What is HIPAA?
The Health Insurance Portability and Accountability Act (HIPAA), enacted in 1996, establishes standards for safeguarding Protected Health Information (PHI). Its primary goals are:
- Protecting patient privacy.
- Ensuring security of electronic health information (ePHI).
- Allowing portability of insurance coverage.
- Standardizing healthcare transactions.
HIPAA applies to:
- Covered Entities (CEs): Healthcare providers (doctors, hospitals, clinics), health plans (insurance companies), and healthcare clearinghouses.
- Business Associates (BAs): Third-party vendors, contractors, or partners that process, store, or transmit PHI for covered entities.
Who Needs to Be HIPAA Compliant?
Any organization or vendor that creates, stores, processes, or transmits PHI must comply with HIPAA.
- Patient portals (online access to medical records).
- Telehealth platforms (video consultations, messaging).
- Online appointment forms (scheduling and intake forms).
- Secure live chat with doctors, nurses, or other medical professionals.
- Cloud hosting providers that store PHI on behalf of healthcare organizations.
Key HIPAA Rules
- Defines how PHI can be used/disclosed.
- Grants patients rights to access, amend, and control their medical data.
- Example: A doctor may share PHI with another provider for treatment but cannot disclose it to a marketer without patient consent.
Privacy Rule
- Applies specifically to electronic PHI (ePHI).
- Requires administrative, technical, and physical safeguards to secure data.
- Example: Implementing firewalls, encryption, and access restrictions.
Security Rule
- Requires organizations to notify affected individuals, HHS, and sometimes the media after a breach.
- Timeline: Notification must occur within 60 days of discovery.
Breach Notification Rule
- Outlines investigation and penalty procedures for HIPAA violations.
- Penalties depend on the level of negligence and can reach $1.9M annually per violation category (2025 adjusted figures).
Enforcement Rule
- Strengthens privacy/security provisions.
- Extends liability to business associates.
- Requires updated BAAs and patient rights notices.
Omnibus Rule
Technical Safeguards
To secure ePHI, organizations must implement:

- SSL/TLS Encryption – Ensures data is encrypted during transmission (e.g., HTTPS websites, secure APIs).
- Data Encryption at Rest – Protects stored data on databases, servers, and backups.
- Secure Authentication – Use multi-factor authentication (MFA) and strong password policies.
- Access Controls – Restrict PHI access based on role-based permissions.
- Audit Trails & Logging – Track who accessed data, when, and what changes were made.
- Intrusion Detection & Monitoring – Detect unusual activity or unauthorized access attempts.
- HIPAA-Compliant Hosting – Work with cloud providers (AWS, Azure, Google Cloud, etc.) that sign Business Associate Agreements (BAAs).
Administrative & Physical Safeguards
Non-technical but equally critical protections include:
- Appoint HIPAA Privacy & Security Officers – Responsible for compliance oversight.
- Regular Risk Assessments – Identify vulnerabilities in systems, policies, and processes.
- Staff Training – Educate employees on PHI handling, phishing awareness, and breach response.
- Data Backup & Recovery Plans – Ensure PHI is recoverable after cyberattacks or disasters.
- Physical Security – Restrict server room access, secure laptops/mobile devices, use badge systems and surveillance.
HIPAA-Compliant Web Forms & Portals
Any patient-facing system must:
- New patient registration/intake.
- Appointment scheduling.
- Online health questionnaires.
Use encrypted forms for:
- Password-protected with MFA.
- Monitored for unauthorized logins (alerts for suspicious activity).
- Designed with minimum necessary data collection – only ask for what’s essential.
Patient portals must be:
Business Associate Agreements (BAAs)
If a third-party vendor handles PHI (e.g., hosting providers, billing services, telehealth platforms), a BAA is legally required.

- Permitted uses/disclosures of PHI.
- Security measures the vendor must implement.
- Breach reporting protocols and timelines.
- Termination clauses if compliance is not maintained.
Notice of Privacy Practices (NPP)
Healthcare organizations must publish and provide an NPP:
- Clearly explains how PHI is collected, used, and disclosed.
- Lists patient rights (e.g., right to access, right to restrict disclosure).
- Provides contact information for complaints or privacy concerns.
- Prominently posted on websites and in clinics.
- Available in paper form upon request.
HIPAA Compliance Checklist (Quick Summary)
- SSL Certificate Installed – HTTPS enabled for all data transmission.
- HIPAA-Compliant Hosting – Use hosting with a signed BAA.
- Data Encryption – At rest (databases, backups) and in transit (SSL/TLS).
- Secure Web Forms – Encrypted, authenticated, minimal data collection.
- Access Controls & Monitoring – Role-based access, audit logs, intrusion detection.
- BAAs with Vendors – Signed and regularly reviewed.
- Privacy Policy Posted – Clear and patient-friendly NPP.
- Staff Training Completed – Ongoing security awareness programs.
- Backup & Recovery Procedures – Regular testing of data restoration.
- Breach Notification Plan – Documented procedure for timely reporting.