Table of Contents
- HIPAA Compliance: The Complete Guide for Healthcare Organizations and Business Associates
- What HIPAA Is β and What It Actually Covers
- Who HIPAA Applies To
- The Four Safeguard Categories
- The Security Risk Analysis β Where Most Organizations Fall Short
- Patient Rights Under the Privacy Rule
- What Qualifies as a Reportable Breach
- The 2026 Security Rule Update β What's Changing
- OCR Enforcement: What Triggers Investigations and What They Cost
- Business Associate Agreements β What They Must Include and Where They Fail
- Workforce Training β What "Annual Training" Actually Requires
- State Laws That Exceed HIPAA
- HIPAA and Cyber Insurance
- What a Functioning HIPAA Compliance Program Looks Like
- The Role of an MSP in HIPAA Compliance
- Where to Start
- Frequently Asked Questions
- 1. Does HIPAA apply to small medical practices with only a few employees?
- 2. What is the difference between a HIPAA Privacy Officer and a Security Officer?
- 3. How long does it take to build a HIPAA compliance program from scratch?
- 4. What does OCR ask for during a HIPAA investigation?
- 5. Are emails and text messages subject to HIPAA requirements?
- 6. Which vendors require a Business Associate Agreement under HIPAA?
- 7. How long must HIPAA compliance documentation be retained?
- 8. Can OCR issue penalties for HIPAA violations even when no data breach occurred?
- 9. How does the 2026 HIPAA Security Rule update affect Microsoft 365 users?
- 10. How does HIPAA compliance affect cyber insurance premiums and eligibility?
HIPAA Compliance: The Complete Guide for Healthcare Organizations and Business Associates
HIPAA compliance is not a certification you earn and move on from. There is no HIPAA certificate issued by HHS, no single audit that clears you for three years. It is an ongoing operational requirement β one that OCR enforces more aggressively each year, and one that the proposed 2026 Security Rule overhaul is about to make considerably more demanding.
This guide covers the full scope of what HIPAA requires: who it applies to, what the four rules demand in practice, how OCR enforces violations, what the 2026 Security Rule update changes, how to determine whether an incident is reportable, how state laws add obligations on top of the federal baseline, and what a compliance program that holds up to scrutiny actually looks like. Each section links to deeper coverage where the topic warrants it.
Topics covered separately: HIPAA Risk Analysis vs. Risk Assessment | HIPAA compliance budget planning | HIPAA fixed-cost compliance scams
What HIPAA Is β and What It Actually Covers
The Health Insurance Portability and Accountability Act was enacted in 1996. The regulatory framework most organizations deal with today β the Privacy Rule, Security Rule, and Breach Notification Rule β came later, built on that foundation through a series of rulemakings running from 2000 through 2013. The HITECH Act of 2009 and the Omnibus Rule of 2013 are the two most consequential amendments: HITECH extended direct HIPAA liability to business associates and significantly increased penalty exposure; the Omnibus Rule formalized those changes into the regulations.
HIPAA's core purpose is protecting Protected Health Information β individually identifiable health information that relates to a person's past, present, or future health condition, healthcare treatment, or payment for care. PHI can be written, oral, or electronic. When PHI is in electronic form it's referred to as ePHI, and it's governed by the Security Rule.
Four rules form the compliance framework:
The Privacy Rule establishes standards for who can use and disclose PHI, what patient rights exist (including the right to access their own records), and how those disclosures must be documented.
The Security Rule requires covered entities and business associates to implement administrative, physical, and technical safeguards to protect ePHI. Until recently, some safeguards were "addressable" β meaning organizations could document an alternative approach. The proposed 2026 update eliminates that flexibility for MFA, encryption, and several other controls.
The Breach Notification Rule requires covered entities to notify affected individuals within 60 days of discovering a breach of unsecured PHI. Breaches affecting 500 or more individuals require simultaneous notification to HHS and local media. Business associates must notify covered entities within 60 days of discovering a breach β and under the proposed 2026 rule, that window tightens to 24 hours for activating an incident response plan.
The Enforcement Rule establishes the procedures and penalty structure OCR uses to investigate complaints and impose sanctions. It defines the four-tier penalty framework and the conditions under which OCR pursues civil monetary penalties versus settlements.
Who HIPAA Applies To
HIPAA divides regulated organizations into two categories: covered entities and business associates.
Covered entities are healthcare providers that conduct certain electronic transactions (any provider that bills electronically), health plans, and healthcare clearinghouses. Medical practices, dental offices, hospitals, health insurance companies, and pharmacies all qualify. Mental health providers, chiropractors, and physical therapists who bill electronically are covered entities β the law does not limit coverage to hospitals or large institutions.
Business associates are where organizations most commonly misjudge their obligations. A business associate is any person or organization that performs a function or activity on behalf of a covered entity that involves creating, receiving, maintaining, or transmitting PHI. The definition is intentionally broad:
IT and managed service providers with access to systems containing patient records are business associates. An MSP that remotely manages servers in a medical practice, monitors endpoints, or provides helpdesk support that touches clinical systems must execute a BAA and comply with the Security Rule directly.
Billing and revenue cycle companies that process claims, submit remittances, or handle patient payment data are business associates. This includes third-party billing companies, clearinghouses, and collections vendors.
Cloud storage and SaaS vendors that store or process ePHI β including Microsoft 365, AWS, and Google Cloud when used to store patient data β are business associates. Each provides a HIPAA BAA, but executing it covers only the provider's infrastructure, not how you configure and use it.
Legal and consulting firms that access PHI in the course of their work β attorneys reviewing records for litigation, compliance consultants performing audits β are business associates when their work involves PHI.
EHR and health IT vendors that host or integrate with patient record systems are business associates. This includes companies providing telehealth platforms, patient portals, and scheduling software connected to clinical systems.
Before the HITECH Act, business associates had no direct HIPAA liability β only contractual obligations. That changed in 2009. Today, business associates are directly subject to the Security Rule and face the same penalty structure as covered entities. OCR has pursued and settled enforcement actions directly against business associates, including a $1.55 million settlement against North Memorial Health Care's contractor for accessing records of 289,904 patients without a BAA in place.
Subcontractors of business associates β organizations that provide services to a business associate involving PHI β are also subject to HIPAA. The compliance obligation extends through the vendor chain regardless of how many layers exist.
The Four Safeguard Categories
The Security Rule organizes required protections into four categories. These are not abstract principles β they translate directly into documented policies, implemented technical controls, and operational procedures that OCR will ask for evidence of during an investigation.
Administrative safeguards are the policies, procedures, and assigned responsibilities that govern your security program. They include the Security Risk Analysis (the single most important and most commonly violated HIPAA requirement), a documented risk management process, a sanctions policy for workforce violations, workforce security training, and an access management process that determines who gets access to what. Administrative safeguards are often where compliance breaks down β organizations implement technical controls but never formalize the written policies and assigned roles the Security Rule requires alongside them.
Physical safeguards govern physical access to systems containing ePHI. Facility access controls, workstation use policies, and device and media controls β including documented processes for disposing of hardware that stored PHI β fall here. Device disposal is one of the most common OCR enforcement findings.
Technical safeguards are the implemented controls on systems: access controls limiting ePHI access to authorized users, audit controls that record system activity, integrity controls that protect ePHI from unauthorized alteration, and transmission security controls protecting ePHI across networks. Under current rules, encryption is addressable. Under the proposed 2026 rule, encryption at rest and in transit becomes mandatory with no addressable alternative.
Organizational requirements primarily concern Business Associate Agreements. A BAA must be executed before any business associate can access PHI on a covered entity's behalf. Required elements under 45 CFR 164.504(e) include: permitted uses of PHI, required safeguards, breach notification obligations, subcontractor compliance provisions, and PHI handling at termination. Executing a BAA once and never reviewing it is one of the most common compliance failures OCR finds β it led to a $400,000 settlement against Care New England Health System for using outdated agreements.
The Security Risk Analysis β Where Most Organizations Fall Short
The HIPAA Security Risk Analysis is required by 45 CFR 164.308(a)(1). It is not optional, not a one-time event, and not satisfied by purchasing security software. It is the documented identification, analysis, and prioritization of risks to the confidentiality, integrity, and availability of ePHI in your environment.
OCR's Risk Analysis Initiative β launched in 2024 and continuing through 2026 β has made inadequate or absent risk analysis the primary enforcement target. A ransomware attack affecting 14,273 patients resulted in a $90,000 settlement specifically because the organization had never conducted a risk analysis. The OCR Director confirmed in early 2026 that the initiative is expanding to include risk management β not just whether a risk analysis exists, but whether the findings were acted on.
A compliant risk analysis covers: identifying all ePHI your organization creates, receives, maintains, or transmits (including ePHI held by third-party vendors); identifying threats to that ePHI; identifying vulnerabilities in your current safeguards; assessing the likelihood and impact of potential threats exploiting those vulnerabilities; and producing a prioritized risk management plan to address identified gaps.
The output must be documented. OCR investigators ask for the written risk analysis, the date it was completed, who conducted it, and evidence that the findings were addressed through your risk management process. Under the proposed 2026 Security Rule update, risk analyses must be conducted and documented annually. The current "periodic" standard is already what most organizations don't fully satisfy.
For a detailed breakdown of the difference between a HIPAA Risk Analysis and a HIPAA Risk Assessment β two terms often used interchangeably but with distinct regulatory meanings β see our guide on HIPAA Risk Analysis vs. Risk Assessment.
Patient Rights Under the Privacy Rule
The Privacy Rule grants patients specific rights over their health information that covered entities must operationalize β not just acknowledge. OCR's enforcement record makes clear that these rights are active enforcement priorities, not aspirational guidelines.
Right of Access. Patients have the right to inspect and obtain copies of their PHI held by a covered entity. The response deadline is 30 days from the request, with one 30-day extension available if the covered entity provides written notice of the delay and the reason for it. OCR's Right of Access enforcement initiative, launched in 2019, has generated more than 50 financial penalties β for failures including missed deadlines, excessive fees, incomplete record production, and outright refusal. Penalties in these cases have ranged from $3,500 to $240,000. The Right of Access initiative is continuing in 2026.
Right to Amend. Patients can request amendments to their PHI if they believe it is inaccurate or incomplete. Covered entities can deny the request under defined circumstances β if the information was not created by the covered entity, if it is accurate and complete, or if it is not part of the designated record set β but the denial and the basis for it must be documented.
Accounting of Disclosures. Patients can request an accounting of certain disclosures of their PHI made in the six years prior to the request. Disclosures for treatment, payment, and healthcare operations are generally exempt, but disclosures for other purposes β law enforcement, public health activities, research without authorization β must be tracked and reported on request.
Minimum Necessary Standard. When using or disclosing PHI, covered entities must make reasonable efforts to limit it to the minimum necessary to accomplish the intended purpose. This is not just a policy requirement β it governs how you configure access controls, how you share records with vendors, and what you transmit in response to requests. Workforce members should access only the PHI needed for their specific role, not a full patient record by default.
What Qualifies as a Reportable Breach
Under the Breach Notification Rule, a breach is presumed whenever PHI is used or disclosed in a manner not permitted by the Privacy Rule. The presumption is rebuttable β but only through a documented four-factor risk assessment that demonstrates a low probability the PHI was compromised. Without that documentation, notification is required.
The four factors, as defined under 45 CFR 164.402:
1. The nature and extent of PHI involved. What types of identifiers were exposed β names, Social Security numbers, financial account numbers, diagnosis codes, treatment information? The more sensitive and re-identifiable the data, the higher the probability of compromise. A misdirected fax containing only appointment dates is lower risk than one containing psychiatric notes and SSNs.
2. The unauthorized person who used or received the PHI. Was it a workforce member who accessed records out of curiosity but has no history of misuse? A third-party vendor with a BAA who received data in error? A criminal actor who obtained access through a phishing attack? The identity and apparent intent of the unauthorized party influences the probability assessment, though a criminal access almost always drives a reportable determination.
3. Whether the PHI was actually acquired or viewed. System logs, access records, and forensic analysis can sometimes establish that data was transmitted to a location but never opened, or that an account was compromised but no PHI directories were accessed. This factor often comes down to the quality of your audit logging β organizations without granular access logs frequently cannot demonstrate that data was not viewed and default to notification.
4. The extent to which risk has been mitigated. Was the misdirected email retrieved and confirmed deleted before being read? Did the recipient sign a destruction attestation? Strong mitigation can support a low-probability determination when the other factors are borderline, but it does not erase the incident. Most mitigation actions in real incidents are incomplete β the horse is already out of the barn before the error is discovered.
The four-factor assessment must be completed and documented regardless of the outcome. If your analysis concludes notification is not required, that documentation is your defense in an OCR investigation. It must be retained for at least six years. Organizations that skip the assessment and notify β which the AMA notes is a permissible option β avoid the documentation burden but lose the ability to demonstrate that systematic reasoning supported a non-notification decision in future incidents.
One common failure mode: treating all incidents as obviously reportable or obviously not reportable without actually conducting the analysis. Both errors create risk. Over-notification erodes patient trust and creates regulatory exposure through inconsistency. Under-notification with no documented rationale is what OCR finds most frequently in enforcement actions following a discovered breach.
The 2026 Security Rule Update β What's Changing
HHS proposed the most significant update to the HIPAA Security Rule since its original adoption. The final rule has been expected in May 2026, with a 240-day compliance window putting enforcement around December 2026 or January 2027. As of May 2026, the final rule has not been published, but organizations that wait for publication to begin preparation will face a compressed implementation window.
The structural change is the elimination of the "required vs. addressable" distinction at 45 CFR 164.306(d). Under the current rule, addressable safeguards give organizations flexibility to implement an alternative or document why the specification is not reasonable. The updated rule removes that flexibility for the controls that matter most.
MFA becomes universal. Multi-factor authentication is required for all access to systems containing ePHI. Narrow exceptions exist for legacy devices under documented migration plans and FDA-approved medical devices predating a specific cutoff date. Any remote access path, admin console, EHR login, or VPN without MFA is a gap under the updated rule. SMS-based MFA satisfies the technical requirement; phishing-resistant options β authenticator apps, FIDO2 hardware keys β reduce actual risk further.
Encryption is mandatory. Encryption of ePHI at rest and in transit moves from addressable to required. Both production and non-production environments containing ePHI are in scope. Databases, laptops, backup media, and email systems must satisfy the requirement. Organizations using Microsoft 365 under a signed BAA get service-side encryption for Exchange Online, SharePoint, OneDrive, and Teams β but endpoint encryption (BitLocker, FileVault) for workstations remains the organization's responsibility.
Vulnerability scanning and penetration testing. Vulnerability scans must be conducted every six months. Annual penetration testing becomes required. For most small and mid-size organizations, neither currently happens on a defined schedule.
Network segmentation. ePHI systems must be segmented from general IT systems and from IoT and connected medical devices. An EHR running on the same network segment as unmanaged devices is a compliance gap under the updated rule.
Incident response timelines tighten. Business associates must notify covered entities within 24 hours of activating an incident response or contingency plan. The 60-day breach notification window for individuals and HHS remains in place, but the early notification requirement demands a practiced, documented response process.
Annual compliance audits and policy reviews. Organizations must conduct and document an internal Security Rule compliance audit at least annually and review policies and procedures at least annually. The current "periodic" standard, which many organizations have used to justify multi-year cycles, is eliminated.
OCR Enforcement: What Triggers Investigations and What They Cost
OCR investigations are triggered three ways: breach reports filed by covered entities and business associates, complaints filed by patients, and OCR-initiated audits. 2024 closed with 22 enforcement actions resulting in settlements or civil monetary penalties. OCR surpassed 50 total enforcement actions in 2026 across its active initiatives.
The penalty structure has four tiers, adjusted annually for inflation. As of 2026:
Tier 1 β Lack of Knowledge: $141 to $36,298 per violation. Applies when the organization had no reasonable way to know about the violation.
Tier 2 β Reasonable Cause: $1,452 to $72,596 per violation. Most common tier for organizations with incomplete compliance programs.
Tier 3 β Willful Neglect (Corrected within 30 days): $14,522 to $72,596 per violation.
Tier 4 β Willful Neglect (Not Corrected): $72,596 per violation, up to $2,177,880 per calendar year for identical violations.
The OCR penalty is rarely the total cost. Breach remediation adds forensic investigation fees, breach notification costs per affected individual, credit monitoring, legal defense, state attorney general actions, and business disruption during investigation and remediation. These costs accumulate independently of whether OCR imposes a civil monetary penalty.
OCR's current enforcement priorities, based on publicly announced actions and OCR Director guidance: risk analysis failures remain the primary target, with the initiative expanding into risk management in 2026. Right of Access violations have generated more than 50 financial penalties since that initiative launched in 2019. Vendor management failures β missing or outdated BAAs β appear regularly. Web tracking technology (pixels, analytics tags, SDKs) that transmits ePHI to third parties without authorization has been a growing focus.
For context on compliance budget planning, see our guide to understanding your HIPAA compliance budget.
Business Associate Agreements β What They Must Include and Where They Fail
A Business Associate Agreement is a contract required by 45 CFR 164.504(e) before any business associate can access PHI on a covered entity's behalf. Executing a BAA does not transfer your compliance liability β it establishes a contractual framework that both parties are responsible for honoring. A covered entity that fails to conduct due diligence on a business associate's security practices, and where a breach then occurs, can still face OCR enforcement regardless of what the BAA says.
Required BAA elements include: permitted uses and disclosures of PHI, safeguard requirements, breach notification timelines, subcontractor compliance obligations, access and amendment rights for patients, accounting of disclosures provisions, HHS access provisions, and PHI handling at contract termination. Under the proposed 2026 Security Rule update, BAAs must include specific cybersecurity obligations and annual verification requirements β covered entities will need to confirm business associate compliance annually through questionnaires, attestations, or audit reports.
The most common BAA failures: executing them once and never reviewing them as the relationship or regulatory requirements evolve; omitting subcontractor flow-down provisions; treating BAA execution as the end of vendor management rather than the beginning. OCR's enforcement record includes the North Memorial Health Care $1.55 million settlement, Raleigh Orthopaedic Clinic's $750,000 settlement for transferring PHI to a vendor without a BAA, and Care New England's $400,000 settlement for using outdated agreements.
Cloud service providers β Microsoft, AWS, Google Cloud β each provide a HIPAA BAA. These agreements cover the provider's infrastructure. They do not cover how your organization uses that infrastructure, who has access to ePHI within your tenant, or whether your configurations satisfy HIPAA's technical safeguards.
Workforce Training β What "Annual Training" Actually Requires
HIPAA requires workforce training on policies and procedures at hire and "periodically thereafter." OCR interprets periodic as at least annually, and has made clear in enforcement guidance that a one-time general HIPAA awareness video does not satisfy the requirement. Training must cover your organization's specific policies and procedures β not generic HIPAA awareness β and must be documented with dates, topics covered, and attendees.
The proposed 2026 Security Rule update requires that when policies are updated β which must happen at least annually β training on the updated policies must follow. This creates an operational cycle: annual risk analysis, updated policies based on findings, training on updated policies, documentation of all three.
Security awareness training must address phishing, malicious software, login monitoring, and password management. Recurring simulated phishing with documented results reduces actual risk and is what cyber insurers ask for evidence of at renewal.
State Laws That Exceed HIPAA
HIPAA is a federal floor. When a state law provides greater privacy protections or grants individuals more rights than HIPAA, the stricter state standard applies. For organizations operating in California, Texas, or with patients in multiple states, this means compliance with HIPAA alone is not enough.
California (CMIA and CPRA). California's Confidentiality of Medical Information Act applies broadly to providers, health plans, contractors, and many consumer-facing digital health applications. Where HIPAA permits certain disclosures for treatment, payment, and healthcare operations without patient authorization, CMIA imposes stricter consent requirements for many of those same disclosures. A key practical difference: CMIA includes a private right of action β patients can sue for negligent, unauthorized disclosures without needing to show intent to harm. California providers must also respond to record access requests faster than HIPAA's 30-day standard. The California Privacy Rights Act (CPRA) adds obligations for health-related data that falls outside HIPAA's definition of PHI β data from wellness apps, fitness trackers, and consumer health platforms.
Texas (HB 300). Texas HB 300 defines "covered entity" more broadly than HIPAA β any entity handling PHI in Texas, not just traditional healthcare providers and insurers. It requires patient authorization for electronic disclosures of PHI outside the covered entity, beyond what HIPAA permits without consent. Penalties run up to $250,000 per intentional violation, with a maximum of $1.5 million per year for patterns of noncompliance. Employees of Texas-based HIPAA covered entities must complete both HIPAA training and HB 300-specific training. A Texas data breach can generate separate penalties under both HIPAA and HB 300.
New York. New York's SHIELD Act imposes breach notification and data security requirements that apply to any organization handling the private information of New York residents β not just covered entities. The proposed New York Health Information Privacy Act, which would have significantly expanded health data protections, was vetoed by Governor Hochul in December 2025, leaving the SHIELD Act as the primary state-level overlay for most New York organizations.
Other states are moving in the same direction. Washington's My Health My Data Act, Virginia's amended Consumer Protection Act, and Connecticut's SB 3 all add obligations for health and health-adjacent data beyond HIPAA's scope. For organizations serving patients across multiple states, the compliance analysis needs to account for where patients are located, not just where the organization is based. This is a legal question β state law applicability in healthcare is fact-specific β and warrants counsel review for any organization with multi-state operations.
HIPAA and Cyber Insurance
HIPAA's technical safeguard requirements β MFA, encryption, access controls, audit logging, incident response β map directly onto what cyber insurers require before they will quote. This overlap is useful: evidence gathered for HIPAA compliance often satisfies underwriting requirements simultaneously. Organizations that treat HIPAA compliance and cyber insurance preparation as separate programs duplicate effort.
The controls that determine cyber insurance eligibility β MFA on email and remote access, EDR on all endpoints, immutable backups with tested restores, a written and tested incident response plan, recurring phishing simulation β are the same controls OCR looks for evidence of in enforcement actions. A well-documented HIPAA security program produces the proof pack that underwriters ask for: MFA coverage reports, EDR agent health exports, patch compliance summaries, IR tabletop documentation.
Healthcare organizations consistently pay higher cyber insurance premiums than other sectors due to breach severity and regulatory exposure. The 2026 Security Rule update, by making MFA, encryption, and annual penetration testing mandatory rather than addressable, is likely to tighten the alignment between HIPAA compliance and insurance eligibility further. Organizations that meet the updated Security Rule requirements will, by definition, satisfy the baseline controls most insurers require for favorable terms. For a detailed breakdown of what insurers require and how HIPAA documentation serves double duty, see our guide to cyber insurance requirements.
What a Functioning HIPAA Compliance Program Looks Like
A compliance program that holds up to OCR scrutiny has eight operational components running continuously β not activated in response to a breach or audit notice.
Designated Privacy and Security Officers. HIPAA requires a named Privacy Officer responsible for policies and procedures, and a named Security Officer responsible for the security program. In smaller organizations, one person can hold both roles. Accountability must be assigned and documented.
Annual Security Risk Analysis. Documented, current, and tied to a risk management plan with open items tracked to closure. A working document that reflects your actual environment and informs security investment decisions β not a report filed and forgotten.
Current, accurate policies and procedures. Reviewed at least annually and updated to reflect changes in your environment, your vendor relationships, and the regulatory requirements. Policies that describe an environment that no longer exists fail the documentation review in an OCR investigation.
Executed and current BAAs. For every vendor with access to PHI. Reviewed when the regulatory environment changes β which is happening now with the 2026 Security Rule update β and when vendor relationships materially change. Tracked in a centralized inventory.
Workforce training. Annual at minimum, with documentation. Phishing simulation integrated into the program. Training on updated policies when policies change.
Implemented technical safeguards. MFA on all systems accessing ePHI. Encryption at rest and in transit. Access controls with documented authorization procedures. Audit logging with defined retention. Written and tested incident response plan.
Breach response capability. A written, tested incident response plan that covers the Breach Notification Rule requirements β including the four-factor assessment process, notification timelines, and designated responsibility for each step. Organizations that improvise breach response after an incident pay more, notify less accurately, and face greater OCR scrutiny.
Ongoing monitoring. Vulnerability scans on a documented schedule. Patch management with defined SLAs for critical vulnerabilities. System activity log review. Periodic review of user access rights. Operational cadence, not one-time activities.
The Role of an MSP in HIPAA Compliance
A managed IT provider with access to systems containing ePHI is a business associate. That means the MSP must execute a BAA, is directly subject to HIPAA's Security Rule, and can face OCR enforcement for violations independent of the covered entity they serve.
For healthcare organizations evaluating MSP relationships: your MSP's security practices become part of your compliance posture. An MSP that cannot produce its own documented security controls, cannot generate the evidence packages OCR asks for, and cannot demonstrate its own Security Rule compliance is a liability in your next compliance review or OCR investigation.
A provider that has structured its security stack around HIPAA requirements can deploy the technical safeguards, generate compliance documentation, and support the annual risk analysis process β reducing the operational burden on internal staff while improving the defensibility of the compliance program. What to evaluate when selecting that provider is covered in our guide to choosing a managed IT provider.
For more on what vendors commonly misrepresent when selling HIPAA compliance services, see our breakdown of HIPAA compliance fixed-cost scams.
Where to Start
Every HIPAA compliance program starts in the same place: a Security Risk Analysis that establishes your current posture against the Security Rule requirements and produces a documented, prioritized remediation plan. Without it, every estimate of your compliance gap is guesswork β and the absence of a documented risk analysis is the most common finding in OCR enforcement actions.
If you have a risk analysis on file, the next question is whether it reflects your current environment. Systems change. Vendors change. The regulatory requirements are changing with the 2026 Security Rule update. A risk analysis conducted years ago on a different infrastructure is not a current, defensible compliance document.
Stratify IT works with healthcare organizations and business associates on HIPAA compliance programs: Security Risk Analysis, gap remediation, policy and procedure development, BAA review, technical safeguard implementation, and ongoing monitoring. We operate as a business associate and execute BAAs as a standard part of every healthcare engagement.
Contact us to discuss where your organization stands, or explore our HIPAA compliance services to understand how we structure engagements.
Frequently Asked Questions
Size does not determine HIPAA applicability β the nature of the data does. Any healthcare provider that transmits health information electronically for billing is a covered entity, regardless of staff count. A solo practitioner using electronic scheduling and billing software carries the same Security Rule obligations as a hospital. The requirements do not scale down for small practices, though program complexity can reflect organizational size.
The Privacy Officer owns policies governing how PHI is used and disclosed β patient rights, privacy training, complaint handling. The Security Officer owns the safeguards protecting ePHI β risk analysis, technical controls, incident response. In smaller organizations, one person commonly holds both roles. What matters is that the responsibilities are formally assigned and documented, not that separate individuals fill each title.
Three to six months is realistic for a small to mid-size organization starting from nothing. The timeline depends on how many systems contain ePHI, how many vendors require BAAs, and whether technical gaps β missing MFA, unencrypted devices β need remediation before documentation can be finalized. Organizations with existing security programs can move faster; those with no prior compliance work typically need the full range.
OCR begins with a document request: written policies and procedures, the Security Risk Analysis, workforce training records, BAA inventory, and evidence that identified risks were addressed. Document review is followed by written questions and sometimes on-site visits. OCR prefers settlements with corrective action plans over civil monetary penalties β but both require producing documentation that many organizations discover they cannot locate.
Yes, when they contain PHI. Neither channel is prohibited, but transmitting PHI through unencrypted email or SMS requires patient acknowledgment of the risk. Covered entities using standard email for clinical communications β lab results, treatment instructions β should use encrypted platforms with a signed BAA. Standard Gmail and consumer SMS are not appropriate environments for ePHI without additional controls and agreements.
Any vendor whose work involves creating, receiving, maintaining, or transmitting PHI on your behalf β IT providers, billing companies, cloud storage vendors, attorneys handling patient records, transcription services. The test is whether PHI touches their systems or people. The common mistake is limiting BAAs to IT vendors while overlooking legal firms and billing services that handle records routinely. Vendors with no PHI contact do not require a BAA.
Six years from creation or from when the document was last in effect, whichever is later. This covers policies and procedures, Security Risk Analyses, training records, BAAs, and breach documentation. The six-year rule applies to compliance records β not medical records, which follow state law. A risk analysis from 2018 that was never updated cannot demonstrate current compliance regardless of how long it has been retained.
Yes. HIPAA enforcement does not require a breach. Failing to conduct a Security Risk Analysis, missing BAAs with PHI-accessing vendors, failing to provide patients their records within 30 days, or skipping annual workforce training are all enforceable violations. OCR has issued financial penalties against organizations with no breach history, based solely on compliance program deficiencies found during complaint investigations or audits.
A signed Microsoft 365 BAA covers service-side encryption for Exchange Online, SharePoint, OneDrive, and Teams. It does not cover endpoint encryption for workstations, MFA enforcement through Conditional Access, or audit log configuration and retention β those remain the organization's responsibility. Having a Microsoft BAA satisfies the infrastructure layer of the updated rule; the configuration and governance layer requires separate action.
The technical controls HIPAA requires β MFA, encryption, access controls, audit logging, tested incident response β are the same baseline controls cyber insurers require. A documented HIPAA security program produces the evidence underwriters ask for: risk analysis records, MFA coverage reports, BAA inventory, IR tabletop documentation. Organizations without a functioning compliance program typically face higher premiums, coverage exclusions, or denial for the same gaps that create HIPAA enforcement exposure.