HIPAA Security Rule Explained: A Practical 101 Guide for Covered Entities

Check out the new compliance progress tracker


Product Pricing Demo Video Free HIPAA Training
LATEST
video thumbnail
Admin Dashboard Walkthrough Jake guides you step-by-step through the process of achieving HIPAA compliance
Ready to get started? Book a demo with our team
Talk to an expert

HIPAA Security Rule Explained: A Practical 101 Guide for Covered Entities

Kevin Henry

HIPAA

January 03, 2025

7 minutes read
Share this article
HIPAA Security Rule Explained: A Practical 101 Guide for Covered Entities

Overview of the HIPAA Security Rule

The HIPAA Security Rule sets national standards to protect the confidentiality, integrity, and availability of electronic protected health information (ePHI). It applies to covered entities and their business associates, regardless of size or technology stack, and is intentionally flexible so you can tailor safeguards to real-world risk.

The Rule is organized around three safeguard categories—administrative, physical, and technical—supported by risk assessment, documentation, and workforce training. Some specifications are “required,” while others are “addressable,” meaning you must implement them if reasonable and appropriate, or document a suitable alternative that achieves comparable protection.

Administrative Safeguards for ePHI Protection

Administrative safeguards establish governance and day-to-day processes that keep ePHI confidentiality front and center. They define who is accountable, how access is granted, how incidents are handled, and how you plan for disruptions.

Governance and Accountability

  • Designate a security official responsible for the Security Rule program and decision-making.
  • Adopt written policies and procedures that reflect your environment, technologies, and risk profile.
  • Conduct an initial and ongoing risk assessment to drive a documented risk management plan.

Workforce Security Policies and Access Management

  • Establish workforce security policies for onboarding, role changes, and terminations, including timely provisioning and deprovisioning of access.
  • Apply the minimum necessary standard with role-based access and documented approvals.
  • Maintain a sanction policy and keep records of corrective actions for policy violations.

Security Awareness and Training

  • Deliver periodic training covering phishing, password hygiene, MFA usage, secure remote work, and device handling.
  • Reinforce with reminders, simulations, and job-specific modules for high-risk roles.

Security Incident Procedures

  • Define security incident procedures for detection, reporting, triage, containment, eradication, and recovery.
  • Differentiate between an incident and a breach, document decisions, and complete post-incident reviews to strengthen controls.

Contingency Planning

  • Implement a data backup plan, disaster recovery plan, and emergency mode operations plan aligned to your recovery time and point objectives.
  • Test, review, and update plans; keep downtime workflows for critical services like EHR access, ePrescribing, and revenue cycle operations.

Business Associate Management

  • Execute business associate agreements that require appropriate safeguards, breach/incident reporting timeframes, and subcontractor flow-downs.
  • Perform due diligence and monitor high-risk vendors that create, receive, maintain, or transmit ePHI.

Evaluation

  • Review your program periodically and when major changes occur (systems, locations, vendors) to verify controls remain effective.

Physical Safeguards and Controls

Physical safeguards protect the places and devices where ePHI resides. Focus on facility access, workstation security, and device/media handling to prevent unauthorized use or disclosure.

  • Facility access controls: visitor management, access badges/keys, emergency access procedures, and maintenance records for doors, locks, and surveillance.
  • Workstation use and security: secure placement, privacy screens, auto-lock timeouts, and clean desk practices in clinical and administrative areas.
  • Device and media controls: inventory of servers, laptops, mobile devices, and removable media; procedures for disposal, media reuse, transfer, and secure destruction; chain-of-custody for moves and repairs.
  • Environmental controls: surge protection and power continuity (e.g., UPS) for systems hosting critical ePHI services.

Technical Safeguards Implementation

Technical safeguards translate policy into enforcement. They control who can see ePHI, record what happens, and protect data against tampering and interception.

Ready to assess your HIPAA security risks?

Join thousands of organizations that use Accountable to identify and fix their security gaps.

Take the Free Risk Assessment
  • Access control: unique user IDs, emergency access procedures, automatic logoff, and encryption/decryption to protect ePHI at rest and in use.
  • Audit controls: centralized logging for EHRs, email, endpoints, and cloud services; alerting on anomalous behavior and inappropriate access.
  • Integrity: hashing, digital signatures, and change-detection to prevent and detect unauthorized alteration of ePHI.
  • Person or entity authentication: strong authentication (preferably MFA) for users, devices, and APIs accessing ePHI.
  • Transmission security: enforce TLS for web and email, secure messaging, VPNs for remote access, and safeguards against insecure protocols.

Conducting Risk Assessments

A risk assessment is the engine of your Security Rule program. It inventories where ePHI lives and moves, identifies threats and vulnerabilities, and prioritizes mitigation to reduce risk to reasonable and appropriate levels.

Practical Steps

  1. Define scope: systems, applications, devices, vendors, and data flows that create, receive, maintain, or transmit ePHI.
  2. Identify threats and vulnerabilities: human error, insider misuse, ransomware, misconfigurations, legacy systems, and third-party dependencies.
  3. Analyze likelihood and impact: use a consistent scale to assign risk levels, considering operational disruption, patient safety, and regulatory exposure.
  4. Map existing controls: note administrative, physical, and technical safeguards already in place and their effectiveness.
  5. Treat the risk: select controls, accept, transfer, or avoid; document owners, timelines, and expected residual risk.
  6. Document and monitor: maintain a risk register and review after incidents, system changes, or at least annually.

Keep the assessment living and actionable. Tie remediation to budgets and projects, and verify completion with evidence such as screenshots, tickets, and test results.

Compliance and Enforcement

The Office for Civil Rights (OCR) enforces the HIPAA Security Rule through investigations, audits, and resolution agreements. Outcomes can include corrective action plans, monitoring, and civil monetary penalties that scale with the level of culpability.

Business associates share direct liability for complying with applicable provisions, and state attorneys general may also bring actions under HIPAA. Prompt breach reporting, thorough documentation, and a demonstrable risk-based program often influence enforcement outcomes.

Documentation and Training Requirements

HIPAA expects you to “do what you say and say what you do.” Maintain written policies, procedures, and evidence showing consistent application across your environment.

  • Documentation: risk assessments, risk management plans, security incident procedures and logs, contingency planning artifacts (backups, recovery tests), workforce security policies, access authorizations, evaluations, and business associate agreements.
  • Retention: keep required documentation for at least six years from the date of creation or last effective date, whichever is later.
  • Training: provide role-based training to all workforce members, with refreshers and ad hoc training following incidents or changes; track attendance and comprehension.
  • Change management: update documents when technologies, vendors, or processes change, and version-control your updates with approvals.

In practice, an effective HIPAA Security Rule program is risk-driven, well-documented, and reinforced by continuous training. By aligning administrative, physical, and technical safeguards with your risk assessment, you protect ePHI confidentiality while sustaining resilient operations.

FAQs

What are the key safeguards required under the HIPAA Security Rule?

The Rule requires administrative, physical, and technical safeguards. Administrative safeguards cover governance, workforce security policies, security incident procedures, contingency planning, and business associate oversight. Physical safeguards address facility access, workstation security, and device/media controls. Technical safeguards include access control, audit controls, integrity, authentication, and transmission security.

How do covered entities conduct a risk assessment?

Define the scope of ePHI systems and data flows, identify threats and vulnerabilities, and evaluate likelihood and impact to determine risk levels. Map existing controls, choose treatments (implement, accept, transfer, or avoid), assign owners and timelines, and document everything in a risk register. Review and update the assessment after significant changes, incidents, or at regular intervals.

What documentation must covered entities maintain for HIPAA compliance?

Maintain written policies and procedures, risk assessments and risk management plans, security incident procedures and records, contingency planning artifacts (backups, disaster recovery tests, emergency operations), workforce training materials and logs, access authorizations, evaluations, sanction records, and business associate agreements. Retain documentation for at least six years.

What are the consequences of non-compliance with the HIPAA Security Rule?

Consequences range from corrective action plans and mandated monitoring to civil monetary penalties that increase with the level of culpability. OCR investigations can also lead to resolution agreements and reputational harm. Demonstrating a rigorous, risk-based program and timely incident response typically mitigates exposure.

Share this article

Ready to assess your HIPAA security risks?

Join thousands of organizations that use Accountable to identify and fix their security gaps.

Take the Free Risk Assessment

Related Articles