HIPAA NPRM Explained: Proposed Rule Changes, Key Dates, and How to Prepare for Compliance

Product Pricing
Ready to get started? Book a demo with our team
Talk to an expert

HIPAA NPRM Explained: Proposed Rule Changes, Key Dates, and How to Prepare for Compliance

Kevin Henry

HIPAA

June 27, 2025

8 minutes read
Share this article
HIPAA NPRM Explained: Proposed Rule Changes, Key Dates, and How to Prepare for Compliance

Overview of HIPAA NPRM

The HIPAA Notice of Proposed Rulemaking (NPRM) is the federal government’s formal proposal to update HIPAA. It outlines draft changes, invites public comment, and previews what covered entities and business associates should expect before a final rule is issued. For most organizations, the NPRM is your early warning system for regulatory change.

While the HIPAA Privacy and Security Rules remain in force, the NPRM signals where enforcement priorities are heading—especially for safeguarding electronic protected health information (ePHI). It typically clarifies expectations, tightens baseline controls, and modernizes requirements in light of current threats and technologies.

Because proposed text can shift before it becomes final, you should treat the NPRM as both a planning guide and a risk management prompt. Use it to get ahead on design decisions that are unlikely to change (for example, stronger authentication and encryption) while avoiding costly rework.

Proposed Security Rule Amendments

Identity and Access Controls

  • Adopt multi-factor authentication for remote, privileged, and administrative access to systems that create, receive, maintain, or transmit ePHI.
  • Strengthen identity lifecycle (joiner-mover-leaver) and least-privilege access, with documented approvals and timely role reviews.
  • Harden remote access pathways (VPNs, portals, cloud consoles) and require session timeouts and device posture checks where feasible.

Encryption Standards and Data Protection

  • Apply encryption standards to protect ePHI in transit and at rest; where encryption is not feasible, require compensating controls and a written risk-based rationale.
  • Use cryptographic key management practices that separate duties, rotate keys, and protect backups and replicas.
  • Secure data lifecycle: data minimization, retention limits, and verified sanitization or destruction of media.

Risk Analysis and Governance

  • Clarify risk analysis requirements with asset inventories that enumerate systems, applications, endpoints, APIs, and third-party services handling ePHI.
  • Document threat-likelihood and impact methods, risk acceptance criteria, and risk treatment plans linked to budget and timelines.
  • Demonstrate ongoing risk management—not a one-time assessment—through measurable objectives and periodic review.

Monitoring, Auditing, and Incident Response

  • Maintain audit controls and log retention sufficient to detect, investigate, and contain suspected incidents affecting ePHI.
  • Operate a tested incident response plan that defines roles, playbooks (e.g., ransomware, lost device, insider misuse), evidence handling, and post-incident lessons learned.
  • Conduct compliance audits and technical validation (e.g., access recertifications, configuration baselines, vulnerability and patch management cadence).

Third-Party and Cloud Assurance

  • Strengthen vendor due diligence, security performance clauses, and right-to-audit language in business associate agreements.
  • Map shared-responsibility models for cloud services and verify provider controls for encryption, logging, backups, and availability.

Key Compliance Deadlines

HIPAA rulemakings usually follow a predictable cadence: proposal (NPRM) → public comment period → final rule → effective date → compliance date. The NPRM will preview proposed timeframes, but only the final rule sets binding deadlines.

Historically, HIPAA updates have provided a window between final publication and mandatory compliance to allow for budgeting, procurement, and operational change. Frequently, there is an effective date followed by at least 180 days to comply, though specific durations can vary by provision.

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

What to Track

  • Comment period close date (signals how soon a final rule could issue).
  • Final rule publication date (starts the clock for effective and compliance dates).
  • Effective date (often 60 days post-publication, but verify the final text).
  • Compliance date(s) (some obligations may have staggered or extended timelines).
  • Small entity accommodations, if provided, and any enforcement discretion announcements.

Phased Implementation Strategy

Phase 0–30 Days: Mobilize

  • Designate an executive sponsor and program lead; align legal, compliance, IT, security, privacy, and clinical operations.
  • Freeze high-risk design choices likely required under the NPRM (multi-factor authentication, encryption standards, log centralization).
  • Establish a requirements register tied to NPRM text and current HIPAA Security Rule safeguards.

Phase 30–90 Days: Baseline and Quick Wins

  • Inventory ePHI and data flows; identify crown-jewel systems and high-risk vendors.
  • Enable MFA for remote and privileged access; enforce TLS for all external transmissions of ePHI.
  • Close critical vulnerabilities and set a patching service-level objective by severity.

Phase 90–180 Days: Formalize and Validate

  • Complete a documented risk analysis with methodology, risk ratings, and remediation plans.
  • Draft or update the incident response plan; run a tabletop exercise covering ransomware and data exfiltration.
  • Implement central logging, access recertifications, and separation of duties for key admin functions.

Phase 6–12 Months: Scale and Sustain

  • Encrypt ePHI at rest where feasible; harden backups with immutability and offline copies.
  • Operationalize vendor risk management, including security addenda and evidence collection.
  • Develop outcome metrics (e.g., mean time to detect/respond, privileged access counts, audit exceptions closed).

Phase 12+ Months: Optimize

  • Automate compliance audits with control testing and continuous monitoring.
  • Integrate threat intelligence, anomaly detection, and proactive hunt activities.
  • Iterate training with role-based scenarios and simulation-driven learning.

Preparing for Compliance

Anchor on Risk Analysis Requirements

  • Use a repeatable method to identify threats, vulnerabilities, and business impacts across applications, devices, and data stores.
  • Tie each high-risk finding to a funded remediation plan with owners and due dates.
  • Reassess after major changes (system go-lives, mergers, new vendors) and at least annually.

Prove It with Documentation and Testing

  • Maintain policies, standards, and procedures that match operational reality.
  • Capture artifacts: MFA configurations, encryption key management logs, access reviews, incident reports, and vendor attestations.
  • Schedule internal compliance audits to validate control design and operating effectiveness ahead of OCR inquiries.

Strengthen Technical Controls

  • Apply multi-factor authentication broadly, prioritize admin and remote access, and phase in for remaining users and apps.
  • Enforce encryption standards for data in transit and at rest; segment networks and restrict lateral movement.
  • Instrument detection and response with centralized logging, alert tuning, and on-call coverage.

Governance, Training, and Culture

  • Establish clear accountability from the board to system owners; track progress via KPIs and risk dashboards.
  • Deliver role-based training for clinicians, IT admins, and business staff; include phishing and data handling for ePHI.
  • Practice crisis communications and decision-making to reduce dwell time during incidents.

Impact of Regulatory Freeze

A regulatory freeze—often issued at the start of a new administration—pauses or delays pending rules for review. For an HIPAA NPRM or a not-yet-effective final rule, this can shift expected timelines, extend review periods, or prompt revisions before publication or enforcement.

Plan for uncertainty without pausing risk reduction. Prioritize changes that are clearly aligned with safeguarding ePHI and are unlikely to be rolled back, such as multi-factor authentication, encryption, and tested incident response. Track status updates and be ready to recalibrate project plans when final dates are confirmed.

Alignment with Cybersecurity Frameworks

Mapping HIPAA requirements to well-known cybersecurity frameworks accelerates execution and audit readiness. It helps you demonstrate defensible choices, avoid gaps, and communicate progress in business terms.

Practical Mapping Tips

  • Use a control framework (e.g., a NIST-aligned catalog) as your master list; cross-reference each HIPAA safeguard and NPRM theme.
  • For Identity, map to account provisioning, least privilege, and MFA; for Data, map to classification, encryption standards, and key management.
  • For Detect/Respond, align logging, alerting, incident response plan testing, and post-incident reviews.
  • For Vendors, align onboarding due diligence, contractual controls, continuous monitoring, and offboarding.

Evidence and Outcomes

  • Maintain a single source of truth for control ownership, testing results, and remediation status.
  • Report outcomes that matter—reduced privileged accounts, shorter patch cycles, faster containment—rather than activity counts.

Conclusion

The HIPAA NPRM is your opportunity to modernize security before deadlines lock in. Focus on core safeguards—risk analysis requirements, multi-factor authentication, encryption standards, monitoring, and an actionable incident response plan—while building documentation and evidence for compliance audits. A phased, framework-aligned approach lets you reduce risk now and glide into formal compliance when final dates arrive.

FAQs.

What are the main changes proposed in the HIPAA NPRM?

Common themes include stronger identity and access controls (notably multi-factor authentication), clarified risk analysis requirements, elevated encryption standards for ePHI in transit and at rest, deeper audit and monitoring expectations, a formalized incident response plan with testing, and tighter vendor risk management with evidence-based oversight. Collectively, these proposals modernize safeguards around electronic protected health information.

How long is the compliance period after the final rule publication?

It varies by rule, but HIPAA updates often provide an effective date followed by at least 180 days to comply, and sometimes longer for certain provisions. Treat publication of the final rule as the starting gun: confirm the effective date in the rule text, note any staggered timelines, and back-plan milestones so critical controls are live—and evidenced—before the compliance date.

What steps should healthcare organizations take to prepare for the HIPAA NPRM?

Mobilize a cross-functional program; complete a current, documented risk analysis; implement multi-factor authentication for privileged and remote access; enforce encryption standards; centralize logging and test your incident response plan; tighten vendor due diligence; and schedule internal compliance audits to validate controls. Capture artifacts as you go so you can demonstrate both progress and operating effectiveness when the final rule arrives.

Share this article

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Related Articles