What is HIPAA Compliance

HIPAA compliance means adhering to the Health Insurance Portability and Accountability Act's requirements for protecting patient health information through administrative, physical, and technical safeguards. For third-party risk management, it requires ensuring vendors who access, store, or transmit protected health information (PHI) maintain equivalent security controls and sign business associate agreements (BAAs).

Key takeaways:

  • HIPAA applies to covered entities (healthcare providers, health plans, clearinghouses) and their business associates
  • Requires documented safeguards across administrative, physical, and technical controls
  • Business Associate Agreements (BAAs) are mandatory for third-party vendors handling PHI
  • Violations carry penalties ranging from $100 to $50,000 per record, up to $1.5M annually
  • Control mapping to NIST 800-66 provides the implementation framework

HIPAA compliance represents a critical control requirement for any organization handling protected health information, whether as a covered entity or business associate. The regulation mandates specific security and privacy controls that directly impact vendor risk assessments, contract requirements, and ongoing monitoring protocols.

For compliance officers managing third-party relationships, HIPAA introduces unique challenges: vendors must demonstrate equivalent security postures, maintain audit-ready documentation, and accept liability through BAAs. Unlike general security frameworks, HIPAA carries statutory penalties and requires specific contractual language that cannot be negotiated away.

The regulation's reach extends beyond traditional healthcare settings. Technology vendors, cloud providers, payment processors, and even janitorial services accessing areas with PHI fall under HIPAA's scope. This broad applicability makes HIPAA compliance a frequent requirement in vendor assessments, particularly when evaluating SaaS platforms, data processors, or any service provider with potential PHI exposure.

Core Components of HIPAA Compliance

HIPAA compliance centers on three primary rules that govern PHI handling:

Privacy Rule (45 CFR Part 160, 164 Subparts A and E)

  • Establishes national standards for PHI use and disclosure
  • Defines minimum necessary standards for information access
  • Grants patients rights to access and amend their health records
  • Requires privacy notices and consent procedures

Security Rule (45 CFR Part 160, 164 Subparts A and C)

  • Mandates administrative safeguards (54% of requirements)
  • Specifies physical safeguards (10% of requirements)
  • Details technical safeguards (36% of requirements)
  • Requires risk assessments and management processes

Breach Notification Rule (45 CFR Part 164 Subpart D)

  • Defines breach thresholds and notification timelines
  • Requires notification within 60 days to affected individuals
  • Mandates HHS notification within 60 days
  • Media notification required for breaches affecting 500+ individuals

Administrative Safeguards in Practice

Administrative safeguards form the backbone of HIPAA compliance programs. These controls require formal documentation and regular updates:

Security Officer Designation: Organizations must appoint a dedicated security official responsible for developing and implementing security policies. In vendor assessments, verify this role exists and has appropriate authority.

Workforce Training: Annual HIPAA training with documented completion records. When evaluating vendors, request training completion rates and curriculum outlines. Red flag: generic security awareness training without HIPAA-specific modules.

Access Management: Role-based access controls with documented authorization procedures. Vendors should demonstrate:

  • Unique user identification systems
  • Automatic logoff procedures
  • Encryption for data at rest and in transit
  • Access review processes (minimum quarterly)

Risk Assessment Requirements: NIST 800-66 provides the accepted methodology:

  1. Asset inventory including all PHI repositories
  2. Threat identification using current threat intelligence
  3. Vulnerability assessment with technical validation
  4. Risk determination using likelihood x impact matrices
  5. Risk mitigation planning with implementation timelines

Technical Safeguards Implementation

Technical controls under HIPAA map directly to common security frameworks but with PHI-specific requirements:

Access Controls (45 CFR 164.312(a))

  • Unique user identification (no shared accounts)
  • Automatic logoff (recommended: 15 minutes)
  • Encryption requirements:
    • AES-256 for data at rest
    • TLS 1.2+ for data in transit
    • Key management procedures documented

Audit Controls (45 CFR 164.312(b))

  • Logging requirements:
    • User ID, timestamp, action performed
    • PHI accessed or modified
    • Source IP and application used
  • Log retention: 6 years minimum
  • Log review: Monthly at minimum, weekly preferred

Integrity Controls (45 CFR 164.312(c))

  • Electronic mechanisms to verify PHI hasn't been altered
  • Common implementations:
    • Database checksums
    • Digital signatures
    • Version control with audit trails
    • Backup verification procedures

Business Associate Agreement Requirements

BAAs represent the primary mechanism for extending HIPAA compliance to third parties. Key contractual elements include:

Required Provisions:

  1. Permitted uses and disclosures limited to contract terms
  2. Safeguards requirements matching covered entity standards
  3. Breach notification within 24-48 hours of discovery
  4. Subcontractor flow-down provisions
  5. Return or destruction of PHI upon termination
  6. HHS audit cooperation clause

Common Negotiation Points:

  • Indemnification caps (vendors often seek limitations)
  • Breach notification timelines (24 vs 48 vs 72 hours)
  • Encryption standards (NIST-approved vs "industry standard")
  • Audit rights (frequency and scope)
  • Liability allocation for subcontractor breaches

Red Flags in BAA Reviews:

  • Generic confidentiality language instead of HIPAA-specific terms
  • Missing subcontractor flow-down requirements
  • Broad indemnification carve-outs
  • Refusal to accept breach notification obligations
  • Vague security control descriptions

Control Mapping and Framework Alignment

HIPAA controls map to multiple compliance frameworks, enabling efficient control testing:

HIPAA Requirement SOC 2 Criteria ISO 27001 Control NIST CSF Function
Access Control CC6.1-CC6.3 A.9.1-A.9.4 PR.AC-1 through PR.AC-7
Audit Logging CC7.1-CC7.2 A.12.4 DE.AE-3, PR.PT-1
Risk Assessment CC3.1-CC3.4 A.12.6 ID.RA-1 through ID.RA-6
Incident Response CC7.3-CC7.5 A.16.1 RS.RP-1, RS.CO-1
Encryption CC6.7 A.10.1 PR.DS-1, PR.DS-2

Organizations maintaining SOC 2 Type II or ISO 27001 certification can leverage existing controls for HIPAA compliance, requiring only PHI-specific additions:

  • BAA management procedures
  • HIPAA-specific training modules
  • Breach notification workflows
  • Patient rights procedures (for covered entities)

Vendor Risk Assessment Considerations

When evaluating vendor HIPAA compliance, structure assessments around these critical areas:

Documentation Review:

  • Current risk assessment (within 12 months)
  • Policy suite addressing all safeguard categories
  • Training records with HIPAA-specific content
  • Incident response procedures with breach scenarios
  • BAA template with required provisions

Technical Validation:

  • Encryption verification (certificates and key strength)
  • Access control testing (authentication methods)
  • Audit log samples demonstrating required elements
  • Vulnerability scan results (quarterly minimum)
  • Penetration test reports (annual)

Operational Evidence:

  • Security officer appointment documentation
  • Training completion rates (target: >95%)
  • Access review records (quarterly)
  • Incident metrics including breach history
  • Audit findings and remediation status

Common Implementation Challenges

Organizations frequently encounter these obstacles when implementing HIPAA controls:

Shadow IT Discovery: Departments independently adopt SaaS tools without security review. Solution: Implement cloud access security broker (CASB) monitoring and regular vendor inventory audits.

Legacy System Encryption: Older systems lack native encryption capabilities. Solution: Database-level encryption, encrypting file systems, or network segmentation with compensating controls.

Audit Log Correlation: Disparate systems generate incompatible log formats. Solution: Security information and event management (SIEM) platforms with PHI-specific correlation rules.

Vendor BAA Resistance: Smaller vendors refuse standard BAA terms. Solution: Risk-based approach with compensating controls or vendor replacement for critical functions.

Frequently Asked Questions

What's the difference between a covered entity and business associate under HIPAA?

Covered entities directly provide healthcare services, process claims, or clear healthcare transactions (hospitals, insurance companies, clearinghouses). Business associates are vendors or partners who handle PHI on behalf of covered entities through services like cloud storage, billing, or data analytics.

Do all cloud providers need to sign BAAs?

Only cloud providers with access to PHI content require BAAs. Providers offering encrypted storage where they cannot access decryption keys may qualify for the "conduit exception," though most healthcare organizations require BAAs regardless for risk mitigation.

How do HIPAA penalties work for business associates?

Business associates face the same penalty structure as covered entities: $100-$50,000 per violation based on culpability level, with annual maximums of $1.5 million per violation category. Both the covered entity and business associate can be penalized for the same breach.

What constitutes a HIPAA breach requiring notification?

Any acquisition, access, use, or disclosure of PHI not permitted under the Privacy Rule that compromises security or privacy. Exceptions include unintentional access by authorized workforce members, inadvertent disclosure between authorized persons, and disclosures where recipients cannot reasonably retain the information.

Can verbal agreements satisfy BAA requirements?

No. HIPAA explicitly requires written agreements. Electronic signatures satisfy the written requirement, but verbal agreements or implied understandings through course of dealing don't meet regulatory standards.

How often should HIPAA risk assessments be updated?

While HIPAA doesn't specify frequency, OCR guidance and enforcement actions indicate annual assessments as the baseline, with updates required after significant changes (new systems, mergers, breach incidents, or regulatory updates).

Frequently Asked Questions

What's the difference between a covered entity and business associate under HIPAA?

Covered entities directly provide healthcare services, process claims, or clear healthcare transactions (hospitals, insurance companies, clearinghouses). Business associates are vendors or partners who handle PHI on behalf of covered entities through services like cloud storage, billing, or data analytics.

Do all cloud providers need to sign BAAs?

Only cloud providers with access to PHI content require BAAs. Providers offering encrypted storage where they cannot access decryption keys may qualify for the "conduit exception," though most healthcare organizations require BAAs regardless for risk mitigation.

How do HIPAA penalties work for business associates?

Business associates face the same penalty structure as covered entities: $100-$50,000 per violation based on culpability level, with annual maximums of $1.5 million per violation category. Both the covered entity and business associate can be penalized for the same breach.

What constitutes a HIPAA breach requiring notification?

Any acquisition, access, use, or disclosure of PHI not permitted under the Privacy Rule that compromises security or privacy. Exceptions include unintentional access by authorized workforce members, inadvertent disclosure between authorized persons, and disclosures where recipients cannot reasonably retain the information.

Can verbal agreements satisfy BAA requirements?

No. HIPAA explicitly requires written agreements. Electronic signatures satisfy the written requirement, but verbal agreements or implied understandings through course of dealing don't meet regulatory standards.

How often should HIPAA risk assessments be updated?

While HIPAA doesn't specify frequency, OCR guidance and enforcement actions indicate annual assessments as the baseline, with updates required after significant changes (new systems, mergers, breach incidents, or regulatory updates).

Put this knowledge to work

Daydream operationalizes compliance concepts into automated third-party risk workflows.

See the Platform