HIPAA for Dummies: What It Is, Who It Applies To, and How to Stay Compliant

Check out the new compliance progress tracker


Product Pricing Demo Video Free HIPAA Training
LATEST
video thumbnail
Admin Dashboard Walkthrough Jake guides you step-by-step through the process of achieving HIPAA compliance
Ready to get started? Book a demo with our team
Talk to an expert

HIPAA for Dummies: What It Is, Who It Applies To, and How to Stay Compliant

Kevin Henry

HIPAA

July 20, 2025

8 minutes read
Share this article
HIPAA for Dummies: What It Is, Who It Applies To, and How to Stay Compliant

HIPAA Overview

HIPAA is a U.S. health privacy and security law that sets national standards for how health information is used, shared, and protected. It aims to balance patient privacy with the flow of information needed to deliver safe, efficient care.

At its core, HIPAA creates rules for Privacy, Security, and Breach Notification. Together, these rules define what counts as Protected Health Information (PHI), how you may use or disclose it, and what to do if it’s exposed. For quick orientation, think privacy for policy, security for safeguards, and breach for incident response.

Key purposes

  • Give individuals rights over their health information.
  • Standardize Privacy Rule Compliance across the country.
  • Require Security Rule Standards for electronic PHI (ePHI).
  • Establish the Breach Notification Rule for timely incident reporting.

Covered Entities and Business Associates

HIPAA applies to covered entities and their business associates. You are a covered entity if you are a health care provider that transmits standard electronic transactions, a health plan, or a health care clearinghouse.

Covered entities

  • Providers: physicians, clinics, dentists, pharmacies, hospitals, telehealth practices, and similar organizations that handle PHI electronically.
  • Health plans: insurers, HMOs, Medicare/Medicaid, employer group health plans.
  • Clearinghouses: organizations that translate health data between systems.

Business associates

A business associate is any person or organization that creates, receives, maintains, or transmits PHI on behalf of a covered entity. Examples include EHR vendors, billing companies, cloud and backup providers, telemedicine platforms, legal firms handling PHI, and analytics vendors.

You must execute a Business Associate Agreement (BAA) with each business associate (and they must do the same with their subcontractors). The BAA requires appropriate safeguards, breach reporting, and help with compliance duties.

Edge cases

  • Employers and schools are not covered entities simply by employing or educating individuals; they may hold similar data outside HIPAA’s scope.
  • Hybrid entities can designate covered health care components if they perform both covered and non-covered functions.

Understanding Protected Health Information

Protected Health Information is individually identifiable health information in any form—paper, verbal, or electronic—related to a person’s health, care, or payment for care. If the data can identify a person and relates to health, it’s likely PHI.

Common PHI examples

  • Names, addresses, contact details, dates linked to care, and other identifiers.
  • Medical records, test results, diagnoses, prescriptions, and billing details.
  • Device identifiers, IP addresses, and full-face photos when tied to health data.

Data that is not PHI

  • De-identified information that removes specified identifiers and cannot reasonably re-identify a person (via safe harbor or expert determination).
  • Limited data sets (with most direct identifiers removed) used for research, public health, or operations under a data use agreement.

Privacy Rule Requirements

The Privacy Rule governs how PHI is used and disclosed and grants rights to individuals. Privacy Rule Compliance hinges on defining permissible uses, honoring patient rights, and embedding the “minimum necessary” standard into daily workflows.

Permitted uses and disclosures

  • Treatment, payment, and health care operations (TPO) without patient authorization.
  • Public interest exceptions (e.g., certain public health, law enforcement, or judicial requirements) as narrowly allowed by law.
  • All other uses require a valid, written authorization you can’t condition care upon (with limited exceptions).

Minimum necessary

Access, use, or disclose only the minimum PHI needed to accomplish the task. Role-based access, data segmentation, and need-to-know decisions help you meet this core expectation.

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Individual rights

  • Right to access, obtain copies, and direct PHI to a third party in a timely manner and in the requested format if readily producible.
  • Right to request amendments and receive an accounting of certain disclosures.
  • Right to request restrictions (and for services paid in full out of pocket, to restrict disclosures to health plans).
  • Right to request confidential communications to alternative addresses or channels.

Operational requirements

  • Provide a clear Notice of Privacy Practices (NPP).
  • Appoint privacy and security leads; train the workforce; apply appropriate sanctions for violations.
  • Adopt, document, and review policies and procedures; retain documentation for at least six years.
  • Consider more stringent state laws; HIPAA sets a federal floor.

Security Rule Safeguards

The Security Rule Standards protect ePHI through administrative, physical, and technical safeguards. The goal is risk-based protection: identify risks, implement reasonable controls, and keep improving.

Administrative safeguards

  • Risk analysis and ongoing Risk Assessment to identify threats, vulnerabilities, and likelihood/impact.
  • Risk management plan to implement prioritized controls and track remediation.
  • Workforce security, role-based access, training, and incident response procedures.
  • Contingency planning: backups, disaster recovery, and emergency operation procedures.
  • Vendor management and BAAs covering security obligations.

Physical safeguards

  • Facility access controls, visitor management, and secure areas for servers or network gear.
  • Workstation security and device/media controls, including secure disposal and reuse procedures.

Technical safeguards

  • Access controls: unique user IDs, strong authentication (consider MFA), and automatic logoff.
  • Audit controls and activity review: system logs, alerts, and routine monitoring.
  • Integrity protections to prevent improper alteration or destruction of ePHI.
  • Transmission security: encrypt data in transit; encrypt at rest to reduce breach risk.

Putting it into practice

  • Harden endpoints and servers; patch promptly; restrict admin privileges.
  • Segment networks; apply least privilege; review access regularly.
  • Test backups and recovery; run tabletop exercises for incidents.
  • Document everything you implement and why—decisions must be reasonable and risk-based.

Breach Notification Procedures

The Breach Notification Rule requires action when there is an impermissible use or disclosure of unsecured PHI. If you encrypt PHI to strong standards, loss of the encrypted data is generally not a reportable breach.

Is it a breach?

Conduct a four-factor risk assessment to decide if there is a low probability PHI was compromised. Consider the PHI’s nature and sensitivity, who received it, whether it was actually acquired or viewed, and how effectively you mitigated the risk.

Who you must notify

  • Affected individuals without unreasonable delay and no later than 60 calendar days after discovery.
  • The Department of Health and Human Services (HHS) via its breach reporting process.
  • The media if a breach affects 500 or more residents in a state or jurisdiction.

Business associate reporting

Business associates must notify the covered entity without unreasonable delay (no later than 60 days) and share details needed for individual notices. Your BAA may set shorter, stricter time frames.

Notice content and method

  • Describe what happened, the types of PHI involved, steps individuals should take, what you are doing to investigate and mitigate, and how to contact you.
  • Use first-class mail or email if the individual agrees; provide substitute notice when contact information is insufficient.

Response best practices

  • Activate your incident response plan; contain, eradicate, and recover.
  • Preserve logs and evidence; perform a root-cause analysis; update controls accordingly.
  • Offer support such as credit monitoring if financial data was involved, based on risk.

Enforcement and Penalties

OCR (the HHS Office for Civil Rights) enforces HIPAA through investigations, audits, and complaint reviews. Enforcement Procedures may result in technical assistance, corrective action plans, or formal resolution agreements with monitoring.

Civil and Criminal Penalties

  • Civil penalties use tiered amounts per violation with annual caps, depending on culpability (from reasonable cause to willful neglect not corrected).
  • Criminal penalties can apply for knowingly obtaining or disclosing PHI in violation of HIPAA, with higher penalties for false pretenses or intent to sell, transfer, or use PHI for harm or personal gain.
  • Separately, state attorneys general may bring civil actions under HIPAA provisions.

Common pitfalls

  • Skipping formal Risk Assessment and relying solely on tools rather than documented analysis.
  • Failing to execute BAAs or to oversee vendors handling PHI.
  • Insufficient training, weak access controls, or poor audit logging.
  • Delays in breach notification or incomplete notices.

Summary

To stay compliant, know what PHI you hold, limit and track its use, secure ePHI with layered safeguards, and prepare to respond rapidly to incidents. Build Privacy Rule Compliance into daily operations, implement Security Rule Standards proportionate to risk, and follow the Breach Notification Rule when issues arise.

FAQs.

What entities are considered covered under HIPAA?

Covered entities are health care providers that conduct standard electronic transactions, health plans, and health care clearinghouses. Business associates—vendors that handle PHI for covered entities—are also directly obligated under HIPAA through BAAs and must implement safeguards and report breaches.

How does HIPAA protect patient information?

HIPAA protects Protected Health Information by setting Privacy Rule requirements for how PHI can be used and disclosed, granting patient rights, and requiring Security Rule safeguards for ePHI. It also mandates breach notification so individuals are informed and can take action if their data is compromised.

What are the main requirements of the HIPAA Security Rule?

The Security Rule requires administrative, physical, and technical safeguards anchored in ongoing Risk Assessment and risk management. Core controls include role-based access, authentication, audit logging, encryption in transit (and preferably at rest), device and facility protections, backup and recovery planning, workforce training, and documented policies.

What are the consequences of non-compliance with HIPAA?

Consequences range from corrective action and monitored resolution agreements to substantial civil monetary penalties per violation and, in egregious cases, criminal penalties. Reputational harm, contractual liabilities, and state enforcement actions can also follow a HIPAA violation.

Share this article

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Related Articles