HIPAA Security Rule · PHI Protection · OCR Readiness

HIPAA Compliance Services to
Protect Patient Data
and Reduce Risk

Impact Risk Advisors delivers end-to-end HIPAA compliance services for covered entities and business associates - from mandatory HIPAA Security Risk Analysis (SRA) and safeguard implementation through policy development, workforce training, and continuous HIPAA monitoring. We help healthcare providers, health technology companies, and business associates build defensible HIPAA compliance programs that satisfy HHS Office for Civil Rights (OCR) requirements and protect patient data from breach and regulatory exposure.

HIPAA Security Rule Privacy Rule Breach Notification Rule Security Risk Analysis BAA Management OCR Audit Readiness
HIPAA Compliance at a Glance
$1.9M
Max annual civil penalty per violation category
60
Days to notify HHS of a breach affecting 500+ individuals
3
HIPAA rules: Security, Privacy, Breach Notification
100%
Of our HIPAA engagements include mandatory SRA
Mandatory HIPAA Security Risk Analysis (SRA) included
All three HIPAA safeguard categories covered
BAA review, negotiation, and vendor registry management
vCISO-led - full program ownership, not a checklist

Understanding HIPAA Compliance and Protected Health Information

The Health Insurance Portability and Accountability Act (HIPAA) is a federal law enacted in 1996 that establishes national standards for the protection of sensitive patient health information. Enforced by the HHS Office for Civil Rights (OCR), HIPAA creates legally binding obligations for any organization that creates, receives, maintains, or transmits Protected Health Information (PHI) - including both physical PHI and electronic PHI (ePHI).

HIPAA compliance is not optional and is not self-certifying. There is no HIPAA certification body - instead, OCR enforces HIPAA through complaint investigations, random audits, and breach-triggered enforcement actions. Organizations must demonstrate ongoing compliance through documented policies, implemented safeguards, workforce training, and completed Security Risk Analyses. When a breach occurs, OCR scrutinizes whether the breached organization had a defensible, functioning HIPAA compliance program in place.

For business associates - including SaaS platforms, cloud providers, analytics tools, billing systems, and any vendor that handles PHI on behalf of a covered entity - HIPAA compliance is equally mandatory. A Business Associate Agreement (BAA) is required, but signing a BAA without the underlying security controls creates massive liability exposure during OCR investigations.

"Signing a Business Associate Agreement without implementing the required HIPAA safeguards is not compliance - it's contractual exposure without protection. Real HIPAA compliance starts with the Security Risk Analysis and ends with continuous monitoring."

The Three HIPAA Rules
HIPAA Security Rule
45 CFR §164.300-318

Requires covered entities and business associates to implement Administrative, Physical, and Technical safeguards to protect the confidentiality, integrity, and availability of electronic PHI (ePHI). Includes the mandatory Security Risk Analysis requirement.

HIPAA Privacy Rule
45 CFR §164.500-534

Establishes national standards for the protection of PHI in all forms - electronic, paper, and oral. Governs how covered entities may use and disclose PHI, grants patients rights over their health information, and requires Notice of Privacy Practices (NPP).

HIPAA Breach Notification Rule
45 CFR §164.400-414

Requires covered entities to notify affected individuals, HHS, and in some cases the media, following a breach of unsecured PHI. Business associates must notify covered entities within 60 days of breach discovery. OCR investigates all breaches affecting 500 or more individuals.

Covered Entities and Business Associates Explained

HIPAA applies to two distinct categories of organizations - each with its own compliance obligations and regulatory exposure. Understanding which category applies to your organization is the first step in any HIPAA compliance program.

Covered Entity

Covered Entities (CEs)

Covered entities are the primary subjects of HIPAA - organizations that directly create, receive, maintain, or transmit PHI as part of their core operations. They are subject to all three HIPAA rules: Privacy, Security, and Breach Notification.

Healthcare providers: hospitals, physician practices, dental offices, mental health providers, pharmacies
Health plans: health insurance companies, HMOs, employer-sponsored health plans, Medicare/Medicaid
Healthcare clearinghouses: entities that process nonstandard health information into standard formats
Any provider that submits electronic health information in connection with a covered transaction
Business Associate

Business Associates (BAs)

Business associates are vendors, contractors, subcontractors, and service providers that perform functions on behalf of a covered entity that involve creating, receiving, maintaining, or transmitting PHI. BAs are directly liable under HIPAA - not just contractually through their BAA - and face the same OCR enforcement risk as covered entities.

Health technology SaaS platforms: EHR systems, patient portals, telehealth tools, scheduling software
Cloud service providers and data centers hosting ePHI
Medical billing and coding services, revenue cycle management companies
Analytics platforms, data warehouses, and AI tools processing patient data
Lawyers, accountants, and consultants with PHI access
E-prescribing services, pharmacy benefit managers, labs, and imaging centers

Business Associate Agreement (BAA) Requirements

Every covered entity must have a signed, compliant Business Associate Agreement in place with each business associate before any PHI is shared. BAAs must specify permitted uses of PHI, require the BA to implement HIPAA-required safeguards, establish breach reporting obligations, and include required regulatory provisions. Impact Risk Advisors reviews, negotiates, and maintains your BAA registry as part of our HIPAA compliance program - ensuring every vendor relationship is properly documented and monitored.

HIPAA Administrative, Technical, and Physical Safeguards

The HIPAA Security Rule requires covered entities and business associates to implement three categories of safeguards - each containing a mix of Required specifications (mandatory) and Addressable specifications (must implement or document a justified alternative).

Administrative Safeguards
Policies, Procedures & Program Governance
45 CFR §164.308 - 9 Required Standards

Administrative safeguards are the policies and procedures that govern how your organization protects ePHI - including how you manage security responsibilities, conduct workforce training, authorize access, and respond to incidents. They represent the largest and most documentation-intensive safeguard category.

Security Management Process Required

Formal risk analysis (SRA), risk management program, sanction policy, and information system activity review

Assigned Security Responsibility Required

Designated HIPAA Security Officer with documented responsibility for the security program

Workforce Security Addressable

Authorization procedures, workforce clearance, and termination procedures for ePHI access

Security Awareness & Training Addressable

Periodic security reminders, malicious software protection training, login monitoring, and password management training

Contingency Plan Required

Data backup plan, disaster recovery plan, emergency mode operations, and testing procedures

Business Associate Contracts Required

Written BAAs with all business associates - required before any PHI is shared

Technical Safeguards
Technology Controls for ePHI Protection
45 CFR §164.312 - 5 Standards

Technical safeguards are the technology controls and procedures that protect ePHI and control access to it. These are the controls most frequently tested during OCR investigations and breach inquiries - and the areas where most healthcare organizations have the highest rate of control gaps.

Access Control Required

Unique user identification, emergency access procedures, automatic logoff, and encryption/decryption of ePHI

Audit Controls Required

Hardware, software, and procedural mechanisms to record and examine ePHI access activity - audit logs must be retained and reviewed

Integrity Controls Addressable

Mechanisms to authenticate ePHI has not been altered or destroyed in an unauthorized manner

Person/Entity Authentication Required

Procedures to verify that the person or entity seeking ePHI access is the one claimed - includes multi-factor authentication

Transmission Security Addressable

Encryption of ePHI transmitted over electronic networks - TLS 1.2+ for data in transit, AES-256 for data at rest

Physical Safeguards
Facility & Device Security Controls
45 CFR §164.310 - 4 Standards

Physical safeguards address the physical security of the facilities and equipment that store, access, or process ePHI. While often overlooked compared to technical controls, physical safeguards are a persistent source of OCR audit findings - particularly for organizations with distributed workforces, remote access, and BYOD policies.

Facility Access Controls Addressable

Policies to limit physical access to facilities holding ePHI while ensuring proper authorized access - visitor logs, access badge systems, security camera documentation

Workstation Use Required

Policies specifying proper workstation use and the physical surroundings of workstations that access ePHI - screen placement, clean desk requirements

Workstation Security Required

Physical safeguards for workstations - screen locks, physical security cables, device tracking for remote and portable devices

Device & Media Controls Required

Policies governing the receipt, removal, movement, reuse, and disposal of hardware and electronic media containing ePHI - includes secure data destruction

Why Healthcare Organizations Struggle With HIPAA Compliance

HIPAA compliance is a continuous program - not a one-time project. Without dedicated security leadership, the same challenges recur in nearly every organization we work with.

No Completed Security Risk Analysis (SRA)

The HIPAA Security Risk Analysis is the single most commonly cited deficiency in OCR enforcement actions - and mandatory under 45 CFR §164.308(a)(1). Organizations routinely treat the SRA as optional or complete inadequate assessments that fail to meet OCR's own guidance on what a proper SRA must include.

Most cited HIPAA violation in OCR enforcement

Incomplete or Missing BAA Register

Every vendor, contractor, or service provider that touches PHI requires a signed, compliant Business Associate Agreement. Most organizations have partial BAA coverage at best - missing agreements with cloud providers, analytics platforms, IT support vendors, and dozens of other business associates who regularly access ePHI.

Avg. 40% of BAs lack signed agreements

Inadequate Workforce Training

HIPAA requires security awareness and training for all workforce members - not just clinical staff. Generic annual checkboxes don't satisfy OCR's expectations. Training must be role-based, documented, tracked to completion, and refreshed when the threat environment or operations change.

58% of HIPAA breaches involve workforce member error

Weak Access Controls and Audit Logging

Unique user IDs, automatic logoff, audit logs for ePHI access, and person/entity authentication are required under the HIPAA Technical Safeguards. Organizations routinely fail these - shared login credentials, no audit trail for ePHI access, and missing multi-factor authentication create OCR enforcement exposure.

Top technical control gap in OCR audits

No Breach Response Plan or Notification Process

Without a documented Breach Notification procedure, organizations discovering a PHI breach have no clear process for the legally required 60-day HHS notification, individual notification, or media notification for large breaches. Delayed or deficient notification is independently sanctionable under HIPAA.

60-day notification window - tight without a plan

No Ongoing Monitoring or Periodic Review

HIPAA is not a one-time project - it requires periodic evaluation and updating of your security program as operations, technology, and threats change. Organizations that implement HIPAA controls and then let them decay create a compounding compliance gap that OCR can treat as willful neglect when a breach investigation reveals outdated safeguards.

Willful neglect: $10K-$50K per violation

Our HIPAA Compliance Approach: A Practical Path to Security and Regulatory Alignment

Impact Risk Advisors' HIPAA compliance methodology is built around the way OCR actually evaluates compliance - starting with the mandatory Security Risk Analysis and building a program that is documented, implemented, trained, monitored, and defensible under enforcement scrutiny.

We don't sell HIPAA checklists or generic policy templates. Our vCISO team embeds in your organization as genuine security leadership - understanding your specific environment, workflows, and risk profile before recommending a single safeguard or drafting a single policy. Every deliverable we produce is specific to your organization and stands up to OCR review.

01

HIPAA Security Risk Analysis (SRA)

We conduct a comprehensive, OCR-compliant Security Risk Analysis - documenting all ePHI flows, identifying threats and vulnerabilities, scoring risk, and producing a risk management plan that satisfies the 45 CFR §164.308(a)(1) requirement.

02

Security Control Implementation

We implement and document the specific Administrative, Technical, and Physical safeguards required for your environment - including access controls, audit logging, encryption, MFA, and facility security procedures.

03

HIPAA Policy & Procedure Development

We develop the complete HIPAA policy and procedure suite - Privacy Policy, Security Policy, Breach Notification Procedures, Incident Response, Workforce Sanctions, BAA Management, and all supporting documentation.

04

Workforce Security Awareness & Training

We design and deliver HIPAA-specific security awareness training - role-based, documented, and tracked to completion - that satisfies the HIPAA Administrative Safeguard training requirements and reduces human-layer breach risk.

05

Continuous HIPAA Monitoring & Annual Review

We maintain your HIPAA compliance program on an ongoing basis - monitoring controls, updating policies, reviewing the SRA annually, managing your BAA registry, and keeping your program aligned with OCR guidance and evolving HHS enforcement priorities.

Phase 1
Weeks 1-3
HIPAA Gap Assessment & SRA Scoping

ePHI inventory, current safeguard review, compliance gap analysis, and OCR-compliant SRA preparation.

ePHI InventoryGap AnalysisSRA Scope
Phase 2
Weeks 3-8
Security Risk Analysis (SRA)

Full OCR-compliant SRA - threat/vulnerability analysis, risk scoring, and risk management plan.

Threat AnalysisRisk ScoringRisk Register
Phase 3
Weeks 6-14
Safeguard Implementation & Policy Development

Administrative, Technical, and Physical safeguard implementation with complete policy documentation suite.

ControlsPoliciesBAA Registry
Phase 4
Month 3-4
Workforce Training & Attestation

Role-based HIPAA security training delivery, tracking, and documentation of workforce completion.

Training ProgramCompletion TrackingAttestations
Phase 5
Ongoing
Continuous HIPAA Compliance

Annual SRA update, quarterly BAA reviews, ongoing monitoring, and OCR audit readiness maintenance.

Annual SRABAA ReviewsOCR Ready

HIPAA Security Risk Assessment: The Foundation of HIPAA Compliance

The HIPAA Security Risk Analysis (SRA) is not optional. Under 45 CFR §164.308(a)(1), every covered entity and business associate is required to "conduct an accurate and thorough assessment of the potential risks and vulnerabilities to the confidentiality, integrity, and availability of electronic protected health information held by the covered entity or business associate." It must be documented, reviewed periodically, and updated when significant environmental or operational changes occur.

Despite its mandatory status, the SRA is the single most commonly cited HIPAA violation in OCR enforcement actions. Many organizations either skip it entirely, use inadequate self-assessment tools that don't satisfy OCR's own Security Risk Assessment guidance, or complete it once and never update it - creating compounding enforcement exposure as their environment changes.

Impact Risk Advisors' HIPAA Security Risk Analysis follows OCR's official SRA guidance and covers all ePHI flows across your entire environment - cloud systems, on-premise infrastructure, mobile devices, third-party integrations, and workforce endpoints - producing documentation that stands up to OCR investigator review.

OCR Enforcement Spotlight

Every significant OCR HIPAA settlement in the past five years has included a finding that the organization failed to conduct an adequate, organization-wide Security Risk Analysis. The SRA is the foundation OCR uses to assess whether an organization's entire HIPAA compliance program is credible.

Our HIPAA SRA Methodology
1

ePHI Inventory & Data Flow Mapping

Identify and document all locations where ePHI is created, received, maintained, or transmitted - including cloud systems, on-premise servers, mobile devices, workstations, third-party integrations, and backup systems.

2

Threat & Vulnerability Identification

Identify reasonably anticipated threats to ePHI confidentiality, integrity, and availability - and the existing vulnerabilities that could enable those threats to materialize - across your entire environment.

3

Current Control Assessment

Evaluate existing safeguards - technical controls, administrative procedures, and physical measures - and assess their effectiveness in mitigating identified threats and vulnerabilities.

4

Risk Likelihood & Impact Scoring

Assign likelihood and impact ratings to each identified risk - producing a documented risk level score for every threat/vulnerability combination across your ePHI environment.

5

Risk Management Plan & Documentation

Produce a documented risk management plan identifying the security measures that will reduce risk to an appropriate level - with management approval, implementation timelines, and ongoing monitoring procedures.

Maintaining HIPAA Compliance Beyond Initial Setup

Achieving HIPAA compliance is not a finish line - it is the starting point of an ongoing compliance obligation. HIPAA explicitly requires periodic review and updating of your security program as environmental changes, operational changes, new threats, and evolving OCR guidance create new compliance requirements.

The organizations that face the most severe OCR enforcement actions are not necessarily those with the worst initial compliance posture - they are often those that implemented HIPAA safeguards years ago and then allowed them to decay without review. OCR investigators treat decayed compliance programs as evidence of willful neglect, which carries the highest penalty tier.

Impact Risk Advisors maintains your HIPAA compliance program on a continuous basis - so that when an OCR investigation, a breach, or a business associate audit occurs, your program is current, documented, and defensible.

Annual HIPAA Security Risk Analysis Update

Mandatory annual SRA review and update to reflect operational changes, new ePHI systems, workforce changes, and evolving threat landscape - with management review and documented approval.

Quarterly BAA Registry Review

Systematic review of your business associate inventory - adding new vendors, reviewing updated BAAs, and identifying BAA expiration or deficiency before they create OCR exposure.

Annual HIPAA Workforce Training Cycle

Refreshed, role-based HIPAA security awareness training with documented completion records - satisfying the administrative safeguard training requirement with audit-ready evidence.

Breach Incident Monitoring & Response Readiness

Ongoing review of security events, incident tracking, and maintained breach notification procedures - so your organization is always prepared to respond within HIPAA's 60-day notification window.

Continuous HIPAA Compliance Activities
📋

Annual SRA

Updated risk analysis every year - and on significant change

📄

BAA Registry

Quarterly vendor review and BAA gap remediation

🎓

Training

Role-based annual workforce security training

🔍

Monitoring

Ongoing ePHI access audit log review

📝

Policies

Annual policy review and management approval

🚨

Incident Mgmt

Breach response readiness and notification procedures

OCR Audit Ready
Your HIPAA program is current, documented, and defensible - at all times

How Our Services Support HIPAA Compliance

HIPAA compliance is a security program - not just a documentation exercise. Our vCISO, risk assessment, and penetration testing services work together to build the security controls your HIPAA program requires and validate that they actually work.

vCISO Services

Your virtual CISO owns the entire HIPAA compliance program - serving as your designated HIPAA Security Officer, leading the Security Risk Analysis, managing your BAA registry, developing policies, and overseeing all safeguard implementation. HIPAA requires a named Security Officer; your vCISO fills that role.

Explore vCISO Services

HIPAA Compliance

The convergence of security leadership, formal risk assessment, and technical control validation - producing a HIPAA compliance program that is documented, implemented, trained, and defensible under OCR scrutiny.

Risk Assessment & Penetration Testing

The HIPAA Security Risk Analysis is satisfied by our formal risk assessment methodology. Our penetration testing services validate the technical safeguards your HIPAA program relies on - identifying vulnerabilities in ePHI-handling systems before an attacker or OCR investigator does.

Explore Risk Assessment
The Outcome: A HIPAA compliance program backed by an OCR-compliant Security Risk Analysis, validated by penetration testing, and governed by vCISO leadership - producing the administrative, technical, and physical safeguards that OCR investigators expect to find in a functioning compliance program.

What You Get: HIPAA Compliance Deliverables

Every Impact Risk Advisors HIPAA engagement produces a defined set of deliverables - OCR-defensible documentation and implemented safeguards that constitute a functioning, auditable HIPAA compliance program.

HIPAA Security Risk Assessment Report

A comprehensive, OCR-compliant Security Risk Analysis documenting your entire ePHI environment, identified threats and vulnerabilities, risk scores, and a documented risk management plan with remediation priorities and management sign-off.

ePHI inventory and data flow maps
Threat/vulnerability analysis with risk scores
Risk management plan with remediation priorities
Management approval documentation

HIPAA Compliance Gap Analysis

A structured gap analysis measuring your current administrative, technical, and physical safeguards against all HIPAA Security Rule requirements - with clear identification of Required versus Addressable deficiencies and implementation recommendations for each gap.

Safeguard-by-safeguard compliance assessment
Required vs. Addressable gap identification
Implementation recommendations per gap
Prioritized remediation roadmap

HIPAA Security Policies & Procedures Suite

A complete, organization-specific HIPAA security policy library - drafted to reflect your actual practices, reviewed by management, and maintained with annual update cycles. Covers all HIPAA administrative safeguard policy requirements.

HIPAA Security Policy
Workforce Security & Sanctions Policy
Breach Notification Procedures (45 CFR §164.400)
Incident Response, Access Management, and Device/Media procedures

Safeguard Implementation Plan

A detailed implementation plan mapping every required and addressable HIPAA safeguard to specific technical controls, responsible owners, implementation timelines, and evidence requirements - providing a clear operational roadmap from current state to compliant state.

Control-to-safeguard mapping
Technical implementation specifications
Owner assignments and timelines
Evidence requirements per control

Business Associate Agreement Registry

A complete inventory of all business associates with PHI access - including BAA status, expiration tracking, and gap identification. All BAAs are reviewed for HIPAA-required provisions and flagged for renegotiation where deficient.

Comprehensive BA inventory
BAA compliance review per vendor
Gap identification and remediation recommendations
BAA template and negotiation support

Ongoing HIPAA Compliance Monitoring Program

A continuous HIPAA compliance architecture - including annual SRA update schedule, quarterly BAA reviews, annual training cycle, access review procedures, and incident monitoring - that keeps your program perpetually current and OCR-defensible.

Annual SRA update process
Quarterly review calendar
Training completion tracking
Breach notification readiness procedures

Fines, Breaches & Legal Consequences of HIPAA Non-Compliance

HHS Office for Civil Rights enforces HIPAA through complaint investigations, random compliance audits, and breach notifications. HIPAA non-compliance carries escalating civil and criminal penalties - and reputational consequences that extend far beyond financial sanctions.

$100
Minimum per violation - unknowing HIPAA violation
$50K
Per violation for willful neglect (corrected)
$1.9M
Annual cap per violation category
$250K
Criminal fine + 10 years for intentional violations

Civil Monetary Penalties (CMPs)

OCR imposes civil monetary penalties on a four-tier scale based on culpability - from unknowing violations at $100-$50,000 per violation to willful neglect uncorrected at $50,000+ per violation, with annual caps of $1.9 million per category. Multiple violation categories in a single enforcement action compound rapidly into multi-million-dollar settlements.

2023 avg. OCR settlement: $1.2 million

OCR Breach Investigation & Corrective Action Plans

Following a breach affecting 500 or more individuals, OCR investigates the breached organization's entire HIPAA compliance program - not just the specific incident. Organizations with inadequate documentation, missing SRAs, or decayed safeguards face Corrective Action Plans (CAPs) requiring years of OCR oversight, monitoring, and reporting.

CAPs typically last 2-3 years of OCR monitoring

Reputational Damage & Patient Trust Loss

HHS publicly lists all breaches affecting 500 or more individuals on the OCR "Wall of Shame" - a permanent, searchable public record of your organization's breach history. Healthcare breaches generate significant media coverage, damage patient trust, reduce referrals, and negatively impact payor contract negotiations and credentialing.

PHI breaches publicly listed on HHS breach portal

State Attorney General Enforcement

In addition to federal OCR enforcement, state attorneys general have independent authority to enforce HIPAA and impose civil penalties. Multiple states have brought HIPAA enforcement actions alongside - and sometimes independently of - OCR investigations, creating dual enforcement exposure for covered entities and business associates operating across state lines.

Dual enforcement: OCR + State AG exposure

Business Associate Downstream Liability

Business associates that suffer a breach affecting covered entity PHI face direct OCR enforcement liability - not just contractual liability to the covered entity. The 2013 HIPAA Omnibus Rule made business associates directly and independently subject to HIPAA enforcement, meaning a breach at a health tech vendor can trigger its own OCR investigation regardless of covered entity notification.

Direct OCR liability for business associates post-Omnibus

Cyber Insurance Coverage Denials

Cyber liability insurers increasingly condition HIPAA-related coverage on evidence of a compliant security program - including a completed Security Risk Analysis, documented safeguards, and workforce training. Organizations that cannot demonstrate HIPAA compliance at time of claim may face coverage denials, reduced settlements, or exclusions for PHI-related breach costs.

Insurer SRA requirements on the rise in 2024-25

HIPAA Compliance Services for Healthcare Providers, SaaS & Business Associates

We serve the full spectrum of HIPAA-regulated organizations - from independent medical practices to healthcare technology platforms that are subject to HIPAA as business associates.

🏥

Hospitals & Health Systems

Enterprise HIPAA programs, SRA management, workforce training, and OCR audit preparation for complex multi-site environments

👨‍⚕️

Physician Practices & Clinics

Right-sized HIPAA compliance for small to mid-size practices - SRA, policies, BAA management, and staff training without enterprise complexity

🧠

Behavioral Health & Mental Health

HIPAA compliance with heightened privacy protections for behavioral health, substance use disorder, and mental health records under 42 CFR Part 2

💻

Health Technology SaaS (EHR, Telehealth)

HIPAA business associate compliance for EHR platforms, telehealth tools, patient engagement apps, and scheduling software handling ePHI

🧬

Medical Laboratories & Imaging

HIPAA compliance for reference labs, radiology centers, and pathology groups - including diagnostic result transmission and PHI sharing with ordering providers

💊

Pharmacies & Pharmacy Benefit Managers

HIPAA compliance for retail pharmacy chains, specialty pharmacies, and PBMs - prescription data handling, patient consent, and BA agreement management

📊

Health Data Analytics & AI Platforms

HIPAA business associate compliance for analytics companies, clinical AI vendors, and population health platforms processing de-identified and identifiable PHI

🏦

Healthcare Revenue Cycle & Billing

HIPAA compliance for medical billing companies, RCM platforms, and clearinghouses - including transaction standard compliance alongside Security and Privacy Rule obligations

Protect Patient Data and Achieve HIPAA Compliance Today

Whether you're a covered entity that needs a defensible HIPAA Security Risk Analysis or a health technology business associate that needs to build a HIPAA compliance program from the ground up, Impact Risk Advisors delivers the vCISO leadership, SRA methodology, and continuous monitoring program your organization needs. Start with a free HIPAA compliance consultation and have your gap analysis in hand within two weeks.

  • Free 60-minute HIPAA compliance consultation - no obligation
  • HIPAA gap analysis and SRA scoping delivered in 5 business days
  • OCR-compliant Security Risk Analysis - not a checkbox tool
  • vCISO-led program with named HIPAA Security Officer designation
Request Your Free HIPAA Compliance Consultation

🔒 Confidential. Attorney-client privilege considerations available. We respond within 1 business day.

HIPAA Compliance FAQs

Common questions about HIPAA requirements, Security Risk Analysis, business associate obligations, OCR enforcement, and what to expect from a HIPAA compliance engagement.

Have a specific HIPAA question?

Our vCISO team can answer questions about your specific HIPAA obligations, BAA requirements, or breach notification situation.

Talk to a HIPAA Expert
HIPAA compliance means meeting the requirements of the Health Insurance Portability and Accountability Act - specifically the Privacy Rule (patient rights over PHI), the Security Rule (safeguards for ePHI), and the Breach Notification Rule (notification obligations following a PHI breach). HIPAA applies to Covered Entities (healthcare providers, health plans, and clearinghouses) and their Business Associates - any vendor, contractor, or service provider that creates, receives, maintains, or transmits PHI on their behalf. Business associates are directly liable under HIPAA since the 2013 Omnibus Rule - not just contractually through their BAA.
Yes - a HIPAA Security Risk Analysis (SRA) is mandatory under 45 CFR §164.308(a)(1). Every covered entity and business associate must conduct an accurate and thorough assessment of the potential risks and vulnerabilities to the confidentiality, integrity, and availability of all electronic PHI they create, receive, maintain, or transmit. The SRA must be documented, reviewed periodically, and updated when significant environmental or operational changes occur. The OCR SRA Tool is available for small providers, but organizations with complex environments typically need a professional-grade SRA that goes beyond the tool's capabilities. The SRA is the single most commonly cited deficiency in OCR HIPAA enforcement actions.
If your SaaS platform creates, receives, maintains, or transmits Protected Health Information on behalf of a healthcare covered entity, you are a Business Associate under HIPAA and must comply with the HIPAA Security Rule. This applies regardless of company size - a startup with two employees that stores ePHI for a hospital system faces the same HIPAA Security Rule obligations as an enterprise EHR vendor. You must also sign a Business Associate Agreement (BAA) with each covered entity customer before any PHI is shared. Simply signing a BAA without implementing the underlying safeguards does not satisfy HIPAA - it just creates contractual liability on top of your regulatory exposure.
HIPAA civil monetary penalties range from $100 to $50,000 per violation, depending on the level of culpability - from unknowing violations to willful neglect. Annual caps of $1.9 million apply per violation category. In practice, OCR enforcement actions involve multiple violation categories, compounding into multi-million-dollar settlements. Criminal penalties for intentional violations range from $50,000 and one year imprisonment to $250,000 and ten years imprisonment for offenses with intent to sell, transfer, or use PHI for commercial advantage. State attorneys general also have independent authority to bring HIPAA enforcement actions.
A Business Associate Agreement is a legally required written contract between a covered entity and a business associate that governs the BA's use and disclosure of PHI. Under HIPAA (45 CFR §164.504(e)), a BAA must: specify permitted uses and disclosures of PHI; require the BA to implement appropriate safeguards; require breach reporting to the covered entity within 60 days; establish subcontractor BAA requirements; provide for the return or destruction of PHI at contract termination; and grant the covered entity the right to terminate for material BAA breach. A BAA signed with non-compliant provisions - or no BAA at all - exposes both parties to OCR sanctions.
HIPAA and SOC 2 are separate frameworks with different origins, purposes, and evidence requirements - but they share substantial control overlap that makes pursuing both simultaneously efficient. HIPAA is a regulatory compliance obligation enforced by OCR; SOC 2 is a market-facing third-party attestation issued by a CPA firm. Many health technology companies need both: HIPAA compliance to satisfy regulatory requirements and business associate obligations, and SOC 2 Type II to satisfy enterprise procurement security reviews from hospital systems and health plans. Impact Risk Advisors designs HIPAA and SOC 2 compliance programs that share control libraries, evidence, and policy infrastructure - reducing duplication and total compliance cost.
Following discovery of a potential HIPAA breach, you have a 60-day window to notify affected individuals and HHS (and the media, if the breach affects 500+ residents in a state or jurisdiction). Immediately upon breach discovery: engage legal counsel; activate your incident response plan; contain and assess the breach; conduct a four-factor risk assessment to determine if notification is required (breaches of unsecured PHI are presumed to require notification unless the risk assessment establishes otherwise); and begin notification procedures. Impact Risk Advisors provides breach response support - from initial incident response through OCR investigation management and Corrective Action Plan compliance. If you are currently experiencing a breach, contact us immediately.
Encryption is an Addressable specification under the HIPAA Technical Safeguards (45 CFR §164.312(a)(2)(iv) for access control and §164.312(e)(2)(ii) for transmission security). "Addressable" does not mean optional - it means you must implement encryption if it is reasonable and appropriate for your environment, or document why an equivalent alternative measure was chosen instead. In practice, OCR guidance and enforcement actions make clear that encryption of ePHI at rest and in transit (TLS 1.2+ for transmission, AES-256 for storage) is the expected industry standard. Unencrypted ePHI that is lost or stolen constitutes a breach requiring full notification; encrypted ePHI that is lost or stolen is considered "safe harbor" and may not require breach notification if the encryption key was not also compromised.