Most businesses choose an IT provider based on price alone — and pay for it later. Get matched based on actual fit. →

Compliance Guide · HIPAA · 2026

HIPAA IT Compliance Guide:
What Your Technology Stack Must Do

HIPAA's Security Rule doesn't prescribe specific technologies — it requires outcomes. This guide translates those outcomes into the actual IT controls, configurations, and vendor requirements that keep a healthcare organization compliant and audit-ready.

Updated May 2026 25 min read For Practice Administrators, Healthcare IT Managers & Compliance Officers

HIPAA and IT: The Framework Overview

HIPAA's Security Rule requires covered entities and their business associates to implement administrative, physical, and technical safeguards to protect electronic Protected Health Information (ePHI). The rule is intentionally technology-neutral — it doesn't require specific software or hardware. What it requires are outcomes: confidentiality, integrity, and availability of ePHI.

The three categories of safeguards:

OCR (the HHS Office for Civil Rights) enforces HIPAA through audits, complaints, and breach investigations. Their enforcement focus has consistently prioritized risk analysis failures, access controls, encryption, and audit logging.

The HIPAA Risk Assessment: Foundation of Everything

Every HIPAA compliance program starts with a documented risk assessment (§164.308(a)(1)). This is the single most commonly cited deficiency in OCR enforcement actions. What it requires:

OCR enforcement pattern: The most common path to a multi-million dollar HIPAA settlement is: breach occurs → OCR investigates → discovers no documented risk assessment → settlement includes corrective action plan with monitoring. The breach itself is often far less expensive than the regulatory response to missing documentation.

Technical Safeguards: The IT Control Requirements

Access Controls (§164.312(a)(1))

Required: Unique user identification, emergency access procedure, automatic logoff, encryption and decryption. Addressable: Automatic logoff (implementation is required if appropriate).

Audit Controls (§164.312(b))

Required: Hardware, software, and procedural mechanisms that record and examine activity in information systems that contain or use ePHI.

Integrity Controls (§164.312(c)(1))

Required: Policies to protect ePHI from improper alteration or destruction. Addressable: Electronic mechanisms to corroborate that ePHI has not been altered or destroyed in an unauthorized manner.

Transmission Security (§164.312(e)(1))

Required: Technical security measures to guard against unauthorized access to ePHI transmitted over electronic communications networks. Addressable: Encryption of ePHI in transit (required if appropriate — which it is in virtually all cases).

Physical Safeguards: What IT Covers

Physical safeguards overlap with IT in several areas:

Business Associate Agreements (BAAs): Every Vendor Matters

Any vendor that creates, receives, maintains, or transmits ePHI on your behalf is a Business Associate under HIPAA and must sign a BAA. Your IT provider is a Business Associate. Cloud vendors storing ePHI (even indirectly) are Business Associates.

Key BAA requirements:

Vendors that commonly need BAAs that practices miss: Cloud backup services, email providers (if ePHI is ever in email), practice management software, billing services, IT managed service providers, phone system providers (if voicemails contain patient information), answering services, and cloud storage (Dropbox, Google Drive, OneDrive) if ePHI is stored there. Most major vendors have standard BAAs available — ask specifically for one.

Encryption Requirements: The Practical Standard

HIPAA technically classifies encryption as "addressable" rather than required — meaning covered entities must implement it if appropriate (and assess and document if they determine it's not). In practice, OCR has made clear that not encrypting ePHI is extremely difficult to justify, and virtually all enforcement guidance treats encryption as effectively required.

The encryption standards that satisfy HIPAA:

Backup and Disaster Recovery (Contingency Plan — §164.308(a)(7))

HIPAA requires a contingency plan with five components:

  1. Data backup plan — Documented procedures for creating and maintaining retrievable exact copies of ePHI
  2. Disaster recovery plan — Documented procedures to restore lost data
  3. Emergency mode operation plan — Procedures to enable continuation of critical business processes during a system emergency
  4. Testing and revision procedures — Procedures to periodically test and revise contingency plans
  5. Applications and data criticality analysis — Assessment of the relative criticality of specific applications and data to prioritize recovery
What this means in practice

A backup that runs every night is not the same as a HIPAA contingency plan. The plan must be documented, tested, and reviewed. Testing means actually restoring from backup and verifying the restore works — not just checking that the backup completed successfully. Most practices that have "backups" have never tested a restore from them.

Breach Response: The 72-Hour and 60-Day Rules

When a HIPAA breach occurs (or is suspected), the response timeline:

Smaller breaches (under 500 individuals) can be reported to HHS in an annual log submitted within 60 days of the end of the calendar year. Large breaches trigger immediate media notification requirements.

What Your IT Provider Must Do for HIPAA

Frequently Asked Questions

What is the HIPAA Security Rule and who does it apply to?
The HIPAA Security Rule establishes standards for protecting electronic Protected Health Information (ePHI). It applies to covered entities (healthcare providers, health plans, clearinghouses) and their business associates — including IT providers who access systems with ePHI. Your IT provider must sign a BAA.
What is a HIPAA risk assessment and how often is it required?
A HIPAA risk assessment documents potential risks and vulnerabilities to ePHI confidentiality, integrity, and availability. No specific frequency is mandated, but OCR recommends conducting one whenever your environment changes significantly, and best practice is annually. It must be documented and drive your risk management plan.
What are the penalties for a HIPAA breach?
Civil penalties range from $100–$50,000 per violation with annual caps up to $1.9M. OCR settlements often reach $1–$5M. Beyond financial penalties, mandatory breach notification to individuals and HHS creates reputational and class action liability.
Free Tool
Does your current IT provider actually support your compliance obligations?
Grade your MSP in 15 questions. Get a letter grade + actionable breakdown.
Take the MSP Scorecard →

Need a HIPAA-Compliant IT Provider?

Answer 7 questions. Get matched with MSPs that have signed BAAs, understand EHR platforms, and have been through HIPAA audits before.

Find the Right IT Provider →