Whether you're a covered entity or a business associate, our HIPAA hub translates the Privacy, Security, and Breach Notification Rules into a practical, risk-based compliance program built for modern cloud, SaaS, and digital health teams.
Free Assessment
HIPAA (the Health Insurance Portability and Accountability Act of 1996, as amended by HITECH 2009 and the Omnibus Rule of 2013) is a US federal law that sets the national standard for protecting Protected Health Information (PHI). It applies to covered entities (health plans, providers, clearinghouses) and any business associate that handles PHI on their behalf.
HIPAA is the default regulatory floor for every digital health company, EHR, telehealth platform, medical-device vendor, healthtech SaaS, and BPO handling PHI in the US. OCR breach penalties regularly exceed $1M per incident and tier ceilings reach $1.9M per violation category per year. Without a compliant program you can't sell into hospital systems, payers, or pharma.
Covered entities: hospitals, clinics, providers, health plans, clearinghouses. Business associates: SaaS vendors, cloud hosts, billing companies, IT services, analytics platforms, AI tools, and any subcontractor downstream. HIPAA applies whenever PHI leaves a covered entity's environment.
A signed Business Associate Agreement (BAA) is a gate to every US healthcare sale. A documented HIPAA program shortens vendor-risk reviews from 90 days to 30. Compliance reduces OCR enforcement exposure, cyber-insurance premiums, and post-breach liability. It's also a strong foundation for HITRUST CSF and SOC 2 if you want them later.
Whether you’re evaluating HIPAA for the first time, deep in implementation, or running a continuous program, start in the lane that matches your current maturity.
Beginner · Understand PHI & Your Role
Figure out if you're a covered entity or a business associate and what constitutes PHI in your systems.
Intermediate · Build the Program
Conduct the required risk analysis, implement safeguards, and paper up BAAs with every vendor.
Advanced · Audit, Breach, and Scale
Prepare for OCR audits, manage incidents, and run a program across multiple products or lines of business.
Covered entities, business associates, subcontractors — and the moment you touch PHI you inherit obligations. Know the definitions before you assume you're out of scope.
A US federal law creating national standards to protect the privacy and security of health information.
Privacy Rule (who can use/disclose PHI), Security Rule (safeguards for ePHI), Breach Notification Rule (when and how to report).
Enacted 1996, strengthened by HITECH (2009) and the Omnibus Rule (2013). Proposed Security Rule updates came in 2025.
Covered entities (providers, payers, clearinghouses) and business associates plus subcontractors of business associates.
Protected Health Information is any identifiable health data. ePHI is PHI in electronic form what the Security Rule focuses on.
The HHS Office for Civil Rights (OCR) investigates complaints, audits covered entities, and levies civil monetary penalties.
Four sets of requirements, each addressing a different failure mode. The Security Rule's administrative, physical, and technical safeguards are the ones auditors and OCR investigators spend the most time on.
Governs permitted uses and disclosures of PHI, the minimum-necessary standard, individual rights (access, amendment, accounting).
Requires administrative, physical, and technical safeguards for ePHI. Includes required and addressable implementation specs.
60-day notification to individuals, HHS, and sometimes media after a PHI breach. Different rules under 500 vs 500+ affected.
Security management process, workforce training, incident response, contingency planning, evaluation.
Facility access controls, workstation use, device & media controls, disposal.
Access control (unique IDs, emergency access, automatic logoff), audit controls, integrity, transmission security.
HIPAA has no certification body — enforcement comes from OCR investigations, HHS audits, and state Attorneys General. What you do need is a defensible, documented compliance program.
Data inventory: where PHI is created, received, maintained, transmitted. Cover cloud, endpoints, SaaS, and paper.
An accurate, thorough risk analysis is the #1 control OCR looks for in every audit. Document it. Keep it current.
Encryption in transit and at rest, MFA, least privilege, backup, IR plan, training, device management.
Policies, procedures, workforce training, sanctions policy, BAAs with every vendor touching PHI.
Annual risk reassessment, penetration test, disaster-recovery drill, phishing simulation, quarterly access review.
Complaint-driven and random audits. Have evidence binders ready: risk analysis, training records, incident log, BAAs.
$15k–$50k for initial risk analysis and gap remediation. Annual program costs $25k–$150k depending on PHI footprint and team size.
The Security Rule's §164.308(a)(1)(ii)(A) risk analysis is the single most-cited deficiency in OCR enforcement. Get it right, and the rest of your program has a backbone.
Compare current safeguards to the Security Rule's §164.308/310/312 requirements. Identify addressable specs you haven't addressed.
Risk analysis current, BAAs signed, workforce trained, encryption enforced, audit logs retained, IR plan tested.
18 required policies/procedures, risk analysis, risk management plan, workforce training materials, sanctions log, disclosure accounting.
Track every vendor touching PHI. Sign BAAs before data flows. Flow-down language for subcontractors.
A tested IR plan with named PHI-breach roles, forensic partner on retainer, pre-drafted notifications.
Annual at minimum. Role-specific for developers, admins, and customer-facing staff. Track completion.
Tools like Compliancy Group, Accountable, and Drata's HIPAA module streamline BAA tracking, training assignments, and audit-log review — but they don't replace clinical workflow review.
Manual: policy binders, spreadsheet BAA trackers, email training certificates. Automated: continuous control monitoring and evidence capture.
Automated logging, access-review evidence, training completion tracking, and encryption enforcement removes single-person dependency.
Multi-product SaaS, cloud-native HealthTech, or any company planning SOC 2 or HITRUST alongside HIPAA.
Drata, Vanta, Secureframe, Thoropass, Sprinto, Compliancy Group, Accountable. Evaluate HIPAA templates and BAA workflow.
Tooling is great but HIPAA is ultimately about the risk analysis and workforce culture. Automation without a named Privacy/Security Officer is cosmetic.
Free resources for covered entities and business associates — policies, risk-analysis templates, and workforce training outlines.
Resource
Policies, BAAs, risk-analysis template, training materials
Template
NIST 800-30 aligned, HealthIT.gov compatible
Template
Editable BAA, subcontractor flow-down, DPA hybrids
Checklist
All §164.308/310/312 specs mapped to controls
Resource
Everything OCR requests in an investigation
Resource
From ePHI to minimum necessary, de-identified
Real business outcomes we see when clients adopt HIPAA with the right implementation partner.
SaaS platforms storing PHI video visits, remote monitoring, care coordination.
Insurers, PBMs, benefit administrators managing eligibility and claims.
Connected devices that transmit or store ePHI MDR security + HIPAA overlap.
Models trained on de-identified or authorized PHI new OCR guidance on AI applies here.
Patterns we’ve seen across 200+ HIPAA engagements. Spot these early and you’ll spare yourself months of rework.
Most OCR findings cite an absent or stale risk analysis the foundational control.
Subprocessors of subprocessors few teams have full visibility of PHI flow.
Backups, dev environments, and logs commonly hold PHI without proper key management.
Developers and engineers rarely get role-specific HIPAA training training PMs and CSMs is not enough.
Keep learning — or put HIPAA into action with a team that has done it before.
HIPAA Fundamentals
HIPAA Rules & Requirements
HIPAA Program Building
Trusted by 200+ Global Enterprise Clients












What Your Business Gets
No obligation · Results in 48 hours · 100% confidential
Pick a time that works for you
Our team responds within 24 hours
Our AI consulting and development team helps enterprises move from AI strategy to live production in 12 weeks, with MLOps, governance, and measurable ROI.