HIPAA Requirements for Nonprofit Healthcare Organizations: A Practical Compliance Guide

Check out the new compliance progress tracker


Product Pricing Demo Video Free HIPAA Training
LATEST
video thumbnail
Admin Dashboard Walkthrough Jake guides you step-by-step through the process of achieving HIPAA compliance
Ready to get started? Book a demo with our team
Talk to an expert

HIPAA Requirements for Nonprofit Healthcare Organizations: A Practical Compliance Guide

Kevin Henry

HIPAA

March 17, 2026

8 minutes read
Share this article
HIPAA Requirements for Nonprofit Healthcare Organizations: A Practical Compliance Guide

HIPAA Applicability to Nonprofits

HIPAA applies based on what you do with health information, not your tax status. If your nonprofit creates, receives, maintains, or transmits Protected Health Information (PHI) while performing covered healthcare activities, HIPAA’s rules apply to you.

You are directly regulated if you are a covered healthcare provider, a health plan, or a healthcare clearinghouse—or if you are a business associate that handles PHI on behalf of a covered entity. Even programs within a larger charity can be subject to HIPAA if they perform covered functions.

Start with a functional test: identify where PHI or Electronic PHI (ePHI) enters your workflows, who touches it, what systems store it, and which external vendors access it. Map these data flows before assigning roles and responsibilities under the HIPAA Privacy Rule and HIPAA Security Rule.

  • Confirm whether specific services (e.g., clinic visits, telehealth, counseling) involve electronic standard transactions.
  • Document when you act as a covered entity versus a business associate for partners and grantees.
  • Segment operations so non‑health programs avoid unnecessary exposure to PHI.

Covered Entities Classification

Nonprofits qualify as Covered Entities when they fit one of HIPAA’s three categories. Classification depends on the nature of activities and transactions, not incorporation type or mission.

  • Healthcare providers: deliver care and transmit health information electronically in standard transactions (e.g., billing eligibility checks).
  • Health plans: nonprofit health plans, employee group health plans you sponsor, or limited‑scope benefit plans that handle PHI.
  • Healthcare clearinghouses: transform nonstandard data from another entity into standard formats and vice versa.

Common nonprofit examples include free clinics, behavioral health centers, hospice programs, and university or faith‑based health services. If only parts of your organization perform covered functions, consider hybrid entity designation to ring‑fence healthcare components and apply HIPAA only where required.

Hybrid entities

As a hybrid entity, you must formally designate healthcare components, implement access controls and “firewalls” between covered and non‑covered functions, and train workforce members accordingly. This approach reduces compliance scope while protecting PHI.

Business Associates Compliance

Vendors that create, receive, maintain, or transmit PHI for you are business associates. Typical nonprofit examples include EHR and patient portal providers, billing and claims processors, telehealth platforms, cloud storage and backup services, fundraising vendors using limited PHI, mail houses, and data analytics firms.

You must execute a Business Associates Agreement with each vendor before sharing PHI. A Business Associate Agreement (BAA)—also referred to as a Business Associates Agreement—sets permitted uses/disclosures, requires safeguards for ePHI, mandates breach reporting, and flows obligations to subcontractors.

  • Perform due diligence: assess the vendor’s security program, incident history, and subcontractor controls.
  • Right‑size the BAA: limit PHI uses to the minimum necessary; specify encryption, logging, and retention; require prompt breach notice.
  • Monitor performance: maintain an inventory, review SOC/security attestations, and test termination and data‑return procedures.

Privacy Rule Obligations

The HIPAA Privacy Rule governs how you use and disclose PHI and the rights you provide to individuals. Center your program on policy, training, and a repeatable decision framework for permissible uses without authorization versus those requiring written authorization.

  • Notice of Privacy Practices: publish and distribute a clear notice; post it where you deliver services and on your website if you have one.
  • Minimum Necessary: restrict PHI use/disclosure and workforce access to what is reasonably needed for the task.
  • Authorizations: obtain written authorization for most marketing, research outside waivers, and disclosures not otherwise permitted.
  • Individual rights: timely access to records (generally within 30 days), amendment, accounting of disclosures, restrictions, and confidential communications.
  • De‑identification: use recognized methods to remove identifiers when you do not need identifiable data.

Special considerations for nonprofits

Fundraising under the Privacy Rule permits limited PHI—such as demographic information and dates of service—without authorization, but each message must include a clear, simple opt‑out and you may not condition care on a donor’s choice. Train staff and development vendors to honor “minimum necessary” and opt‑out requests promptly.

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Security Rule Safeguards

The HIPAA Security Rule requires you to protect the confidentiality, integrity, and availability of ePHI. Your security program must be risk‑based and documented, balancing safeguards with your size, complexity, and capabilities.

Administrative safeguards

  • Risk analysis and risk management with prioritized remediation plans.
  • Security official designation, policies and procedures, and workforce training.
  • Contingency planning: backups, disaster recovery, and emergency operations.
  • Vendor management integrated with Business Associates Agreement oversight.

Physical safeguards

  • Facility access controls and visitor management.
  • Workstation security, device and media controls, and secure disposal of hardware.
  • Environmental protections for server rooms and networking equipment.

Technical safeguards

  • Unique user IDs, role‑based access, and multi‑factor authentication for remote and privileged accounts.
  • Encryption in transit and at rest for systems storing ePHI; strong key management.
  • Audit controls: centralized logging, alerting, and regular review of access reports.
  • Integrity controls and anti‑malware; timely patching and vulnerability management.

Nonprofit‑focused quick wins

  • Adopt cloud services with built‑in security features and BAAs, then configure them securely.
  • Standardize endpoints with full‑disk encryption, automated updates, and remote wipe.
  • Use least‑privilege access and short‑lived credentials to reduce risk from account compromise.

Breach Notification Procedures

The Breach Notification Rule requires notice after a breach of unsecured PHI. Start with a four‑factor risk assessment to determine whether PHI was compromised: the data’s nature and identifiers, the unauthorized person, whether the PHI was actually acquired or viewed, and the extent of mitigation.

  • Discovery and containment: isolate systems, stop further disclosures, and preserve logs.
  • Risk assessment: document facts, apply the four factors, and decide if notice is required.
  • Individual notice: without unreasonable delay and no later than 60 days from discovery; written notice by mail or email where appropriate.
  • Media and HHS notice: if 500 or more individuals in a state/jurisdiction are affected, notify prominent media and HHS within 60 days.
  • Annual HHS log: for breaches affecting fewer than 500 individuals, submit to HHS within 60 days after the end of the calendar year.
  • Business associate role: BAs must notify the covered entity promptly so you can meet deadlines.

Leverage encryption to qualify for the “unsecured PHI” safe harbor; if compromised data are properly encrypted, notification may not be required. Regardless, maintain incident response playbooks, contact templates, and decision logs to demonstrate diligence.

Enforcement and Penalties

HIPAA is enforced primarily by the HHS Office for Civil Rights (OCR), with potential actions by state attorneys general and, in certain cases, the Department of Justice. Resolutions often include corrective action plans, independent monitoring, and monetary settlements or civil money penalties.

Penalties are tiered based on culpability—ranging from violations you could not have known about, to reasonable cause, to willful neglect (corrected or uncorrected)—with annual inflation adjustments. Criminal penalties can apply for knowingly obtaining or disclosing PHI, with higher tiers for false pretenses or intent to sell or harm.

Mitigating factors include the nature and extent of the violation, number of individuals affected, timeliness of correction, and your prior compliance history. For nonprofits, OCR frequently cites gaps in risk analysis, access controls, and right‑of‑access response times—areas worth prioritizing.

Conclusion

Build compliance around clear governance: classify your role, lock down ePHI with layered safeguards, train your workforce, manage vendors through a robust Business Associates Agreement process, and rehearse breach response. With documented risk management and privacy workflows, your nonprofit can meet HIPAA’s requirements and maintain community trust.

FAQs

What entities are covered by HIPAA in nonprofit healthcare?

Any nonprofit that functions as a covered healthcare provider, health plan, or healthcare clearinghouse is a covered entity. A nonprofit is also covered when it acts as a business associate for a partner that is subject to HIPAA. If only specific programs handle PHI, you may designate a hybrid entity so HIPAA applies to the healthcare components while other programs remain outside scope.

What are the key privacy rule requirements for nonprofits?

Publish and follow a Notice of Privacy Practices, apply the Minimum Necessary standard, obtain authorizations when required, and honor individual rights to access, amend, and receive an accounting of disclosures. Train staff, maintain policies, and de‑identify data when possible. For fundraising, you may use limited PHI under the HIPAA Privacy Rule but must include an easy opt‑out in every solicitation.

How should nonprofits handle breach notifications?

Contain the incident, perform the HIPAA four‑factor risk assessment, and if a breach of unsecured PHI occurred, notify affected individuals without unreasonable delay and no later than 60 days from discovery. For incidents affecting 500 or more individuals in a state or jurisdiction, also notify HHS and the media; smaller breaches go on your annual HHS log. Ensure business associates alert you quickly so you can meet deadlines under the Breach Notification Rule.

What penalties apply for HIPAA violations by nonprofits?

OCR can require corrective action plans and assess tiered civil money penalties that scale with the level of culpability and are adjusted annually for inflation. Serious or intentional misconduct can trigger criminal liability. Demonstrated good‑faith compliance efforts—risk analyses, timely corrections, and strong vendor management—can significantly mitigate outcomes.

Share this article

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Related Articles