Healthcare Organizations That Count as HIPAA Covered Entities: Examples Explained
Understanding which healthcare organizations qualify as HIPAA covered entities starts with the Covered Entity Definition: health plans, healthcare clearinghouses, and healthcare providers that transmit health information electronically in standard transactions. These entities handle Protected Health Information (PHI) and must meet specific Compliance Requirements under the HIPAA Privacy Rule and HIPAA Security Rule.
Knowing where your organization fits helps you build practical policies, train your workforce, and support health information portability—making data shareable and accessible to patients and partners without sacrificing Healthcare Data Security.
Healthcare Providers as Covered Entities
Covered entity definition for providers
A healthcare provider is a covered entity when it transmits any health information electronically in connection with standard HIPAA transactions (for example, claims, eligibility checks, referrals, authorizations, or electronic prescribing). Merely using an EHR does not make you covered; participating in these standard transactions does.
Common provider types that qualify
- Hospitals, physician practices, clinics, urgent care centers, and ambulatory surgical centers
- Pharmacies, clinical laboratories, imaging centers, and durable medical equipment suppliers
- Dentists, chiropractors, optometrists, physical/occupational/speech therapists, and behavioral health providers
- Skilled nursing facilities, home health and hospice agencies, and telehealth providers
Some organizations are hybrid entities (for example, a university with a medical center). Only the designated healthcare components are subject to HIPAA, but all staff within those components must follow Privacy and Security Rule requirements.
Health Plans under HIPAA
What qualifies as a health plan
A health plan is an individual or group plan that provides or pays the cost of medical care. If you administer benefits or pay claims, you are likely a covered entity. The employer itself is not the covered entity; the employer’s group health plan is.
Examples of covered health plans
- Health insurance issuers and HMOs
- Employer group health plans, including self-insured plans and multiemployer plans
- Government programs such as Medicare, Medicaid, CHIP, TRICARE, and veteran health programs
- Medicare Advantage and Part D prescription drug plans
- Stand-alone dental and vision plans, and certain long-term care insurers
- Medical FSAs, HRAs, and some student health plans when they pay for care
Third-party administrators and benefits managers typically act as business associates to the plan and must enter Business Associate Agreements, but the plan remains the covered entity responsible for overall compliance.
Role of Healthcare Clearinghouses
Healthcare clearinghouses process nonstandard health information they receive from another entity into standard HIPAA transactions—or the reverse. They enable health information portability by translating, editing, and routing data so claims and other transactions flow reliably between providers and plans.
- Convert paper or proprietary-format claims into standard electronic transactions
- Normalize code sets, validate data, and return standardized acknowledgments
- Aggregate, de-duplicate, and route transactions to the correct payer or vendor
Clearinghouses are covered entities when performing these functions; when servicing non-covered clients, they may also act as business associates and must still protect Protected Health Information (PHI).
Ready to simplify HIPAA compliance?
Join thousands of organizations that trust Accountable to manage their compliance needs.
HIPAA Privacy Rule Compliance
The HIPAA Privacy Rule governs how covered entities use and disclose PHI and the rights patients have over their information. You must implement policies that reflect the minimum necessary standard while enabling treatment, payment, and healthcare operations.
- Issue a clear Notice of Privacy Practices and designate a privacy official
- Define permitted uses/disclosures and obtain valid authorizations when required
- Apply the minimum necessary standard to non-treatment disclosures
- Honor individual rights: access, amendments, restrictions, confidential communications, and accounting of disclosures
- Train the workforce, manage sanctions, and document policies and procedures
- Execute Business Associate Agreements with vendors that handle PHI
- Use de-identification or limited data sets when full identifiers aren’t needed
- Follow breach notification obligations when PHI is compromised
HIPAA Security Rule Implementation
The HIPAA Security Rule focuses on safeguarding electronic PHI (ePHI) by ensuring its confidentiality, integrity, and availability. Implementation is risk-based: you must assess risks and apply reasonable and appropriate controls across administrative, physical, and technical safeguards.
Administrative safeguards
- Conduct an enterprise-wide risk analysis and implement a risk management plan
- Assign security responsibility, train staff, and enforce sanctions for violations
- Develop contingency plans: data backup, disaster recovery, and emergency operations
- Manage vendor risks and maintain Business Associate Agreements
Physical safeguards
- Control facility access and workstation security
- Secure devices and media, with inventory tracking and safe disposal
- Protect remote and mobile use (device encryption, screen locks, and secure locations)
Technical safeguards
- Unique user IDs, strong authentication, and role-based access
- Encryption in transit and at rest, plus integrity controls and secure configurations
- Audit logging, security monitoring, and timely patching
- Secure messaging and portals instead of unprotected email or texting for PHI
Together, these controls operationalize Healthcare Data Security and align with your overall Compliance Requirements.
Examples of Covered Entities Compliance
- A physician practice verifies identity and releases only the minimum necessary PHI to a life insurer after receiving a valid authorization.
- A hospital uses role-based access and multi-factor authentication for its EHR; audit logs flag unusual access for investigation.
- A health plan’s claims team accesses member data strictly for payment operations and issues an accurate Explanation of Benefits.
- A clearinghouse converts nonstandard provider claims into HIPAA-standard transactions, validates codes, and routes them securely to the correct payer.
- A telehealth provider encrypts video sessions, stores ePHI in an encrypted database, and trains staff on secure remote workflows.
- A clinic de-identifies data for quality improvement, using a limited data set when direct identifiers are unnecessary.
- All entities maintain current Business Associate Agreements with their billing, cloud hosting, and e-prescribing vendors.
Importance of PHI Protection
Protecting PHI preserves patient trust, supports safe care, and reduces the likelihood of costly incidents. Strong Privacy Rule practices and Security Rule controls work together to prevent unauthorized access and ensure data is available when needed.
Effective safeguards also advance health information portability: patients can access, use, and share their information, while interoperable systems exchange standardized data without compromising privacy.
Summary
Covered entities include providers, health plans, and clearinghouses that handle PHI through standard electronic transactions. By implementing the HIPAA Privacy Rule and HIPAA Security Rule with a risk-based approach, you fulfill core Compliance Requirements and strengthen Healthcare Data Security across your organization.
Ready to simplify HIPAA compliance?
Join thousands of organizations that trust Accountable to manage their compliance needs.