HIPAA Compliance for Self-Insured Employers: Requirements, Responsibilities, and Best Practices

Check out the new compliance progress tracker


Product Pricing Demo Video Free HIPAA Training
LATEST
video thumbnail
Admin Dashboard Walkthrough Jake guides you step-by-step through the process of achieving HIPAA compliance
Ready to get started? Book a demo with our team
Talk to an expert

HIPAA Compliance for Self-Insured Employers: Requirements, Responsibilities, and Best Practices

Kevin Henry

HIPAA

March 03, 2026

8 minutes read
Share this article
HIPAA Compliance for Self-Insured Employers: Requirements, Responsibilities, and Best Practices

HIPAA Applicability to Self-Insured Employers

Who is the covered entity?

In a self-insured arrangement, the group health plan is the HIPAA covered entity. You, as the employer and plan sponsor, are generally not a covered entity; however, when you perform plan administration functions and receive Protected Health Information (PHI), HIPAA applies to those activities.

To lawfully receive PHI for plan administration, you must amend plan documents, certify that you will safeguard PHI, and establish a firewall separating plan administration from employment decisions. Without these steps, you may receive only limited data like enrollment information or de-identified/summary health information.

What counts as PHI in this context?

PHI is individually identifiable health information related to an individual’s past, present, or future health or payment for care. For a health plan, this often includes claims files, eligibility data, explanations of benefits, case management records, and appeals. Electronic PHI (ePHI) triggers additional Security Rule controls.

Practical applicability steps

  • Designate a Privacy Official and a contact for privacy complaints.
  • Define who on your benefits team may access PHI and for what plan administration purposes.
  • Document minimum necessary standards and create a HIPAA “firewall” between plan administration and HR managers who make employment decisions.

Privacy Rule Obligations

Notice of Privacy Practices

A self-insured plan must maintain and distribute a Notice of Privacy Practices (NPP). Provide the NPP at initial enrollment, upon material revision, and at least every three years notify participants that the NPP is available and how to obtain it. If the plan has a benefits website, post the NPP there as well.

Permitted uses, minimum necessary, and authorizations

You may use or disclose PHI for payment and health care operations, and for plan administration as allowed by amended plan documents. Apply the minimum necessary standard to uses, disclosures, and requests. Obtain a written authorization for any use or disclosure not otherwise permitted by HIPAA or required by law.

Individual rights and core policies

  • Access and copies: Provide participants access to PHI in the designated record set within required timeframes.
  • Amendment and accounting: Process amendment requests and maintain an accounting of certain disclosures.
  • Restrictions and confidential communications: Evaluate restriction requests and accommodate reasonable requests for alternate contact methods.
  • Policies, sanctions, and retention: Implement written policies, apply sanctions for noncompliance, and retain documentation for at least six years.

Security Rule Obligations

Risk analysis and ongoing Risk Assessment

Conduct a comprehensive Risk Assessment of ePHI to identify threats, vulnerabilities, likelihood, and impact, then implement a risk management plan with prioritized controls. Revisit the assessment at least annually and upon significant changes such as new systems, vendors, or migrations.

Administrative Safeguards

  • Security management: Risk management, workforce sanctions, and activity review.
  • Assigned security responsibility and workforce security with role-based access.
  • Information access management and minimum necessary enforcement.
  • Security awareness and training, including phishing and secure remote work practices.
  • Contingency planning: Data backup, disaster recovery, and emergency-mode operations with periodic testing.

Technical Safeguards

  • Access controls: Unique user IDs, multi-factor authentication, automatic logoff.
  • Audit controls: Centralized logging and routine log review.
  • Integrity and authentication: Hashing or checksums and strong authentication methods.
  • Transmission security: Encrypted email and secure file transfer; encryption is “addressable” but expected in practice.

Physical Safeguards

  • Facility access controls and visitor management for locations hosting ePHI.
  • Workstation and device security, including screen privacy and cable locks.
  • Device and media controls for secure disposal and media re-use.

Documentation and evaluation

Maintain written security policies, procedures, and system inventories. Perform periodic technical and nontechnical evaluations, track remediation, and document management approval of risk decisions.

Business Associate Agreements

Who is a Business Associate?

A Business Associate creates, receives, maintains, or transmits PHI on behalf of your plan. Common examples include TPAs, PBMs, COBRA administrators, wellness vendors, case/disease management firms, mail-house and print vendors, cloud hosting providers, and certain brokers or consultants. A stop-loss carrier may be a Business Associate if it handles PHI beyond underwriting or enrollment data—evaluate the actual data flows.

What to include in the agreement

Execute a Business Associate Agreement before sharing PHI. At minimum, specify permitted uses/disclosures, safeguard requirements aligned to the Security Rule, prompt breach and incident reporting, subcontractor flow-down, access/amendment/accounting support, minimum necessary, HHS audit cooperation, return or destruction of PHI, and termination rights. Consider service-level expectations for breach reporting and audit log delivery.

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Due diligence and monitoring

  • Screen vendors for security maturity (policies, encryption, SOC 2 or comparable reports).
  • Map PHI flows and limit data to the minimum necessary.
  • Review BAAs and security attestations annually; document follow-up on gaps.

Breach Notification Requirements

Presumption of breach and risk assessment

An impermissible use or disclosure of unsecured PHI is presumed a breach unless you demonstrate a low probability of compromise. Evaluate the type of PHI, the unauthorized recipient, whether data was actually acquired or viewed, and the extent of risk mitigation. Encrypting PHI or securely destroying it can remove it from the scope of the Breach Notification Rule.

Notification timelines and content

  • Individuals: Notify without unreasonable delay and no later than 60 calendar days after discovery.
  • HHS: For 500+ affected in a state/jurisdiction, notify HHS within 60 days; for fewer than 500, report to HHS within 60 days after the end of the calendar year.
  • Media: For breaches affecting 500+ residents of a state/jurisdiction, notify prominent media within 60 days.
  • Business Associates: Your BAA should require earlier notice to the plan so you can meet deadlines.

Include in notices: a description of the incident and dates, types of PHI involved, steps individuals should take, mitigation measures, and contact methods for questions. Maintain detailed incident and decision logs.

Incident response playbook

  • Activate response team, preserve evidence, and stop further data loss.
  • Conduct the breach risk assessment and decide on notification.
  • Deliver notices, file required reports, and implement corrective actions.
  • Review lessons learned, update controls, and retrain as needed.

ERISA Fiduciary and Cybersecurity Oversight

Connecting HIPAA and ERISA Fiduciary Duty

As an ERISA plan fiduciary, you must act prudently and solely in the interest of participants. That fiduciary duty extends to selecting and monitoring service providers, including their cybersecurity practices, and ensuring the plan’s PHI and other sensitive data are protected.

Prudent governance steps

  • Assign committee oversight for privacy and security; record decisions and metrics.
  • Integrate HIPAA controls into vendor RFPs and contracts, with performance and breach-reporting standards.
  • Review SOC reports, penetration test summaries, and corrective action plans from vendors handling PHI.
  • Align disclosures: ensure the SPD, HIPAA NPP, and administrative processes are consistent.
  • Maintain cyber insurance, incident response coordination with the TPA, and tested business continuity plans.

Training and Awareness

Role-based training program

Train all workforce members who handle PHI at onboarding and when policies change, with at least annual refreshers. Provide additional role-based modules for benefits staff, HRIS administrators, and executives who receive PHI for plan administration.

Awareness practices that stick

  • Short, frequent security reminders (phishing, secure file transfer, data minimization).
  • Job aids on the minimum necessary standard and how to verify requesters.
  • Clear escalation paths for privacy complaints, incidents, and suspected breaches.
  • Document completion, comprehension checks, and sanctions for noncompliance.

Conclusion

HIPAA compliance for self-insured employers centers on sound governance, a current Risk Assessment, robust administrative/technical/physical safeguards, disciplined Business Associate oversight, a tested breach response, prudent ERISA fiduciary controls, and continuous training. With these elements in place, your plan can protect participants while operating efficiently and confidently.

FAQs

What are the key HIPAA requirements for self-insured employers?

Establish plan document amendments and a HIPAA firewall; publish and maintain the Notice of Privacy Practices; implement Privacy Rule policies and participant rights processes; perform a Security Rule Risk Assessment and implement Administrative Safeguards, technical and physical controls; execute and monitor each Business Associate Agreement; maintain an incident response plan aligned to the Breach Notification Rule; train your workforce and retain documentation.

How should self-insured employers conduct risk assessments?

Inventory systems and vendors with ePHI, map data flows, and evaluate threats and vulnerabilities by likelihood and impact. Prioritize remediation, assign owners and timelines, and track completion. Reassess at least annually and whenever you add major systems or vendors. For incidents, perform a breach risk assessment focused on the probability of compromise to decide on notification.

When must breach notifications be issued?

Notify affected individuals without unreasonable delay and no later than 60 calendar days after discovery. For breaches affecting 500 or more residents of a state or jurisdiction, notify HHS and the media within 60 days; for smaller breaches, report to HHS within 60 days after the end of the calendar year. Your Business Associate should alert you promptly under the BAA so you can meet these deadlines.

What training is required for workforce handling PHI?

Provide onboarding and annual refreshers for anyone who handles PHI, with role-based modules for plan administrators and HRIS staff. Include privacy fundamentals, the minimum necessary standard, secure transmission and storage of PHI, incident reporting, and phishing awareness. Keep records of attendance, content, and assessments to demonstrate compliance.

Share this article

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Related Articles