Guide to the Four HIPAA Entities: Definitions, Risks, and Best Practices
Covered Entities Overview
The “four HIPAA entities” commonly means three types of covered entities plus business associates. Covered entities are health plans, health care clearinghouses, and certain health care providers that transmit transactions electronically. Each handles Protected Health Information (PHI) and, for electronic formats (ePHI), must meet the HIPAA Security Rule alongside the HIPAA Privacy Rule.
Health plans
Health plans include insurers, HMOs, employer-sponsored plans, Medicare, and Medicaid. They determine eligibility, pay claims, and coordinate benefits using PHI. Their obligations span the HIPAA Privacy Rule’s permissible uses and disclosures and appropriate safeguards for ePHI.
Health care clearinghouses
Clearinghouses translate nonstandard health information into standard formats and vice versa. Because they transform and route PHI between parties, they are covered entities even if they never see patients. Their controls must protect data integrity and confidentiality end to end.
Health care providers
Providers are covered when they transmit HIPAA standard transactions electronically, such as claims or eligibility checks. This group includes clinicians, hospitals, labs, and pharmacies. With Electronic Health Records (EHR), providers must align privacy practices with technical safeguards for ePHI.
Protected Health Information (PHI) essentials
PHI is individually identifiable health information in any form. It covers demographics, diagnosis, treatment, billing, and more, whether spoken, written, or electronic. The HIPAA Privacy Rule governs when and how you may use or disclose PHI.
Business Associates Defined
Business associates (BAs) are organizations or individuals that create, receive, maintain, or transmit PHI for covered entities. Typical examples include EHR vendors, cloud or data hosting providers, billing services, consultants, and analytics firms. BAs must follow the HIPAA Security Rule and relevant Privacy Rule provisions through contract.
Who qualifies as a business associate
If your services involve access to PHI—whether routine or incidental—you likely qualify as a BA. This includes managed service providers, claims processors, email gateways, and data destruction companies. Even storage-only cloud services qualify when ePHI is hosted.
Business Associate Agreements (BAAs)
A BAA defines permitted uses and disclosures, required safeguards, and breach reporting duties. It should specify encryption, access controls, audit rights, and subcontractor obligations. Strong BAAs streamline incident response and reduce the chance you will need a Corrective Action Plan after an investigation.
Subcontractors and downstream oversight
BA obligations flow to subcontractors that handle PHI on a BA’s behalf. You must ensure equivalent protections, documentation, and breach notification duties. Ongoing monitoring—risk reviews, attestations, and audits—keeps downstream risk in check.
Risks of HIPAA Violations
Common causes
Frequent violations stem from misdirected messages, snooping, misconfigured cloud storage, lost or stolen devices, and phishing. Weak passwords, shared accounts, and excessive access compound exposure. Gaps in training and outdated policies often underlie these events.
Regulatory and financial consequences
HHS OCR enforces HIPAA using a tiered civil penalty structure based on culpability, with annual caps per violation category. State attorneys general can bring actions, and the Department of Justice may pursue criminal cases for egregious misconduct. Settlements often require multi‑year monitoring and a detailed Corrective Action Plan.
Operational and reputational impact
Breaches drive downtime, incident costs, legal effort, and patient support needs. Trust erosion can reduce patient engagement and referral networks. Leadership focus shifts to remediation, delaying strategic projects.
Breach Notification Rule implications
The Breach Notification Rule requires timely notices to affected individuals, HHS, and sometimes the media, depending on scale. Inadequate or delayed notification can increase penalties. Thorough documentation and forensics support defensible decisions on whether a breach occurred.
Best Practices for HIPAA Compliance
Program governance and ownership
Designate privacy and security officers with clear authority and resources. Establish a governance committee that reviews metrics, risks, and incidents. Tie program objectives to business goals and patient trust.
Risk Analysis and ongoing risk management
Conduct an accurate and thorough Risk Analysis covering systems, data flows, vendors, and facilities. Prioritize risks, define owners, and track remediation to closure. Reassess when technology, operations, or threats change.
Policies, procedures, and workforce training
Maintain up‑to‑date Privacy Rule and Security Rule policies aligned to practice. Train staff on minimum necessary, secure messaging, and incident reporting. Reinforce learning with targeted refreshers and phishing simulations.
Access governance and least privilege
Use role‑based access with documented approvals and periodic reviews. Enforce strong authentication, preferably multi‑factor, for systems containing ePHI. Remove access promptly on role change or separation.
Incident response and Corrective Action Plan discipline
Prepare playbooks for privacy and security events, with clear decision trees for the Breach Notification Rule. Run tabletop exercises and post‑incident reviews. Use CAPs to institutionalize fixes, timelines, and validation tests.
Vendor management
Inventory all vendors touching PHI and classify them by risk. Perform due diligence, execute BAAs, and require security attestations. Monitor changes to services, locations, and subcontractors.
Technology baselines
Encrypt data at rest and in transit, patch routinely, and harden configurations. Implement EHR audit logs, endpoint protection, mobile device management, and data loss prevention. Back up critical systems and test restores.
Ready to assess your HIPAA security risks?
Join thousands of organizations that use Accountable to identify and fix their security gaps.
Take the Free Risk AssessmentAdministrative Safeguards Explained
Security management process
Administrative safeguards start with Risk Analysis and risk management to reduce vulnerabilities. Maintain sanction policies and workforce oversight to deter improper behavior. Document decisions and keep evidence audit‑ready.
Workforce security and training
Screen workforce members, define appropriate access, and supervise effectively. Provide orientation and periodic training on privacy practices and security hygiene. Track completion and measure effectiveness.
Information access management
Define who may access which PHI, for what purpose, and through which systems. Enforce minimum necessary with approvals and separation of duties. Review access when roles or job functions evolve.
Security awareness, contingency, and evaluation
Deliver ongoing awareness, including phishing and safe data handling. Maintain contingency plans for backup, disaster recovery, and emergency mode operations. Periodically evaluate your program to verify alignment with the HIPAA Security Rule.
Business associate oversight
Catalog BAs, execute BAAs, and set monitoring expectations. Require incident reporting, cooperation in investigations, and timely remediation. Ensure subcontractors implement equivalent safeguards.
Technical Safeguards Explained
Access controls
Assign unique user IDs, enforce strong authentication, and configure emergency access procedures. Use automatic session timeouts and restrict shared accounts. Apply the principle of least privilege throughout your environment.
Audit controls and activity review
Enable logs for EHRs, databases, APIs, and admin actions. Correlate events to detect anomalies and investigate inappropriate access. Review reports routinely and retain logs per policy.
Integrity, authentication, and trust
Use checksums, digital signatures, and application integrity controls to prevent improper alteration. Validate user and system identities before granting access. Guard against tampering in backups and replicas.
Transmission security
Protect ePHI in motion with modern TLS, secure email gateways, and VPNs where appropriate. Disable weak ciphers and enforce certificate management. Segment networks to limit lateral movement.
Encryption and key management
Encrypt sensitive stores, including databases, object storage, laptops, and mobile devices. Centralize key management with strict separation of duties. Rotate keys and test decryption in disaster recovery drills.
Physical Safeguards Explained
Facility access controls
Limit entry to data centers and server rooms using badges, biometrics, and visitor logs. Maintain escort policies and environmental controls. Review access lists regularly and revoke promptly.
Workstation use and security
Define acceptable use, screen positioning, and session lock behavior. Secure shared workstations at nursing stations and registration areas. Harden kiosks and telehealth setups to prevent unauthorized viewing.
Device and media controls
Track laptops, removable media, backups, and medical devices that store ePHI. Sanitize or destroy media before reuse or disposal and document the process. Use cable locks and secure transport procedures.
Summary
Covered entities and business associates share responsibility for safeguarding PHI under the HIPAA Privacy Rule, HIPAA Security Rule, and the Breach Notification Rule. By pairing a rigorous Risk Analysis with sound administrative, technical, and physical safeguards, you reduce violations and improve patient trust. Treat incidents as learning opportunities, apply a disciplined Corrective Action Plan, and keep your program current as technology and threats evolve.
FAQs.
What entities are covered under HIPAA?
HIPAA covers health plans, health care clearinghouses, and health care providers that conduct standard electronic transactions. Business associates and their subcontractors must also protect PHI through BAAs and Security Rule controls.
What are the penalties for HIPAA violations?
Penalties are tiered based on culpability, with per‑violation amounts and annual caps adjusted for inflation. HHS OCR can impose civil monetary penalties and require corrective actions; state attorneys general may bring cases; and the Department of Justice can pursue criminal charges for willful, egregious conduct.
How can entities ensure HIPAA compliance?
Build a formal privacy and security program, perform an accurate and thorough Risk Analysis, and implement administrative, technical, and physical safeguards. Train your workforce, manage vendors with strong BAAs, monitor activity, and use a Corrective Action Plan to close gaps quickly.
What is the role of business associates under HIPAA?
Business associates create, receive, maintain, or transmit PHI for covered entities and must safeguard it under the HIPAA Security Rule and applicable Privacy Rule requirements. BAAs define allowable uses, required protections, and breach reporting obligations, which also extend to subcontractors.
Ready to assess your HIPAA security risks?
Join thousands of organizations that use Accountable to identify and fix their security gaps.
Take the Free Risk Assessment