HIPAA Covered Entities with Multiple Functions: Requirements, Risks, and Examples

Check out the new compliance progress tracker


Product Pricing Demo Video Free HIPAA Training
LATEST
video thumbnail
Admin Dashboard Walkthrough Jake guides you step-by-step through the process of achieving HIPAA compliance
Ready to get started? Book a demo with our team
Talk to an expert

HIPAA Covered Entities with Multiple Functions: Requirements, Risks, and Examples

Kevin Henry

HIPAA

January 01, 2025

8 minutes read
Share this article
HIPAA Covered Entities with Multiple Functions: Requirements, Risks, and Examples

Organizations often deliver health care services alongside unrelated operations—think universities with clinics, retailers with pharmacies, or municipalities with public health programs. These HIPAA covered entities with multiple functions must separate health-related activities from non-health activities while safeguarding protected health information (PHI). This guide explains how to identify functions, implement a hybrid entity designation, document health care components, train staff, manage risks, and learn from practical examples.

The aim is effective privacy program implementation that prevents unauthorized disclosure, satisfies the Privacy and Security Rules, and supports compliance risk management without slowing the business.

Identifying Covered and Non-Covered Functions

What counts as a “covered” function

A function is “covered” when it operates as a health plan, health care provider that transmits standard transactions, or health care clearinghouse. Typical covered functions inside multifaceted organizations include on-site clinics, pharmacies, dental or optical centers, student health services, employee assistance programs that bill insurers, and self-insured group health plans.

Non-covered functions and adjacent roles

Non-covered functions include operations with no role in delivering or paying for care—such as retail, academic departments, city utilities, or corporate marketing. Human resources is generally non-covered; however, when administering a group health plan, specific plan administration activities are subject to HIPAA and must be ring-fenced from the broader employer. Shared services (IT, legal, finance) may support both covered and non-covered areas but must handle PHI only as permitted.

Practical mapping steps

  • Inventory lines of business and services, noting which create, receive, maintain, or transmit PHI.
  • Confirm whether a function conducts HIPAA standard transactions (e.g., claims, eligibility, remittance) or acts as a health plan.
  • Classify each function as a health care component, a non-covered component, or a business associate of a covered component.
  • Trace PHI flows between components and to vendors to pinpoint where unauthorized disclosure prevention controls are required.

Implementing Hybrid Entity Designation

Making the designation official

A hybrid entity designation formally separates health care components from the rest of the organization. Leadership documents which units are designated, what workforce members belong to each, and how shared services may access PHI. This hybrid entity designation ensures HIPAA obligations attach to the designated components and any permitted shared services, not to the entire enterprise.

Core elements to implement

  • Define boundaries: list every health care component (e.g., pharmacy, clinic, group health plan) and identify non-covered components.
  • Establish “firewalls”: policies that restrict PHI use and disclosure across components and govern dual-role staff.
  • Align notices and rights: provider components issue a Notice of Privacy Practices; plans issue plan-specific notices; both support individual rights.
  • Authorize shared services: specify when IT, compliance, or revenue cycle can use PHI to support covered functions.
  • Update vendor arrangements: execute business associate agreements (BAAs) for services that handle PHI for covered components.

Handling dual-role workforce and systems

Staff who serve covered and non-covered components should have role-based access, distinct workflows, and training that emphasizes minimum necessary use of PHI. Systems shared across components need technical segmentation, auditable access controls, and logging so that PHI does not bleed into non-covered operations.

Documenting Health Care Components

HIPAA compliance documentation essentials

  • Designation record: a written statement naming each health care component, shared services permitted to access PHI, and responsible leaders.
  • Data maps and diagrams: clear depiction of PHI systems, interfaces, and third-party connections.
  • Policies and procedures: privacy, security, and breach response policies tailored to hybrid operations.
  • Risk analysis and risk management plan: documented evaluation of threats and prioritized remediation actions.
  • Training records and sanctions: proof of workforce education and consistent enforcement.
  • Vendor inventory and BAAs: contracts, security due diligence, and ongoing monitoring artifacts.

Change management and retention

Update documentation whenever you add or retire a clinic, launch telehealth, migrate to new systems, restructure units, or change vendors. Conduct periodic reviews to confirm that health care components, PHI flows, and controls still match reality. Retain HIPAA compliance documentation per your retention policy and applicable legal requirements.

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Ensuring Staff Training and Awareness

Role-based training that sticks

  • Baseline orientation for all workforce members on PHI, minimum necessary, and incident reporting.
  • Targeted modules for dual-role staff explaining how to isolate covered work from non-covered duties.
  • Job-specific content for pharmacy, clinic, plan administration, registration, and revenue cycle teams.
  • Leadership briefings on governance, risk acceptance, and resourcing for privacy program implementation.

Everyday practices to prevent unauthorized disclosure

  • Use checklists for call centers and front desks to verify identity and disclose only the minimum necessary.
  • Label and segregate PHI in mixed-use spaces; avoid shared inboxes or printers without access controls.
  • Enable secure messaging, encryption, and automatic logoff; prohibit copy-paste of PHI into non-covered tools.
  • Run drills for misdirected communications, lost devices, or ransomware to reinforce quick response.

Managing Compliance Risks and Penalties

Key risks in multi-function environments

  • Cross-component leakage of PHI—particularly between a group health plan and the broader employer.
  • Improper marketing or research use of PHI without authorization or required waivers/data use agreements.
  • Vendor incidents stemming from insufficient due diligence or weak contract controls.
  • Access creep in shared systems, inadequate audit logging, or unmonitored third-party apps.
  • Incomplete risk analysis, delayed breach detection, or inconsistent patient rights fulfillment.

Risk treatment and response

  • Conduct and refresh enterprise-wide risk analysis focused on component boundaries and PHI flows.
  • Implement technical segmentation, role-based access, encryption, and data loss prevention.
  • Monitor with audits and alerts; investigate anomalies and enforce sanctions when appropriate.
  • Maintain an incident response plan covering containment, forensics, notification decisions, and lessons learned.

Consequences of non-compliance

Regulators can impose tiered civil monetary penalties, require corrective action plans, and monitor organizations for years. Beyond fines, breaches damage trust, trigger litigation, and disrupt operations. Mature compliance risk management lowers both regulatory and reputational exposure.

Examples of Hybrid and Affiliated Covered Entities

University with clinical services

A university designates its student health center, dental clinic, and self-insured student health plan as health care components. Academic departments, athletics, and housing remain non-covered. Research units accessing PHI do so under proper approvals or data agreements, and shared IT services are authorized to support the designated components.

Municipality with public health operations

A city government designates its public health clinic and immunization program as covered components while utilities, parks, and police remain non-covered. HR’s plan administration team is included within the group health plan component. Firewalls prevent employer access to plan PHI except as permitted.

Retailer with pharmacy and optical centers

A national retailer designates in-store pharmacies and optical clinics as health care components. Corporate merchandising and e-commerce remain non-covered. Contact centers use scripts and system controls to keep PHI within the covered components, and vendors sign BAAs before handling PHI.

Manufacturer with a self-insured plan

A manufacturer designates its self-insured group health plan as a health care component. The wider enterprise cannot use PHI for employment decisions; only plan administration staff with documented need-to-know access handle PHI under minimum necessary rules.

Affiliated covered entities (ACE) in health systems

Separate legal entities under common control—such as a hospital and its physician group—may form affiliated covered entities to operate under a unified privacy framework. An ACE facilitates shared operations and coordinated care while still applying minimum necessary standards and maintaining HIPAA compliance documentation of the affiliation.

Addressing Organizational Compliance Challenges

Governance and accountability

  • Appoint a privacy officer and security officer with authority over all health care components.
  • Establish a cross-functional privacy council to review risks, incidents, and policy exceptions.
  • Define metrics (e.g., training completion, access review cadence, incident closure times) to track privacy program implementation.

Technology and data controls

  • Maintain a living systems inventory and data map for PHI across components and vendors.
  • Apply zero-trust principles: least privilege, strong identity, network micro-segmentation, and continuous monitoring.
  • Harden endpoints and mobile devices; require encryption, remote wipe, and secure messaging.

Process alignment and vendor management

  • Standardize intake, disclosures, and marketing approvals to avoid ad hoc decisions that risk unauthorized disclosure.
  • Integrate BA lifecycle management—due diligence, BAAs, onboarding controls, and ongoing assessments.
  • Plan for M&A and divestitures with a playbook that updates designations, contracts, and PHI migrations.

Conclusion

HIPAA covered entities with multiple functions succeed when they clearly separate health care components, formalize the hybrid entity designation, maintain rigorous HIPAA compliance documentation, train their workforce, and execute disciplined compliance risk management. Done well, these steps protect patients, streamline operations, and enable responsible growth.

FAQs

What is a hybrid entity under HIPAA?

A hybrid entity is a single organization that performs both covered and non-covered functions and formally designates its health care components. HIPAA applies to those designated components (and authorized shared services), ensuring PHI protections without imposing HIPAA obligations on unrelated parts of the enterprise.

How do covered entities manage multiple functions?

They document a hybrid entity designation, define component boundaries, implement policy firewalls, and restrict PHI to the minimum necessary. Role-based access, segmented systems, business associate agreements, and tailored training keep PHI within covered components while enabling shared services to support care and payment operations.

What are the risks of non-compliance for hybrid entities?

Risks include improper cross-component disclosures, misuse of PHI for employment or marketing, vendor breaches, and weak access controls. Consequences range from regulatory penalties and corrective action plans to reputational harm and operational disruption, all of which robust compliance risk management seeks to prevent.

How should organizations document hybrid entity status?

Maintain a written designation naming health care components and permitted shared services, supported by data maps, policies, risk analyses, training records, BAAs, and incident logs. Update the documentation whenever structures, systems, or PHI flows change, and review it periodically to ensure it reflects current operations.

Share this article

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Related Articles