How to Apply HIPAA Privacy and Security Rules: Differences, Requirements, Checklist

Product Pricing Demo Video Free HIPAA Training
LATEST
video thumbnail
Admin Dashboard Walkthrough Jake guides you step-by-step through the process of achieving HIPAA compliance
Ready to get started? Book a demo with our team
Talk to an expert

How to Apply HIPAA Privacy and Security Rules: Differences, Requirements, Checklist

Kevin Henry

HIPAA

February 27, 2025

7 minutes read
Share this article
How to Apply HIPAA Privacy and Security Rules: Differences, Requirements, Checklist

Overview of HIPAA Privacy Rule

The HIPAA Privacy Rule governs how you use and disclose Protected Health Information (PHI) in any form—paper, oral, or electronic. Its purpose is to protect individual privacy while allowing the flow of health information needed to provide high-quality care and run operations.

Scope and purpose

The rule applies to covered entities (health plans, health care providers, and clearinghouses) and their business associates. It establishes permissible uses and disclosures, the “minimum necessary” standard, and processes to safeguard PHI while supporting treatment, payment, and health care operations.

Core requirements you must implement

  • Define permissible uses/disclosures of PHI, and apply the minimum necessary standard.
  • Establish policies for authorizations, disclosures to family or caregivers, and public interest exceptions.
  • Train your workforce on privacy policies and document all procedures and decisions.
  • Execute written agreements with business associates governing PHI handling.

Notice of Privacy Practices (NPP)

You must provide a clear Notice of Privacy Practices that explains how you use PHI, patient rights, and whom to contact with questions or complaints. Keep the NPP accessible and ensure staff can explain it in practical terms.

Overview of HIPAA Security Rule

The HIPAA Security Rule focuses on Electronic Protected Health Information (ePHI). It requires you to ensure the confidentiality, integrity, and availability of ePHI through Administrative Safeguards, Physical Safeguards, and Technical Safeguards scaled to your risks and environment.

Objectives and scope

You must protect ePHI you create, receive, maintain, or transmit. The Security Rule is flexible and technology-neutral, allowing you to select reasonable and appropriate controls for your size, complexity, and capabilities.

Safeguard categories

  • Administrative Safeguards: governance, Risk Assessment, workforce training, and contingency planning.
  • Physical Safeguards: facility, workstation, and device protections to prevent unauthorized access or loss.
  • Technical Safeguards: access controls, audit controls, integrity safeguards, authentication, and transmission security.

Risk Assessment and documentation

Perform a Risk Assessment to identify threats, vulnerabilities, and impacts to ePHI, then implement and document risk management actions. Keep records of decisions, evaluations, and updates as your systems and threats evolve.

Key Differences Between Privacy and Security Rules

  • What they cover: the Privacy Rule protects PHI in any form; the Security Rule protects ePHI specifically.
  • What they require: the Privacy Rule governs when and how PHI may be used or disclosed and grants patient rights; the Security Rule governs how you safeguard ePHI via Administrative, Physical, and Technical Safeguards.
  • Who is involved: both apply to covered entities and business associates, but Security controls are more technical and operational in nature.
  • Flexibility: the Security Rule includes “required” and “addressable” specifications; addressable means you must assess applicability and implement an alternative control or document why it is not reasonable, not that it is optional.

Where they intersect

Decisions allowed by the Privacy Rule (for example, a permitted disclosure) must still be executed securely under the Security Rule (for example, encrypting ePHI during transmission).

Patient Rights Under Privacy Rule

Patients have defined rights regarding their PHI, and you must operationalize processes to honor them.

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

  • Access and copies: patients can inspect and obtain a copy of their PHI, including electronic copies when records are maintained electronically.
  • Amendment: patients can request corrections to their records; you must respond and document approvals or denials.
  • Accounting of disclosures: provide a record of certain disclosures made outside treatment, payment, and operations.
  • Restrictions: consider requests to restrict certain uses or disclosures; document decisions and apply approved restrictions.
  • Confidential communications: accommodate reasonable requests for alternative contact methods or locations.
  • Notice of Privacy Practices: provide, post, and explain your NPP; obtain acknowledgments where applicable.
  • Complaints: maintain a process for receiving and investigating privacy complaints without retaliation.

Administrative Safeguards Requirements

Administrative Safeguards establish your governance and risk management framework for ePHI.

  • Security management process: perform Risk Assessment and risk management; apply sanctions for violations.
  • Assigned security responsibility: designate a security official accountable for the program.
  • Workforce security and information access management: authorize, modify, and terminate access based on role.
  • Security awareness and training: provide ongoing training, phishing awareness, and reminders.
  • Security incident procedures: detect, report, evaluate, and respond to incidents and potential breaches.
  • Contingency plan: maintain data backup, disaster recovery, and emergency mode operation plans; test them.
  • Evaluation: periodically evaluate technical and non-technical safeguards for effectiveness.
  • Business associate management: execute and manage agreements requiring appropriate safeguards for PHI and ePHI.

Practical steps

  • Inventory systems holding ePHI and map data flows end to end.
  • Define policies, procedures, and audit schedules; document everything you implement or decide.
  • Integrate privacy decisions (for example, minimum necessary) into access provisioning and workflows.

Physical Safeguards Implementation

Physical Safeguards protect the places and devices where ePHI resides.

  • Facility access controls: regulate entry, maintain visitor logs, and plan for emergency access.
  • Workstation use and security: define acceptable use; position screens to reduce viewing; use privacy filters where needed.
  • Device and media controls: encrypt portable devices; track assets; back up before movement; securely dispose or sanitize media.
  • Environmental protections: lock server rooms, secure wiring closets, and monitor for theft or tampering.

Practical measures

  • Implement badge access and camera coverage for sensitive areas.
  • Use cable locks and secure storage for laptops and tablets.
  • Standardize wipe-and-disposal procedures with documented chain of custody.

Technical Safeguards and Risk Assessment

Technical Safeguards are the controls you implement in systems that store or transmit ePHI, supported by a documented Risk Assessment and ongoing risk management.

Access control

  • Unique user IDs, least-privilege roles, and timely deprovisioning.
  • Multi-factor authentication for remote and privileged access.
  • Automatic session timeouts and, where reasonable and appropriate, encryption at rest.

Audit controls and integrity

  • Centralized logging for EHRs, email, endpoints, and cloud services; review logs regularly.
  • File integrity monitoring and change management to detect unauthorized alterations.

Authentication and transmission security

  • Strong authentication for users and connected devices.
  • Encrypt ePHI in transit (for example, secure email gateways, TLS for portals and APIs, VPNs for remote connections).

Risk Assessment workflow

  • Identify assets holding ePHI and map processes and data flows.
  • Analyze threats, vulnerabilities, likelihood, and impact to determine risk levels.
  • Evaluate existing controls; select Administrative, Physical, and Technical Safeguards to reduce risks.
  • Document decisions, remediate gaps, and define metrics for continuous monitoring.
  • Reassess after major changes, incidents, or emerging threats and update your risk management plan.

Implementation checklist

  1. Appoint privacy and security officials; document governance.
  2. Inventory PHI/ePHI systems; map data flows and third parties.
  3. Publish and distribute your Notice of Privacy Practices; apply minimum necessary.
  4. Execute business associate agreements; set access roles and approval workflows.
  5. Complete a formal Risk Assessment; prioritize and track remediation.
  6. Implement encryption, MFA, logging, backup, and tested recovery.
  7. Secure facilities, workstations, and mobile devices; standardize disposal.
  8. Train the workforce; run phishing simulations and refresher modules.
  9. Establish incident response and breach procedures; drill at least annually.
  10. Evaluate controls periodically and update policies and documentation.

Conclusion

Applying the HIPAA Privacy and Security Rules means defining when PHI may be used or disclosed, honoring patient rights, and engineering layered safeguards for ePHI based on Risk Assessment. With clear governance, practical controls, and continuous improvement, you can protect data while enabling compliant, efficient care.

FAQs.

What is the main difference between the HIPAA Privacy Rule and Security Rule?

The Privacy Rule governs when and how PHI in any form may be used or disclosed and grants patient rights; the Security Rule specifies how you protect ePHI with Administrative, Physical, and Technical Safeguards and ongoing risk management.

How do the Security Rule safeguards protect electronic health information?

They establish layered controls—governance and training (Administrative), facility and device protections (Physical), and access, logging, encryption, and transmission security (Technical)—all driven by a documented Risk Assessment and continuous monitoring.

What are patient rights under the HIPAA Privacy Rule?

Patients have rights to access and obtain copies of their PHI (including electronic copies when applicable), request amendments, receive an accounting of certain disclosures, request restrictions, request confidential communications, receive a Notice of Privacy Practices, and file complaints without retaliation.

How often should risk assessments be conducted for HIPAA compliance?

Conduct a comprehensive Risk Assessment initially and review it regularly—at least annually is common practice—and whenever you introduce significant system, workflow, or vendor changes, experience an incident, or face new threats.

Share this article

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Related Articles