Examples and Best Practices for Complying with New HIPAA Privacy and Security Amendments

Product Pricing Demo Video Free HIPAA Training
LATEST
video thumbnail
Admin Dashboard Walkthrough Jake guides you step-by-step through the process of achieving HIPAA compliance
Ready to get started? Book a demo with our team
Talk to an expert

Examples and Best Practices for Complying with New HIPAA Privacy and Security Amendments

Kevin Henry

HIPAA

February 19, 2025

7 minutes read
Share this article
Examples and Best Practices for Complying with New HIPAA Privacy and Security Amendments

HIPAA Security Rule Updates

What changed in practice

The new HIPAA Privacy and Security amendments sharpen expectations for protecting electronic protected health information and verifying that safeguards actually work. You are expected to maintain current, risk-based controls, produce clear risk analysis documentation, and demonstrate cybersecurity validations that prove controls are effective over time.

Updates emphasize stronger technical safeguards, tighter third‑party oversight, continuous monitoring, and clearer security incident reporting. They also reinforce the “minimum necessary” principle and accountability for decisions that accept or transfer risk.

What you should do now

  • Map data flows for electronic protected health information, including cloud and vendor paths, to close coverage gaps.
  • Update policies and procedures to align with the amendments; embed approval, version control, and attestation steps.
  • Assign owners for each safeguard and define metrics that serve as ongoing cybersecurity validations.
  • Refresh workforce training with scenario‑based modules tailored to your environment and job roles.
  • Re-negotiate business associate agreements to reflect reporting timelines, audit rights, and technical requirements.

Mandatory Security Measures

Baseline technical and administrative controls

  • Identity and access management with role‑based access, least privilege, and periodic access reviews.
  • Network segmentation controls to isolate clinical systems, billing platforms, and administrative services.
  • Hardened configurations, centralized logging, and continuous monitoring of privileged activities.
  • Endpoint protection with EDR, application allow‑listing for high‑risk systems, and automatic patching.
  • Routine vulnerability scanning with tracked remediation SLAs and risk‑based prioritization.
  • Regular penetration testing for critical applications and externally exposed assets.
  • Secure backup and recovery with immutability, offline copies, and tested restoration procedures.
  • Change management and secure development practices for custom apps and integrations.

Operational rigor

  • Define control objectives and health indicators; review them in monthly security governance meetings.
  • Tie exceptions to documented risk acceptance with expiration dates and mitigating conditions.
  • Conduct supplier due diligence before onboarding and at least annually thereafter.
  • Ensure onboarding/offboarding automation to promptly grant, adjust, and revoke access.

Encryption Requirements

Data in transit

  • Use modern TLS (1.2 or higher) for all transmissions of electronic protected health information, including APIs and remote access.
  • Disable legacy protocols and ciphers; enforce certificate lifecycle management and HSTS on web portals.
  • Adopt email encryption or secure portals for patient communications and data exchanges with partners.

Data at rest

  • Apply full‑disk encryption for laptops, mobile devices, and workstations that may store electronic protected health information.
  • Use database and file‑level encryption for servers, storage arrays, and cloud object stores.
  • Encrypt backups and archives, including snapshots and replicas, with separate key custody.

Key management and governance

  • Centralize keys with a hardened KMS or HSM; enforce separation of duties for key generation, rotation, and revocation.
  • Rotate keys on a defined schedule and after personnel changes or suspected compromise.
  • Restrict key access via just‑in‑time elevation and require multi‑factor authentication for key operations.
  • Log and review all cryptographic events as part of your cybersecurity validations program.

Practical examples

  • Encrypt EHR databases and implement field‑level encryption for especially sensitive attributes.
  • Use device‑based encryption with remote wipe on clinician laptops and tablets.
  • For cloud workloads, enforce server‑side encryption with customer‑managed keys and per‑environment key separation.

Multi-Factor Authentication Implementation

Where to enforce MFA first

  • Remote access (VPN, VDI) and web portals containing electronic protected health information.
  • Administrative consoles, cloud control planes, and privileged accounts.
  • Email and collaboration platforms to reduce account takeover risk.

How to roll it out effectively

  • Select phishing‑resistant methods (for example, security keys or platform authenticators) wherever feasible.
  • Integrate MFA with SSO to minimize friction; enable risk‑based step‑up for sensitive actions.
  • Provide clear enrollment guides, backup factors, and help‑desk workflows for lost or replaced devices.

Handling exceptions and resilience

  • Define break‑glass procedures with strict time limits, enhanced logging, and post‑use review.
  • Periodically test MFA enforcement and report results as cybersecurity validations to leadership.

Annual Risk Assessments

Scope and approach

Perform a comprehensive assessment at least annually and after major changes, covering assets, data flows, threats, and controls. Your risk analysis documentation should show how you identify risks to electronic protected health information, evaluate likelihood and impact, and determine treatment plans.

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Testing and validation

  • Run authenticated vulnerability scanning on a recurring schedule; track findings to closure with due dates.
  • Conduct penetration testing for critical apps and high‑value targets; validate fixes with re‑tests.
  • Assess third‑party risk for business associates and document control gaps and compensating measures.

Reporting and follow‑through

  • Maintain a living risk register with owners, budgets, and target dates; review it with executive leadership.
  • Publish a summary of cybersecurity validations, including key control metrics and remediation progress.

Incident Response and Contingency Planning

Core plan elements

  • Define roles, 24/7 on‑call coverage, severity criteria, and decision authority.
  • Create playbooks for ransomware, account compromise, lost devices, insider misuse, and cloud misconfiguration.
  • Preserve evidence with proper chain of custody and coordinate with privacy, legal, and communications teams.

Contingency and recovery

  • Set RTO/RPO objectives and test restore procedures from immutable backups.
  • Prepare downtime workflows for clinical operations, including paper procedures and reconciliation steps.
  • Document data retention and secure disposal for systems storing electronic protected health information.

Security incident reporting

  • Define thresholds and timelines for internal escalation and external notifications.
  • Align security incident reporting with contractual and regulatory requirements; pre‑approve templates and contact lists.
  • Run tabletop exercises at least annually and record lessons learned as part of your cybersecurity validations.

Business Associate Compliance

Contractual safeguards

  • Update business associate agreements to require timely security incident reporting, technical baselines (encryption, MFA), and audit rights.
  • Flow down obligations to subcontractors and specify notification windows and evidence requirements.
  • Include requirements for vulnerability scanning, penetration testing, and prompt remediation of critical findings.

Ongoing oversight

  • Collect and review cybersecurity validations such as control attestations, architecture diagrams, and remediation reports.
  • Verify network segmentation controls for vendor connectivity and restrict access to the minimum necessary.
  • Maintain an inventory of vendors touching electronic protected health information and map data exchanges.

Incident coordination

  • Define joint response procedures, indicators of compromise sharing, and secure channels for evidence exchange.
  • Test escalation paths and ensure vendors can meet your reporting timelines and forensic requirements.

Conclusion

Focus on clear documentation, measurable controls, and repeatable processes that prove your safeguards protect electronic protected health information. By operationalizing encryption, MFA, risk assessments, incident response, and business associate oversight, you align daily practices with the new HIPAA Privacy and Security amendments and reduce both clinical and business risk.

FAQs

What are the key changes in the new HIPAA Security Rule amendments?

The amendments elevate expectations for documented, risk‑based security; strengthen technical safeguards like encryption and MFA; require more rigorous cybersecurity validations; clarify third‑party responsibilities; and tighten security incident reporting and recordkeeping. You should be able to show how each safeguard operates, how you monitor it, and how you address residual risk.

How often must risk assessments be conducted under the new rule?

Plan for a formal enterprise‑wide assessment at least annually and whenever significant changes occur, supported by continuous activities such as vulnerability scanning, targeted penetration testing, and ongoing risk analysis documentation. High‑impact environments may warrant quarterly reviews of key controls and metrics.

What are the encryption requirements for electronic protected health information?

Encrypt electronic protected health information in transit with modern TLS and at rest using strong, industry‑accepted algorithms. Manage keys centrally, rotate them regularly, and log cryptographic operations. Apply full‑disk and server‑side encryption, protect backups, and extend encryption to mobile devices and removable media.

How quickly must security incidents be reported by business associates?

Follow the timelines specified in your business associate agreement and the amendments’ reporting expectations. As a best practice, require initial notice within 24–72 hours for material incidents, with ongoing updates until containment and root cause are confirmed. Breach notifications applicable to unsecured electronic protected health information must be made without unreasonable delay and within the legally required outer limits.

Share this article

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Related Articles