HIPAA Privacy Rule Summary: HHS OCR Requirements and Compliance Guide

Check out the new compliance progress tracker


Product Pricing Demo Video Free HIPAA Training
LATEST
video thumbnail
Admin Dashboard Walkthrough Jake guides you step-by-step through the process of achieving HIPAA compliance
Ready to get started? Book a demo with our team
Talk to an expert

HIPAA Privacy Rule Summary: HHS OCR Requirements and Compliance Guide

Kevin Henry

HIPAA

August 04, 2024

7 minutes read
Share this article
HIPAA Privacy Rule Summary: HHS OCR Requirements and Compliance Guide

Overview of the HIPAA Privacy Rule

The HIPAA Privacy Rule sets national standards for how health information is used and disclosed, and it is enforced by the U.S. Department of Health and Human Services Office for Civil Rights (OCR). It governs Protected Health Information (PHI) in any form—electronic, paper, or oral—held by covered entities and their business associates.

The rule permits uses and disclosures for treatment, payment, and health care operations (TPO) without individual authorization, while most other purposes require written authorization. The “minimum necessary” standard applies to most uses and disclosures, but it does not limit sharing for treatment or disclosures to the individual.

Entities must provide a Notice of Privacy Practices, apply role-based access, and implement policies that reflect the HIPAA Security Rule for ePHI. De-identified information is outside the rule’s scope when achieved through expert determination or removal of specified identifiers.

HIPAA preempts contrary state laws unless a state provision is more stringent. Your program should track state requirements that add confidentiality or access protections beyond the federal baseline.

Covered Entities and Protected Health Information

Covered entities include health plans, health care clearinghouses, and health care providers who transmit health information in connection with standard electronic transactions. Business associates—vendors that create, receive, maintain, or transmit PHI for a covered entity—must sign business associate agreements that bind them to HIPAA safeguards.

PHI is individually identifiable health information relating to a person’s health, care, or payment. It includes common identifiers (for example, name, address, dates, and contact details) when linked to health data. Employment records held by an employer and de-identified data are not PHI.

Limited data sets may be used for research, public health, or operations under a data use agreement. Always confirm whether information is PHI, a limited data set, or de-identified before using or sharing it.

Individual Privacy Rights Under HIPAA

You have the right to access and obtain copies of your PHI in the form and format requested if readily producible, and you may direct a copy to a third party. Covered entities may charge only reasonable, cost-based fees for copies and must respond within set timelines.

You may request amendments to inaccurate or incomplete PHI, ask for restrictions on certain disclosures, and require confidential communications (for example, alternate address or phone). If you pay a provider in full out of pocket, you can require that information about that service not be disclosed to a health plan.

Additional rights include receiving a Notice of Privacy Practices and requesting an accounting of certain disclosures not made for TPO or with authorization. You may file a complaint with OCR if you believe your privacy rights have been violated.

Enforcement and Penalties by HHS OCR

OCR enforces the Privacy, Security, and Breach Notification Rules through complaint investigations, breach reports, and compliance reviews. Outcomes range from technical assistance to resolution agreements with corrective action plans and ongoing monitoring.

When violations warrant monetary sanctions, OCR may impose Civil Money Penalties across four tiers keyed to culpability (from “no knowledge” to “willful neglect not corrected”). Penalty amounts and annual caps are adjusted for inflation, and OCR weighs factors such as harm, duration, and organizational size.

Criminal penalties for wrongful use or disclosure of PHI are enforced by the Department of Justice. State attorneys general may also bring civil actions under HIPAA, increasing enforcement exposure for covered entities and business associates.

Recurring compliance failures include delayed right-of-access responses, lack of a current Security Risk Analysis (SRA), missing business associate agreements, insufficient audit controls, and disclosures beyond the minimum necessary standard.

Ready to assess your HIPAA security risks?

Join thousands of organizations that use Accountable to identify and fix their security gaps.

Take the Free Risk Assessment

Recent Amendments and Final Rules

HHS OCR finalized rules to bolster Reproductive Health Information Privacy, adding a prohibition on using or disclosing PHI to investigate or sanction individuals, providers, or others for seeking, obtaining, providing, or facilitating lawful reproductive health care. The rule also introduces an attestation requirement for certain disclosures and obligates covered entities and business associates to update policies, training, and Notices of Privacy Practices.

HHS also modernized confidentiality protections for substance use disorder records under 42 CFR Part 2, aligning key privacy and enforcement elements with HIPAA. Organizations that integrate Part 2 data into their HIPAA-regulated systems should update consent workflows, access controls, and accounting processes accordingly.

Beyond these changes, OCR continues to issue guidance and adjust Civil Money Penalties for inflation. Pandemic-era flexibilities have largely sunset, so telehealth and remote work arrangements must fully meet HIPAA Security Rule requirements.

Security Risk Analysis and Compliance Best Practices

A Security Risk Analysis (SRA) is the foundation of HIPAA Security Rule compliance. Inventory systems and data flows containing ePHI, identify threats and vulnerabilities, assess likelihood and impact, and document risk levels with selected mitigation steps and timelines.

  • Access management: unique user IDs, least privilege, multi-factor authentication, timely termination of access.
  • Technical safeguards: encryption in transit and at rest, email security, endpoint protection, secure configuration baselines, and patching.
  • Audit and monitoring: log collection, review, and alerting for anomalous activity; periodic access reviews and reconciliation.
  • Resilience: tested backups, disaster recovery and downtime procedures, and segmentation to contain ransomware.
  • Administrative safeguards: policies, workforce training, sanctions, vendor due diligence, and business associate agreements.
  • Privacy controls: minimum necessary workflows, secure communications, and validated processes for authorizations and denials.

Reassess risks at least annually and upon major changes (for example, a new EHR, cloud migration, or merger). Tie risk treatment to leadership-approved budgets and track progress to closure.

Expect continued modernization of the HIPAA Security Rule and related cybersecurity expectations, including more prescriptive requirements for access controls, incident response, and third-party risk. OCR has emphasized the SRA as a recurring, documented practice rather than a one-time exercise.

Watch the expanding patchwork of state consumer health privacy laws that regulate data outside HIPAA, especially for health apps and wearables. The FTC’s Health Breach Notification Rule and enforcement posture underscore the need to classify data correctly and communicate accurate privacy promises.

Interoperability mandates—such as information blocking rules and nationwide data exchange frameworks—continue to affect how you share PHI while honoring minimum necessary and patient choice. Align governance, consent, and API security with these parallel obligations.

AI and advanced analytics raise questions about transparency, fairness, and data minimization. Build governance that documents model purposes, training data sources, and human oversight while maintaining role-based access and auditability.

Bottom line: maintain a current risk analysis, tighten vendor oversight, update policies for reproductive health and Part 2 data, and train your workforce. These steps will keep your HIPAA Privacy Rule program resilient as legal requirements evolve.

FAQs.

What entities are subject to the HIPAA Privacy Rule?

Health plans, health care clearinghouses, and health care providers who conduct standard electronic transactions are covered entities. Business associates that handle PHI for covered entities are also directly liable for many HIPAA requirements.

How does the Privacy Rule protect individual health information?

It limits uses and disclosures of PHI to defined purposes, requires authorizations for most non-TPO activities, enforces the minimum necessary standard, and grants rights such as access, amendments, and confidential communications. The HIPAA Security Rule adds safeguards for electronic PHI.

What penalties does HHS OCR impose for violations?

OCR can require corrective action and may assess Civil Money Penalties across four tiers based on culpability, with amounts adjusted for inflation. Serious or uncorrected violations, patterns of noncompliance, and significant harm increase penalty exposure; some cases may be referred for criminal enforcement.

What recent changes have been made to enhance reproductive health privacy under HIPAA?

HHS OCR finalized a rule that prohibits using or disclosing PHI to investigate or penalize lawful reproductive health care and requires specific attestations for certain disclosures. Covered entities and business associates must update policies, notices, and workforce training to reflect these protections.

Share this article

Ready to assess your HIPAA security risks?

Join thousands of organizations that use Accountable to identify and fix their security gaps.

Take the Free Risk Assessment

Related Articles