What is HIPAA?

by Jon Lober | NOC Technology

A Healthcare Business Owner's Guide to Understanding Compliance

If you own or manage a healthcare practice, you have probably heard this advice: "Make sure your IT is HIPAA compliant." The assumption is that HIPAA is primarily a technology problem, something your IT provider handles while you focus on patient care.


This assumption is dangerously incomplete.


HIPAA compliance is not an IT checkbox. It is an organizational commitment that touches every person, policy, and process in your practice. Your IT infrastructure matters, but so does the way your receptionist handles phone calls, how your nurses discuss patients, and whether your billing vendor signed the right agreements. Technology is one piece of a much larger puzzle.


This guide will help you understand what HIPAA actually requires so you can build real, sustainable compliance.


What is HIPAA?

The Health Insurance Portability and Accountability Act (HIPAA) became law in 1996. While the original legislation addressed health insurance portability, the law's privacy and security provisions have become its most significant legacy.


HIPAA's core purpose is straightforward: protect patient privacy and ensure the security of medical records.


HIPAA applies to two categories of organizations:

Covered entities include healthcare providers (clinics, hospitals, private practices), health plans, and healthcare clearinghouses. If you provide healthcare services and transmit health information electronically, you are a covered entity.


Business associates are vendors and partners who handle protected health information on behalf of covered entities. This includes billing services, IT providers, cloud software vendors, and medical transcription services.


HIPAA establishes three main rules:

  • The Privacy Rule defines who can access protected health information (PHI) and under what circumstances
  • The Security Rule establishes how organizations must protect PHI, particularly electronic records
  • The Breach Notification Rule specifies what organizations must do when PHI is compromised


The Three HIPAA Rules Explained


The Privacy Rule: Who Can Access Patient Information

The Privacy Rule defines what counts as protected health information and sets limits on how it can be used and shared.


PHI includes any information that can identify a patient and relates to their health condition, treatment, or payment. This covers patient names, medical record numbers, and diagnoses, but also appointment dates, photos, email addresses, and other identifiers connected to healthcare services.


Under the Privacy Rule, patients can access their own records, request amendments, and receive an accounting of who has viewed their information.


Healthcare organizations can share PHI for treatment, payment, and operations without specific authorization. Sharing for other purposes generally requires explicit consent.


The Privacy Rule introduces the "minimum necessary" principle: when sharing PHI, disclose only the information needed. Your billing department does not need access to clinical notes.


Any vendor who handles PHI must sign a Business Associate Agreement (BAA). If your IT provider or billing service has not signed a BAA, you have a compliance gap.


Critical point: Privacy Rule violations are often organizational, not technical. A receptionist discussing a patient's condition within earshot of others is a Privacy Rule issue. No firewall can prevent that.


The Security Rule: How to Protect Patient Information

The Security Rule focuses on electronic protected health information (ePHI) and establishes three categories of safeguards.


Technical safeguards

Include encryption of data at rest and in transit, access controls that limit who can view records, audit logs that track system activity, and backup systems.


Physical safeguards

Address security of spaces and devices where ePHI exists: controlling access to server rooms, securing workstations, and properly disposing of old equipment.


Administrative safeguards

Include security policies, workforce training, incident response plans, and regular risk assessments. Organizations must designate a security official and establish contingency plans.


The Security Rule also addresses workforce security: ensuring employees have appropriate role-based access and use strong passwords.


Technical safeguards are only one-third of the Security Rule. Physical and administrative safeguards depend heavily on organizational policies and staff behavior.


The Breach Notification Rule

What to Do When Things Go Wrong

The Breach Notification Rule establishes what organizations must do when PHI is compromised.


A breach is unauthorized acquisition, access, use, or disclosure of PHI. This includes ransomware attacks and stolen laptops, but also misdirected faxes and improper disposal of paper records.


Organizations must notify affected individuals within 60 days of discovery. If the breach affects 500 or more individuals, they must also notify media outlets and the Department of Health and Human Services (HHS) immediately. Notification letters must explain what happened, what information was involved, and how individuals can protect themselves.


The real cost of a breach extends beyond fines: notification expenses, legal fees, reputation damage, and potential lawsuits.


Why HIPAA Compliance is Organizational

Understanding the three rules makes one thing clear: HIPAA compliance cannot be delegated entirely to your IT department. It requires coordinated effort across your entire organization.


IT's Role

Your IT team handles critical technical safeguards:

  • Encrypting data at rest and in transit
  • Implementing access controls and multi-factor authentication
  • Maintaining audit logs
  • Managing backup and disaster recovery
  • Network security with firewalls and antivirus


These are essential. But alone, they are not sufficient.


Clinical Staff's Role

Your clinical team's behavior directly impacts compliance:

  • Exercising discretion in verbal communications (no patient discussions in hallways)
  • Properly disposing of paper records containing PHI
  • Following computer use policies (logging out, locking screens)
  • Recognizing phishing attempts and social engineering
  • Following procedures for accessing records


A clinician who simply ignores password policies creates a HIPAA violation. That is an organizational failure, not an IT failure.


Administration's Role (Essential)

Practice managers create the framework for compliance:

  • Ensuring annual HIPAA training for all staff
  • Executing BAAs with every vendor who handles PHI
  • Developing incident response procedures
  • Establishing access control policies
  • Managing patient consent procedures
  • Conducting regular risk assessments


Staff sharing patient information in the break room is a HIPAA issue. No encryption can prevent human behavior problems.


Common HIPAA Misconceptions

Myth: "One breach means bankruptcy."

Reality: HHS evaluates culpability. Organizations demonstrating good-faith compliance efforts often face reduced penalties.


Myth: "We're small, so HIPAA doesn't apply."

Reality: HIPAA applies to all covered entities regardless of size. Solo practitioners have the same obligations as hospital systems.


Myth: "Cloud services violate HIPAA."

Reality: Cloud services can be HIPAA-compliant when providers sign BAAs and implement required safeguards.


Myth: "HIPAA fines are always devastating."

Reality: Fines range from $100 to $50,000 per violation depending on culpability.


HIPAA in Practice

Scenario 1: The Visible Chart

A receptionist leaves a patient chart visible on the desk. Another patient sees the information. This is a Privacy Rule violation with no technology involved.


Scenario 2: The Vendor Laptop

Your billing service's employee has a laptop stolen containing your patient data. Your practice may face liability without a proper BAA in place.


Scenario 3: The Shared Password

A physician shares their EHR login with a nurse for convenience. This is a Security Rule violation: audit logs cannot determine who actually accessed records.


Scenario 4: The Discovered Breach

You discover an employee accessed 50 patient records without authorization. You must notify patients, assess risk, document your response, and potentially report to HHS.


Building HIPAA Compliance in Your Practice

  • Conduct a risk assessment. Identify where PHI exists, who has access, and what vulnerabilities exist. HHS provides guidance on these assessments.
  • Develop comprehensive policies.  Document procedures for access control, password management, device security, and incident response.
  • Execute Business Associate Agreements.  Every vendor who handles PHI needs a signed BAA.
  • Train all staff annually. Training should cover rules, policies, and practical scenarios.
  • Implement technical safeguards.  Work with IT to ensure encryption, access controls, and audit logging.
  • Designate a Privacy Officer.  Someone must oversee compliance, manage incidents, and keep policies current.
  • Test your incident response plan.  Conduct tabletop exercises before a real breach occurs.
  • Stay current.  HHS releases guidance updates. Subscribe to announcements and consider joining compliance associations.


Moving Forward with Confidence

HIPAA compliance is achievable. It requires organizational commitment, but thousands of healthcare practices maintain effective compliance programs every day.


Compliance is not a product you purchase or a service you outsource. It is a culture you build through policies, training, and consistent attention to how your organization handles patient information.


If building your compliance program feels overwhelming, consider partnering with experts. Your IT provider can implement technical safeguards, but you may also benefit from compliance specialists and legal counsel.


NOC Technology helps healthcare practices build the technical foundation for HIPAA compliance. We can also help identify gaps and connect you with compliance resources. Ready to evaluate your practice's HIPAA readiness? Let's talk: discuss your situation and identify next steps.

Frequently Asked Questions

Does HIPAA apply to my small practice? +
Yes. HIPAA applies to all covered entities that transmit health information electronically, regardless of size. A solo practitioner with one employee has the same HIPAA obligations as a hospital system. Many of the misconceptions about HIPAA stem from the belief that only large organizations need to comply, but that is not true. If you provide healthcare services and handle patient data electronically, you are a covered entity.
What is a Business Associate Agreement (BAA) and why do I need one? +
A BAA is a contract that establishes HIPAA responsibilities between your practice (covered entity) and vendors or partners who handle patient data (business associates). This includes your IT provider, billing service, medical transcription service, or any cloud software vendor. Without signed BAAs, you have a compliance gap and potential liability if a vendor causes a breach. Every vendor who touches patient data must sign a BAA.
If we encrypt our data, are we HIPAA compliant? +
Encryption is important, but it is not enough. HIPAA compliance requires technical safeguards (encryption, access controls, audit logs) plus physical safeguards (secure server rooms, device disposal) plus administrative safeguards (policies, training, incident response). A receptionist discussing a patient's condition in the hallway or staff sharing confidential information in the break room creates a Privacy Rule violation that no amount of encryption can prevent. Compliance is an organizational commitment, not just a technology solution.
What counts as a HIPAA breach and how much trouble are we in if it happens? +
A breach is unauthorized acquisition, access, use, or disclosure of patient information. This includes ransomware attacks, stolen laptops, misdirected faxes, and improper disposal of records. The consequences depend on the severity and your compliance efforts. HHS evaluates culpability, and organizations demonstrating good-faith compliance efforts often face reduced penalties. Fines range from $100 to $50,000 per violation, but costs also include notification expenses, legal fees, credit monitoring, and reputation damage. This is why prevention is far cheaper than dealing with a breach after it happens.
Is my IT team responsible for all of HIPAA compliance? +
No. This is a critical misconception. HIPAA compliance is shared responsibility. Your IT team handles technical safeguards (encryption, access controls, backups). Your clinical staff ensure proper handling of patient data (discretion in conversations, secure disposal of records, following policies). Your administration creates the framework (BAAs, training, policies, incident response). A clinician who shares a password is creating a violation that IT cannot prevent. Compliance is organizational, not just technical.
How do we get started building HIPAA compliance? +
Start with a risk assessment to identify where patient data exists, who has access, and what vulnerabilities exist. Then develop written policies for access control, password management, device security, and incident response. Execute BAAs with all vendors. Conduct annual HIPAA training for staff. Designate a privacy officer to oversee compliance and manage incidents. Work with IT to implement encryption, access controls, and audit logging. This is an ongoing process, not a one-time project. Many practices find it helpful to partner with external consultants for the initial assessment and policy development.
Can we use cloud services like OneDrive or Google Drive for patient data? +
Cloud services can be HIPAA-compliant if the provider has signed a BAA with you and implements required encryption and access controls. Major providers like Microsoft 365 offer HIPAA-compliant options with proper agreements. However, personal OneDrive, Dropbox, or Google Drive accounts are not secure for patient data without a BAA. Always verify that your cloud provider has signed a BAA and implements appropriate security measures before storing any patient information.
how to justify the cost of IT to executives and a board of directors
By Jon Lober March 3, 2026
Proving managed IT ROI is hard because success means nothing happened. Learn to quantify prevention, downtime costs, and productivity gains your CFO will accept.
By Jon Lober March 3, 2026
Local dental office IT support with EHR security & HIPAA compliance. Patient records safe, zero downtime, local technicians. Never overseas.
AI attacks
By Jon Lober March 2, 2026
Google confirms hackers now use AI to attack faster and smarter. Learn why traditional security fails and what St. Louis businesses need instead.
More Articles