The HIPAA Security Rule in Plain Language
The Security Rule protects electronic patient data through specific technical, administrative, and physical safeguards. Here is what it actually requires — without the legalese.
Technical Safeguards — What Your Systems Must Do
These are the technology measures required to protect electronic PHI.
Access Controls
Unique user IDs, emergency access procedures, automatic logoff, and encryption/decryption. Every user must have their own login — no shared accounts.
Audit Controls
Hardware, software, and procedural mechanisms to record and examine activity in systems containing ePHI. You must be able to show who accessed what and when.
Integrity Controls
Policies and procedures to protect ePHI from improper alteration or destruction. Includes mechanisms to authenticate that data has not been tampered with.
Transmission Security
Technical security measures to guard against unauthorized access to ePHI being transmitted over a network. Encryption is addressable but strongly recommended.
Administrative Safeguards — Your Policies & People
The largest category — covering your security program, workforce, and risk management.
Security Management Process
Risk analysis, risk management, sanctions for violations, and information system activity review. The foundation of your HIPAA compliance program.
Workforce Security
Authorization and supervision procedures, workforce clearance, and termination procedures. Ensuring only authorized personnel access ePHI.
Information Access Management
Access authorization, access establishment and modification policies. Role-based access controls for your EHR and patient data systems.
Security Awareness Training
Security reminders, protection from malicious software, login monitoring, and password management training for all workforce members.
Contingency Planning
Data backup plan, disaster recovery plan, emergency mode operation plan. What happens when systems go down — planned and unplanned.
Need Help with Security Rule Compliance?
Security Rule FAQ
Required specifications must be implemented as stated — there is no flexibility. Addressable specifications must be assessed: if the specification is reasonable and appropriate for your environment, you must implement it. If not, you must document why and implement an equivalent alternative measure. Addressable does not mean optional.
No. The HIPAA Security Rule applies exclusively to electronic protected health information (ePHI). Paper records are covered by the Privacy Rule. However, most practices today handle nearly all patient data electronically, so the Security Rule applies broadly across EHR systems, billing, scheduling, imaging, and communication platforms.
No. While reputable EHR vendors implement security controls on their platforms, HIPAA compliance is a shared responsibility. You are responsible for how your practice accesses the system, who has credentials, how devices are secured, and how data is handled outside the EHR. A signed Business Associate Agreement with your vendor is required but does not make you compliant.
HIPAA compliance made simple
Protect patient data and avoid costly violations with our comprehensive healthcare cybersecurity solutions.
