HIPAA Standards for Controlling PHI: Privacy vs Security Rule Guide

Check out the new compliance progress tracker


Product Pricing Demo Video Free HIPAA Training
LATEST
video thumbnail
Admin Dashboard Walkthrough Jake guides you step-by-step through the process of achieving HIPAA compliance
Ready to get started? Book a demo with our team
Talk to an expert

HIPAA Standards for Controlling PHI: Privacy vs Security Rule Guide

Kevin Henry

HIPAA

September 05, 2024

8 minutes read
Share this article
HIPAA Standards for Controlling PHI: Privacy vs Security Rule Guide

Controlling protected health information (PHI) requires you to master two pillars of HIPAA: the Privacy Rule and the Security Rule. This guide explains how each rule governs PHI, what safeguards are required, and how to operationalize compliance without slowing care.

In short, the Privacy Rule answers when, why, and with whom PHI may be used or disclosed. The Security Rule answers how you must protect Electronic Protected Health Information (ePHI) through administrative, physical, and technical measures. Together, they establish HIPAA standards for controlling PHI end to end.

HIPAA Privacy Rule Overview

The Privacy Rule applies to PHI in any form—paper, oral, or electronic. PHI is a subset of Individually Identifiable Health Information that relates to health status, care, or payment and can identify a person directly or indirectly. Covered entities and their business associates must handle this information under strict conditions.

Core principles include permissible uses and disclosures for treatment, payment, and healthcare operations (TPO) without needing prior patient authorization. Beyond TPO, Patient Consent Requirements typically take the form of a written authorization, such as for most marketing, research without waiver, or sale of PHI. The “minimum necessary” standard requires you to limit PHI to the least amount needed for a task (note that this standard does not apply to disclosures for treatment).

Privacy governance also requires a Notice of Privacy Practices, policies for workforce privacy, and business associate agreements that bind vendors to Privacy Rule duties. De-identification and limited data sets enable data use with reduced privacy risk when identifiers are removed or controlled.

HIPAA Security Rule Overview

The Security Rule protects Electronic Protected Health Information. Its requirements are risk based and organized into Administrative Safeguards, Physical Safeguards, and Technical Safeguards. Some implementation specifications are “required,” while others are “addressable,” meaning you must implement them if reasonable and appropriate or document equivalent alternatives.

Effective security is a continuous program: conduct a Security Risk Assessment, implement controls, train your workforce, monitor systems, and document everything. The rule’s objective is to ensure the confidentiality, integrity, and availability of ePHI while preventing reasonably anticipated threats or impermissible disclosures.

Administrative Safeguards for PHI

Administrative Safeguards establish the policies, processes, and oversight needed to manage risk to ePHI and to guide your workforce’s actions. While they target ePHI, these controls reinforce disciplined handling of PHI in any form.

  • Security management process: perform a formal Risk Assessment, manage identified risks, apply a sanction policy for violations, and review system activity (logs, access reports, security alerts).
  • Assigned security responsibility: designate a security official accountable for the program’s design, implementation, and reporting.
  • Workforce security: authorize, supervise, and terminate access appropriately; use onboarding/offboarding checklists to prevent privilege creep.
  • Information access management: enforce role-based access, least privilege, and need-to-know to support the minimum necessary principle.
  • Security awareness and training: provide recurring training on phishing, secure handling of PHI, device use, and incident reporting; reinforce with reminders and simulated exercises.
  • Security incident procedures: detect, document, investigate, contain, and learn from incidents; maintain an incident response plan aligned to your reporting obligations.
  • Contingency planning: maintain data backup, disaster recovery, and emergency mode operations plans; test and update them regularly.
  • Evaluation: periodically evaluate technical and nontechnical controls to verify continued effectiveness as systems, threats, and operations evolve.

Organizational requirements—such as business associate agreements—ensure vendors and service providers apply comparable Administrative Safeguards to protect ePHI they create, receive, maintain, or transmit on your behalf.

Physical and Technical Safeguards

Physical Safeguards protect the environments where PHI and ePHI live and the devices that store or process them.

  • Facility access controls: restrict entry with badges, visitor logs, and escort procedures; define emergency access methods that preserve security during outages.
  • Workstation use and security: set rules for workstation placement, screen privacy, automatic screen locks, and secure remote work areas.
  • Device and media controls: inventory devices, back up data, and apply secure disposal and media reuse procedures (wiping, shredding, or degaussing as appropriate).

Technical Safeguards apply directly to systems handling ePHI and are central to protecting Electronic Protected Health Information.

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

  • Access controls: require unique user IDs, enforce multi-factor authentication where feasible, use automatic logoff, and define emergency access procedures.
  • Audit controls: generate and review logs for access and administrative activity; enable alerts for anomalous behavior and unsuccessful access attempts.
  • Integrity: protect ePHI from improper alteration with hashing, digital signatures, versioning, and endpoint protections; maintain change control.
  • Person or entity authentication: verify identity before granting access; validate service accounts and integrations to avoid shared or orphaned credentials.
  • Transmission security: encrypt ePHI in transit with strong protocols and consider encryption at rest based on your Risk Assessment; segment networks and use secure messaging.

Patient Rights and PHI Access

Patients have the right to access their PHI in the format requested if readily producible, including via patient portal or secure email, within 30 days (with one allowable 30‑day extension). You may charge only a reasonable, cost-based fee for copies. Patients may also direct their records to a third party of their choice.

Patients can request amendments to PHI; you must act within 60 days (with one 30‑day extension) and either amend or provide a reasoned denial while allowing a statement of disagreement. They may request restrictions on disclosures, seek confidential communications at alternative locations or by alternate means, and receive an accounting of certain non‑TPO disclosures.

Patient control is reinforced by Patient Consent Requirements: routine TPO uses generally proceed without written consent under HIPAA, while uses outside TPO typically require written authorization. HIPAA sets a federal floor; state laws may impose stricter consent or access rules that you must also follow.

Risk Assessment and Management

A Security Risk Assessment is the foundation of your HIPAA program. It identifies where ePHI resides, what could go wrong, and how likely and impactful those events would be, so you can prioritize controls.

  • Scope and inventory: map data flows, systems, applications, devices, vendors, and storage locations containing ePHI.
  • Threats and vulnerabilities: analyze human error, malicious actors, process gaps, and technical weaknesses across your environment.
  • Likelihood and impact: rate risks to confidentiality, integrity, and availability; consider patient safety and business disruption.
  • Treatment plan: select Administrative Safeguards, Physical Safeguards, and Technical Safeguards to mitigate risk to an acceptable level; assign owners and deadlines.
  • Documentation and monitoring: record decisions (including addressable choices), track metrics, and reassess after changes or at least annually.

Risk management continues with patching, vulnerability management, backup verification, incident response exercises, and vendor oversight through questionnaires and contract controls. Clear documentation demonstrates that you evaluated risks and implemented reasonable, appropriate protections.

Differences Between Privacy and Security Rules

Scope: the Privacy Rule governs PHI in any form; the Security Rule governs only ePHI. Focus: the Privacy Rule sets permissible uses and disclosures and grants individual rights; the Security Rule defines how to safeguard systems and data to prevent unauthorized access or alteration.

Mechanics: the Privacy Rule relies on policies, workforce practices, and Patient Consent Requirements; the Security Rule relies on specific control families—Administrative, Physical, and Technical Safeguards—guided by a Risk Assessment. Outputs differ too: Privacy programs center on notices, authorizations, and disclosure tracking, while Security programs center on access control, logging, encryption, and contingency planning.

In practice, you need both: for example, sharing a consult note with another provider is permitted by the Privacy Rule under treatment, and the Security Rule requires you to transmit that note securely and restrict access on receiving systems.

Taken together, the rules ensure lawful, purposeful use of PHI while mandating practical protections for ePHI. Build your program around clear privacy policies, strong technical controls, ongoing training, and a living risk management process that keeps pace with change.

FAQs

What is the difference between HIPAA Privacy and Security Rules?

The Privacy Rule governs when PHI may be used or disclosed and what rights patients have over their information. The Security Rule governs how you protect Electronic Protected Health Information through Administrative Safeguards, Physical Safeguards, and Technical Safeguards informed by a Risk Assessment.

Which safeguards protect electronic PHI?

All three safeguard categories apply to ePHI, but Technical Safeguards are most direct: access controls, audit controls, integrity protections, authentication, and transmission security. Administrative Safeguards (policies, training, incident response) and Physical Safeguards (facility, workstation, and device protections) complete the defense.

How does HIPAA ensure patient control over their information?

The Privacy Rule grants rights to access, request amendments, receive an accounting of certain disclosures, request restrictions, and obtain confidential communications. It also sets Patient Consent Requirements by allowing TPO uses while requiring authorization for most non‑TPO uses such as marketing or sale of PHI.

What risk management practices are required under HIPAA?

You must conduct a Security Risk Assessment, implement risk-based Administrative, Physical, and Technical Safeguards, train your workforce, monitor and log activity, maintain contingency plans, manage vendors, and document decisions—reassessing regularly or when your environment or threats change.

Share this article

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Related Articles