Does HIPAA Apply to Your Organization? Privacy Rule Scope, Definitions, and Guidance
If you create, receive, maintain, or transmit health information in the United States, you need a reliable way to determine whether the HIPAA Privacy Rule applies. This guide—Does HIPAA Apply to Your Organization? Privacy Rule Scope, Definitions, and Guidance—clarifies who is covered, what counts as protected health information (PHI), and how you may use and disclose it.
Use the sections below to confirm your role (covered entity or business associate), understand PHI boundaries, and implement core requirements like the minimum necessary standard and individual rights. The goal is to give you practical direction you can apply immediately.
Quick applicability check
- Do you conduct any HIPAA-covered transactions electronically (claims, eligibility, remittance) yourself or through a vendor?
- Do you provide services to a covered entity that require access to PHI (for example, billing, IT, cloud hosting, analytics)?
- Do you create or receive individually identifiable health information for treatment, payment, or healthcare operations?
If you answer “yes” to any of these, HIPAA likely applies—either directly or through a business associate relationship.
HIPAA Privacy Rule Applicability
The HIPAA Privacy Rule applies to two groups: covered entities and their business associates. If your organization fits either role, you must safeguard PHI in any form—electronic, paper, or oral—and limit uses and disclosures to what the rule permits.
Coverage is function-based, not industry-label-based. A software vendor, startup, law firm, or nonprofit can be in scope if it performs regulated functions or services involving PHI. Size, funding model, and tax status do not change applicability.
One common trigger is conducting HIPAA-covered transactions in standard electronic formats, such as claims submission, eligibility inquiries, claim status, or payment and remittance advice. You may perform them directly or via a healthcare clearinghouse; either way, the Privacy Rule can apply.
Operationally, in-scope organizations adopt policies and workforce training, assign a privacy official designation and a contact person for complaints, and implement administrative, physical, and technical safeguards aligned with HIPAA’s requirements.
Covered Entities
Health plans
Health plans include insurers, HMOs, government programs, and employer-sponsored group health plans. They create and receive PHI to enroll members, pay claims, manage benefits, and perform utilization review.
Healthcare providers
Any provider that transmits health information electronically in connection with a HIPAA-covered transaction is a covered entity. This includes hospitals, physician practices, clinics, labs, pharmacies, dentists, and telehealth providers—even small practices that submit claims through a billing service.
Healthcare clearinghouse
A healthcare clearinghouse translates nonstandard health data into standard EDI formats (and vice versa). Examples include billing intermediaries and switch vendors that normalize claims and payment data between providers and plans.
Hybrid entities and organized arrangements
Organizations with both covered and non-covered functions (for example, a university with a health clinic) can designate a hybrid entity so only the healthcare component is subject to the rule. Providers and plans may also operate within organized health care arrangements that allow sharing PHI for joint operations under specific conditions.
Business Associates
A business associate is any non-workforce person or company that creates, receives, maintains, or transmits PHI for or on behalf of a covered entity. Common examples include revenue-cycle vendors, IT support, cloud storage, EHR and telehealth platforms, consultants, attorneys, and analytics or data processing firms.
Business associates must execute a business associate agreement that defines permitted uses and disclosures, requires safeguards, and obligates prompt breach reporting. Subcontractors that handle PHI are also business associates and must sign similar downstream agreements.
The conduit exception is narrow: a telecom carrier or courier that merely transports data without persistent storage or routine access is not a business associate. If your service stores or can routinely access PHI, you are usually a business associate and must comply.
Protected Health Information
Definition and scope
Protected health information (PHI) is individually identifiable health information that relates to a person’s physical or mental health, healthcare, or payment for care, and that is created or received by a covered entity or business associate. PHI can exist in any medium—ePHI, paper, or verbal.
What is not PHI
- De-identified data meeting HIPAA de-identification methods.
- Education records covered by FERPA.
- Employment records held by an employer in its role as employer.
- Health information about a person who has been deceased for more than 50 years.
Identifiers and practical examples
Names, full addresses, contact numbers, medical record numbers, account numbers, device IDs, and biometric identifiers are common PHI identifiers when linked to health context. Even small datasets—appointment dates or lab numbers—can be PHI if they identify the individual.
De-identification methods
HIPAA recognizes two de-identification methods: the expert determination method, which uses statistical analysis to minimize re-identification risk, and the safe harbor method, which requires removal of enumerated identifiers such as names, precise geographies, full-face photos, and many device and account IDs. Proper de-identification takes data outside the Privacy Rule.
Limited data set option
A limited data set removes most direct identifiers but may retain elements like dates and some geography. It may be used for research, public health, or operations under a data use agreement that restricts re-identification and onward disclosure.
Ready to simplify HIPAA compliance?
Join thousands of organizations that trust Accountable to manage their compliance needs.
Permitted Uses and Disclosures
Treatment, payment, and healthcare operations (TPO)
You may use and disclose PHI without patient authorization for TPO activities: providing and coordinating care; billing and payment; and healthcare operations such as quality improvement, credentialing, utilization review, and business planning. Disclosures to a business associate for these purposes are allowed under a valid agreement.
Public interest and other permitted purposes
- Required by law and for health oversight activities.
- Public health reporting, including disease reporting and adverse events.
- Judicial and administrative proceedings and certain law enforcement requests.
- To avert a serious threat to health or safety.
- Research under an IRB or privacy board waiver, or with limited data sets.
- Decedent information, organ and tissue donation, and specialized government functions.
- Workers’ compensation programs as permitted by law.
When authorization is required
Patient authorization is generally required for uses and disclosures outside the permitted purposes. Common examples include most marketing, the sale of PHI, and use of psychotherapy notes (with narrow exceptions). Patients may also be given an opportunity to agree or object to certain disclosures, such as facility directories or notification to family and friends involved in care.
Minimum Necessary Standard
What it requires
The minimum necessary standard is a PHI use limitation: you must make reasonable efforts to access, use, or disclose only the minimum PHI needed to accomplish the purpose. Role-based access, standardized request workflows, and data segmentation are core controls.
Key exceptions
- Disclosures to or requests by a treating healthcare provider for treatment.
- Disclosures to the individual who is the subject of the information.
- Uses or disclosures made pursuant to a valid authorization.
- Uses or disclosures required by law or for compliance investigations by HHS.
How to implement
- Define workforce roles and the PHI each role needs, then configure systems accordingly.
- Standardize routine disclosures with protocols; require approvals for non-routine requests.
- Default to truncated date ranges or aggregated reports when full detail is unnecessary.
- Apply de-identification methods or limited data sets when feasible to reduce risk.
Individual Rights
Right of access
Individuals have the right to access and obtain a copy of their PHI in a designated record set, in the form and format requested if readily producible. Reasonable, cost-based fees may apply for copies. You must provide timely access and cannot require in-person pickup when electronic options are available.
Right to request amendment
Patients may request an amendment of PHI they believe is inaccurate or incomplete. If you deny a request, you must provide a written denial and allow the individual to submit a statement of disagreement, which you maintain with the record.
Right to request restrictions and confidential communications
Individuals can ask you to restrict certain uses or disclosures and to communicate by alternative means or locations (for example, only by mail or to a specific address). You must honor reasonable requests for confidential communications and must accept restrictions for services paid for in full out-of-pocket when the disclosure would otherwise go to a health plan.
Accounting of disclosures
Upon request, you must provide an accounting of disclosures of PHI made for certain purposes, excluding most TPO uses and disclosures authorized by the individual. Your systems should track non-exempt disclosures to meet this obligation.
Notice of Privacy Practices and complaints
You must provide a clear Notice of Privacy Practices explaining how you use and disclose PHI, the individual’s rights, and how to file a complaint. Maintain processes for receiving complaints and document your responses.
Conclusion
If you handle PHI as a covered entity or business associate, HIPAA applies. Use this guidance to confirm your role, define PHI accurately, limit uses under the minimum necessary standard, and operationalize individual rights. Doing so answers the core question—does HIPAA apply to your organization—and positions you to comply with the Privacy Rule’s scope, definitions, and guidance.
FAQs
Who qualifies as a covered entity under the HIPAA Privacy Rule?
Covered entities are health plans, healthcare providers that conduct HIPAA-covered transactions electronically, and healthcare clearinghouses. Many providers qualify because they submit claims or eligibility checks electronically, even when using a billing service or intermediary.
What responsibilities do business associates have under HIPAA?
Business associates must sign a business associate agreement, use and disclose PHI only as permitted, implement safeguards, apply the minimum necessary standard, report breaches promptly, and flow down the same obligations to subcontractors that handle PHI. They are directly liable for compliance failures.
How does HIPAA protect individual health information?
HIPAA defines PHI as individually identifiable health information and restricts its use and disclosure to permitted purposes or those authorized by the individual. It grants rights such as access, amendment requests, restrictions, confidential communications, and an accounting of disclosures, and requires notices, policies, and safeguards to enforce these protections.
When can PHI be disclosed without patient authorization?
PHI may be disclosed without authorization for treatment, payment, and healthcare operations; when required by law; and for specified public interest activities such as public health reporting, certain law enforcement needs, health oversight, and research with appropriate approvals. Outside these purposes, a valid authorization is typically required.
Ready to simplify HIPAA compliance?
Join thousands of organizations that trust Accountable to manage their compliance needs.