HIPAA Privacy Rule vs. Security Rule: Real-World Scenarios That Make the Differences Clear

Check out the new compliance progress tracker


Product Pricing Demo Video Free HIPAA Training
LATEST
video thumbnail
Admin Dashboard Walkthrough Jake guides you step-by-step through the process of achieving HIPAA compliance
Ready to get started? Book a demo with our team
Talk to an expert

HIPAA Privacy Rule vs. Security Rule: Real-World Scenarios That Make the Differences Clear

Kevin Henry

HIPAA

March 13, 2025

7 minutes read
Share this article
HIPAA Privacy Rule vs. Security Rule: Real-World Scenarios That Make the Differences Clear

The HIPAA Privacy Rule governs when and how Protected Health Information (PHI) may be used or disclosed and grants patient rights, such as access and amendments. The HIPAA Security Rule requires safeguards to protect electronic Protected Health Information (ePHI) and focuses on confidentiality, integrity, and availability.

Together, they answer two questions: “May we use or disclose this PHI?” (Privacy) and “How do we keep ePHI secure while doing so?” (Security). The scenarios below make these distinctions concrete and actionable.

Patient Access to Medical Records

Scenario: A patient requests lab results and visit notes

Under the Privacy Rule, you must provide access within 30 days (with one allowable 30‑day extension and written notice). You may charge only a reasonable, cost-based fee. The minimum necessary standard does not apply to disclosures to the patient.

Under the Security Rule, if the patient requests electronic copies, you must transmit ePHI securely. Use identity verification, access controls, and transmission security. If a patient insists on unencrypted email after being advised of risks, honor the request and document the patient’s preference.

Scenario: Format and form of access

The Privacy Rule expects you to provide records in the requested format if readily producible (portal download, encrypted email, or mailed USB). If not, agree on an alternative that is acceptable to the patient.

The Security Rule requires safeguards around those methods: role-based access in the portal, automatic logoff, and audit logs to record who accessed or released the ePHI.

Secure Transmission of ePHI

Scenario: Sending records to a specialist

The Privacy Rule permits sharing for treatment without patient authorization requirements. Apply the minimum necessary standard only when the purpose is not treatment; for treatment, send what the receiving clinician reasonably needs.

The Security Rule requires transmission security. Use encrypted channels (such as TLS-secured messaging), verify recipient identity, and confirm address accuracy. Maintain audit trails and retain proof of transmission.

Scenario: Patient email and texting preferences

Privacy allows honoring patient communication preferences when reasonable. Document the preference and any risk acceptance by the patient.

Security requires compensating controls: secure messaging apps, mobile device management (MDM), and policies that prohibit sending ePHI over unsecured channels by staff unless an approved, documented patient request applies.

Confidentiality in Public Settings

Scenario: Check-in areas and waiting rooms

The Privacy Rule allows incidental disclosures if you use reasonable safeguards—speak quietly, avoid unnecessary details, and limit visible information. Do not announce sensitive diagnoses where others can hear.

For the Security Rule, apply physical safeguards to ePHI: privacy screens on kiosks, locked printers, and workstation positioning that prevents shoulder surfing. Technical safeguards include automatic screen lock and restricted user sessions at shared desks.

Scenario: Hallway consultations

Privacy requires you to minimize overheard PHI. Move to a private area, share only the details required for the purpose, and refrain from discussing patient identities in public corridors.

Security complements this by enforcing access controls and unique user IDs, ensuring only authorized personnel can open electronic charts wherever they are physically located.

Safeguards for Lost Devices

Scenario: A stolen laptop containing ePHI

Under the Security Rule, preemptive measures are critical: full-disk encryption, strong authentication, remote wipe, and automatic logoff. If encryption is properly implemented, the risk of compromise is greatly reduced.

The Privacy Rule requires mitigation and workforce sanctions as appropriate, plus evaluation of whether a reportable breach occurred. Follow your incident response plan, document your risk assessment, and notify affected individuals if required by your policies and applicable rules.

Scenario: A personal smartphone used for messaging

Security mandates MDM enrollment, device encryption, and the ability to remove ePHI if the phone is lost. Disable local backups to personal cloud accounts that are not covered by a business associate agreement.

Privacy requires you to restrict PHI use to authorized purposes and train staff not to store PHI in personal photo galleries, notes apps, or messaging threads outside approved channels.

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Permitted Sharing of PHI with Insurers

Scenario: Submitting a claim

The Privacy Rule permits PHI disclosures to health plans for payment and healthcare operations without separate patient authorization requirements. Apply the minimum necessary standard—send what the plan needs to adjudicate the claim, not an entire chart.

Security requires secure claim submission workflows: encrypted data exchange, vetted clearinghouses with business associate agreements, and audit logs of what was transmitted and when.

Scenario: Patient pays out of pocket and requests privacy

Privacy allows a patient to request a restriction preventing disclosure of PHI to a health plan when the service is paid for in full out of pocket. You must honor this for that episode of care and segregate related documentation.

Security must support that restriction operationally—tag records, segment access, and ensure ePHI routing rules prevent automatic billing file inclusion for the restricted visit.

Administrative Compliance Requirements

Privacy Rule administrative expectations

Designate a privacy official, issue a Notice of Privacy Practices, establish policies and procedures, train the workforce, apply sanctions for violations, and maintain complaint and mitigation processes. Retain required documentation for at least six years.

Security Rule administrative safeguards

Conduct a thorough risk analysis and implement risk management, assign a security official, establish workforce security and training, manage information access, create contingency plans and backups, evaluate periodically, and manage business associate oversight.

Scenario: Policy rollout and real-world testing

Before launching a new portal or vendor integration, run tabletop exercises that trace a request from intake to release. Confirm that minimum necessary rules are applied where required and that technical safeguards function as written.

Technical Security Controls

Core controls mapped to daily workflows

  • Access controls: unique user IDs, role-based permissions, and multi-factor authentication.
  • Audit controls: detailed logging of view, edit, export, and transmission events with regular review.
  • Integrity controls: hashing and change tracking to detect unauthorized alteration of ePHI.
  • Transmission security: encryption in transit for APIs, email gateways, and file exchange.
  • Endpoint protection: encryption at rest, automatic logoff, anti-malware, and timely patching.
  • Data lifecycle: secure backups, tested restores, and disposal workflows that sanitize media.

Physical safeguards that support technology

Control facility access, secure server rooms, lock networking closets, and protect workstations with cable locks and privacy filters. Physical safeguards complement technical measures, ensuring ePHI stays protected end to end.

Conclusion

The Privacy Rule decides when PHI may be used or disclosed and enforces patient rights, while the Security Rule dictates how ePHI is protected through administrative, physical, and technical safeguards. Use the minimum necessary standard, obtain patient authorization where required, and implement layered controls so compliance aligns with practical care delivery.

FAQs.

What is the key difference between the HIPAA Privacy Rule and Security Rule?

The Privacy Rule governs permissible uses and disclosures of PHI and establishes patient rights. The Security Rule requires safeguards—administrative, physical, and technical—to protect ePHI during creation, storage, and transmission.

How does the Privacy Rule regulate patient access to medical records?

Patients have a right to access their records within 30 days (with one possible 30‑day extension and written notice). You must provide the requested form and format if readily producible, charge only reasonable cost-based fees, and note that the minimum necessary standard does not limit disclosures to the patient.

What safeguards are required under the Security Rule for electronic PHI?

Organizations must implement administrative safeguards (risk analysis, training), physical safeguards (facility and workstation security), and technical safeguards (access control, audit controls, integrity, authentication, and transmission security) appropriate to their risks and operations.

How should providers handle PHI disclosures to insurance companies?

Disclosures for payment and healthcare operations are permitted without separate authorization, but apply the minimum necessary standard. If a patient pays in full out of pocket and requests a restriction, you must withhold related PHI from the health plan and ensure systems enforce that restriction.

Share this article

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Related Articles