Unveiling the Scope: Who is Covered by the HIPAA Security Rule?

Check out the new compliance progress tracker


Product Pricing Demo Video Free HIPAA Training
LATEST
video thumbnail
Admin Dashboard Walkthrough Jake guides you step-by-step through the process of achieving HIPAA compliance
Ready to get started? Book a demo with our team
Talk to an expert

Unveiling the Scope: Who is Covered by the HIPAA Security Rule?

Kevin Henry

HIPAA

January 17, 2024

6 minutes read
Share this article
Unveiling the Scope: Who is Covered by the HIPAA Security Rule?

The HIPAA Security Rule sets national standards for safeguarding electronic protected health information (ePHI). Understanding who is covered by the HIPAA Security Rule helps you determine obligations, manage risk, and prioritize safeguards across people, processes, and technology.

Covered Entities Under HIPAA

Who the Security Rule applies to

The Security Rule applies to covered entities that create, receive, maintain, or transmit ePHI. Covered entities include health plans, healthcare clearinghouses, and healthcare providers who conduct HIPAA-standard electronic transactions such as claims or eligibility checks.

Types of covered entities

Health plans encompass insurers, HMOs, government programs, and certain employer-sponsored plans. Healthcare providers include hospitals, clinics, physicians, dentists, pharmacies, and telehealth providers when they transmit standardized electronic transactions. Clearinghouses transform health data between formats on behalf of other entities.

Special situations and boundaries

Hybrid entities may designate specific healthcare components as covered, while their non‑health operations remain outside HIPAA. Organized health care arrangements can share ePHI for joint activities. Common carriers that merely transport information as conduits are generally not covered entities, but most service relationships handling ePHI fall under business associate rules.

Business Associates Roles and Responsibilities

Who qualifies as a business associate

Business associates are vendors or partners that create, receive, maintain, or transmit ePHI on behalf of a covered entity or for services regulated by HIPAA. Subcontractors that handle ePHI for a business associate inherit the same obligations.

Core responsibilities under the Security Rule

Business associates must perform a risk analysis, implement administrative safeguards, physical safeguards, and technical safeguards, and maintain written security policies. They must report security incidents and breaches, and ensure downstream subcontractors implement equivalent protections for ePHI.

Contracts and oversight

Before sharing ePHI, covered entities must execute business associate agreements that define permitted uses, safeguards, breach reporting timelines, and termination rights. Ongoing oversight includes vetting vendors, monitoring performance, and updating agreements as systems and risks change.

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Administrative Safeguards for Compliance

Program foundations

  • Risk analysis and risk management: identify threats, assess likelihood and impact, select measures to reduce risk to reasonable and appropriate levels.
  • Assigned security responsibility: appoint a security official to develop and enforce the program.
  • Policies, procedures, and documentation: maintain, implement, review periodically, and retain required records.

Workforce and access controls

  • Workforce security and sanction policy to authorize, supervise, and discipline as needed.
  • Information access management using role-based access and the minimum necessary principle.
  • Security awareness and training, including phishing resistance and secure handling of ePHI.

Preparedness and response

  • Security incident procedures to detect, report, and mitigate events promptly.
  • Contingency planning: data backups, disaster recovery, and emergency operations with periodic testing.
  • Periodic evaluations of technical and nontechnical safeguards to reflect environmental or operational changes.

Physical Safeguards Implementation

Facility and environment controls

  • Facility access controls such as badges, logs, visitor management, and emergency access procedures.
  • Environmental measures like locked server rooms, surveillance where appropriate, and resilient power/cooling.

Workstations and devices

  • Workstation use and security standards addressing screen locking, privacy screens, and secure locations.
  • Device and media controls for inventory, secure disposal, media reuse, and verified destruction of ePHI.
  • Protections for laptops and mobile devices, including encryption and cable locks when applicable.

Remote and hybrid work

  • Defined requirements for home offices, including secure Wi‑Fi, restricted access areas, and approved storage.
  • Procedures for lost or stolen devices and rapid revocation of access.

Technical Safeguards and Security Measures

Access and authentication

  • Access controls with unique user IDs, least privilege, emergency access, and automatic logoff.
  • Strong authentication, preferably multi‑factor, for systems containing ePHI.

Integrity and auditability

  • Audit controls to log access and changes, with centralized monitoring and alerting.
  • Integrity controls that detect unauthorized alteration, including hashing and tamper‑evident storage.

Transmission and storage security

  • Transmission security using modern encryption for data in motion.
  • Encryption and key management for data at rest across servers, backups, and cloud services.
  • Segmentation, patching, endpoint protection, and secure configuration baselines.

Enforcement and Penalties by OCR

How Office for Civil Rights enforcement works

The Department of Health and Human Services Office for Civil Rights investigates complaints, breach reports, and targeted compliance reviews. OCR may request policies, risk analyses, audit logs, training records, and evidence of implemented safeguards.

Penalties and corrective actions

Outcomes range from technical assistance to resolution agreements with corrective action plans and monitoring, civil monetary penalties based on a tiered structure, and in certain cases referral for criminal enforcement. Factors include the nature and duration of violations, the number of individuals affected, and the entity’s diligence and cooperation.

Reducing enforcement risk

  • Complete and update risk analyses; remediate prioritized findings with timelines and proof of implementation.
  • Execute and maintain business associate agreements; verify vendor safeguards.
  • Train the workforce, document everything, and report incidents promptly with thorough investigation and mitigation.

Scope of Electronic Protected Health Information

What counts as ePHI

Electronic protected health information is individually identifiable health information in electronic form held by a covered entity or business associate. It includes data that relates to past, present, or future health status, care, or payment and that identifies or could identify an individual.

Common locations of ePHI

  • Electronic health records, billing and claims systems, patient portals, telehealth platforms, and secure messaging.
  • Emails, texts, images, medical device outputs, backups, cloud storage, logs, and analytics repositories containing identifiers.

What is not ePHI

De‑identified information meeting HIPAA standards is not ePHI. Employment records held by a covered entity in its role as employer and education records protected by other laws also fall outside the Security Rule. Consumer health data not handled by covered entities or business associates may be outside HIPAA but still requires careful stewardship.

Share this article

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Related Articles