Unveiling the Scope: Who is Covered by the HIPAA Security Rule?
The HIPAA Security Rule sets national standards for safeguarding electronic protected health information (ePHI). Understanding who is covered by the HIPAA Security Rule helps you determine obligations, manage risk, and prioritize safeguards across people, processes, and technology.
Covered Entities Under HIPAA
Who the Security Rule applies to
The Security Rule applies to covered entities that create, receive, maintain, or transmit ePHI. Covered entities include health plans, healthcare clearinghouses, and healthcare providers who conduct HIPAA-standard electronic transactions such as claims or eligibility checks.
Types of covered entities
Health plans encompass insurers, HMOs, government programs, and certain employer-sponsored plans. Healthcare providers include hospitals, clinics, physicians, dentists, pharmacies, and telehealth providers when they transmit standardized electronic transactions. Clearinghouses transform health data between formats on behalf of other entities.
Special situations and boundaries
Hybrid entities may designate specific healthcare components as covered, while their non‑health operations remain outside HIPAA. Organized health care arrangements can share ePHI for joint activities. Common carriers that merely transport information as conduits are generally not covered entities, but most service relationships handling ePHI fall under business associate rules.
Business Associates Roles and Responsibilities
Who qualifies as a business associate
Business associates are vendors or partners that create, receive, maintain, or transmit ePHI on behalf of a covered entity or for services regulated by HIPAA. Subcontractors that handle ePHI for a business associate inherit the same obligations.
Core responsibilities under the Security Rule
Business associates must perform a risk analysis, implement administrative safeguards, physical safeguards, and technical safeguards, and maintain written security policies. They must report security incidents and breaches, and ensure downstream subcontractors implement equivalent protections for ePHI.
Contracts and oversight
Before sharing ePHI, covered entities must execute business associate agreements that define permitted uses, safeguards, breach reporting timelines, and termination rights. Ongoing oversight includes vetting vendors, monitoring performance, and updating agreements as systems and risks change.
Ready to simplify HIPAA compliance?
Join thousands of organizations that trust Accountable to manage their compliance needs.
Administrative Safeguards for Compliance
Program foundations
- Risk analysis and risk management: identify threats, assess likelihood and impact, select measures to reduce risk to reasonable and appropriate levels.
- Assigned security responsibility: appoint a security official to develop and enforce the program.
- Policies, procedures, and documentation: maintain, implement, review periodically, and retain required records.
Workforce and access controls
- Workforce security and sanction policy to authorize, supervise, and discipline as needed.
- Information access management using role-based access and the minimum necessary principle.
- Security awareness and training, including phishing resistance and secure handling of ePHI.
Preparedness and response
- Security incident procedures to detect, report, and mitigate events promptly.
- Contingency planning: data backups, disaster recovery, and emergency operations with periodic testing.
- Periodic evaluations of technical and nontechnical safeguards to reflect environmental or operational changes.
Physical Safeguards Implementation
Facility and environment controls
- Facility access controls such as badges, logs, visitor management, and emergency access procedures.
- Environmental measures like locked server rooms, surveillance where appropriate, and resilient power/cooling.
Workstations and devices
- Workstation use and security standards addressing screen locking, privacy screens, and secure locations.
- Device and media controls for inventory, secure disposal, media reuse, and verified destruction of ePHI.
- Protections for laptops and mobile devices, including encryption and cable locks when applicable.
Remote and hybrid work
- Defined requirements for home offices, including secure Wi‑Fi, restricted access areas, and approved storage.
- Procedures for lost or stolen devices and rapid revocation of access.
Technical Safeguards and Security Measures
Access and authentication
- Access controls with unique user IDs, least privilege, emergency access, and automatic logoff.
- Strong authentication, preferably multi‑factor, for systems containing ePHI.
Integrity and auditability
- Audit controls to log access and changes, with centralized monitoring and alerting.
- Integrity controls that detect unauthorized alteration, including hashing and tamper‑evident storage.
Transmission and storage security
- Transmission security using modern encryption for data in motion.
- Encryption and key management for data at rest across servers, backups, and cloud services.
- Segmentation, patching, endpoint protection, and secure configuration baselines.
Enforcement and Penalties by OCR
How Office for Civil Rights enforcement works
The Department of Health and Human Services Office for Civil Rights investigates complaints, breach reports, and targeted compliance reviews. OCR may request policies, risk analyses, audit logs, training records, and evidence of implemented safeguards.
Penalties and corrective actions
Outcomes range from technical assistance to resolution agreements with corrective action plans and monitoring, civil monetary penalties based on a tiered structure, and in certain cases referral for criminal enforcement. Factors include the nature and duration of violations, the number of individuals affected, and the entity’s diligence and cooperation.
Reducing enforcement risk
- Complete and update risk analyses; remediate prioritized findings with timelines and proof of implementation.
- Execute and maintain business associate agreements; verify vendor safeguards.
- Train the workforce, document everything, and report incidents promptly with thorough investigation and mitigation.
Scope of Electronic Protected Health Information
What counts as ePHI
Electronic protected health information is individually identifiable health information in electronic form held by a covered entity or business associate. It includes data that relates to past, present, or future health status, care, or payment and that identifies or could identify an individual.
Common locations of ePHI
- Electronic health records, billing and claims systems, patient portals, telehealth platforms, and secure messaging.
- Emails, texts, images, medical device outputs, backups, cloud storage, logs, and analytics repositories containing identifiers.
What is not ePHI
De‑identified information meeting HIPAA standards is not ePHI. Employment records held by a covered entity in its role as employer and education records protected by other laws also fall outside the Security Rule. Consumer health data not handled by covered entities or business associates may be outside HIPAA but still requires careful stewardship.
Ready to simplify HIPAA compliance?
Join thousands of organizations that trust Accountable to manage their compliance needs.