HIPAA Changes: What's New, Key Deadlines, and How to Stay Compliant

Product Pricing
Ready to get started? Book a demo with our team
Talk to an expert

HIPAA Changes: What's New, Key Deadlines, and How to Stay Compliant

Kevin Henry

HIPAA

June 27, 2025

7 minutes read
Share this article
HIPAA Changes: What's New, Key Deadlines, and How to Stay Compliant

Reproductive Health Privacy Rule Overview

What changed and why it matters

Recent HIPAA changes strengthen privacy protections for reproductive health information. You must not use or disclose protected health information (PHI) to investigate or impose liability for lawful reproductive health care. Many disclosures now require a signed attestation confirming the request is not for a prohibited purpose, and your Notice of Privacy Practices must explain these limits in plain language.

Operational impacts you should plan for

  • Standardize intake for law enforcement and third‑party requests, including an attestation template and verification workflow.
  • Update your Notice of Privacy Practices and workforce training so staff can spot and escalate prohibited-purpose requests quickly.
  • Configure your EHR to identify reproductive health PHI, apply minimum necessary, and log all disclosures and denials.
  • Add legal and privacy review for subpoenas, warrants, and out‑of‑state requests; document written verification of compliance decisions.
  • Refresh incident response and breach notification requirements to address risks of improper disclosures related to reproductive care.

Substance Use Disorder Records Requirements

42 CFR Part 2 alignment in practice

Reforms to substance use disorder (SUD) confidentiality rules bring them closer to HIPAA while preserving critical patient safeguards. With a single patient consent, you may use and disclose Part 2 records for treatment, payment, and health care operations, but redisclosure and segmentation controls still apply. HIPAA breach notification requirements now extend to many Part 2 programs, raising the bar for incident detection and reporting.

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

How to operationalize compliance

  • Adopt unified consent forms that clearly cover TPO, redisclosure limits, and revocation rights; capture consent electronically where possible.
  • Segment SUD data in your EHR and data warehouse; tag records so queries, exports, and analytics respect Part 2 boundaries.
  • Revise your Notice of Privacy Practices to reflect Part 2 changes and patient rights, and retrain front‑line and HIM teams.
  • Update Business Associate Agreements to address Part 2 handling, incident reporting, and flow‑down obligations to subcontractors.
  • Enhance monitoring and audit logging so you can prove appropriate access and produce accounting of disclosures on request.

HIPAA Security Rule Updates

Security expectations to meet now

Regulators increasingly expect concrete safeguards that go beyond policy binders. Prioritize multi-factor authentication for all remote, privileged, and clinical-system access; strong encryption in transit and at rest; and continuous risk management protocols that tie your risk analysis to funded remediation plans.

A practical modernization sprint

  • Access control: implement MFA, privileged access management, and quarterly entitlement reviews.
  • Vulnerability management: 30‑day patch SLAs for critical systems, endpoint detection and response, and network segmentation.
  • Data protection: encrypted backups with immutable storage, tested recovery objectives, and secure disposal workflows.
  • Monitoring and response: 24/7 alerting thresholds, tabletop exercises, and breach notification playbooks mapped to HIPAA requirements.
  • Third‑party risk: due diligence questionnaires, security addenda in BAAs, and written verification of compliance from vendors annually.

Make it measurable

  • Conduct annual compliance audits and quarterly control testing; track findings to closure with executive oversight.
  • Maintain a living risk register that shows status, owners, funding, and deadlines for each corrective action.

Enhancing Patient Access Rights

Delivering fast, digital access

Patients should receive timely, easy access to their designated record set in the format they request when feasible. Strengthen your portals, APIs, and release-of-information workflows so patients can obtain electronic health information without friction or unnecessary delays.

Operational guardrails

  • Implement standardized data sharing through modern APIs to reduce manual processing and errors.
  • Use identity proofing that balances security with usability; document denials and partial denials with clear rationale.
  • Ensure cost‑based fees are applied correctly and that staff can explain options for format, delivery, and third‑party directives.
  • Continuously monitor turnaround times and automate status updates so patients always know where a request stands.

Information Blocking Compliance Measures

Program elements that prevent violations

  • Define “electronic health information” (EHI) consistently and map where it lives across your systems and vendors.
  • Codify the information blocking exceptions with decision trees, documentation templates, and an approval path for denials.
  • Support standardized data sharing with FHIR-based APIs; test regularly to confirm availability, performance, and uptime.
  • Log and review every delayed or denied response; validate that Security, Privacy, Preventing Harm, or other exceptions truly apply.
  • Educate clinicians and IT so well‑intended safety holds do not become de facto information blocking.

Updating Business Associate Agreements

Clauses to add or tighten

  • Permitted uses/disclosures: incorporate reproductive health care limits and SUD (Part 2) segmentation requirements.
  • Security safeguards: require multi-factor authentication, encryption standards, and documented risk management protocols.
  • Incident handling: specify breach notification requirements, including rapid initial notice (e.g., within 24–72 hours) and ongoing updates.
  • Verification and oversight: obtain written verification of compliance, audit rights, and remediation timelines for deficiencies.
  • Subcontractors and data lifecycle: flow‑down obligations, data return/destruction on termination, and restrictions on de‑identification or secondary use.

Execution tips

  • Inventory all BAAs, rank vendors by risk, and deploy updated templates; track status to signature with executive sponsorship.
  • Add standardized security exhibits and require evidence (policy excerpts, SOC 2, penetration tests) during onboarding and annually.

Key Compliance Deadlines Summary

  • Breach notification requirements: notify affected individuals without unreasonable delay and no later than 60 calendar days after discovery of a reportable breach.
  • Program cadence: conduct annual compliance audits, refresh security risk analyses at least annually and upon major changes, and retrain the workforce every year.
  • Reproductive health privacy changes: plan policy, EHR flagging, and Notice of Privacy Practices updates ahead of applicable federal compliance dates; complete staff training before enforcement begins.
  • Substance use disorder records: align consent, segmentation, and BAAs within the federal transition window for 42 CFR Part 2 changes; validate redisclosure controls before go‑live.
  • Information blocking: maintain continuous API availability, document use of exceptions in real time, and monitor response times to patient and app requests monthly.
  • Vendors and BAAs: execute updated agreements promptly and obtain written verification of compliance from business associates on an annual cycle.

FAQs

What are the new deadlines for HIPAA compliance?

Deadlines vary by rule and entity. Create a master calendar that tracks each rule’s effective date, compliance date, and any transition period. As a baseline, follow the 60‑day timeline for breach notifications, complete annual compliance audits and workforce training each year, and schedule Notice of Privacy Practices and BAA updates well ahead of applicable federal compliance dates.

How do the HIPAA Security Rule updates impact healthcare providers?

You are expected to demonstrate mature safeguards rather than just policies on paper. Priorities include multi-factor authentication, end‑to‑end encryption, continuous risk management protocols, rapid patching, resilient backups, and documented incident response. Regulators also expect measurable oversight of vendors and proof that identified risks are tracked to remediation.

What changes were made to patient access rights?

Patients should receive timely, electronic access to their records in the manner they request when feasible. You should streamline release‑of‑information workflows, enable standardized data sharing through APIs, apply cost‑based fees correctly, and document any denials under recognized exceptions while keeping turnaround times as short as possible.

How should organizations update their Business Associate Agreements?

Revise BAAs to reflect reproductive health privacy limits, substance use disorder segmentation, and explicit breach notification requirements. Require concrete security controls such as multi-factor authentication and encryption, mandate written verification of compliance and audit rights, and flow obligations down to all subcontractors. Track renewals to completion and collect evidence annually.

Bottom line: build a living compliance program that pairs clear policies with measurable execution—update your Notice of Privacy Practices, modernize security with MFA and risk‑based controls, standardize data sharing, reinforce breach notification readiness, and keep BAAs and audits on a dependable annual cycle.

Share this article

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Related Articles