HIPAA Information: What It Is, Key Rules, and How to Comply

Product Pricing Demo Video Free HIPAA Training
LATEST
video thumbnail
Admin Dashboard Walkthrough Jake guides you step-by-step through the process of achieving HIPAA compliance
Ready to get started? Book a demo with our team
Talk to an expert

HIPAA Information: What It Is, Key Rules, and How to Comply

Kevin Henry

HIPAA

June 25, 2025

7 minutes read
Share this article
HIPAA Information: What It Is, Key Rules, and How to Comply

HIPAA Overview

HIPAA, the Health Insurance Portability and Accountability Act, is a U.S. federal law that sets national standards to protect the privacy and security of health data and to give individuals rights over their records. This HIPAA information centers on who must comply and what information is protected.

Who must comply

Covered entities include health care providers, health plans, and health care clearinghouses. Vendors and subcontractors that create, receive, maintain, or transmit Protected Health Information on their behalf are business associates and are directly subject to certain HIPAA obligations through Business Associate Liability.

Protected Health Information (PHI)

PHI is individually identifiable health information relating to a person’s health status, care, or payment for care. It includes identifiers such as names, addresses, full-face photos, medical record numbers, and more, in any format—verbal, paper, or digital.

Electronic Protected Health Information (ePHI)

Electronic Protected Health Information refers to PHI that is created, stored, transmitted, or received electronically, such as within EHR systems, patient portals, cloud services, email, texts, and backups.

HIPAA Privacy Rule

The Privacy Rule governs how PHI may be used or disclosed and establishes patient rights. It applies to PHI in any format and emphasizes limiting access to the minimum necessary.

Permitted uses and disclosures

  • Treatment, payment, and health care operations without individual authorization.
  • Disclosures required by law and certain public interest uses (for example, public health or law enforcement) under defined conditions.
  • All other uses require a valid, written authorization that can be revoked.

Minimum necessary and role-based access

Covered entities must restrict routine PHI access to what workforce members need to perform their job functions and apply the minimum necessary standard to most disclosures.

Individual rights

  • Right of access to records and, when feasible, to an electronic copy of ePHI.
  • Right to request amendments and an accounting of certain disclosures.
  • Right to request restrictions and confidential communications.
  • Right to receive a Notice of Privacy Practices describing how PHI is used and shared.

De-identification

Data that are properly de-identified (via expert determination or removal of specified identifiers) are no longer PHI and therefore fall outside the Privacy Rule.

HIPAA Security Rule

The Security Rule protects the confidentiality, integrity, and availability of ePHI. It requires a risk-based program with administrative, physical, and technical safeguards.

Administrative safeguards

  • Security management process with documented Risk Assessments and risk management.
  • Assigned security responsibility, workforce training, and sanction policies.
  • Contingency planning, incident response, and evaluation of changes.
  • Business associate oversight through contracts and due diligence.

Physical safeguards

  • Facility access controls and visitor management.
  • Workstation and device protections, including secure disposal and media re-use procedures.
  • Environmental and hardware protections for servers and networking equipment.

Technical safeguards

Operational best practices

  • Patch and vulnerability management, endpoint protection, and mobile device management.
  • Network segmentation, secure configurations, and backup/restore testing.
  • Continuous monitoring and periodic technical testing.

HIPAA Breach Notification Rule

This rule sets Breach Notification Requirements when unsecured PHI is compromised. A breach is an impermissible use or disclosure that compromises the security or privacy of the information, unless a documented risk assessment shows a low probability of compromise.

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Breach risk assessment factors

  • Nature and extent of PHI involved (types of identifiers and sensitivity).
  • Unauthorized person who used the PHI or to whom the disclosure was made.
  • Whether the PHI was actually acquired or viewed.
  • Extent to which the risk has been mitigated.

Breach Notification Requirements

  • Notify affected individuals without unreasonable delay and no later than 60 days after discovery.
  • Notify HHS; for breaches affecting 500 or more individuals, provide contemporaneous notice within the same 60-day outer limit; smaller breaches are reported to HHS annually.
  • Notify prominent media outlets when a breach affects 500 or more residents of a state or jurisdiction.
  • Business associates must notify the covered entity without unreasonable delay, consistent with contractual terms.
  • Maintain documentation of the assessment, decisions, and notifications.

HIPAA Enforcement Rule

The Enforcement Rule empowers the Office for Civil Rights (OCR) to investigate complaints, conduct compliance reviews, and impose remedies. Outcomes may include corrective action plans, monitoring, and monetary penalties.

Civil Penalties

Civil penalties follow a tiered structure based on the level of culpability—from lack of knowledge to willful neglect—with per-violation assessments and annual caps. Factors such as the nature and extent of the violation, harm caused, history, and corrective actions influence the amount.

Criminal Penalties

The Department of Justice can prosecute willful violations involving PHI. Penalties include fines and imprisonment: up to one year for basic offenses, up to five years for offenses under false pretenses, and up to ten years for offenses committed for commercial advantage, personal gain, or malicious harm.

HIPAA Omnibus Rule

The 2013 Omnibus Rule updated multiple HIPAA provisions and strengthened protections.

Key updates

  • Business Associate Liability expanded to business associates and their subcontractors for compliance and breach obligations.
  • Presumption of breach unless a documented risk assessment shows a low probability of compromise.
  • Enhanced patient rights, including receiving electronic copies of ePHI and restricting disclosures to health plans when services are self-paid in full.
  • Revisions to marketing, sale of PHI, and fundraising rules; Notice of Privacy Practices updates.
  • Integration of genetic information protections under applicable rules.

HIPAA Compliance Steps

Implementation roadmap

  1. Identify your role and data: confirm covered entity or business associate status; inventory systems, vendors, and data flows involving PHI and ePHI.
  2. Perform documented Risk Assessments at startup and periodically; prioritize and track risk remediation.
  3. Establish policies and procedures for privacy, security, and breach response; apply minimum necessary and role-based access.
  4. Deploy safeguards: strong authentication, least privilege, encryption where appropriate, audit logging, secure configurations, backups, and tested recovery.
  5. Manage vendors: execute Business Associate Agreements, assess security, and flow down requirements to subcontractors.
  6. Train the workforce initially and regularly; reinforce acceptable use, incident reporting, and privacy practices.
  7. Prepare for incidents: detect, contain, investigate, document, and execute Breach Notification Requirements when triggered.
  8. Honor individual rights: timely access, amendments, restrictions, confidential communications, and accounting of disclosures.
  9. Govern and document: appoint privacy and security officers, maintain records of assessments, decisions, and actions; review annually or upon material changes.
  10. Monitor and improve: conduct audits, test controls, track metrics, and update the program as technology and guidance evolve.

Conclusion

Understanding HIPAA information and its core rules—the Privacy, Security, Breach Notification, Enforcement, and Omnibus provisions—helps you protect Protected Health Information and Electronic Protected Health Information while meeting legal obligations. Build a risk-based, well-documented program, engage your vendors, train your workforce, and continuously improve to sustain compliance.

FAQs

What is the purpose of HIPAA?

HIPAA establishes national standards that protect the privacy and security of health information, give individuals rights over their data, and promote efficient, standardized health care transactions.

How does the HIPAA Privacy Rule protect patient information?

It limits how PHI may be used and disclosed, enforces the minimum necessary standard, and grants rights such as access, amendment, restrictions, confidential communications, and a clear Notice of Privacy Practices.

What are the penalties for HIPAA violations?

OCR can impose tiered civil penalties per violation with potential annual caps, along with corrective action plans and monitoring. The Department of Justice may bring criminal cases, with fines and imprisonment up to ten years for the most serious offenses.

How can covered entities ensure HIPAA compliance?

Conduct regular Risk Assessments, maintain robust privacy and security policies, implement administrative/physical/technical safeguards, manage vendors with Business Associate Agreements, train the workforce, monitor controls, and respond promptly to incidents and breaches.

Share this article

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Related Articles