Legislation Amending the HIPAA Privacy and Security Rules: Requirements Explained

Product Pricing Demo Video Free HIPAA Training
LATEST
video thumbnail
Admin Dashboard Walkthrough Jake guides you step-by-step through the process of achieving HIPAA compliance
Ready to get started? Book a demo with our team
Talk to an expert

Legislation Amending the HIPAA Privacy and Security Rules: Requirements Explained

Kevin Henry

HIPAA

February 19, 2025

7 minutes read
Share this article
Legislation Amending the HIPAA Privacy and Security Rules: Requirements Explained

This guide explains what the legislation amending the HIPAA Privacy and Security Rules means for your organization and how to comply. You will learn what to change in your policies, systems, and vendor relationships to safeguard Protected Health Information, especially Electronic Protected Health Information, while meeting new documentation and oversight expectations.

The sections below translate the requirements into practical actions you can schedule, measure, and audit—covering reproductive health information, Notice of Privacy Practices updates, inventories, Risk Assessment Protocols, vendor controls, Data Encryption Standards, Multi-Factor Authentication Requirements, and Incident Response Procedures.

Reproductive Health Information Protection

Scope and definition

Reproductive health information is PHI related to services such as contraception, fertility care, pregnancy, miscarriage management, and abortion. The legislation heightens protections to reduce misuse or inappropriate disclosures and to ensure use and disclosure align with patient expectations and lawful care.

Use and disclosure controls

  • Apply the minimum necessary standard and require explicit purpose validation before disclosing PHI tied to reproductive services.
  • Introduce requestor attestations for disclosures, documenting that the requested use is lawful and not intended to identify, investigate, or prosecute lawful care.
  • Segment and tag records so queries, reports, and data extracts cannot inadvertently include reproductive health information without authorized justification.

Operational steps you should take

  • Map where reproductive health information appears in EHRs, portals, billing, data lakes, and third-party apps handling Electronic Protected Health Information.
  • Update intake and disclosure management workflows to capture the purpose of requests and enforce denial/approval paths.
  • Train workforce members on new restrictions and escalation points; include Business Associate obligations in the curriculum.
  • Revise auditing to flag searches, exports, and interface traffic involving reproductive health indicators.

Notice of Privacy Practices Revisions

Required content updates

Revise the NPP to describe how reproductive health information is protected, when disclosures are prohibited, and when they are permitted with additional safeguards. Clarify individual rights to access, amendments, restrictions, and confidential communications as they relate to this PHI category.

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Communication and availability

  • Publish the updated NPP at all points of service and within digital front doors, and provide it upon request in accessible formats and prevalent languages.
  • Highlight changes prominently, including new limitations on disclosures for investigations or proceedings related to reproductive health services.

Execution checklist

  • Draft and legally review revisions; align your acknowledgments and retention practices.
  • Synchronize NPP content with internal policies, workforce training, and Business Associate Agreements.

Mandatory Data and Technology Inventories

What the inventory must cover

  • All systems, applications, devices, APIs, and data stores that create, receive, maintain, or transmit Electronic Protected Health Information.
  • Data flows to third parties, including integration engines, patient apps, analytics platforms, and backup or disaster recovery targets.
  • Identity and access components such as directories, SSO, service accounts, and privileged access tooling.

Fields to capture for each asset

  • Business owner and purpose; PHI data elements; location and residency; retention; backup/restore coverage.
  • Encryption state at rest and in transit, mapped to your Data Encryption Standards and key management practices.
  • Authentication method, MFA status, logging/monitoring, incident contacts, and vendor details tied to Business Associate Agreements.

Why it matters

Complete inventories drive accurate Risk Assessment Protocols, scope your monitoring, and ensure consistent enforcement of Multi-Factor Authentication Requirements. They also accelerate incident investigation by revealing where PHI resides and how it moves.

Enhanced Risk Assessments

Assessment depth and coverage

  • Extend risk analysis to telehealth, remote work, IoT/medical devices, AI-enabled features, third-party APIs, and cross-border processing of ePHI.
  • Evaluate administrative, physical, and technical safeguards holistically, including workforce behavior and vendor controls.

Risk Assessment Protocols

  • Identify assets and data flows; analyze threats and vulnerabilities; estimate likelihood and impact; assign risk ratings.
  • Define mitigation plans with owners, deadlines, and acceptance criteria; track exceptions with documented business justification.
  • Use metrics (e.g., time-to-remediate, residual risk trend) to show continuous risk reduction.

Cadence and triggers

  • Perform assessments on a recurring schedule and whenever material changes occur (new systems, major integrations, or incidents).
  • Re-validate controls after remediation and before go-live for high-risk technologies.

Vendor Oversight

Before you contract

  • Conduct due diligence covering security architecture, encryption, identity, logging, data residency, and subcontractor chains.
  • Require evidence (policy excerpts, penetration tests, certifications) that aligns with your Risk Assessment Protocols.

Business Associate Agreements

  • Update BAAs to reflect Multi-Factor Authentication Requirements, Data Encryption Standards, incident reporting timelines, and reproductive health information restrictions.
  • Mandate downstream flow-down to subcontractors and the right to audit or obtain independent assurance.

Ongoing monitoring

  • Use security scorecards, log-sharing, or attestations to verify operational control performance.
  • Define offboarding steps for termination: data return/destruction, key revocation, and interface teardown.

Encryption and Multi-Factor Authentication

Data Encryption Standards

  • Encrypt ePHI at rest and in transit using industry-recognized algorithms and strong key management with rotation and separation of duties.
  • Protect backups and DR replicas with the same or stronger controls; validate encryption during restore tests.

Multi-Factor Authentication Requirements

  • Enforce MFA for privileged accounts, remote access, EHR access, admin consoles, and any portal exposing ePHI.
  • Prefer phishing-resistant factors; use risk-based authentication and step-up verification for sensitive actions.
  • Document exception handling, device binding, and recovery processes to avoid lockouts without weakening security.

Implementation guidance

  • Integrate encryption and MFA checks into CI/CD pipelines, asset onboarding, and user provisioning.
  • Continuously monitor for drift (unencrypted stores, disabled MFA) and auto-remediate when feasible.

Incident Response and Disaster Recovery Plans

Incident Response Procedures

  • Establish runbooks for prepare, detect, analyze, contain, eradicate, recover, and post-incident review stages.
  • Define thresholds for suspected vs. confirmed incidents, breach notification decision trees, and evidence handling.
  • Coordinate with privacy, legal, communications, and affected vendors under Business Associate Agreements.

Disaster recovery and resilience

  • Set recovery time and recovery point objectives; test restoration paths and failover; verify data integrity after recovery.
  • Ensure backups are encrypted, isolated, and regularly validated; document alternate workflows for clinical continuity.

Exercises and improvements

  • Run tabletop exercises covering reproductive health scenarios, third-party breaches, and credential compromise.
  • Capture lessons learned, update controls and policies, and feed results back into Risk Assessment Protocols.

Summary and next steps

  • Identify where reproductive health information resides and tighten disclosure workflows.
  • Publish an updated NPP; complete a system and data inventory; refresh your risk analysis.
  • Strengthen vendor oversight, enforce encryption and MFA, and rehearse your incident and recovery plans.

FAQs

What changes are proposed to protect reproductive health information?

The legislation tightens use and disclosure rules around PHI related to reproductive services. You must validate the purpose of requests, apply the minimum necessary standard, document lawful bases through attestations, and segment records so reproductive health information is only accessed or disclosed when explicitly authorized.

How must covered entities update their Notice of Privacy Practices?

You need to revise the NPP to explain the special protections for reproductive health information, when disclosures are prohibited or require added safeguards, and how individuals can exercise their rights. Publish the updated NPP across patient touchpoints, make it accessible, and align the language with your internal policies and workforce training.

What new security requirements must business associates follow?

Business associates must meet the same baseline as covered entities: maintain current inventories of systems handling ePHI, follow your Data Encryption Standards, enforce Multi-Factor Authentication Requirements, log and monitor access, and execute Incident Response Procedures that include timely notification. These obligations should be explicit in updated Business Associate Agreements and flowed down to subcontractors.

How often must security assessments be conducted under the new rules?

The legislation expects recurring, risk-based assessments. Practically, you should perform a comprehensive risk analysis at least annually and whenever material changes occur—such as new systems, major integrations, or after significant incidents—while monitoring key controls continuously in between.

Share this article

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Related Articles