Live Webinar | 26 June 2025 9AM PT
From Black Box to Boardroom: Operationalizing Trust in AI Governance
April 29, 2025

What is HIPAA Compliance? Key Requirements, Covered Entities, Checklists, Certification Steps, Violations, and Penalties

HIPAA compliance is critical for U.S. healthcare providers, insurers, and their business associates—including international organizations handling protected health information (PHI). Since its inception in 1996, HIPAA has evolved to safeguard patient privacy, with stricter enforcement and significant penalties for non-compliance. Cyber threats like ransomware have made compliance even more urgent.

In January 2025, Northeast Surgical Group, P.C. paid $10,000 to settle a HIPAA ransomware cybersecurity investigation—the 10th such action by the Department of Health and Human Services Office for Civil Rights (OCR). These attacks often expose PHI and trigger HIPAA’s breach notification rule, making them a top regulatory concern. With enforcement tightening, healthcare organizations must understand HIPAA requirements, compliance checklists, and potential violations.

Whether you’re a healthcare provider, insurer, or vendor handling PHI, this HIPAA compliance guide offers practical insights to help ensure compliance and protect patient data.

What is HIPAA compliance?

The Health Insurance Portability and Accountability Act (HIPAA) is a United States (US) federal law enacted in 1996 to safeguard patient's'' health information through privacy and security standards. It also aims to ensure health insurance portability and allow employees to retain coverage between jobs.

HIPAA compliance requires organizations in the US that manage PHI to protect patient data by adhering to security, privacy, and breach notification rules. PHI refers to any identifiable health information that is created, stored, or shared during the delivery of care or related operations, whether in physical, electronic, or verbal form. HIPAA includes guidelines for how healthcare organizations and their business associates must collect, store, use, and share PHI to ensure its confidentiality, integrity, and availability.

HIPAA Covered entities

Covered entities are individuals or organizations directly handling PHI. These entities include health service providers such as hospitals, pharmacies, nursing homes, and doctors who access PHI to carry out treatment, payment, and other healthcare operations.

Other covered entities include Hhealth insurance companies, health maintenance organizations (HMOs), healthcare clearing houses. Employer-sponsored health plans also fall under this category when they manage PHI, although the employer itself may not always be directly subject to HIPAA.

Role of Business associates in HIPAA

Business associates provide support services handling PHI for covered entities and other associates, such as IT service providers, cloud platforms, and consultancies.

Read Our Dedicated Article on HIPAA Covered Entities , Non- Covered Entities and Business Associates

How HIPAA compliance applies to startups, enterprises, and telehealth providers?

PHI and HIPAA compliance aren’t limited to traditional healthcare providers. Startups and telehealth providers offering wellness programs, fitness apps, and wearable health devices may need to comply with HIPAA regulations. This applies if they collect sensitive health-related data—such as heart rate, sleep patterns, or workout routines—that could be considered PHI.

If these programs and apps collect, store, or share the user’s health information on behalf of a covered entity—like a hospital, insurance company, or provider network, then it could be considered PHI, and the organizations are responsible for protecting their users’ data as per HIPAA regulations.

For example, mobile apps such as Fitbit partnering with payers, providers, and employers collect user health data, including heart rate and dietary habits, to track users’ fitness progress.

Wearable health devices, such as the Apple Watch, track users’ physical activity and vital health signs like heart rate and blood pressure. Apple stores user health data in a secure system in accordance with HIPAA privacy and security standards. Users maintain control over sharing health data with providers and other apps. Any health data from Apple Watch that users choose to share with other healthcare organizations is treated in accordance with the organization’s data policy.

Even as these health tech companies implement encryption to protect user data and give users greater control, security incidents still occur. A notable example is the MyFitnessPal app, which experienced a data breach in 2018 when an unauthorized party acquired data associated with 150 million app users.

HIPAA regulations may apply if your fitness app, wellness program, or wearable device collects, processes, or shares data that can be considered PHI with covered entities (such as health insurers or medical providers).

HIPAA compliance rules and requirements in 2025

HIPAA regulations are organized into distinct rules, which ensure that covered entities and business associates safeguard PHI through reasonable physical, administrative, and technical measures.

1. The HIPAA privacy rule

The privacy rule requires covered entities to create processes and procedures to keep PHI confidential. It defines standards for protecting patients' personally identifiable health information, including medical diagnoses, prescriptions, procedures, social security numbers, and more. The rule also applies to business associates accessing PHI.

2. The HIPAA security rule

The security rule defines multiple standards for protecting patient information.

  • Administrative safeguards include policies, training programs, security management plans, and hiring security personnel to help run these programs.
  • Technical safeguards include access controls, encryption, audit controls, and user authentication systems to prevent unauthorized access or disclosure.
  • Physical safeguards include business access controls, workstation security, and device management to protect PHI from physical threats.

3. The HIPAA breach notification rule

The rule mandates that covered entities and business associates notify affected patients in the event of a PHI breach. Depending on the extent of data compromise, they may also be required to notify the Department of Health and Human Services (HHS) or other stakeholders, and in some cases, the media.

4. The HIPAA enforcement rule

Added to HIPAA in 2006, this rule grants the authority to the HHS Office for Civil Rights (OCR) to investigate covered entities and business associates for HIPAA violations, including breaches of ePHI, failure to implement adequate security safeguards, and non-compliance with the privacy rule.

5. The Omnibus rule

Enacted in 2013, the HIPAA Omnibus rule strengthens patient privacy and security by expanding the scope of HIPAA, specifically regarding business associates. It updates and clarifies previous rules to enhance data security and patient control, making business associates directly liable for HIPAA compliance.

What is HIPAA certification?

HIPAA training is widely called HIPAA certification. The certification or training isare not officially recognized by the Department of Health and Human Services. The training program educates individuals and organizations on HIPAA rules, privacy practices, and security measures. Though it's not officially required, organizations pursue HIPAA certification through accredited training providers to demonstrate their commitment to protecting PHI and ensuring compliance with HIPAA regulations.

What are the available HIPAA certification programs for businesses?

While there's no single, universally accepted HIPAA compliance certification, businesses can demonstrate their compliance through any of the following certification and training programs:

1. HHS

HHS provides free learning resources to organizations and individuals to enable them to understand the basics of HIPAA rules and regulations.

2. 360training

This private HIPAA training and certification program is offered by 360training, an IACET-accredited company. The organization offers 100% online training programs covering all aspects of HIPAA, including privacy, security, and breach notification.

3. Cyber Security Hive

It offers HIPAA compliance certification programs tailored for different roles, such as administrators, security experts, and compliance officers.

When selecting a certification program, consider factors such as accreditation, course relevance, and your organization's specific needs to ensure that the training and certification align with your compliance and business objectives.

Common HIPAA violations and how to avoid them

HIPAA violations result from an organization's failure to comply with regulations. These violations can lead to unauthorized access to PHI, impermissible disclosures, data breaches, and unintentional mistakes, such as mishandling patient information. The consequences for healthcare organizations can be severe, including financial penalties and reputational damage. Some common HIPAA violations are as follows:

1. Unauthorized access to PHI

An impermissible use or disclosure under HIPAA occurs when PHI is accessed, used, or shared without proper authorization or legal justification. While not every unauthorized use qualifies as a breach, it may be considered one if it compromises the privacy or security of the PHI. Sharing patient information without consent or proper authorization is considered an impermissible uses orand disclosures, leading to penalties for HIPAA non-compliance.

2. Lack of proper encryption and security controls

Organizations' fFailure to implement appropriate security measures, such as access control, can lead to employees gaining unauthorized access to PHI and data breach. Additionally, the lack of data encryption increases the likelihood of breaches that compromise patient privacy.

Organizations must implement robust security measures, such as encryption, strict access controls, and audit controls, to monitor access to PHI and reduce the risk of unauthorized access or data breaches.

For example, Gulf Coast Pain Consultants was fined $1.19 million in 2024 for HIPAA security rule violations after a data breach report indicated that a former contractor for the company had impermissibly accessed their electronic record system.

3. Improper data sharing and disposal

Organizations discarding physical records without shredding or leaving electronic data accessible can expose patient information to unauthorized individuals and entities. To avoid this risk, they must follow secure disposal methods such as certified shredding and permanent data deletion.

4. Failure to conduct regular risk assessments

Healthcare organizations must conduct periodic risk assessments to detect vulnerabilities and take timely remedial actions to prevent threats and avoid non-compliance with HIPAA regulations. These evaluations help organizations identify security gaps and take corrective actions before an incident occurs.

5. Non-compliance with business associate agreements (BAAs)

Covered entities must have business associate agreements (BAAs) with third parties that handle PHI on their behalf. A lack of proper agreements conforming to HIPAA guidelines can lead to significant compliance issues.

Covered entities must ensure all business associates sign HIPAA-compliant agreements before sharing PHI with them.

6. Failure to comply with individuals' rights

Patients have the right to access their records and request corrections in their PHI. Healthcare organizations' failure to uphold these rights can result in compliance violations. Organizations must establish a defined mechanism to process patient requests.

For example, Oregon Health & Science University was penalized with a fine of $200,000 in March 2025 for its failure to provide timely access to patient records.

7. Lost or stolen devices

Unsecured laptops, smartphones, or USB drives with patient data pose a significant security risk. Organizations must encrypt all portable devices and enforce strict access policies to mitigate this risk. Admins must also ensure that the access credentials and permissions of employees leaving the organization are revoked to prevent unauthorized access to patient information.

HIPAA penalties and fines in 2025

HIPAA violations are classified as civil and criminal and can be penalized with fines, a corrective action plan, or even jail time. Depending on the severity and nature of the violation, the penalty can range from thousands to millions of dollars.

Civil penalties

When HIPAA violations occur due to non-compliance, negligence, or lack of security measures, the Office for Civil Rights (OCR) imposes civil penalties on organizations. Based on the severity of violations, civil penalties are categorized into four tiers.

  • Tier 1: Unaware of the violation due to lack of knowledge. The penalty ranges from a minimum of $141 to a maximum penalty of $71,162 per violation.
  • Tier 2: Violation due to reasonable cause but not willful neglect. The penalty can range from a minimum of $1,424 to a maximum penalty of $71,162 per violation.
  • Tier 3: Willful neglect, though corrective actions were later taken. The penalty can range from a minimum of $14,232 to a maximum penalty of $71,162 per violation.
  • Tier 4: Willful neglect with no correction within 30 days. The penalty can range from a minimum of $71,162 to a maximum of $2,134,831 per violation.

Criminal penalties

HIPAA violations involving malicious intent, fraud, or knowingly obtaining and unlawfully disclosing PHI result in criminal penalties. The Department of Justice (DOJ) handles these penalties, classifying them into three levels. A judge decides the jail term and accompanying fine based on the specifics of each case.

  • Tier 1: The violation was committed unknowingly or due to negligence. The penalty can be up to one year in jail.
  • Tier 2: PHI was obtained under false pretenses but without malicious intent. The jail term can be up to five years.
  • Tier 3: PHI was obtained for personal gain or with malicious intent. Penalty: Up to 10 years in jail.

Each tier may also include monetary fines, as determined by the judge.

HIPAA compliance checklist

A HIPAA compliance checklist is essential for organizations to systematically ensure they meet all security, privacy, and breach notification requirements. A structured checklist enables organizations to protect patient data and demonstrate due diligence in compliance audits.

Step 1: Determine if the HIPAA privacy rule applies to you

The Privacy Rule applies to fewer organizations than the Security Rule; however, it is essential for all organizations to understand the Privacy Rule provisions since they're the foundation of HIPAA compliance and are essential for complying with other rules.

Understand what constitutes PHI, how it can be used and disclosed, and when individual authorization is required. Evaluate risks associated with maintaining PHI confidentiality and implement safeguards to minimize risks to a reasonable and appropriate level.

Step 2: Conduct a HIPAA risk assessment

A comprehensive HIPAA risk assessment checklist includes the following steps for IT and compliance officers:

  • Identify all types of PHI handled within the organization and conduct a risk analysis to evaluate vulnerabilities and threats to PHI, considering both electronic and physical risks.
  • Assess existing administrative, physical, and technical safeguards to protect PHI.
  • Evaluate access controls and authentication methods to ensure PHI access is limited to authorized personnel.
  • Assess whether the risk mitigation plan adequately addresses the identified risks and whether responsible personnel have been identified to manage these risks.
  • Establish a process for periodic review and update of compliance policies to incorporate the latest regulatory developments.

Step 3: Implement administrative, physical, and technical safeguards

The HIPAA Security Rule checklist includes standards to ensure the confidentiality, integrity, and availability of PHI and ePHI.

  • Administrative safeguards include a security management process, designating security officers, information access management, security awareness and training, security incidentce procedures, a contingency plan, and periodic evaluations.
  • Physical safeguards cover facility access control, workstation security and use, and device and media controls.
  • Technical safeguards include system access control, audit controls, integrity controls, person or entity authentication, and transmission security.

Step 4: Conduct HIPAA training and awareness programs for employees

A HIPAA training and awareness program ensures employees understand privacy rules, security practices, and their role in protecting patient data. Training helps organizations prevent human errors and violations and reinforces compliance with evolving regulations. A trained workforce helps organizations avoid breaches, civil and criminal penalties, and reputational damage, making HIPAA training an integral component of the compliance checklist.

Step 5: Ensure BAAs are in place

Covered entities must ensure they have BAAs in place for third-party vendors handling PHI on their behalf. A BAA ensures vendors follow the same security and privacy standards. Without a BAA, an organization is liable for any breaches caused by its vendors.

Step 6: Conduct continuous monitoring, auditing, and risk mitigation

IT and compliance officers must implement a robust audit control framework focusing on IT systems and applications.

  • Systems containing ePHI must log all access and modifications using automated logging mechanisms to track who accessed what data and when.
  • Monitor system activities to identify unauthorized access or unusual behavior and use intrusion detection systems (IDS) to detect anomalies indicating potential breaches.
  • Periodically review audit logs to investigate suspicious activities, ensure compliance, and enhance your security posture against data breaches.

How Scrut simplifies HIPAA compliance?

Scrut is a leading HIPAA compliance automation platform that strengthens your HIPAA compliance posture with pre-built controls and continuous compliance monitoring. It simplifies end-to-end HIPAA compliance by managing activities across the value chain, from cloud risk assessments and control reviews to employee policy attestations and vendor risk management. Featuring 1,400+ pre-mapped controls across 50+ frameworks, Scrut minimizes manual effort by up to 70%, ensuring seamless HIPAA compliance.

Protect PHI using in-built and customized policies

Scrut offers a library of 75+ expert-vetted policies while allowing you to upload your custom policies through an in-built editor that also supports version control. The editor enables you to adjust policies to meet your organization's needs.

Automated evidence collection to streamline compliance

Scrut integrates with popular third-party applications to automate evidence collection across your HRIS systems, cloud providers, and IT systems. It automates 80% of the evidence collection, reducing manual efforts and improving efficiency. The evidence is logged and tracked in real-time, ensuring you have a 100% audit-ready view of all evidence mapped to the corresponding HIPAA controls.

Access to in-house HIPAA compliance experts

Scrut provides access to a network of HIPAA compliance specialists, including auditors and consultants, offering guidance on policy implementation, audit readiness, and best practices.

Continuous control monitoring for real-time risk assessment

Scrut continuously monitors compliance across policy management, employee training, vendor risk, access control, and cloud security. The platform automates policy checks, tracks security training completion, ensures timely vendor risk assessments, and highlights outdated access rights. It also scans cloud environments to detect misconfigurations that could lead to compliance failures. Scrut provides real-time visibility into control effectiveness, enhancing HIPAA audit readiness.

Integrations with EHRs, cloud platforms, and security tools

Scrut integrates with electronic health records (EHRs) to monitor data access, enforce role-based permissions, and track PHI usage, ensuring compliance with HIPAA's Privacy Rule.

Scrut's integrations with cloud security tools enable organizations to continuously assess their cloud environments for security risks and misconfigurations while automating compliance reporting to meet HIPAA's technical safeguards. Scrut automatically maps controls to different standards and displays their compliance status in real-time.

Audit-ready documentation to reduce manual effort

The platform’s comprehensive audit logs enable organizations to maintain an audit trail of security controls and remediation actions. The audit logs capture every update, change, and progress made, ensuring a precise compliance record with minimal manual effort.

Protecting patient data and staying compliant with HIPAA regulations can be complex—but the right HIPAA compliance software makes it easier. A strong solution should automate audits, provide continuous monitoring, offer expert support, and integrate easily with your existing tech stack to minimize risk and boost efficiency.

Scrut simplifies HIPAA compliance with continuous monitoring, detailed risk assessments, third-party vendor assessments, real-time, automated evidence collection, and expert guidance—helping you stay secure without the manual hassle.Ensure your organization is always audit-ready. Schedule a demo with Scrut today to see how effortless HIPAA compliance can be.

Liked the post? Share on:
Table of contents
Join our community
Join our community and be the first to know about updates!
Subscribe
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

Join our community and be the first to know about updates!

Subscribe
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

Related Posts

Risk Management
Compliance Essentials
Risk Management Strategy: Meaning, Types, Responses, Examples
Cloud Security
Risk Management
Vulnerability Management
Compliance Essentials
Trust Management
SecuriTea Time Ep 1 | Securing the Future: Strategies to Master Cloud Security
Compliance Essentials
Trust Management
Risk Management
Risk Grustlers EP 2 | Do Auditors Have Horns?

Ready to see what security-first GRC really looks like?

Ready to see what security-first GRC really looks like?

Ready to see what security-first GRC really looks like?

See what a real security- first GRC platform looks like

Ready to see what security-first GRC really looks like?

Focus on the traveler experience. We’ll handle the regulations.

Get Scrut. Achieve and maintain compliance without the busywork.

Choose risk-first compliance that’s always on, built for you, and never in your way.

Ready to see what security-first GRC
One platform, every framework. No more duplicate work.
You can’t manage user access if you’re always playing catch-up.
Explore the future of enterprise GRC
Tired of chasing vendors for risk assessments?

Join the thousands of companies automating their compliance with Scrut.

The right partner makes all the difference. Let’s grow together.

Make your business easy to trust, put security transparency front and center.

Risk-first security starts with risk-first visibility.
Secure your team from the inside out.
Don't settle for slow, expensive compliance. Get Scrut instead.
Risk-first compliance for forward-thinking teams.
Audits without the back-and-forth. Just seamless collaboration.
Scale fast. Stay compliant. Automate the rest.
Compliance? Done and dusted, in half the time.
Get ahead of GDPR compliance before it becomes a problem.
Outgrowing table-stakes compliance? Create custom frameworks with ease.
Navigate SOC 2 compliance, minus the stress.
PCI DSS compliance, minus the panic.
Take the wheel of your HIPAA certification journey today.
We’ve got what you need to fast-track your ISO 27001 certification.
Make your NIST AI RMF journey as smooth as possible.

Your GRC team, multiplied and AI-backed.

Modern compliance for the evolving education landscape.

Ready to simplify healthcare compliance?

Don’t let compliance turn into a bottleneck in your SaaS growth.

Find the right compliance frameworks for your business in minutes

Ready to see what security-first GRC really looks like?

Real-time visibility into every asset

Ready to simplify fintech compliance?

The Scrut Platform helps you move fast, stay compliant, and build securely from the start.

Scrut helps you set up a security program that scales with your business and stands up to audits. Without last-minute chaos.

Scrut helps you streamline audits, close deals faster, and stay ahead of risk without slowing down your team. Because trust shouldn’t take months to earn.

Scrut helps you set up a security program that scales with your business and stands up to audits. Without last-minute chaos.

Tag, classify, and monitor assets in real time—without the manual overhead.

Whether you're entering new markets or launching new products, Scrut helps you stay compliant without slowing down.

Scrut pulls compliance data straight from the tools you already use—so you don’t have to dig for evidence, chase approvals, or manually track controls.

Less manual work, more customizability. The Scrut Platform gives you everything you need to align your compliance to your business’s priorities.

With Scrut, you’re not just adding a tool to your offering—you’re adding a competitive edge. Join our Partner Network and help your clients streamline their GRC program.

Gaining trust is your first step to growing and cracking better deals. The Scrut Platform comes pre-built with all the tools you need to showcase a firm security posture and build confidence.

Don’t settle for rigid systems—Scrut ensures your risk management strategy is as flexible as your business needs.

Start building a security-first culture. Save your operations from improper training and a lack of compliance awareness.

Scrut fast-tracks compliance so you can focus on scaling, not scrambling. Automate compliance tasks and accelerate enterprise deals—without the grind.

Automate assessments, track compliance, and get full visibility into third-party risk—all in one place.

Scrut automates compliance tasks, supports proactive risk management, and saves you time, so you can focus on growing your business. Start building trust with customers and scaling confidently.

Leave legacy GRC behind. Meet the AI-powered platform built for teams managing risk and compliance in real time.

Give auditors direct access, keep track of every request, and manage audits effortlessly—all in one place.

Scrut ensures access permissions are correct, up-to-date, and fully compliant.

Whether you need fast results or a fully tailored program mapped to your risks and needs, Scrut delivers exactly what you need, when you need it. Ready to start?

Scrut unifies compliance across all your frameworks, so you can stop juggling systems and start scaling securely.

Manually managing your compliance processes and audits can get inefficient and overwhelming. Scrut automates these outdated, manual processes and eliminates your last-minute worries.

Access automated compliance, real-time risk tracking, and expert-backed support—all in one platform. Get started with Scrut!

Less manual work, more customizability. The Scrut Platform gives you everything you need to align your compliance to your business’s priorities.

The Scrut Platform helps you move fast, stay compliant, and build securely from the start.

Earn trust and back it up with solid evidence. Scrut takes you through the SOC 2 compliance journey step-by-step, navigating every complexity you face.

Manage your PCI DSS compliance with real-time monitoring and effortless automation. Get started with Scrut today!

Securing your PHI shouldn’t be a constant hassle. Scrut automates your workflows—from risk assessments to monitoring—so you can put your compliance worries on the back burner.

Automate security controls, simplify audits, and keep your ISMS aligned with the latest standards. Get started with Scrut!

Tackle potential AI risks with NIST AI RMF-compliant controls and get expert support every step of the way.

Offload the grunt compliance work to us. Execute manual, draining GRC tasks with the reliable AI-powered Scrut Teammates without switching contexts or bottlenecks.

Whether you're managing student data, partnering with educational institute, or expanding to new geographies—Scrut gives you the tools to stay compliant, manage risk, and build trust at every step.

Scaling healthcare doesn’t have to come at the cost of security. Scrut keeps your organization compliant, audit-ready, and protected—no matter how fast you grow.

Scrut automates the hard parts of compliance and security so you can move fast and stay ahead of risks from day one.

The Scrut Platform helps you move fast, stay compliant, and build securely from the start.

Growth in fintech comes with heavy scrutiny. Scrut helps you stay compliant, audit-ready, and secure—without slowing down your momentum.

Book a Demo
Book a Demo
Join the Scrut Partner Network
Join the Scrut Partner Network
No items found.