HIPAA Privacy Rule Summary: Key Requirements and Practical Compliance Guide
This HIPAA Privacy Rule Summary distills the key requirements you must meet to lawfully use and disclose Protected Health Information (PHI) and offers a practical compliance guide you can apply immediately. You will learn who the rule covers, what rights patients have, when authorizations are required, how to safeguard PHI, and how to respond to incidents under the Breach Notification Rule.
Use this compliance guide to align policies, train your workforce, and verify that daily operations reflect the Minimum Necessary Standard and other core obligations.
Covered Entities and Business Associates
Who is a Covered Entity?
Covered entities include health plans, health care clearinghouses, and health care providers that transmit PHI electronically in standard transactions. If you bill electronically, run an EHR, or process eligibility or claims, you are almost certainly a covered entity under the Privacy Rule.
Who is a Business Associate?
A business associate is any person or organization that creates, receives, maintains, or transmits PHI on your behalf. Common examples include EHR and cloud vendors, billing companies, revenue cycle firms, mailing houses, data analytics partners, legal and accounting advisors, and certain health tech platforms.
Business Associate Agreements
You must execute written Business Associate Agreements before sharing PHI. A compliant BAA defines permitted uses and disclosures, requires appropriate Administrative Safeguards and Technical Safeguards, obligates subcontractors to the same protections, mandates breach reporting, allows HHS access for audits, and provides for termination if the associate violates material terms.
Action checklist
- Inventory all vendors handling PHI and categorize them as business associates or subcontractors.
- Execute or update Business Associate Agreements; verify security controls, not just signatures.
- Limit vendor access to the Minimum Necessary and monitor with audit logs.
Patient Rights and Access to PHI
Right of Access
Patients have the right to inspect and obtain a copy of PHI in the designated record set, including electronic copies of ePHI. You must respond within 30 calendar days; one 30‑day extension is permitted with written notice explaining the delay. Provide the format requested when readily producible and allow a patient to direct a copy to a third party.
Fees
Access fees must be reasonable and cost‑based (e.g., labor for copying, supplies, postage). Per‑page fees for ePHI are generally not appropriate. Do not impose burdensome verification steps or require in‑person visits if not necessary.
Amendment, Confidential Communications, and Restrictions
Patients may request amendments; you must act within 60 days (with one 30‑day extension). If accepted, append the amendment and notify relevant parties; if denied, explain why and allow a statement of disagreement. Patients may request confidential communications (alternate address or channel) and request restrictions; you must honor a restriction that bars disclosure to a health plan for payment or operations when the individual fully pays out of pocket.
Accounting of Disclosures and Notices of Privacy Practices
Upon request, provide an accounting of certain disclosures made in the past six years, excluding most treatment, payment, and operations activities. You must also furnish clear Notices of Privacy Practices that describe permissible uses and disclosures, patient rights, your duties, and contact information, and make the notice available at the first service encounter and upon request.
Disclosure and Authorization Requirements
Permitted Uses and Disclosures Without Authorization
You may use or disclose PHI without an authorization for treatment, payment, and health care operations; when required by law; for public health and health oversight activities; in certain judicial and law‑enforcement contexts; for decedents and organ donation; to avert serious threats to health or safety; for specialized government functions; and for workers’ compensation as authorized. Limited disclosures to family or others involved in care are allowed with the patient’s agreement or opportunity to object.
When an Authorization Is Required
Authorizations are required for most other uses and disclosures, including marketing (with narrow exceptions), the sale of PHI, and psychotherapy notes (with specific exceptions). A valid authorization must describe the information, name who may disclose and receive it, state purpose, include an expiration date or event, explain the right to revoke, and be signed and dated by the individual.
Operational Controls
- Use standardized decision trees for common disclosure scenarios and embed the Minimum Necessary Standard.
- Implement role‑based workflows so frontline staff can quickly determine when an authorization is needed.
- Maintain disclosure logs where required and train staff to document decisions.
Safeguards for PHI Protection
Reasonable Safeguards and the Security Rule
The Privacy Rule requires reasonable safeguards for all PHI, and the Security Rule sets specific standards for ePHI. Together, they call for layered Administrative Safeguards, Technical Safeguards, and physical protections to reduce risk.
Ready to simplify HIPAA compliance?
Join thousands of organizations that trust Accountable to manage their compliance needs.
Administrative Safeguards
- Risk analysis and risk management with documented remediation plans.
- Policies for access, disclosures, contingency planning, incident response, and sanctions.
- Workforce training, confidentiality acknowledgments, and periodic drills.
- Vendor risk management and governance of Business Associate Agreements.
Technical Safeguards
- Unique user IDs, multi‑factor authentication, and least‑privilege access.
- Encryption in transit and at rest, secure messaging, and data loss prevention.
- Audit controls, immutable logs, automated alerts, and regular review of access reports.
- Integrity controls, automatic logoff, and secure backup with tested restores.
Physical Protections
- Facility access controls, visitor management, and secure server rooms.
- Workstation security, screen privacy, and device/media controls with chain‑of‑custody.
- Sanitized disposal and documented destruction of media containing PHI.
Minimum Necessary Standard Compliance
What the Standard Requires
Except for specific circumstances, you must limit each use, disclosure, and request for PHI to the Minimum Necessary to accomplish the purpose. Build processes that default to the smallest reasonable data set.
Key Exceptions
- Disclosures to or requests by a health care provider for treatment.
- Disclosures to the individual or pursuant to a valid authorization.
- Disclosures to HHS for compliance investigations or as required by law.
How to Operationalize
- Define role‑based access matrices and approve exceptions through a documented process.
- Standardize minimal data sets and de‑identify when full identifiers are not needed.
- Use limited data sets with data use agreements for research or analytics when appropriate.
- Continuously monitor access patterns and audit outliers.
Breach Notification Procedures
What Counts as a Breach
A breach is an acquisition, access, use, or disclosure of unsecured PHI in a manner not permitted by the Privacy Rule that compromises its security or privacy. Breach is presumed unless a documented risk assessment shows a low probability of compromise based on the nature of the data, the unauthorized recipient, whether the PHI was actually viewed or acquired, and the extent of mitigation.
Who to Notify and When
- Individuals: Without unreasonable delay and no later than 60 calendar days after discovery; use written notice and substitute methods if necessary.
- HHS: For 500 or more affected individuals in a state or jurisdiction, notify contemporaneously with individual notice; for fewer than 500, report no later than 60 days after the end of the calendar year in which the breach was discovered.
- Media: Notify prominent media outlets when a breach affects 500 or more residents of a state or jurisdiction.
Business Associates’ Duties
Business associates must notify the covered entity without unreasonable delay and no later than 60 days after discovery, providing the identities of affected individuals and the information needed for notices under the Breach Notification Rule.
Incident Response Playbook
- Contain and secure systems; preserve logs and evidence.
- Conduct and document the risk assessment; consult your privacy and security officers.
- Prepare legally compliant notices with recommended protective steps and relevant contact points.
- Implement corrective actions, track remediation, and update policies and training.
Enforcement and Penalty Framework
How HIPAA Is Enforced
The HHS Office for Civil Rights (OCR) enforces HIPAA through complaints, compliance reviews, and audits. Outcomes range from technical assistance and corrective action plans to resolution agreements with monitoring and civil monetary penalties. Willful neglect violations trigger mandatory penalties.
Civil Monetary Penalties
HIPAA uses a four‑tier penalty structure that considers the nature and extent of the violation and of the resulting harm, along with your level of culpability and mitigation. Penalties are assessed per violation with annual caps by tier and are periodically adjusted for inflation. Documented risk management, prompt remediation, and cooperation can significantly reduce exposure.
Criminal Penalties and Other Liability
Knowingly obtaining or disclosing PHI in violation of HIPAA can lead to criminal fines and imprisonment, with higher penalties for offenses committed under false pretenses or for commercial advantage. State attorneys general may bring civil actions on behalf of residents. HIPAA itself does not create a private right of action, but related state privacy or negligence claims may still arise.
Conclusion
This HIPAA Privacy Rule Summary and practical compliance guide emphasize disciplined governance: identify who you are and who your vendors are, honor patient rights on time, require authorizations when needed, apply Administrative Safeguards and Technical Safeguards rigorously, limit data to the Minimum Necessary, and follow the Breach Notification Rule precisely. Consistency in these fundamentals is your most reliable risk reducer.
FAQs
What entities are covered by the HIPAA Privacy Rule?
Covered entities are health plans, health care clearinghouses, and health care providers that transmit PHI electronically in standard transactions. Business associates—vendors that create, receive, maintain, or transmit PHI for a covered entity—are directly regulated for certain obligations and must sign Business Associate Agreements.
How can patients access and amend their PHI?
Patients can request access to PHI in the designated record set and receive copies—electronic when readily producible—within 30 calendar days (one 30‑day extension allowed). Fees must be reasonable and cost‑based. Patients may request amendments; you must act within 60 days, accept and append the change or provide a written denial with appeal options.
What are the obligations for breach notifications under HIPAA?
You must notify affected individuals without unreasonable delay and no later than 60 days after discovering a breach of unsecured PHI, include specific content in the notice, and follow substitute notice rules if needed. Report to HHS and, for large breaches (500+ in a state or jurisdiction), notify the media. Business associates must notify the covered entity promptly with all necessary details.
What penalties apply for HIPAA violations?
OCR can impose civil monetary penalties using a four‑tier structure calibrated to your level of culpability and mitigation, with per‑violation amounts and annual caps adjusted for inflation. Serious or willful neglect violations carry higher penalties, and certain wrongful disclosures can trigger criminal fines and imprisonment. Settlement agreements may also require corrective action plans and ongoing monitoring.
Ready to simplify HIPAA compliance?
Join thousands of organizations that trust Accountable to manage their compliance needs.