HIPAA Security Rule
The HIPAA Security Rule establishes national standards for protecting electronic Protected Health Information (ePHI) in the United States. Published by the U.S. Department of Health and Human Services, it requires covered entities and business associates to implement administrative, physical, and technical safeguards. The rule applies to health plans, healthcare clearinghouses, healthcare providers that transmit health information electronically, and their business associates.
Overview
What is the HIPAA Security Rule?
The HIPAA Security Rule (45 CFR Part 160 and Part 164, Subparts A and C) is a US federal regulation that sets minimum security standards for protecting electronic Protected Health Information (ePHI). It is one component of the Health Insurance Portability and Accountability Act of 1996, alongside the Privacy Rule and Breach Notification Rule. The Security Rule specifically addresses the confidentiality, integrity, and availability of ePHI and requires covered entities to conduct risk analyses and implement appropriate safeguards.
What are the three types of HIPAA safeguards?
The Security Rule organises its requirements into three categories of safeguards:
- Administrative Safeguards (Section 164.308): Policies and procedures designed to manage the selection, development, implementation, and maintenance of security measures. Includes risk analysis, workforce security, information access management, security awareness training, contingency planning, and evaluation. These represent the largest section of the rule.
- Physical Safeguards (Section 164.310): Physical measures, policies, and procedures to protect electronic information systems and related buildings and equipment from natural and environmental hazards. Covers facility access controls, workstation use and security, and device and media controls.
- Technical Safeguards (Section 164.312): Technology and related policies that protect ePHI and control access to it. Covers access controls, audit controls, integrity controls, person or entity authentication, and transmission security.
What is the difference between required and addressable HIPAA specifications?
The Security Rule designates each implementation specification as either 'Required' or 'Addressable.' Required specifications must be implemented as stated. Addressable specifications require the organisation to assess whether the specification is reasonable and appropriate; if so, implement it; if not, document why and implement an equivalent alternative. Addressable does not mean optional. Organisations must document their rationale regardless of the decision.
What are the HIPAA breach notification requirements?
The Breach Notification Rule (Subpart D) requires covered entities to notify affected individuals within 60 days of discovering a breach of unsecured PHI. Breaches affecting 500 or more individuals require notification to the HHS Secretary and prominent media outlets simultaneously. Breaches affecting fewer than 500 individuals must be reported to HHS annually. Business associates must notify the covered entity within 60 days (or as specified in the Business Associate Agreement).
Key Controls
| ID | Control |
|---|---|
| 164.308(a)(1) | Security Management Process |
| 164.308(a)(3) | Workforce Security |
| 164.308(a)(5) | Security Awareness & Training |
| 164.308(a)(6) | Security Incident Procedures |
| 164.308(a)(7) | Contingency Plan |
| 164.310(a)(1) | Facility Access Controls |
| 164.312(a)(1) | Access Control |
| 164.312(e)(1) | Transmission Security |
Domains
Compare HIPAA Security Rule
Implementation Guides
Compare HIPAA Security Rule
Related Articles
Related Courses
HIPAA Security Rule by Industry
HIPAA Security Rule by Role
Frequently Asked Questions
What is HIPAA Security Rule?
How many controls does HIPAA Security Rule have?
Where does HIPAA Security Rule apply?
What frameworks does HIPAA Security Rule map to?
How do I get started with HIPAA Security Rule compliance?
How ready are you for HIPAA Security Rule?
Answer 25 questions and get a professional readiness report with gap analysis, maturity scores, and prioritised action items. Results in 5 minutes.