HIPAA Laws and Regulations Explained: What They Are, Key Rules, and How to Stay Compliant

Product Pricing Demo Video Free HIPAA Training
LATEST
video thumbnail
Admin Dashboard Walkthrough Jake guides you step-by-step through the process of achieving HIPAA compliance
Ready to get started? Book a demo with our team
Talk to an expert

HIPAA Laws and Regulations Explained: What They Are, Key Rules, and How to Stay Compliant

Kevin Henry

HIPAA

June 26, 2025

7 minutes read
Share this article
HIPAA Laws and Regulations Explained: What They Are, Key Rules, and How to Stay Compliant

HIPAA Overview

The Health Insurance Portability and Accountability Act (HIPAA) sets national standards for safeguarding Protected Health Information across the U.S. healthcare ecosystem. It applies to covered entities—healthcare providers, health plans, and clearinghouses—and to their vendors and subcontractors that handle PHI, known as business associates.

HIPAA defines PHI as individually identifiable health information in any form, and Electronic Protected Health Information (ePHI) when stored or transmitted electronically. The law balances care delivery with privacy by permitting necessary uses and disclosures while requiring security controls and accountability.

  • Core rules: Privacy, Security, Breach Notification, Enforcement, and the Omnibus modifications.
  • Key principles: minimum necessary, individual rights, security safeguards, and documented compliance.
  • Business associates must sign Business Associate Agreements that set required protections and responsibilities.

HIPAA Privacy Rule

The Privacy Rule governs how PHI may be used or disclosed and grants patients specific rights. You may use or disclose PHI for treatment, payment, and healthcare operations without authorization, and in limited situations such as public health or certain law enforcement purposes, subject to strict conditions.

What counts as PHI and de-identification

  • PHI covers any data that identifies an individual and relates to health status, care, or payment.
  • Data are de-identified when specified identifiers are removed or an expert determines re-identification risk is very small.

Patient rights you must support

  • Access and obtain copies of records, generally within 30 days, including in electronic form when readily producible.
  • Request amendments and receive an accounting of certain disclosures.
  • Request restrictions and confidential communications, including restricting disclosures to health plans for services paid out of pocket in full.

Operational requirements

HIPAA Security Rule

The Security Rule requires protecting ePHI’s confidentiality, integrity, and availability through Administrative Safeguards, physical controls, and technical measures. It is risk-based and scalable: you must implement reasonable and appropriate protections for your environment.

Administrative Safeguards

  • Risk Assessment and ongoing risk management to identify, prioritize, and reduce ePHI risks.
  • Assigned security responsibility, workforce security, and role-based information access management.
  • Security awareness and training, sanction policies, incident response, and contingency planning with backups and disaster recovery.
  • Vendor oversight via Business Associate Agreements and due diligence.

Physical Safeguards

  • Facility access controls, visitor management, and secure workstation locations.
  • Device and media controls, including secure disposal and re-use procedures.

Technical Safeguards

  • Access controls (unique user IDs, emergency access, automatic logoff) and strong authentication.
  • Audit controls and log review to detect anomalies.
  • Integrity protections and transmission security; encryption in transit and at rest is strongly recommended.

HIPAA Breach Notification Rule

The rule defines a breach as an impermissible use or disclosure of unsecured PHI that compromises privacy or security. There is a presumption of breach unless you document through a Risk Assessment that there is a low probability of compromise based on specified factors.

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Breach Notification Requirements

  • Notify affected individuals without unreasonable delay and no later than 60 calendar days after discovery.
  • Notify the Department of Health and Human Services; if 500 or more individuals are affected in a state or jurisdiction, notify the media as well.
  • Business associates must notify the covered entity of breaches they discover.
  • Notices must describe what happened, the information involved, steps individuals should take, what you are doing to investigate and mitigate, and contact information.

HIPAA Enforcement Rule

The Office for Civil Rights (OCR) enforces HIPAA through investigations, audits, and resolution agreements. Violations can result in Civil Monetary Penalties that scale by culpability and are subject to annual caps, alongside corrective action plans and multi‑year monitoring where appropriate. Certain knowing wrongful disclosures may also trigger criminal liability.

OCR considers the nature and extent of the violation, the harm caused, your organization’s size and financial condition, and the history of compliance efforts. Prompt detection, containment, and remediation can significantly influence outcomes.

HIPAA Omnibus Rule

The Omnibus Rule finalized major updates, including direct liability for business associates and their subcontractors, strengthened limits on marketing and sale of PHI, and changes to Notices of Privacy Practices. It also codified the default presumption of breach and clarified the Risk Assessment standard for determining low probability of compromise.

Patients gained stronger rights, such as the ability to restrict disclosures to health plans when paying out of pocket, and added protections around genetic information in underwriting contexts.

HIPAA Compliance Steps

A practical, repeatable program helps you stay compliant and resilient. Use these steps to build and sustain controls that match your risks, size, and complexity.

Build governance and accountability

  • Designate a privacy officer and a security officer; define roles, escalation paths, and decision rights.
  • Create a cross‑functional committee spanning clinical, IT, legal, compliance, and vendor management.

Perform a living Risk Assessment

  • Inventory systems, data flows, and vendors handling PHI and ePHI; map where data are created, stored, transmitted, and destroyed.
  • Analyze threats, vulnerabilities, likelihood, and impact; prioritize mitigations and track them to closure.

Harden controls and document policies

  • Publish clear privacy, security, and Breach Notification Requirements, including sanctions and disciplinary measures.
  • Implement least‑privilege access, timely provisioning/deprovisioning, encryption, patching, endpoint protection, and secure configuration baselines.
  • Establish contingency plans with tested backups and recovery time objectives that reflect clinical risk.

Manage vendors with Business Associate Agreements

  • Execute Business Associate Agreements before sharing PHI; extend obligations to subcontractors.
  • Perform due diligence and ongoing monitoring, including security questionnaires and, when warranted, independent assessments.

Train, test, and monitor

  • Provide initial and periodic security awareness and training tailored to roles; include phishing simulations and secure handling of patient data.
  • Log key systems, review alerts, and audit access to sensitive records; investigate anomalies promptly.

Operationalize patient rights and incident response

  • Offer streamlined processes to fulfill access, amendment, and restriction requests within required timeframes.
  • Run tabletop exercises for incident response and breach notification; maintain scripts, templates, and contact trees.

Measure, improve, and retain evidence

  • Define metrics (e.g., time to fulfill access requests, patch compliance, incident closure) and review them regularly.
  • Retain required documentation for at least six years from creation or last effective date, whichever is later.

Conclusion

HIPAA compliance hinges on understanding the rules, tailoring safeguards through disciplined Risk Assessment, holding vendors accountable with Business Associate Agreements, and responding quickly to incidents under the Breach Notification Requirements. A well‑governed, well‑documented program turns legal obligations into daily, reliable practices that protect patients and your organization.

FAQs

What are the main HIPAA regulations?

The primary HIPAA regulations are the Privacy Rule, Security Rule, Breach Notification Rule, and Enforcement Rule, along with the Omnibus Rule modifications that expanded business associate liability and strengthened breach and patient rights provisions.

How does HIPAA protect patient information?

HIPAA protects patient information by defining Protected Health Information and Electronic Protected Health Information, restricting uses and disclosures, granting patient rights, and requiring Administrative Safeguards plus physical and technical controls. Vendor access is governed by Business Associate Agreements, and violations are subject to investigation and penalties.

What are the penalties for HIPAA violations?

Penalties range from corrective action plans to tiered Civil Monetary Penalties per violation with annual caps, depending on factors like negligence and remediation. Serious or intentional misconduct can also involve criminal charges, and organizations may face reputational harm and required monitoring.

How can organizations maintain HIPAA compliance?

Establish governance, conduct ongoing Risk Assessments, implement and document safeguards, manage vendors with Business Associate Agreements, train the workforce, monitor systems, and prepare an incident response plan that meets Breach Notification Requirements. Review metrics and update controls as your environment and risks evolve.

Share this article

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Related Articles