HIPAA Security Rule Physical Safeguards: What They Are, Requirements, and Examples

Check out the new compliance progress tracker


Product Pricing Demo Video Free HIPAA Training
LATEST
video thumbnail
Admin Dashboard Walkthrough Jake guides you step-by-step through the process of achieving HIPAA compliance
Ready to get started? Book a demo with our team
Talk to an expert

HIPAA Security Rule Physical Safeguards: What They Are, Requirements, and Examples

Kevin Henry

HIPAA

March 17, 2024

7 minutes read
Share this article
HIPAA Security Rule Physical Safeguards: What They Are, Requirements, and Examples

Facility Access Controls

What they are

Facility Access Controls are policies and procedures that limit physical access to locations housing systems that create, receive, maintain, or transmit Electronic Protected Health Information (ePHI). They balance security with operational needs, ensuring authorized personnel can enter while unauthorized access prevention remains effective.

Core implementation specifications (addressable)

  • Contingency operations: Define how authorized staff gain facility access during emergencies to restore services and protect ePHI.
  • Facility security plan: Document physical security standards, including door controls, visitor management, surveillance, and environmental hazard protections such as fire, flood, and temperature controls.
  • Access control and validation: Enforce role-based entry using badges, PINs, or biometrics; validate identity before granting access to sensitive areas.
  • Maintenance records: Track repairs and modifications to doors, locks, cameras, server rooms, and wiring closets that could affect security.

Practical controls

  • Layered entry (reception, badge door, server-room cage) with anti-tailgating measures and visible access control policies.
  • Visitor registration, escort requirements, time-bound badges, and retained logs.
  • 24/7 video coverage of entrances and critical rooms with retention aligned to HIPAA compliance requirements and risk levels.
  • Power, HVAC, water-leak detection, UPS, and generator testing to reduce environmental threats to systems storing ePHI.

Documentation to maintain

  • Facility diagrams, asset-to-room mapping, and critical area classifications.
  • Badge role matrices, visitor logs, and incident reports tied to physical access events.
  • Preventive maintenance schedules and completion records for safeguards and building systems.

Workstation Use Policies

Purpose and scope

Workstation Use Policies define allowable functions, the manner of use, and physical surroundings for desktops, laptops, thin clients, and kiosks that access ePHI. This standard is required and sets clear expectations wherever staff handle patient information.

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Required elements

  • Authorized functions: Specify clinical, billing, and administrative tasks permitted on each workstation type; prohibit personal use that risks ePHI.
  • Manner of performance: Enforce screen locking when unattended, clean-desk practices, and restrictions on printing or local storage of ePHI.
  • Physical surroundings: Position screens to prevent shoulder surfing; use privacy filters in public areas; avoid locating workstations where conversations or displays can be overheard or seen.
  • Remote and mobile use: Define rules for telework spaces, including private areas, device storage, and protections during travel.

Training and reinforcement

  • Role-based education on acceptable use and unauthorized access prevention.
  • Periodic reminders near shared stations and attestation during onboarding and annually.

Workstation Security Measures

Physical protections

  • Lockable offices, secure docking stations, cable locks, and anchored kiosks to deter theft or tampering.
  • Port blockers and secure USB policies for devices near patient-facing areas.
  • Dedicated, locked storage for laptops when not in use and overnight security checks.
  • Privacy screens and secure printer placement to reduce visual exposure of ePHI.

Shared, clinical, and remote settings

  • Time-limited sessions on shared stations; automatic screen locks paired with physical placement that discourages shoulder surfing.
  • In clinics and nursing stations, mount devices to walls or carts with lockable drawers; route cables inside conduits.
  • For home offices, require separate work areas, locked cabinets, and no shared household use of devices that access ePHI.

Monitoring and upkeep

  • Asset tags, inventories, and periodic sweeps to confirm each workstation’s location and condition.
  • Ticketing for lost or relocated devices and alignment with incident response when physical compromise is suspected.

Device and Media Controls

Required and addressable specifications

  • Disposal (required): Implement media disposal procedures that render ePHI unreadable—shredding, pulverizing, or sanitization aligned to recognized standards.
  • Media re-use (required): Sanitize devices before re-assignment or return; verify that prior data is irretrievable.
  • Accountability (addressable): Maintain logs and chain-of-custody for hardware and media; track transfers, repairs, and loans.
  • Data backup and storage (addressable): Create a retrievable, exact copy of ePHI before moving equipment or media.

Media Disposal Procedures

  • Use certified destruction for drives and tapes; require certificates of destruction and lot details from vendors.
  • Apply approved sanitization (for example, cryptographic erase for SSDs) before resale or redeployment.
  • Lock disposal bins for paper containing ePHI; shred onsite or use bonded couriers with tamper-evident containers.

Accountability and chain of custody

  • Assign asset owners; log custody changes with dates, locations, and responsible individuals.
  • Audit serial numbers during inventories; reconcile discrepancies promptly as potential incidents.

Backup before movement

  • Document and test backups prior to relocating servers or decommissioning devices that store ePHI.
  • Store backups in protected, access-controlled locations with environmental safeguards.

Implementation Best Practices

Risk-driven program

  • Start with a risk analysis that maps where ePHI lives, who needs access, and which threats are most credible.
  • Align controls to HIPAA compliance requirements and your organization’s tolerance for operational disruption.

Layered defenses and access control policies

  • Combine perimeter controls, interior zoning, and point protections (locks, cages, cabinets) for defense in depth.
  • Use role-based badges, visitor management, and periodic access reviews; remove access quickly when roles change.

Environmental hazard protections

  • Implement fire suppression appropriate for IT areas, temperature and humidity monitoring, and water-leak detection.
  • Test UPS and generators under load; document outcomes and corrective actions.

Operational excellence

  • Train staff on physical security standards; run drills for emergency access and evacuations.
  • Audit logs, camera coverage, and asset inventories; remediate gaps with deadlines and owners.
  • Vet vendors handling devices/media; require contracts that specify safeguards and performance metrics.

Examples of Physical Safeguards

  • Mantraps with badge plus PIN for data center and server-room entries.
  • Visitor kiosks issuing time-limited badges and capturing signatures.
  • Locked network closets and server racks with keyed or smart locks.
  • Video surveillance at entrances, loading docks, and records rooms with 90-day retention.
  • Privacy screens on registration desk monitors and triage areas.
  • Cable-locked workstations and anchored exam-room tablets.
  • Secure, labeled bins for paper and media awaiting shredding or destruction.
  • Tamper-evident bags for transporting backup media with documented chain of custody.
  • Environmental sensors, UPS, and automatic transfer switches protecting systems that store ePHI.
  • Badge role reviews every quarter with immediate revocation for separations.

Compliance Challenges

Organizations often struggle to harmonize policies across multiple sites, manage third-party service providers, and secure remote workspaces. Legacy buildings may lack modern controls, budgets can be tight, and documentation frequently lags behind real-world changes—each of which raises risk to ePHI.

Common pitfalls

  • Unlogged visitors or contractors and shared badges.
  • Devices moved without backup, sanitization, or updated inventories.
  • Unsecured kiosks and printers in patient-facing areas.
  • Incomplete maintenance records for locks, cameras, and alarms.

Mitigations

  • Establish minimum physical security standards for every site and verify with periodic walkthroughs.
  • Centralize asset management and require documented chain-of-custody for device moves.
  • Create quick-reference procedures for emergencies, visitor handling, and media disposal.
  • Tie corrective actions to owners and due dates; report status to leadership.

Conclusion

HIPAA Security Rule Physical Safeguards convert policy into protection by controlling who can enter facilities, how workstations are used and secured, and how devices and media are handled. When you implement layered controls, document consistently, and test regularly, you reduce exposure to environmental and human threats while meeting HIPAA compliance requirements.

FAQs

What are the main physical safeguards required by HIPAA?

HIPAA’s physical safeguards include Facility Access Controls, Workstation Use policies, Workstation Security measures, and Device and Media Controls. Within these, certain elements are required (for example, disposal and media re-use) and others are addressable, allowing you to tailor protections based on risk while still protecting ePHI.

How do facility access controls protect ePHI?

They restrict entry to spaces housing systems that handle ePHI and verify that only authorized individuals can enter. Measures such as role-based badges, visitor validation, surveillance, and environmental hazard protections prevent unauthorized access and reduce downtime or data loss from physical events.

What procedures are needed for proper device and media handling?

Define end-to-end procedures for inventory, chain of custody, backup before movement, secure transport, and final disposition. Apply media disposal procedures that make ePHI irretrievable and require sanitization before re-use, with documentation and vendor controls where third parties are involved.

How can organizations ensure workstation security under HIPAA?

Place and secure devices to limit exposure, use privacy screens, lock equipment and rooms, and enforce policies for session locking and proper use. Support these steps with inventories, periodic inspections, training, and rapid response when devices are lost, relocated, or suspected of being tampered with.

Share this article

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Related Articles