HIPAA regulations ensure that patient privacy and security are protected. Any party involved in handling protected health information (PHI) is required to adhere to HIPAA regulations. The following entities must be HIPAA compliant.
The HIPAA compliance framework primarily focuses on these three main categories of covered entities:
Covered entities make up 84% of data breaches from 9 June 2025 to 8 August 2025, as reported by the US Department of Health and Human Services (HHS). These numbers demonstrate the susceptibility of covered entities to data breaches and therefore their need to comply with HIPAA to prevent these breaches.
Related: Navigating HIPAA for covered entities
Business associates are individuals or entities that perform certain functions or activities involving the use or disclosure of PHI on behalf of covered entities. Examples of business associates include:
Business associates account for 16% of data breaches from the period 9 June 2025 to 8 August 2025. This indicates that business associates too need to comply with HIPAA to reduce the risk of a data breach.
Related: How to know if you're a business associate
According to the HHS, “A “business associate” also is a subcontractor that creates, receives, maintains, or transmits protected health information on behalf of another business associate. The HIPAA Rules generally require that covered entities and business associates enter into contracts with their business associates to ensure that the business associates will appropriately safeguard protected health information.” Subcontractors and sub-business associates work with business associates and also have access to electronic PHI. This means they must comply with HIPAA regulations.
For example, an IT firm, the business associate, hires a developer, the subcontractor, who engages a data analytics firm, the sub-business associate. Each of these parties must adhere to HIPAA through appropriate contractual agreements.
Small healthcare providers, such as solo practitioners or those with limited resources, must still ensure the privacy and security of patient information to the best of their abilities within the framework of HIPAA. According to the HHS, “Covered entities of all types and sizes are required to comply with the Privacy Rule. To ease the burden of complying with the new requirements, the Privacy Rule gives needed flexibility for providers and plans to create their own privacy procedures, tailored to fit their size and needs. The scalability of the Rule provides a more efficient and appropriate means of safeguarding protected health information than would any single standard.” This scalability and flexibility allows:
Whether you’re a covered entity, a business associate, or a subcontractor, being HIPAA compliant is a must. Here are some best practices to consider:
Under the HIPAA Security Rule’s Administrative safeguards (§164.308(a)(1)(ii)(A)), a risk analysis is a required implementation specification. Under this specification, HIPAA requires HIPAA-regulated entities to “Conduct an accurate and thorough assessment of the potential risks and vulnerabilities to the confidentiality, integrity, and availability of electronic protected health information held by the covered entity or business associate.” This will allow regulated entities to:
Furthermore, HIPAA’s administrative safeguards require regulated entities to “Implement policies and procedures for granting access to electronic protected health information, for example, through access to a workstation, transaction, program, process, or other mechanism.” Entities must use:
On December 30, 2024, the U.S. Department of Health and Human Services (HHS) introduced the first major updates to the HIPAA Security Rule in over a decade, aiming to strengthen cybersecurity across the healthcare industry. The draft Notice of Proposed Rulemaking (NPRM) was set to be published in the Federal Register on January 6, 2025. Under this update, HIPAA covered entities are required to encrypt ePHI at rest and in transit to protect data from unauthorized access.
Go deeper: HHS proposes updated HIPAA security rule
HIPAA’s Security Rule requires covered entities to “train all members of its workforce on the policies and procedures with respect to protected health information.” Staff members must trained on HIPAA’s Privacy, Security, and breach notification rules. The training must cover how to properly handle PHI, recognize potential security threats like phishing attempts, follow organizational policies and procedures, and respond appropriately to data breaches or unauthorized disclosures.
This documentation must:
Despite best efforts, breaches happen, and organizations must be prepared:
Continuous monitoring helps detect and respond to suspicious activity.
HIPAA isn’t static. Regulations, technologies, and threats evolve. To stay up-to-date, organizations can:
See also: HIPAA Compliant Email: The Definitive Guide (2025 Update)
PHI includes any individually identifiable health information related to a person’s health status, provision of healthcare, or payment for healthcare that is created, stored, or transmitted by a covered entity or business associate. This includes names, addresses, Social Security numbers, medical records, and more.
Read also: What are the 18 PHI identifiers?
Penalties range from $141 to $71,146 per violation, with a maximum annual penalty over $2 million per provision violated. Serious violations may also result in criminal charges, including fines and imprisonment.
Read also: The complete guide to HIPAA violations