HIPAA Compliance for Non-Covered Entities: Requirements, Risks, and Best Practices
Even if you are not a HIPAA covered entity, you may collect, create, or process health-related data that attracts regulatory, contractual, and reputational risk. Understanding HIPAA concepts helps you align with industry expectations, communicate with partners, and protect individuals’ information.
This guide explains how HIPAA principles apply to non-covered entities, what requirements commonly arise through contracts and adjacent laws, the risks you face, and practical best practices to build a defensible privacy and security program.
Overview of Non-Covered Entities
A non-covered entity is any organization that is neither a HIPAA covered entity (health plans, most healthcare providers, or healthcare clearinghouses) nor a business associate acting on their behalf. Examples include consumer health apps, wellness platforms, life sciences startups, employee wellness vendors without a Business Associate Agreement (BAA), employers in their employer role, and schools when data falls under other regimes.
Protected Health Information (PHI) is individually identifiable health information held or transmitted by a covered entity or its business associate. If you collect similar data independently (for example, a fitness app storing heart rate), it may not be PHI under HIPAA, but it is still sensitive and often regulated by other laws and contracts.
Many non-covered entities voluntarily align to HIPAA concepts to satisfy customer expectations, support enterprise sales, or prepare to sign future BAAs. This alignment reduces friction with partners and raises your security baseline.
Privacy and Security Measures
HIPAA’s Privacy Rule and Security Rule do not directly bind non-covered entities unless you function as a business associate. Still, mapping your controls to these rules gives you a clear, recognized framework and reassures stakeholders that you manage data responsibly.
Privacy-aligned practices
- Data minimization and “minimum necessary”: collect only what you need, limit access by role, and suppress unneeded identifiers.
- Purpose specification and notices: explain how you use data, retention timelines, and sharing with third parties in plain language.
- Consent and preference management: respect opt-ins, withdrawals, and marketing choices; record evidence of consent.
Security-aligned practices
- Administrative Safeguards: define governance, appoint a security and privacy lead, issue policies, train your workforce, and manage vendor risk.
- Technical Safeguards: enforce strong authentication (e.g., MFA), encrypt data in transit and at rest, apply least privilege, segment networks, and monitor logs.
- Physical Safeguards: protect facilities and devices, secure media, and manage visitor access.
Build an incident response plan that includes Data Breach Notification procedures for relevant laws or contracts. Your plan should define thresholds, roles, forensics steps, and communications templates.
Risk Assessment Strategies
A disciplined Risk Analysis helps you prioritize controls and justify decisions. Start by inventorying systems, data flows, and third parties so you know where sensitive data enters, moves, and leaves your environment.
Core steps for effective risk analysis
- Identify threats and vulnerabilities: consider misuse, credential theft, misconfiguration, API exposures, and insider risks.
- Evaluate likelihood and impact: use a simple scoring model to rank scenarios and focus on the top risks first.
- Select treatments: mitigate (controls), transfer (insurance), avoid (change design), or accept with sign-off and timelines.
- Document and track: maintain a living risk register with owners, milestones, and evidence of closure.
Revisit the assessment at least annually or after major changes such as new features, vendors, or incidents. Tie findings to budgets and roadmaps so risk reduction becomes part of normal planning.
Data Handling and Disposal
Manage the full data lifecycle—from collection to deletion—to reduce exposure and comply with promises you make to users and partners. Clear retention limits also lower storage costs and breach impact.
Ready to assess your HIPAA security risks?
Join thousands of organizations that use Accountable to identify and fix their security gaps.
Take the Free Risk AssessmentCollection and use
- Collect the minimum identifiers needed; prefer tokenization or pseudonymization where feasible.
- Segregate PHI-like data from general analytics; restrict cross-use unless expressly disclosed and allowed.
Storage and transfer
- Encrypt at rest and in transit, rotate keys, and protect secrets in a managed vault.
- Apply access controls, just-in-time elevation, and continuous logging with alerting for anomalous activity.
Retention and disposal
- Define retention schedules based on legal, contractual, and business needs; avoid “keep forever.”
- Dispose securely using approved methods (for example, cryptographic erasure for cloud, secure wipe for devices, and shredding for paper) and record disposal logs.
Penalties for Non-Compliance
Non-covered entities typically are not penalized under HIPAA unless they function as business associates or violate a BAA. However, significant consequences still exist for mishandling health data or misrepresenting your practices.
- Contractual liability: BAAs or data protection addenda may impose security obligations, audit rights, indemnities, and damages for breaches.
- Regulatory actions: the Federal Trade Commission can pursue unfair or deceptive practices and enforce the Health Breach Notification Rule for certain health apps and similar services.
- State laws: attorneys general and state regulators can enforce privacy and data breach statutes, including notification obligations and civil penalties.
- Litigation and reputational harm: class actions, customer churn, and lost partnerships often exceed direct regulatory costs.
Treat “non-compliance” broadly: failure to follow your own notices, contracts, or industry standards can trigger investigations even if HIPAA does not apply directly.
Implementing Best Practices
Translate requirements and risks into a practical program you can operate. Start small, document decisions, and iterate as you grow.
Program foundations
- Governance: assign executive sponsorship and name privacy and security leads with authority to enforce policies.
- Policies and training: publish concise policies, run onboarding and annual training, and test comprehension.
- Vendor management: perform due diligence, require security commitments, and map data sharing to contracts.
Operational controls
- Access management: least privilege, periodic reviews, quick offboarding, and break-glass procedures.
- Secure development: threat modeling, code review, dependency scanning, and pre-release security testing.
- Monitoring and logging: maintain centralized logs, define alerts, and retain evidence to support investigations.
Incident readiness and notifications
- Run tabletop exercises to practice containment, forensics, decision-making, and Data Breach Notification timing.
- Prepare customer and regulator communications in templates; keep contact lists current.
Monitoring and Auditing Compliance
Ongoing oversight proves that controls work as intended and that you honor your promises. Plan a Compliance Auditing cadence that blends automated checks with periodic reviews.
What to monitor
- Access anomalies to sensitive systems, failed login spikes, and data export volumes.
- Configuration drift in cloud resources, encryption status, and patch currency.
- Vendor attestations, certificate expirations, and results of penetration tests.
How to audit
- Scope: select a control set mapped to the Privacy Rule and Security Rule for consistency, even if not strictly required.
- Evidence: collect screenshots, logs, tickets, and training records; ensure traceability to control IDs.
- Reporting: summarize gaps, risk ratings, owners, and deadlines; track remediation to completion.
Conclusion
While HIPAA may not directly govern your organization, aligning to its principles strengthens trust, reduces risk, and streamlines partnerships. By performing a thoughtful Risk Analysis, adopting disciplined safeguards, and sustaining monitoring and audits, you create a defensible program that protects individuals and your business.
FAQs
What defines a non-covered entity under HIPAA?
A non-covered entity is any organization that is neither a HIPAA covered entity nor a business associate handling PHI on a covered entity’s behalf. It may still process health-related data, but that data is not PHI under HIPAA unless it is created or received by a covered entity or its business associate.
What privacy measures should non-covered entities implement?
Implement data minimization, transparent notices, consent management, and role-based access, supported by Administrative Safeguards, encryption, monitoring, and secure disposal. Aligning with the Privacy Rule and Security Rule frameworks provides a clear, recognized structure.
What are the consequences of non-compliance for non-covered entities?
Even without direct HIPAA applicability, you can face contractual liability under BAAs or data agreements, regulatory enforcement (such as FTC actions and Health Breach Notification Rule obligations for certain services), state investigations, lawsuits, and reputational damage.
Ready to assess your HIPAA security risks?
Join thousands of organizations that use Accountable to identify and fix their security gaps.
Take the Free Risk Assessment