Notification Rule with mature incident response.

HIPAA Privacy Rule Compliance

The Privacy Rule governs how you use, disclose, and protect PHI across your organization. Start by mapping PHI flows—where PHI is created, received, maintained, or transmitted—so you can apply the minimum necessary standard and role‑based access to routine operations.

Core obligations

  • Define permitted uses and disclosures for treatment, payment, and health care operations, and require valid authorizations for non‑routine uses.
  • Publish and distribute a Notice of Privacy Practices that explains rights and organizational duties in plain language.
  • Honor individuals’ rights: access and obtain copies, request amendments, request restrictions, receive confidential communications, and request an accounting of certain disclosures.
  • Adopt privacy policies and procedures, designate a Privacy Official, train your workforce, and apply sanctions for violations.
  • Limit PHI sharing to the minimum necessary, and prefer de‑identified data or limited data sets when feasible.

Business Associate Agreements (BAAs)

Execute BAAs with vendors that handle PHI or ePHI on your behalf. Each agreement must specify permissible uses/disclosures, require appropriate safeguards, mandate breach reporting, bind subcontractors, and allow termination for material noncompliance.

HIPAA Security Rule Compliance

The Security Rule covers ePHI and requires a risk‑based program with administrative, physical, and technical safeguards. Some specifications are required; others are addressable, but you must implement them when reasonable and appropriate—or document why an alternative achieves the same protection.

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Foundational steps

  • Assign a Security Official with authority to drive the program and allocate resources.
  • Perform an enterprise‑wide risk analysis of systems, data flows, and third parties that create, receive, maintain, or transmit ePHI.
  • Manage identified risks with prioritized controls, security awareness training, and ongoing evaluations.
  • Integrate incident response, contingency planning, and change management with your compliance lifecycle.

Administrative Safeguards Implementation

Security management process

  • Risk analysis and risk management to reduce risks to a reasonable and appropriate level.
  • Sanction policy for workforce noncompliance and documented enforcement.
  • Information system activity review, including audit log review and anomaly detection.

Workforce and access governance

  • Assigned security responsibility; clearly defined roles and segregation of duties.
  • Workforce security with authorization, supervision, clearance, and timely termination procedures.
  • Information access management and role‑based access aligned to the minimum necessary standard.

Operational readiness

  • Security awareness and training (onboarding, periodic refreshers, phishing simulations, and role‑specific modules).
  • Security incident procedures for detection, escalation, containment, investigation, and post‑incident lessons learned.
  • Contingency planning: data backup, disaster recovery, and emergency mode operations with tested procedures.
  • Regular evaluations to verify control effectiveness after environmental or operational changes.
  • Business Associate Agreements (BAAs) that require comparable safeguards and timely incident reporting.

Physical Safeguards Requirements

Facility and workstation protections

  • Facility access controls: badge systems, visitor logs, escorts, and secure areas for servers and networking gear.
  • Workstation use and security: location standards, screen privacy filters, automatic lock, and cable locks for shared spaces.

Devices and media

  • Device and media controls: inventories, chain‑of‑custody, secure disposal, and documented media re‑use procedures.
  • Backup and storage for critical ePHI before moving or decommissioning devices; remote wipe for mobile assets.

Technical Safeguards Enforcement

Access control

  • Unique user IDs, multi‑factor authentication, emergency access procedures, and automatic session timeouts.
  • Encryption for ePHI at rest and in transit as a practical baseline for modern environments.

Audit and integrity

  • Audit controls that log access, administrative changes, privileged activity, and data exfiltration attempts.
  • Integrity protections: change management, code signing, anti‑malware, and file integrity monitoring to prevent improper alteration or destruction.

Authentication and transmission security

  • Person or entity authentication with strong credentials, managed secrets, and secure single sign‑on where appropriate.
  • Transmission security using TLS, secure APIs, VPN for administrative access, and encrypted email or secure messaging for PHI.

Risk Analysis and Management

Conduct an enterprise‑wide, documented risk analysis that inventories assets handling ePHI, data flows, third parties, and environmental dependencies. Identify threats and vulnerabilities, then estimate likelihood and impact to prioritize remediation.

Practical method

  • Scope: systems, applications, endpoints, cloud services, medical devices, interfaces, and backups that touch ePHI.
  • Assess: evaluate administrative, physical, and technical controls; include vendor and Business Associate risks.
  • Treat: select controls, owners, budgets, and timelines; document risk acceptance with clear justification.
  • Verify: test controls, track metrics, and re‑assess after major changes or at planned intervals.
  • Prepare: align incident response with the Breach Notification Rule, including decision trees and communication templates.

Training and Documentation Best Practices

Effective programs combine role‑based training, just‑in‑time reminders, and leadership visibility. Reinforce minimum necessary, phishing awareness, secure handling of PHI/ePHI, and how to escalate incidents without delay.

What to document

  • Policies and procedures for the Privacy and Security Rules, updated as your environment evolves.
  • Risk analyses, risk management plans, security evaluations, and incident/breach records.
  • Access authorizations, role definitions, sanctions, and workforce training logs with acknowledgments.
  • Asset inventories, device/media disposition records, audit log retention, and Business Associate Agreements.
  • Retention: keep required documentation for at least six years from creation or last effective date.

Conclusion

By operationalizing Administrative, Physical, and Technical Safeguards, maintaining strong BAAs, and practicing disciplined risk management, you can satisfy HIPAA’s Privacy and Security Rules and reduce breach risk. Treat compliance as an ongoing program, not a one‑time project.

FAQs

What are the key requirements of the HIPAA Privacy Rule?

You must safeguard PHI, use and disclose it only as permitted or authorized, apply the minimum necessary standard, issue a Notice of Privacy Practices, and honor individual rights such as access and amendment. You also need policies, workforce training, sanctions, mitigation procedures, and Business Associate Agreements for vendors handling PHI.

How do entities implement the HIPAA Security Rule?

Start with an enterprise‑wide risk analysis covering ePHI systems and data flows. Implement Administrative, Physical, and Technical Safeguards—access control, encryption, audit logging, training, incident response, and contingency planning—and document each decision, especially for addressable specifications. Continuously monitor, evaluate, and improve.

What administrative safeguards must covered entities follow?

They include risk analysis and management, sanction policies, activity reviews, assigned security responsibility, workforce security and access governance, security awareness training, incident procedures, contingency plans, periodic evaluations, and BAAs that bind partners to comparable protections.

When is a breach notification required under HIPAA?

Notify when there is an impermissible use or disclosure of unsecured PHI that is not excepted and is not shown—via a documented four‑factor assessment—to present a low probability of compromise. Notifications go to affected individuals (without unreasonable delay and within required timeframes), to regulators, and to the media when thresholds are met. Business associates must notify the covered entity of breaches they discover.

Share this article

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Related Articles