Skip to main content
The Agency.
Back to Cybersecurity Glossary

Resources

HIPAA Compliance

HIPAA compliance refers to the adherence to standards established by the Health Insurance Portability and Accountability Act of 1996, which mandates how organizations must protect and handle protected health information (PHI).

HIPAA compliance encompasses interconnected requirements that organizations must implement across their entire operations, including the handling of protected health information. HIPAA compliance requires implementation of administrative, physical, and technical safeguards protecting patient health information while ensuring data privacy, security, and breach notification protocols.

Key Compliance Components

Risk Assessments: Organizations must conduct comprehensive evaluations identifying vulnerabilities in PHI handling, storage, and transmission systems to prioritize security investments and remediation efforts.

Safeguard Implementation: Organizations must deploy administrative controls like workforce training, physical security measures, and technical safeguards such as encryption and access management.

Documentation Requirements: Organizations must maintain detailed records for six years, including policies, procedures, and evidence of compliance activities.

Business Associate Management: Organizations must execute agreements with vendors handling PHI, ensuring third-party compliance through contracts specifying security obligations.

Cloud Services Considerations

Cloud services require evaluating shared responsibility models where providers manage infrastructure while organizations protect PHI. Business associate agreements must specify compliance responsibilities and procedures, including verification of provider certifications, encryption implementation, and audit log availability.

Training and Human Factors

Training addresses human factors causing most breaches through social engineering and policy violations. Effective programs combine role-based onboarding, annual refreshers, and incident-specific education, measured through testing and simulations focusing on practical scenarios.

HIPAA and Email Security

Email is a common vector for data breaches involving PHI, making email security a critical component of HIPAA compliance. Organizations must implement technical safeguards to prevent unauthorized access to PHI transmitted via email, including encryption, access controls, and advanced threat protection.

Data protection starts with email

Most data leaks originate from email. Secure the channel before a breach forces your hand.

Talk to our security team