HIPAA Privacy Rule: Who It Applies To, Risks, and Best Practices

Check out the new compliance progress tracker


Product Pricing Demo Video Free HIPAA Training
LATEST
video thumbnail
Admin Dashboard Walkthrough Jake guides you step-by-step through the process of achieving HIPAA compliance
Ready to get started? Book a demo with our team
Talk to an expert

HIPAA Privacy Rule: Who It Applies To, Risks, and Best Practices

Kevin Henry

HIPAA

March 03, 2025

8 minutes read
Share this article
HIPAA Privacy Rule: Who It Applies To, Risks, and Best Practices

The HIPAA Privacy Rule sets national standards for how health information is used and disclosed, while giving individuals clear rights over their data. If you create, receive, maintain, or transmit protected health information, you likely have obligations under this rule. Understanding who it applies to, the risks of non‑compliance, and the best practices to implement will help you protect patients and your organization.

Applicability of HIPAA Privacy Rule

Covered entities

The Privacy Rule applies to three types of covered entities: health care providers that conduct standard electronic transactions, health plans, and health care clearinghouses. If you bill electronically, operate a health plan, or process claims on behalf of others, you are within scope and must follow the rule’s requirements.

Business associates

Vendors and contractors that handle protected health information (PHI) on behalf of a covered entity are business associates. If you provide services like billing, IT support, claims analytics, cloud hosting, or transcription involving PHI, you must sign business associate agreements and implement required safeguards.

Hybrid entities and organized arrangements

Organizations with both health and non-health functions (for example, a university with a clinic) may designate themselves as hybrid entities. Only the health components are subject to HIPAA, but boundaries must be clearly defined and enforced. Organized health care arrangements allow multiple providers to coordinate compliance for shared operations such as joint practice management.

What counts as PHI

PHI includes individually identifiable health information in any form—paper, verbal, or electronic protected health information—created or received by a covered entity or business associate. It links a person to health status, care, or payment. De-identified data, stripped of specified identifiers, falls outside HIPAA, but re-identification risks must be managed.

Permitted uses, disclosures, and the minimum necessary standard

You may use or disclose PHI without authorization for treatment, payment, and health care operations, and for specific public interest purposes. Outside those cases, you need a valid authorization. Apply the minimum necessary standard so workforce members and partners access only what they need to perform their duties.

Risks of HIPAA Non-Compliance

Regulatory enforcement

Non-compliance can trigger investigations, corrective action plans, and monetary penalties. Repeated or willful violations, ignored risks, or failure to cooperate with investigators raise exposure and may prompt audits across your enterprise.

Financial and operational impacts

Breaches drive substantial costs: forensic investigations, breach notification, credit monitoring, legal fees, downtime, and remediation. Contract terminations, stalled partnerships, and higher cyber insurance premiums can follow, straining budgets and operations.

Patient safety and trust

Unauthorized disclosures can expose sensitive diagnoses, treatment plans, or medications. That loss of confidentiality erodes trust, discourages patients from seeking care, and can create safety risks if records are altered or withheld due to an incident.

Litigation and contractual exposure

Class actions, state attorney general actions, and indemnity demands from partners are common after privacy failures. Weak business associate oversight, missing business associate agreements, or poor vendor controls can shift liability to your organization.

Criminal liability

Knowingly obtaining or disclosing PHI inappropriately—especially for personal gain or malicious intent—can result in criminal charges. Strong governance and access controls help deter insider misuse.

Best Practices for HIPAA Compliance

Establish governance and accountability

Designate privacy and security officers, define decision rights, and maintain a cross-functional committee. Document responsibilities for policy management, risk assessments, incident handling, and oversight of vendors and affiliates.

Policies, procedures, and business associate agreements

Create clear, current policies for uses and disclosures, minimum necessary, patient rights, and sanctioning. Execute business associate agreements that define permitted uses, safeguards, reporting timelines, and flow-down obligations to subcontractors.

Data minimization and patient rights

Collect only what you need, limit retention, and standardize deletion. Operationalize rights of access, amendment, and accounting of disclosures with documented workflows and service-level targets to ensure timely responses.

Incident response plans and testing

Maintain incident response plans covering triage, containment, investigation, breach risk assessment, notification, and post-incident review. Run tabletop exercises at least annually and update playbooks with lessons learned.

Monitoring and continuous improvement

Enable role-based access, audit logs, and behavioral alerts. Review logs routinely, investigate anomalies, and track corrective actions. Align improvements with your risk assessments and leadership priorities.

Role of Business Associates

Who qualifies

A business associate performs functions or activities involving PHI for a covered entity, such as claims processing, data storage, EHR support, legal services, or analytics. If PHI flows to a vendor, treat them as a business associate unless an exception applies.

Business associate agreements (BAAs)

BAAs must specify allowed uses, require administrative, technical, and physical safeguards, mandate breach reporting, and bind subcontractors to equivalent protections. Include audit rights, cooperation clauses, and termination and data return or destruction terms.

Security and privacy obligations

Business associates must comply with the Security Rule for ePHI and relevant Privacy Rule provisions. They should implement risk assessments, encryption, access controls, and incident response plans, and support covered entities in honoring patient rights.

Oversight and lifecycle management

Risk-rank vendors, perform due diligence, and review attestations or assessments regularly. Monitor service changes, restrict data sharing to the minimum necessary, and enforce offboarding steps to revoke access and securely destroy PHI when contracts end.

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Safeguarding Protected Health Information

Administrative safeguards

  • Assign ownership for privacy and security, and document policies with version control.
  • Conduct periodic risk assessments and map data flows across systems and vendors.
  • Apply the minimum necessary standard with role-based access and approval workflows.
  • Manage third-party risk with due diligence, business associate agreements, and ongoing reviews.
  • Enforce sanctions for violations and maintain contingency and incident response plans.

Technical safeguards

  • Encrypt ePHI in transit and at rest; manage keys securely.
  • Use multi-factor authentication, least-privilege access, and just-in-time elevation where needed.
  • Maintain centralized logging, anomaly detection, and regular access reviews.
  • Segment networks, patch promptly, and harden endpoints and mobile devices.
  • Implement data loss prevention, secure messaging, and reliable backups with recovery testing.

Physical safeguards

  • Control facility access with badges, visitor logs, and surveillance where appropriate.
  • Protect workstations with privacy screens and clear-desk policies.
  • Secure media handling, from encrypted drives to certified destruction of retired storage.
  • Harden clinical environments by limiting PHI exposure on whiteboards and shared printers.

Data lifecycle and de-identification

Inventory where PHI lives, define retention by record type, and apply defensible deletion. When feasible, use de-identified or limited data sets to reduce risk while enabling analytics and research.

Telehealth and remote work

Adopt secure telehealth platforms, verify patient identity, and document consent. For remote staff, require encrypted devices, VPN or zero trust access, and safeguards to prevent viewing or overhearing by unauthorized parties.

Conducting Risk Assessments

Scope and inventory

Start with a comprehensive inventory of systems, applications, devices, and vendors that create, receive, maintain, or transmit PHI. Include administrative processes and physical environments to avoid blind spots.

Threat and vulnerability analysis

Identify credible threats—insider misuse, ransomware, lost devices, misconfigurations—and the vulnerabilities they might exploit. Evaluate existing controls and their effectiveness to understand true exposure.

Likelihood, impact, and risk rating

Estimate how likely each scenario is and the business and patient impact if it occurred. Use a consistent scoring model to prioritize remediation, focusing on high-risk findings affecting large volumes of ePHI.

Remediation planning and tracking

Create action plans with owners, milestones, and measurable outcomes. Track progress in a risk register, escalate delays, and validate fixes through testing and audits before closing items.

Cadence and continuous improvement

Perform enterprise risk assessments at least annually and after major changes. Feed results into budgeting, training, vendor oversight, and technology roadmaps to ensure improvements stick.

Training and Awareness Programs

Role-based, practical training

Provide onboarding and annual refreshers tailored to roles—clinical staff, billing teams, IT, and executives. Use realistic scenarios on minimum necessary, secure messaging, and handling requests for access or amendments.

Social engineering and data handling

Run phishing simulations, coach on spotting pretexting, and reinforce safe handling of PHI in conversations, emails, and shared workspaces. Emphasize reporting of suspected incidents without fear of reprisal.

Reinforcement and measurement

Offer microlearning, job aids, and quick reference guides. Track completion, quiz scores, and incident trends to gauge effectiveness and focus future sessions on observed weaknesses.

Conclusion

The HIPAA Privacy Rule applies broadly to covered entities and their business associates, carrying significant risk for gaps. By executing strong governance, sound business associate agreements, disciplined safeguards, thorough risk assessments, and engaging training, you can protect protected health information and sustain trust.

FAQs

Who is considered a covered entity under HIPAA?

Covered entities are health care providers that conduct standard electronic transactions, health plans (including employer-sponsored group health plans and insurers), and health care clearinghouses. If you fall into one of these groups, the Privacy Rule applies to your PHI uses and disclosures.

What are the penalties for violating the HIPAA Privacy Rule?

Penalties range from corrective action plans and monetary settlements to, in severe or willful cases, substantial civil fines and potential criminal charges. Regulators consider factors like the nature and extent of the violation, the organization’s compliance efforts, the harm caused, and cooperation during investigations.

How should organizations secure electronic protected health information?

Implement administrative, technical, and physical safeguards: conduct risk assessments, enforce role-based access and multi-factor authentication, encrypt ePHI in transit and at rest, log and review access, train your workforce, manage vendors with business associate agreements, and maintain tested incident response plans and reliable backups.

What are the responsibilities of business associates under HIPAA?

Business associates must protect PHI per their agreements, comply with the Security Rule and applicable Privacy Rule provisions, report breaches promptly, bind subcontractors to equivalent safeguards, support patient rights when required, and return or destroy PHI at contract termination where feasible.

Share this article

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Related Articles