Guide to the Four HIPAA Entities: Definitions, Risks, and Best Practices

Product Pricing Demo Video Free HIPAA Training
LATEST
video thumbnail
Admin Dashboard Walkthrough Jake guides you step-by-step through the process of achieving HIPAA compliance
Ready to get started? Book a demo with our team
Talk to an expert

Guide to the Four HIPAA Entities: Definitions, Risks, and Best Practices

Kevin Henry

HIPAA

January 14, 2025

8 minutes read
Share this article
Guide to the Four HIPAA Entities: Definitions, Risks, and Best Practices

Covered Entities Overview

The “four HIPAA entities” commonly means three types of covered entities plus business associates. Covered entities are health plans, health care clearinghouses, and certain health care providers that transmit transactions electronically. Each handles Protected Health Information (PHI) and, for electronic formats (ePHI), must meet the HIPAA Security Rule alongside the HIPAA Privacy Rule.

Health plans

Health plans include insurers, HMOs, employer-sponsored plans, Medicare, and Medicaid. They determine eligibility, pay claims, and coordinate benefits using PHI. Their obligations span the HIPAA Privacy Rule’s permissible uses and disclosures and appropriate safeguards for ePHI.

Health care clearinghouses

Clearinghouses translate nonstandard health information into standard formats and vice versa. Because they transform and route PHI between parties, they are covered entities even if they never see patients. Their controls must protect data integrity and confidentiality end to end.

Health care providers

Providers are covered when they transmit HIPAA standard transactions electronically, such as claims or eligibility checks. This group includes clinicians, hospitals, labs, and pharmacies. With Electronic Health Records (EHR), providers must align privacy practices with technical safeguards for ePHI.

Protected Health Information (PHI) essentials

PHI is individually identifiable health information in any form. It covers demographics, diagnosis, treatment, billing, and more, whether spoken, written, or electronic. The HIPAA Privacy Rule governs when and how you may use or disclose PHI.

Business Associates Defined

Business associates (BAs) are organizations or individuals that create, receive, maintain, or transmit PHI for covered entities. Typical examples include EHR vendors, cloud or data hosting providers, billing services, consultants, and analytics firms. BAs must follow the HIPAA Security Rule and relevant Privacy Rule provisions through contract.

Who qualifies as a business associate

If your services involve access to PHI—whether routine or incidental—you likely qualify as a BA. This includes managed service providers, claims processors, email gateways, and data destruction companies. Even storage-only cloud services qualify when ePHI is hosted.

Business Associate Agreements (BAAs)

A BAA defines permitted uses and disclosures, required safeguards, and breach reporting duties. It should specify encryption, access controls, audit rights, and subcontractor obligations. Strong BAAs streamline incident response and reduce the chance you will need a Corrective Action Plan after an investigation.

Subcontractors and downstream oversight

BA obligations flow to subcontractors that handle PHI on a BA’s behalf. You must ensure equivalent protections, documentation, and breach notification duties. Ongoing monitoring—risk reviews, attestations, and audits—keeps downstream risk in check.

Risks of HIPAA Violations

Common causes

Frequent violations stem from misdirected messages, snooping, misconfigured cloud storage, lost or stolen devices, and phishing. Weak passwords, shared accounts, and excessive access compound exposure. Gaps in training and outdated policies often underlie these events.

Regulatory and financial consequences

HHS OCR enforces HIPAA using a tiered civil penalty structure based on culpability, with annual caps per violation category. State attorneys general can bring actions, and the Department of Justice may pursue criminal cases for egregious misconduct. Settlements often require multi‑year monitoring and a detailed Corrective Action Plan.

Operational and reputational impact

Breaches drive downtime, incident costs, legal effort, and patient support needs. Trust erosion can reduce patient engagement and referral networks. Leadership focus shifts to remediation, delaying strategic projects.

Breach Notification Rule implications

The Breach Notification Rule requires timely notices to affected individuals, HHS, and sometimes the media, depending on scale. Inadequate or delayed notification can increase penalties. Thorough documentation and forensics support defensible decisions on whether a breach occurred.

Best Practices for HIPAA Compliance

Program governance and ownership

Designate privacy and security officers with clear authority and resources. Establish a governance committee that reviews metrics, risks, and incidents. Tie program objectives to business goals and patient trust.

Risk Analysis and ongoing risk management

Conduct an accurate and thorough Risk Analysis covering systems, data flows, vendors, and facilities. Prioritize risks, define owners, and track remediation to closure. Reassess when technology, operations, or threats change.

Policies, procedures, and workforce training

Maintain up‑to‑date Privacy Rule and Security Rule policies aligned to practice. Train staff on minimum necessary, secure messaging, and incident reporting. Reinforce learning with targeted refreshers and phishing simulations.

Access governance and least privilege

Use role‑based access with documented approvals and periodic reviews. Enforce strong authentication, preferably multi‑factor, for systems containing ePHI. Remove access promptly on role change or separation.

Incident response and Corrective Action Plan discipline

Prepare playbooks for privacy and security events, with clear decision trees for the Breach Notification Rule. Run tabletop exercises and post‑incident reviews. Use CAPs to institutionalize fixes, timelines, and validation tests.

Vendor management

Inventory all vendors touching PHI and classify them by risk. Perform due diligence, execute BAAs, and require security attestations. Monitor changes to services, locations, and subcontractors.

Technology baselines

Encrypt data at rest and in transit, patch routinely, and harden configurations. Implement EHR audit logs, endpoint protection, mobile device management, and data loss prevention. Back up critical systems and test restores.

Ready to assess your HIPAA security risks?

Join thousands of organizations that use Accountable to identify and fix their security gaps.

Take the Free Risk Assessment

Administrative Safeguards Explained

Security management process

Administrative safeguards start with Risk Analysis and risk management to reduce vulnerabilities. Maintain sanction policies and workforce oversight to deter improper behavior. Document decisions and keep evidence audit‑ready.

Workforce security and training

Screen workforce members, define appropriate access, and supervise effectively. Provide orientation and periodic training on privacy practices and security hygiene. Track completion and measure effectiveness.

Information access management

Define who may access which PHI, for what purpose, and through which systems. Enforce minimum necessary with approvals and separation of duties. Review access when roles or job functions evolve.

Security awareness, contingency, and evaluation

Deliver ongoing awareness, including phishing and safe data handling. Maintain contingency plans for backup, disaster recovery, and emergency mode operations. Periodically evaluate your program to verify alignment with the HIPAA Security Rule.

Business associate oversight

Catalog BAs, execute BAAs, and set monitoring expectations. Require incident reporting, cooperation in investigations, and timely remediation. Ensure subcontractors implement equivalent safeguards.

Technical Safeguards Explained

Access controls

Assign unique user IDs, enforce strong authentication, and configure emergency access procedures. Use automatic session timeouts and restrict shared accounts. Apply the principle of least privilege throughout your environment.

Audit controls and activity review

Enable logs for EHRs, databases, APIs, and admin actions. Correlate events to detect anomalies and investigate inappropriate access. Review reports routinely and retain logs per policy.

Integrity, authentication, and trust

Use checksums, digital signatures, and application integrity controls to prevent improper alteration. Validate user and system identities before granting access. Guard against tampering in backups and replicas.

Transmission security

Protect ePHI in motion with modern TLS, secure email gateways, and VPNs where appropriate. Disable weak ciphers and enforce certificate management. Segment networks to limit lateral movement.

Encryption and key management

Encrypt sensitive stores, including databases, object storage, laptops, and mobile devices. Centralize key management with strict separation of duties. Rotate keys and test decryption in disaster recovery drills.

Physical Safeguards Explained

Facility access controls

Limit entry to data centers and server rooms using badges, biometrics, and visitor logs. Maintain escort policies and environmental controls. Review access lists regularly and revoke promptly.

Workstation use and security

Define acceptable use, screen positioning, and session lock behavior. Secure shared workstations at nursing stations and registration areas. Harden kiosks and telehealth setups to prevent unauthorized viewing.

Device and media controls

Track laptops, removable media, backups, and medical devices that store ePHI. Sanitize or destroy media before reuse or disposal and document the process. Use cable locks and secure transport procedures.

Summary

Covered entities and business associates share responsibility for safeguarding PHI under the HIPAA Privacy Rule, HIPAA Security Rule, and the Breach Notification Rule. By pairing a rigorous Risk Analysis with sound administrative, technical, and physical safeguards, you reduce violations and improve patient trust. Treat incidents as learning opportunities, apply a disciplined Corrective Action Plan, and keep your program current as technology and threats evolve.

FAQs.

What entities are covered under HIPAA?

HIPAA covers health plans, health care clearinghouses, and health care providers that conduct standard electronic transactions. Business associates and their subcontractors must also protect PHI through BAAs and Security Rule controls.

What are the penalties for HIPAA violations?

Penalties are tiered based on culpability, with per‑violation amounts and annual caps adjusted for inflation. HHS OCR can impose civil monetary penalties and require corrective actions; state attorneys general may bring cases; and the Department of Justice can pursue criminal charges for willful, egregious conduct.

How can entities ensure HIPAA compliance?

Build a formal privacy and security program, perform an accurate and thorough Risk Analysis, and implement administrative, technical, and physical safeguards. Train your workforce, manage vendors with strong BAAs, monitor activity, and use a Corrective Action Plan to close gaps quickly.

What is the role of business associates under HIPAA?

Business associates create, receive, maintain, or transmit PHI for covered entities and must safeguard it under the HIPAA Security Rule and applicable Privacy Rule requirements. BAAs define allowable uses, required protections, and breach reporting obligations, which also extend to subcontractors.

Share this article

Ready to assess your HIPAA security risks?

Join thousands of organizations that use Accountable to identify and fix their security gaps.

Take the Free Risk Assessment

Related Articles