HIPAA Basics Explained: Privacy Rule, Security Rule, and Compliance Essentials

Check out the new compliance progress tracker


Product Pricing Demo Video Free HIPAA Training
LATEST
video thumbnail
Admin Dashboard Walkthrough Jake guides you step-by-step through the process of achieving HIPAA compliance
Ready to get started? Book a demo with our team
Talk to an expert

HIPAA Basics Explained: Privacy Rule, Security Rule, and Compliance Essentials

Kevin Henry

HIPAA

July 07, 2025

8 minutes read
Share this article
HIPAA Basics Explained: Privacy Rule, Security Rule, and Compliance Essentials

This guide distills HIPAA fundamentals so you can protect health data with confidence. You will see how the Privacy Rule governs uses and disclosures of Protected Health Information (PHI), how the Security Rule safeguards Electronic Protected Health Information (ePHI), and what compliance essentials—Risk Assessment, Documentation Requirements, Workforce Training, and Data Breach Notification—look like in practice.

HIPAA Privacy Rule Overview

The Privacy Rule sets national standards for how covered entities and their business associates may use and disclose PHI in any form—paper, verbal, or electronic. It permits use and disclosure for treatment, payment, and health care operations, allows many public-interest disclosures, and otherwise requires a valid authorization. The “minimum necessary” standard limits non-treatment disclosures to the least amount of PHI needed.

Scope and Key Concepts

  • PHI includes any individually identifiable health information tied to a person’s past, present, or future health status, care, or payment.
  • De-identification removes or obscures identifiers so information is no longer PHI; a limited data set may be shared under a data use agreement.
  • Covered entities must provide a Notice of Privacy Practices describing how PHI is used and your rights.

Individual Rights

  • Access and obtain copies of PHI, including most electronic records.
  • Request amendments to inaccurate or incomplete PHI.
  • Receive an accounting of certain non-routine disclosures.
  • Request restrictions and confidential communications (for example, alternative addresses).

Workforce Training and Documentation Requirements

  • Train the workforce on privacy policies relevant to their roles and update training when material changes occur.
  • Designate a privacy official, adopt policies and procedures, maintain a complaint process, and apply sanctions for violations.
  • Retain required documentation (policies, training logs, notices, authorizations) for at least six years from creation or last effective date.

HIPAA Security Rule Standards

The Security Rule focuses on ePHI and requires safeguards to ensure confidentiality, integrity, and availability. It is risk-based and scalable: some implementation specifications are “required,” while others are “addressable”—you must implement them or document a reasonable alternative based on your Risk Assessment.

Risk Assessment and Management

  • Inventory systems that create, receive, maintain, or transmit ePHI.
  • Identify threats, vulnerabilities, likelihood, and impact; prioritize risks and select controls.
  • Document results, remediate gaps, and reassess periodically and after significant changes.

Policies, Contracts, and Documentation Requirements

  • Adopt security policies (access control, incident response, change management) and keep them current.
  • Execute business associate agreements that require appropriate safeguards for ePHI.
  • Maintain risk analyses, risk management plans, incident logs, and evaluations for at least six years.

Breach Notification Requirements

A breach is an impermissible use or disclosure of unsecured PHI that compromises privacy or security. There is a presumption of breach unless a documented, four-factor risk assessment shows a low probability of compromise. Limited exceptions apply (e.g., certain good-faith or intra-organization disclosures).

Notification Timelines and Methods

  • Notify affected individuals without unreasonable delay and no later than 60 calendar days after discovery.
  • If a breach involves 500 or more residents of a state or jurisdiction, notify prominent media and the HHS Secretary within 60 days.
  • For fewer than 500 individuals, log incidents and report to HHS no later than 60 days after the end of the calendar year.
  • Business associates must notify the covered entity without unreasonable delay and no later than 60 days after discovery, supplying available details.
  • Law enforcement may request a documented delay of notifications when necessary.

Documentation and Mitigation

  • Record the risk assessment, decision rationale, notifications sent, and remediation steps.
  • Mitigate harm (for example, recover misdirected data, reset credentials, offer support as appropriate) and strengthen controls to prevent recurrence.

Enforcement Rule Procedures

The HHS Office for Civil Rights (OCR) enforces HIPAA through complaints, investigations, and compliance reviews. Outcomes range from technical assistance and voluntary corrective action to resolution agreements with corrective action plans and monitoring. The Department of Justice may pursue criminal cases for certain knowing violations.

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Compliance Penalties

  • Civil monetary penalties follow a tiered structure based on culpability (from lack of knowledge to willful neglect), with annual inflation adjustments.
  • Factors include the nature and extent of the violation, resulting harm, history of compliance, and the entity’s cooperation.
  • Uncorrected willful neglect leads to mandatory penalties; timely corrective action can significantly mitigate exposure.

Appeals and Resolution

  • Entities may contest findings and penalties before an administrative law judge, with further HHS appeals available.
  • Resolution agreements typically require specific actions, independent assessments, reporting, and sustained Documentation Requirements.

Administrative Safeguards Implementation

Administrative safeguards translate governance into daily practice. Your goal is to embed security and privacy into operations so ePHI is protected consistently across people, processes, and technology.

  • Perform and maintain a written Risk Assessment; drive a prioritized risk management plan.
  • Assign a security official; define roles and responsibilities; enforce least-privilege access.
  • Implement Workforce Training, security awareness, and a sanctions policy.
  • Establish incident response procedures, including reporting, containment, investigation, and post-incident review.
  • Plan for continuity: data backup, disaster recovery, and emergency mode operations.
  • Evaluate safeguards periodically and after major changes; update policies accordingly.
  • Execute and manage business associate agreements; verify downstream protections.

Contingency Planning

  • Data backup and restoration testing on a defined schedule.
  • Disaster recovery procedures with clear roles, RTO/RPO targets, and contact trees.
  • Emergency mode operations to maintain critical functions if systems are degraded.
  • Application and data criticality analysis to prioritize recovery.

Business Associate Oversight

  • Due diligence before onboarding; verify capabilities to safeguard PHI and ePHI.
  • Contractual requirements for incident reporting, subcontractor flow-down, and right to audit.
  • Ongoing monitoring and documented remediation of issues.

Physical Safeguards Measures

Physical safeguards protect facilities, workstations, and devices that handle PHI and ePHI. They reduce risks like unauthorized facility access, device theft, and improper media handling.

  • Facility access controls: access badges, visitor logs, surveillance where appropriate, and contingency operations planning.
  • Workstation use and security: location and orientation to limit viewing, screen privacy filters, automatic logoff, and clean-desk practices.
  • Device and media controls: secure storage, transport procedures, chain-of-custody records, and validated disposal methods.

Device and Media Controls

  • Maintain an asset inventory; encrypt portable devices; disable external ports where feasible.
  • Use secure wiping or physical destruction before reuse or disposal; document each step.
  • Back up data before moving or servicing devices; verify restoration works.

Technical Safeguards Controls

Technical safeguards enforce access, monitor activity, preserve integrity, and secure transmissions for ePHI. Implement required controls and justify addressable ones through your documented Risk Assessment.

  • Access controls: unique user IDs, role-based access, emergency access procedures, and automatic logoff.
  • Audit controls: detailed logging of access and changes; routine review and alerting for anomalies.
  • Integrity: mechanisms to detect unauthorized alteration (hashing, checksums, allowlists).
  • Person/entity authentication: strong authentication, preferably multi-factor, for remote and privileged access.
  • Transmission security: encryption for data in transit (e.g., TLS), secure messaging, and network segmentation.

Access Management

  • Provision access on least-privilege and need-to-know; document approvals and periodic recertifications.
  • Terminate access promptly upon role change or separation; revoke tokens and retrieve devices.
  • Use unique service accounts and vault credentials; monitor privileged actions.

Monitoring and Response

  • Centralize logs; correlate events; investigate and contain suspicious activity quickly.
  • Patch systems, harden configurations, and deploy endpoint protection based on prioritized risks.
  • Test incident response and recovery playbooks; incorporate lessons learned into policies and training.

Conclusion

Effective HIPAA compliance integrates policy and practice: know what PHI and ePHI you hold, perform a living Risk Assessment, implement layered administrative, physical, and technical safeguards, train your workforce, and document everything. With these compliance essentials in place, you reduce risk, protect patients, and are prepared to respond if a breach occurs.

FAQs

What is the difference between the Privacy Rule and Security Rule?

The Privacy Rule governs when and how PHI may be used or disclosed and grants individuals rights over their information. The Security Rule focuses on protecting ePHI through administrative, physical, and technical safeguards to ensure confidentiality, integrity, and availability.

How soon must a data breach be reported under HIPAA?

You must notify affected individuals without unreasonable delay and no later than 60 calendar days after discovering a breach. For incidents affecting 500 or more residents of a state or jurisdiction, you must also notify HHS and the media within 60 days; smaller breaches are logged and reported to HHS no later than 60 days after the calendar year ends.

What are the main types of safeguards required by HIPAA?

HIPAA requires administrative, physical, and technical safeguards. Together, they address policies and people, facilities and devices, and the technology controls that protect PHI and ePHI end to end.

How often must HIPAA training be conducted for employees?

HIPAA requires role-appropriate training upon hire and whenever policies or job duties materially change, plus ongoing security awareness. Many organizations provide comprehensive refresher training annually to maintain awareness and document compliance.

Share this article

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Related Articles