HIPAA Compliant: What It Means and How to Achieve It
HIPAA compliant means your organisation meets federal PHI protection requirements. Learn what compliance requires, who must comply, and how to achieve it.

What Does HIPAA Compliant Mean?
Saying you're 'HIPAA compliant' means your organisation has implemented the administrative, physical, and technical safeguards required by the Health Insurance Portability and Accountability Act of 1996 and its subsequent rules. HIPAA doesn't issue compliance certificates. There's no federal checklist you submit and no government approval you receive. Instead, HIPAA compliance is a continuous operational state — a set of policies, procedures, and practices that your organisation maintains on an ongoing basis to protect the privacy and security of protected health information (PHI).
The term 'HIPAA compliant' is widely used in healthcare, technology, and business contexts, sometimes loosely. A vendor claiming its software is 'HIPAA compliant' means the software has features that can support HIPAA-covered operations — it does not mean the software has been certified by HHS or that using it automatically makes you compliant. Compliance is an organisational responsibility, not a product feature. You can use HIPAA-compliant software tools and still fail compliance if your policies, access controls, training, and breach response procedures aren't also in place.
True HIPAA compliance spans four federal rules — Privacy, Security, Breach Notification, and the Omnibus Rule — each with specific requirements that covered entities and their business associates must meet. Together, these rules govern who can access PHI, how it must be secured, what patients must be told about their rights, and what happens when PHI is impermissibly disclosed. Understanding what compliance actually requires helps organisations build real protection rather than the appearance of it.
PHI — protected health information — is defined broadly under HIPAA. It includes any individually identifiable health information: diagnoses and medical conditions, treatment records and clinical notes, prescriptions and pharmacy records, lab results, billing and insurance information, appointment records, and any other information that relates to a person's past, present, or future physical or mental health and that could be used to identify the individual.
PHI is protected in all formats — electronic records (ePHI), paper records, and verbal communications. The 18 HIPAA identifiers that turn health information into PHI include names, dates (birth, admission, death), geographic subdivisions smaller than a state, phone numbers, email addresses, Social Security numbers, device identifiers, and several others. Properly de-identified health information — from which all 18 identifiers have been removed or statistically processed — is no longer PHI and falls outside HIPAA's scope.
The concept of 'minimum necessary' is foundational to how PHI must be handled day-to-day. Under the Privacy Rule, covered entities must make reasonable efforts to limit the use, disclosure, and requests for PHI to the minimum necessary to accomplish the intended purpose. This doesn't apply to disclosures for treatment purposes — a consulting physician can share the full record needed to treat a patient — but it applies to disclosures for operations, payment, and many other purposes.
Implementing minimum necessary practices means setting access controls so that administrative staff see only the PHI their role requires, not every element of a patient's record, and ensuring that PHI isn't shared more broadly than necessary even within the organisation.
- Who must comply: Covered entities (healthcare providers, health plans, healthcare clearinghouses) and their business associates who handle PHI on their behalf
- What's protected: Any individually identifiable health information — diagnoses, treatment records, billing information, insurance data — in any format (paper, electronic, verbal)
- No federal certification: HHS does not issue HIPAA compliance certificates — compliance is self-assessed and demonstrated during audits or investigations
- Three main rules: Privacy Rule (patient rights and permitted disclosures), Security Rule (electronic PHI safeguards), Breach Notification Rule (breach response requirements)
- Penalties: $100–$50,000 per violation, up to $1.9M per violation category per year — plus potential criminal charges for wilful violations
- Ongoing commitment: Compliance is not a one-time project — it requires annual risk assessments, policy updates, workforce training, and breach response preparedness
The Four HIPAA Rules
Privacy Rule
Security Rule
Breach Notification Rule
Omnibus Rule

Who Must Be HIPAA Compliant?
HIPAA's compliance requirements apply to two categories of entities: covered entities and business associates. Understanding which category you fall into — and what obligations each carries — is the first step in determining what compliance means for your specific organisation.
Covered entities are the three types of organisations directly regulated by HIPAA: healthcare providers who transmit health information electronically (physicians, hospitals, pharmacies, nursing homes, labs, and many others), health plans (insurance companies, HMOs, employer-sponsored health plans, Medicare and Medicaid programmes), and healthcare clearinghouses (organisations that process nonstandard health information into standard formats). If your organisation falls into any of these three categories, you are a covered entity with full HIPAA compliance obligations under all four rules.
Business associates are organisations or individuals that create, receive, maintain, or transmit PHI on behalf of a covered entity in the course of performing services for that entity. This category includes a broad range of organisations: medical billing companies, transcription services, EHR vendors, cloud storage providers who store ePHI, law firms that work on healthcare matters, consultants who have access to PHI, and any other third party that handles PHI as part of their service delivery.
Business associates must sign Business Associate Agreements (BAAs) with their covered entity clients and are directly subject to the Security Rule and Breach Notification Rule.
Subcontractors of business associates — companies hired by a business associate to perform services involving PHI — are also business associates under HIPAA and must sign BAAs with their upstream business associate. This chain of accountability means that PHI protection obligations travel through the entire service supply chain. A covered entity is responsible for having BAAs with its direct business associates, but business associates are responsible for flowing those protections down to their own vendors and subcontractors.
Workforce members of covered entities and business associates are not themselves directly subject to HIPAA as individual regulatory targets, but they must comply with their employer's HIPAA policies and can face employment consequences and potentially criminal charges for wilful PHI violations. HIPAA training for all workforce members who handle PHI is a required element of both covered entity and business associate compliance programmes, making workforce awareness a critical component of any organisation's compliance posture.
The Three Pillars of HIPAA Compliance
Policies and procedures that manage the selection, development, and maintenance of security measures. Includes the annual security risk analysis (the cornerstone requirement), risk management plan, workforce training programme, access management policies, contingency planning (backup and recovery), and evaluation of security effectiveness. Administrative safeguards are the management framework within which all other safeguards operate.
Controls that protect the physical facilities and equipment where ePHI is stored or accessed. Includes facility access controls (who can enter server rooms and areas with computers), workstation use policies (where ePHI can be accessed and how workstations must be secured), and device and media controls (how devices containing ePHI are tracked, moved, and disposed of). Physical safeguards protect against unauthorised physical access to systems containing PHI.
Technology and policies for protecting ePHI and controlling access to it. Includes unique user authentication (no shared login credentials), automatic logoff from inactive sessions, audit logging of all access to ePHI, data integrity controls that detect unauthorised modification, and encryption of ePHI in transmission. Technical safeguards are the security controls built into the systems and software that handle ePHI.
HIPAA requires covered entities and business associates to maintain written policies and procedures implementing all required safeguards, and to retain documentation for at least six years from creation or last effective date. Required documentation includes the results of annual risk analyses, risk management plans, workforce training records, access authorisation records, and Business Associate Agreements. Documentation is what you present during a HIPAA audit or investigation.
HIPAA Compliant Technology: What It Requires
Software is 'HIPAA compliant' when it includes the technical features needed to protect ePHI and when the vendor will sign a Business Associate Agreement. Key technical features to verify:
- Access controls: Unique user authentication, role-based access (limiting users to the minimum necessary PHI), automatic session timeouts
- Audit logs: Logs that track who accessed which PHI, when, and what actions were taken — with logs retained and available for review
- Encryption: ePHI encrypted at rest (stored data) and in transit (data moving across networks) using current standards (AES-256 at rest, TLS 1.2+ in transit)
- Backup and recovery: Automated backups of ePHI, tested recovery procedures, offsite or redundant storage
- BAA availability: The vendor must be willing to sign a Business Associate Agreement — if a vendor refuses, the software cannot be used to handle PHI regardless of its technical features
- Risk analysis support: Good HIPAA-compliant software vendors provide documentation of their security practices to help you complete your annual risk analysis

HIPAA Violations and Penalties
HHS's Office for Civil Rights (OCR) enforces HIPAA and can investigate complaints, conduct compliance audits, and impose civil monetary penalties (CMPs) for violations. The penalty structure has four tiers based on the covered entity's or business associate's culpability — from 'did not know' through 'wilful neglect corrected' to 'wilful neglect not corrected' — with penalty amounts scaling dramatically with culpability.
The penalty ranges are significant. A single violation category can result in penalties up to $1.9 million per calendar year. Individual violations within a category are assessed at $100 to $50,000 per violation depending on culpability tier — and each impermissible disclosure of a different patient's PHI can be treated as a separate violation.
Large-scale breaches involving thousands of patient records have resulted in multi-million dollar settlements. Advocate Aurora Health paid $16 million in 2018 (the largest HIPAA settlement at that time) following two breaches affecting 4 million patients. More recently, Banner Health, Premera Blue Cross, and several large hospital systems have all settled for amounts in the $5M–$18M range.
The most common causes of HIPAA enforcement actions include: failure to conduct a risk analysis, unauthorised access to PHI (including insider snooping), failure to implement access controls, missing or inadequate Business Associate Agreements, failure to provide patients access to their records within the required timeframe, and inadequate safeguards for portable devices containing ePHI. Many of these are preventable with consistent policy implementation and staff training.
Criminal penalties under HIPAA are enforced by the Department of Justice rather than OCR. Knowingly obtaining or disclosing PHI in violation of HIPAA carries penalties up to $50,000 and one year in prison. Violations committed under false pretences carry penalties up to $100,000 and five years.
Violations with intent to sell, transfer, or use PHI for commercial advantage, personal gain, or malicious harm carry penalties up to $250,000 and ten years in prison. Healthcare insiders who access and misuse patient records — including viewing records of celebrities, ex-partners, or family members without authorisation — have faced federal criminal prosecution under these provisions.
HIPAA Compliance Checklist
- ✓Conduct and document an annual security risk analysis covering all systems that create, receive, maintain, or transmit ePHI
- ✓Develop and implement a risk management plan addressing the vulnerabilities identified in the risk analysis
- ✓Have signed Business Associate Agreements in place with all vendors who handle PHI on your behalf
- ✓Implement role-based access controls ensuring workforce members access only the minimum necessary PHI for their job functions
- ✓Deploy encryption for ePHI at rest and in transit on all systems and portable devices
- ✓Maintain audit logs of all access to ePHI and review them regularly for anomalous access patterns
- ✓Establish and train staff on a breach response plan including the 60-day notification timeline
- ✓Provide annual HIPAA training to all workforce members who handle PHI, with documented completion records
- ✓Post or provide patients with a current Notice of Privacy Practices and document patient acknowledgement
- ✓Establish a process for receiving and responding to patient access requests within 30 days of receipt
Common HIPAA Compliance Approaches
- +Building compliance in-house gives organisations full control over their compliance programme, direct integration with clinical workflows, and deep institutional knowledge about where PHI flows — the best approach for large covered entities with dedicated compliance resources
- +Using a HIPAA compliance management platform (Compliancy Group, HIPAA One, Accountable, etc.) provides structured checklists, documentation templates, risk assessment tools, and guidance that reduces the expertise burden on smaller organisations
- +Engaging a HIPAA compliance consultant provides expert guidance for complex compliance situations — particularly useful for business associates or specialty practices that need help with BAA review, risk analysis methodology, and policy development
- −No approach eliminates compliance risk entirely — even organisations with robust programmes experience breaches, and the key distinction that affects penalties is demonstrating you had appropriate safeguards in place, not that you achieved perfect security
- −Compliance management platforms vary significantly in quality — some provide genuine compliance support while others offer checkbox documentation without substantive guidance. Evaluate whether a platform addresses all Security Rule requirements before committing
- −External consultants may not be familiar with your specific clinical environment — the best compliance outcomes combine external expertise with internal operational knowledge of how PHI actually flows through your organisation

How to Achieve HIPAA Compliance
Achieving HIPAA compliance is an organisational process, not a one-time event. The steps below describe the core activities that covered entities and business associates must undertake — not as a finite project, but as an ongoing operational commitment.
The mandatory starting point is the security risk analysis. This formal assessment identifies all systems and workflows that create, receive, maintain, or transmit ePHI; assesses the threats and vulnerabilities to that ePHI; evaluates the likelihood and impact of each identified risk; and documents the current safeguards in place.
The risk analysis drives everything else in the compliance programme — it tells you where your gaps are and what your risk management plan needs to address. HHS has published a Security Risk Assessment Tool (available at healthit.gov) that small and medium healthcare organisations can use to conduct and document their risk analysis.
The risk management plan turns risk analysis findings into action. For each significant risk identified, the plan specifies what safeguard will be implemented to reduce the risk to an acceptable level, who is responsible for implementation, and the timeline. HHS regulations require that risk be reduced to a 'reasonable and appropriate' level — not eliminated, because perfect security isn't achievable, but managed to a level commensurate with the sensitivity of the PHI and the organisation's resources.
After the risk analysis and management plan, policy and procedure development formalises how your organisation implements all required safeguards. Written policies must address every addressable and required specification in the HIPAA Security Rule, and Privacy Rule policies must address patient rights, permitted disclosures, and workforce responsibilities for PHI handling. Policies should be reviewed and updated annually — after the risk analysis, after any significant system change, and after any breach or near-miss incident that reveals a policy gap.
Business Associate Agreement management is a specific compliance obligation that many organisations underestimate. You must identify every third party that handles PHI on your behalf, ensure each has a signed BAA in place, and review BAAs when vendor relationships or services change materially. BAAs without the required provisions — including business associates' direct liability for Security Rule compliance and breach notification obligations — are non-compliant even when signed.
HIPAA Compliance by the Numbers
HIPAA Compliance for Small Practices and Business Associates
Small healthcare practices and small business associates face the same HIPAA compliance requirements as large hospital systems — the regulations don't scale their requirements by organisation size. What does scale is the level of implementation that's considered 'reasonable and appropriate': a solo practitioner's compliance programme will look different from a 500-bed hospital's, reflecting different resources, PHI volumes, and risk profiles.
HHS acknowledges this through the concept of 'addressable' specifications in the Security Rule, which allow organisations to implement equivalent alternatives to specific requirements when the stated implementation is not reasonable given the organisation's circumstances — as long as the decision is documented and justified.
For small practices, the most practical starting point is the HHS Security Risk Assessment Tool, the OCR's sample policies and procedures available at hhs.gov, and professional guidance from a healthcare attorney or HIPAA consultant when facing complex questions about BAAs, breach determinations, or Privacy Rule exceptions. Many small practices also use their EHR vendor as a practical starting point — EHR vendors typically provide HIPAA-related documentation about their platform and include standard BAA templates in their service agreements, giving small practices a foundation to build on.
Small business associates — marketing agencies, IT managed service providers, legal firms, and others who handle PHI incidentally — sometimes don't recognise that they're business associates with direct HIPAA obligations. If your company accesses PHI in the course of performing services for a healthcare covered entity, you're a business associate regardless of how central healthcare is to your business model. Reviewing all client relationships for PHI access and ensuring BAAs are in place before PHI handling begins is the critical first step for business associates operating in the healthcare space.
Failure to conduct a documented annual risk analysis is the single most common finding in HIPAA enforcement actions and audits. HHS OCR considers the risk analysis the cornerstone Security Rule requirement — it drives all other administrative safeguards. Organisations that have experienced breaches and face enforcement often discover that their incomplete or outdated risk analysis is the primary vulnerability OCR focuses on. A risk analysis doesn't need to be expensive or elaborate for a small organisation, but it must be conducted, documented, and used to drive real risk management decisions. Using the HHS Security Risk Assessment Tool at healthit.gov provides a structured framework that satisfies the requirement at no cost. Skipping the risk analysis — or conducting one superficially without updating policies based on its findings — is the fastest path to avoidable enforcement exposure.
Maintaining Ongoing HIPAA Compliance
HIPAA compliance is not a project with an end date. It's an operational discipline that requires consistent attention across several recurring activities. Organisations that treat compliance as ongoing rather than periodic maintain better security posture and are better positioned to demonstrate good-faith compliance when regulators investigate.
Annual activities include completing and documenting the security risk analysis, reviewing and updating all HIPAA policies and procedures, conducting workforce training with documentation of completion, reviewing all Business Associate Agreements for continued accuracy, testing backup and recovery procedures, and reviewing audit logs for unusual access patterns. These aren't optional — each is directly tied to specific regulatory requirements.
Event-driven activities include updating policies and conducting spot training when systems change materially, when new workforce members are hired, when new vendors are engaged, and after any incident — including near-misses — that reveals a gap in the existing programme. Breach investigations should always conclude with a root-cause analysis that feeds back into policy and technical improvements, not just the notification process.
Organisations that invest in compliance culture — where workforce members understand why HIPAA matters and feel empowered to flag potential issues — consistently outperform organisations that treat compliance as a documentation exercise. PHI breaches caused by insider error are far more common than breaches caused by external attackers, and a culture where staff ask questions before acting on unclear PHI-handling situations prevents many of the most common violations before they occur.
Documentation discipline is the difference between organisations that survive an audit and those that face enforcement action. When OCR investigates a complaint or breach, it requests written policies, risk analysis records, training logs, and BAAs. An organisation that has genuinely good practices but can't document them faces the same exposure as one that has no practices at all — in enforcement proceedings, undocumented compliance is treated as non-compliance. Building documentation habits into day-to-day operations — not just during annual compliance reviews — ensures that your actual security practices are reflected in the records that matter most when it counts.
HIPAA Compliant Questions and Answers
About the Author
Attorney & Bar Exam Preparation Specialist
Yale Law SchoolJames R. Hargrove is a practicing attorney and legal educator with a Juris Doctor from Yale Law School and an LLM in Constitutional Law. With over a decade of experience coaching bar exam candidates across multiple jurisdictions, he specializes in MBE strategy, state-specific essay preparation, and multistate performance test techniques.