HIPAA NPRM Explained: Key Proposed Rule Changes, Timeline, and What to Do Next

Product Pricing Demo Video Free HIPAA Training
LATEST
video thumbnail
Admin Dashboard Walkthrough Jake guides you step-by-step through the process of achieving HIPAA compliance
Ready to get started? Book a demo with our team
Talk to an expert

HIPAA NPRM Explained: Key Proposed Rule Changes, Timeline, and What to Do Next

Kevin Henry

HIPAA

June 14, 2025

7 minutes read
Share this article
HIPAA NPRM Explained: Key Proposed Rule Changes, Timeline, and What to Do Next

HIPAA Privacy Rule Updates

The HIPAA NPRM proposes refinements to how covered entities and business associates handle protected health information (PHI). Expect clearer guardrails around the “minimum necessary” standard, more consistent pathways for care coordination and case management, and heightened expectations for documenting permissible uses and disclosures.

Individual right-of-access provisions are a focal point. The NPRM aims to streamline how quickly and simply you furnish records to patients, including directing PHI to third parties and apps. Fee transparency, identity verification practices, and electronic delivery mechanisms are all areas likely to be tightened to reduce friction for patients.

Disclosures for public health, law enforcement, and oversight may be clarified to curb overbroad sharing and reinforce purpose-based limitations. Sensitive categories of PHI—such as information that could reveal intimate details about a person’s health choices—are poised for stronger privacy controls, with added emphasis on auditability and necessity determinations.

Operationally, you should plan for updated Notices of Privacy Practices, refreshed authorization templates, more granular data-mapping of where PHI flows, and playbooks that guide staff on nuanced disclosure scenarios and denial-of-access exceptions.

HIPAA Security Rule Updates

Security Rule changes in the HIPAA NPRM emphasize outcome-driven controls anchored in a living risk management program. Expect explicit risk analysis requirements that tie asset inventories, data flows, and threat modeling to measurable safeguards and recurring reviews.

Stronger identity and access management is anticipated, with multi-factor authentication for administrators and remote access, stricter password and session policies, and more rigorous termination and role-change procedures. Logging, monitoring, and anomaly detection are likely to be elevated to reduce dwell time and improve incident response.

Technical hardening will highlight network segmentation to contain lateral movement, encryption of PHI in transit and at rest, and modern endpoint detection and response. Regular vulnerability scanning, prioritized patching, and periodic penetration testing are expected as baseline hygiene rather than optional “nice-to-haves.”

Contingency management will stress tested backups, recovery time objectives, and clear contingency plan notification triggers—who must be notified, how quickly, and through what channels—so decision-makers can act without delay when systems are degraded or unavailable.

Implementation Timeline

The path from NPRM to enforceable obligations follows a predictable arc. After publication, a public comment window opens; HHS then reviews feedback and issues a Final Rule. The Final Rule sets an effective date and a separate compliance date (or dates) for various provisions.

Historically, effective dates often land within weeks of publication, while compliance deadlines are months longer and may be phased by requirement or entity type. Complex operational changes—like overhauling access workflows or implementing comprehensive logging—typically receive the longest lead times.

Plan for parallel tracks: immediate readiness work (governance, gap analysis, budget) and medium-term execution (technology rollouts, contract updates, training, and validation). Adjust as the Final Rule clarifies exact timeframes.

Stand up a cross-functional HIPAA NPRM task force spanning privacy, security, clinical operations, IT, compliance, legal, and vendor management. Give it a charter, milestones, and executive sponsorship.

Perform a current-state assessment focused on PHI data mapping, access request workflows, disclosure decision trees, and Security Rule safeguards. Prioritize gaps that touch patient rights, high-risk systems, and third parties.

Launch quick wins—enable multi-factor authentication for privileged and remote access, tighten endpoint patching cadence, and script standardized responses for right-of-access requests. In parallel, scope larger efforts like network segmentation and centralized logging.

Engage vendors early. Share expected requirements, confirm capabilities (e.g., encryption, audit trails), and draft playbooks for breach handling and contingency plan notification so responsibilities are unambiguous.

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Compliance Planning and Risk Management

Build a risk register that traces threats and vulnerabilities to specific PHI assets and business processes. For each risk, document likelihood, impact, existing controls, and targeted mitigations, then tie those to owners, budgets, and timelines.

Use repeatable methods to satisfy risk analysis requirements: define scope, inventory assets, evaluate threats, test controls, and capture results in a defensible report. Reassess on a set cadence and after material changes—new systems, integrations, or incidents.

Convert policy into practice. Update policies and procedures, train staff with scenario-based content, and measure adoption using metrics like mean time to fulfill access requests, patch latency, and incident containment time.

Validate continuously: conduct tabletop exercises, restore-from-backup tests, and control effectiveness checks. Feed lessons learned back into policies, technology settings, and vendor requirements.

Business Associate Obligations

Expect tighter alignment between covered entities and business associates (BAs) on security outcomes, reporting timelines, and patient access support. BAAs should address encryption, logging, multi-factor authentication, and data retention with explicit performance expectations.

Clarify incident reporting and contingency plan notification duties, including immediate escalation criteria, contact hierarchies, and evidence preservation steps. Require routine vulnerability scanning, proof of remediation, and periodic penetration testing for systems touching your PHI.

Instituting right-to-audit provisions and standardized security questionnaires helps verify control maturity. Flow down obligations to subcontractors so protections for protected health information extend across the entire service chain.

Technological Enhancements for Security

Prioritize identity-first defenses: enforce multi-factor authentication, least-privilege access, and just-in-time elevation for administrators. Centralize identities and automate joiner-mover-leaver processes to minimize orphaned accounts.

Segment critical environments. Use network segmentation and micro-segmentation to isolate EHR platforms, imaging systems, and backups from general user networks. Gate sensitive services with modern firewalls, TLS, and strict east-west traffic controls.

Operationalize continuous assurance. Schedule credentialed vulnerability scanning for servers, workstations, and cloud workloads; fix high-severity findings on service-level timelines; and complement with annual or risk-triggered penetration testing to validate real-world exposure.

Strengthen detection and recovery. Centralize logs into a SIEM, deploy endpoint detection and response, and run frequent backup integrity tests. Define recovery runbooks with precise roles and thresholds that activate contingency plan notification without ambiguity.

Data-centric protections matter, too. Discover and classify PHI, apply encryption and DLP to high-risk flows, and verify that third-party apps receiving patient-designated records can protect them to your standards.

In short, align people, process, and technology: mature risk analysis requirements, harden access with multi-factor authentication, confine blast radius through network segmentation, and prove resilience with vulnerability scanning and penetration testing.

FAQs

What are the major changes proposed in the HIPAA NPRM?

The NPRM centers on clearer rules for patient right of access, tighter boundaries for when PHI can be used or disclosed, and stronger Security Rule expectations. Practically, that means more consistent access workflows, better documentation of minimum necessary decisions, and security upgrades such as multi-factor authentication, enhanced logging, network segmentation, vulnerability scanning, and periodic penetration testing.

When will the final HIPAA NPRM rules take effect?

After HHS issues a Final Rule in the Federal Register, it will specify an effective date and separate compliance dates. Effective dates often arrive relatively soon after publication, while compliance periods typically extend longer to give organizations time to operationalize changes.

How long do covered entities have to comply with the new HIPAA requirements?

Timeframes vary by provision. Complex operational or technical changes may receive phased deadlines, while simpler updates may be due sooner. Plan early by prioritizing high-impact areas—patient access processes, PHI data mapping, and foundational safeguards like encryption and multi-factor authentication.

What actions should stakeholders take to prepare for HIPAA NPRM compliance?

Form a cross-functional program, perform a gap analysis against proposed updates, and launch near-term security upgrades (multi-factor authentication, logging, and patching). Refresh policies and training, tighten vendor oversight with clear contingency plan notification and testing requirements, and validate controls through recurring risk analysis, vulnerability scanning, and targeted penetration testing.

Share this article

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Related Articles