What HIPAA-Covered Entities Must Do to Keep Patient Data Private

Check out the new compliance progress tracker


Product Pricing Demo Video Free HIPAA Training
LATEST
video thumbnail
Admin Dashboard Walkthrough Jake guides you step-by-step through the process of achieving HIPAA compliance
Ready to get started? Book a demo with our team
Talk to an expert

What HIPAA-Covered Entities Must Do to Keep Patient Data Private

Kevin Henry

HIPAA

January 17, 2025

6 minutes read
Share this article
What HIPAA-Covered Entities Must Do to Keep Patient Data Private

To keep patient data private, you must combine strong governance with practical controls that protect Protected Health Information (PHI) and Electronic Protected Health Information across people, processes, and technology. The steps below align with Privacy Rule Compliance and the HIPAA Security Rule so you can demonstrate due diligence and readiness.

Implement Administrative Safeguards

Assign responsibility and build governance

Designate a privacy officer and a security officer to own your compliance program. Define decision rights, escalation paths, and a cadence for risk reviews and policy updates so accountability is clear.

Perform risk analysis and maintain documentation

Complete an enterprise-wide risk analysis that inventories systems handling PHI and Electronic Protected Health Information, evaluates threats and vulnerabilities, and ranks likelihood and impact. Keep thorough Risk Analysis Documentation and update it after major changes, incidents, or at least annually.

Create policies, procedures, and Workforce Training Requirements

Publish policies for access, acceptable use, incident response, data retention, and sanctions. Translate them into step-by-step procedures. Provide role-based training at hire and annually, track completion, and test understanding with scenarios and phishing simulations.

Manage third parties with Business Associate Agreements

Identify vendors and affiliates that handle PHI and execute Business Associate Agreements before sharing data. BAAs should define permitted uses, safeguard expectations, subcontractor flow-downs, breach reporting timelines, and return-or-destroy requirements at contract end.

Plan for continuity and incident response

Adopt contingency plans covering data backup, disaster recovery, and emergency modes of operation. Maintain an incident response plan that defines triage, containment, eradication, recovery, and post-incident reviews with documented lessons learned.

Enforce Technical Safeguards

Harden access to systems and data

Use unique IDs, strong authentication, and multi-factor authentication for all remote and privileged access. Implement least-privilege, role-based access controls and automatic session timeouts to reduce unauthorized exposure.

Encrypt Electronic Protected Health Information

Encrypt ePHI in transit and at rest using modern, well-configured cryptography. Apply secure email, VPNs, and disk/database encryption; protect encryption keys with dedicated key management and strict separation of duties.

Monitor, log, and audit

Enable audit controls on EHRs, applications, and databases to record access and changes to PHI. Centralize logs, alert on anomalies, and review them regularly. Retain logs long enough to support investigations and compliance inquiries.

Preserve integrity and availability

Use hashing, digital signatures, and application controls to prevent unauthorized alteration. Patch systems promptly, segment networks, and maintain tested backups to ensure you can restore ePHI quickly after an incident.

Apply Physical Safeguards

Secure facilities

Restrict access to data centers, wiring closets, and file storage with badge controls, visitor logs, and surveillance. Establish procedures for emergencies that balance safety with protection of PHI.

Protect workstations and screens

Position monitors away from public view, enable privacy screens, and enforce automatic locking. Define where devices may be used, preventing PHI exposure in uncontrolled locations.

Control devices and media

Keep an asset inventory, track custody, and sanitize or destroy media before reuse or disposal. Use locked storage for removable media and disable unnecessary ports on clinical workstations.

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Adhere to Minimum Necessary Standard

Limit access by role and purpose

Grant only the information needed to perform a task, not blanket access to full records. Document decision criteria so auditors can see how the Minimum Necessary Standard is applied in daily operations.

Differentiate routine and non-routine disclosures

For routine disclosures, predefine what data elements are necessary. For non-routine requests, require case-by-case review and approval to ensure the scope is narrowly tailored.

Use de-identification and limited data sets

When full identifiers are not required, provide a limited data set or de-identified information. This supports Privacy Rule Compliance while enabling analytics and quality improvement.

Comply with Breach Notification Requirements

Define and assess breaches

A breach is an impermissible acquisition, access, use, or disclosure of unsecured PHI. Conduct a risk assessment to evaluate the probability of compromise based on the nature of data, recipient, whether it was actually viewed, and mitigation steps.

Execute timely Data Breach Notification

Notify affected individuals without unreasonable delay and within the required timeframes. When thresholds are met, notify regulators and, where applicable, the media. Include what happened, what information was involved, steps you are taking, and how individuals can protect themselves.

Document and improve

Maintain incident records, decision rationales, and copies of notices. Use post-incident reviews to strengthen controls, update policies, and retrain staff where process gaps were found.

Understand Enforcement and Penalties

Know who enforces and what they evaluate

The federal civil rights regulator reviews complaints, breach reports, and audit results. Investigations focus on your risk analysis, risk management, policies, technical controls, and training—along with how promptly and completely you remediate issues.

Penalty tiers and factors

Civil penalties scale across tiers based on your level of diligence, from reasonable cause to willful neglect. Aggravating factors include prolonged noncompliance, repeated violations, and harm; mitigating factors include cooperation, prompt correction, and strong Risk Analysis Documentation.

Resolution agreements and corrective action plans

Investigations may result in settlement agreements requiring multi-year corrective action plans, monitoring, and reporting. Business associates can be directly liable, and state authorities may also enforce applicable laws.

In practice, you succeed by making privacy and security routine: document risks, train your people, limit access under the Minimum Necessary Standard, encrypt ePHI, monitor activity, verify vendors with solid Business Associate Agreements, and respond quickly and transparently to incidents.

FAQs

What are the key administrative safeguards under HIPAA?

They include a documented, enterprise-wide risk analysis and ongoing risk management; written policies and procedures; Workforce Training Requirements with tracking and sanctions for violations; designated privacy and security officers; contingency planning and incident response; and vendor oversight through Business Associate Agreements and periodic assessments.

How must breaches of PHI be reported?

After assessing the probability of compromise, notify affected individuals without unreasonable delay and within required deadlines. Include clear explanations, the PHI involved, protective steps, and contacts. For larger incidents, submit regulator notices—and when applicable, public notices—to satisfy Data Breach Notification obligations, and retain complete documentation.

What penalties apply for HIPAA noncompliance?

Civil monetary penalties are tiered based on culpability, with higher amounts for willful neglect and failure to correct. Remedies can include resolution agreements, corrective action plans, and multi-year monitoring. Criminal penalties may apply for knowingly obtaining or disclosing PHI for prohibited purposes.

How does the minimum necessary standard limit PHI use?

It requires you to limit uses, disclosures, and requests to the least amount of PHI needed to accomplish a specific purpose. You implement it with role-based access, predefined data sets for routine disclosures, documented approvals for exceptions, and reliance on de-identified or limited data sets whenever full identifiers are not essential.

Share this article

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Related Articles