HIPAA Compliance and Your Practice: Part 2 of 3

June 17, 2021


The entire HIPAA legislation is no quick read! Its length and technical jargon may make it difficult for you to know where and how to start becoming HIPAA compliant.


For healthcare providers wanting to take a step toward having a HIPAA-compliant practice, these basic HIPAA rules are a good place to start: Privacy, Security, and Breach Notification.


It’s also important to keep in mind that these apply to:


  • Covered entities. Health plans, healthcare clearinghouses, and healthcare providers that create, maintain, or transmit PHI.


  • Business associates. Any entity that is provided with access to PHI in order to perform services for a covered entity.


Privacy, Security, and Breach Notification

Privacy Rule

The HIPAA Privacy Rule largely covers protected health information (PHI). It points out the restrictions and conditions that need to be observed when using and/or disclosing PHI. It discusses what can and cannot be shared without patient authorization, and with whom such information can be disclosed. 


The Privacy Rule also gives patients (or their nominated representatives) rights over their PHI. These rights include being able to obtain a copy of and/or examine their health records as well as being able to request necessary corrections.


Under the Privacy Rule, covered entities are strongly advised to:


  • Provide HIPAA education and training to employees


  • Ensure that appropriate steps are taken to maintain the integrity of patients’ PHI


  • Ensure that patients provide written permission before their health information is used for purposes such as marketing, fundraising, or research


Even when the use or disclosure of PHI is permitted under the HIPAA Privacy Rule, it still needs to go through the minimum necessary standard, which means that access to PHI is limited to the minimum amount of information necessary to fulfill the intended purpose of the particular disclosure, request, or use.


Security Rule

The HIPAA Security Rule defines and regulates the standards, methods, and procedures that must be applied to electronically stored, accessed, and transmitted PHI (ePHI).


The Security Rule comprises three parts—technical, physical, and administrative safeguards. Some safeguards must be implemented (required), while some can be implemented with a reasonable amount of flexibility (addressable).


Here they are according to
HIPAA Journal’s Compliance Checklist:


Technical Safeguards


The technical safeguards focus on the technology used to protect and provide access to ePHI. HIPAA requires ePHI (at rest or in transit) to be encrypted according to NIST standards once ePHI goes beyond an organization's internal firewalled servers.

A poster that says technical safeguards on it


Physical Safeguards


The physical safeguards cover physical access to ePHI, whether these are stored in on-premise servers, on the cloud, or in an offsite data center.

A poster showing the steps to physical safeguards.


Administrative Safeguards


The administrative safeguards focus on internal organization, workforce management, maintenance of security measures that ensure the protection of ePHI.

A poster showing the different types of administrative responsibilities


Breach Notification Rule

According to the US Department of Health and Human Services (HHS), a breach is generally defined as an impermissible use or disclosure under the HIPAA Privacy Rule that compromises the security or privacy of the PHI.


In the event of a PHI breach, the Breach Notification Rule requires covered entities to provide notifications to certain parties without unreasonable delay and in no case later than 60 days following the incident:


  • Affected Individuals. Individual notice must be in written form and sent by first-class mail or, if the affected individual has agreed to receive such notices electronically, via email. The notice must include a brief description of the breach, what types of information were involved in the breach, what the individuals should do to protect themselves from potential harm, and contact information for the covered entity. It should also contain information on what the entity is doing to investigate the breach, mitigate its effects, and prevent any further security incidents.


  • Secretary of HHS. If the breach affects 500 or more individuals, a notice must be sent to the Secretary promptly after the incident. However, if a breach affects fewer than 500 individuals, the covered entity may notify the Secretary about such breaches in an annual report.


  • Media. If the breach affects more than 500 residents of a state or jurisdiction, covered entities are required to issue a notice to prominent media outlets serving the area. This is typically done in the form of a press release and must include the same information required for the individual notice.


| What happens if you break HIPAA rules? Read HIPAA Compliance and Your Practice: Part 3 of 3


HIPAA Compliance Experts At Your Service

HIPAA compliance deals a lot more than just the basics, which is why you need a reliable partner as you take steps in getting that HIPAA Seal of Compliance for your healthcare practice.

ER Tech Pros is a managed service provider that specializes in giving healthcare practices the IT, cloud, and compliance technology they need to keep their data secure and their operations HIPAA compliant. 


If you found the checklists above to be helpful and practical, we’ve got more in store for you!


TALK TO A COMPLIANCE EXPERT

Search Articles

A healthcare provider follows strict cybersecurity measures as they log in to their work laptop.
By Dhanvi Mathur December 9, 2025
Protect your healthcare organization from ransomware, data breaches, and cybersecurity threats with ER Tech Pros.
Office staff members use VoIP for business calls, showcasing its flexibility and convenience for mod
By Dhanvi Mathur December 2, 2025
Discover the top 7 benefits of switching to VoIP for business, from cost savings and flexibility to improved collaboration and secure communication.
By Dhanvi Mathur November 25, 2025
Imagine locking up your healthcare practice at night: lights off, doors secured, alarm systems on. You rest easy knowing that even while you sleep, something is watching over what matters most, keeping everything safe. That’s exactly what managed cloud hosting can do for your practice’s digital world, be it a small business or a multi-location specialty. It acts like a 24/7 security system – monitoring, protecting, and maintaining your IT environment around the clock. Your patient data, clinical applications, and digital records have an always-on shield, so you can focus on providing quality care with peace of mind.  In this blog, we’ll explore the seven biggest benefits of managed cloud hosting for small practices and how it can help enhance patient care, strengthen data protection, and run your operations more efficiently.
IT experts collaborate to provide managed IT services, focusing on small business IT solutions.
By Dhanvi Mathur November 10, 2025
Discover the top 10 benefits of managed IT services for small and mid-sized businesses.
A doctor is able to communicate with their patient through reliable VoIP solutions from ER Tech Pros
By Jadys Diez October 21, 2025
Discover how VoIP services transform hospital and ER communication with secure, reliable, and cost-effective solutions from ER Tech Pros.
IT experts check their server room to see if they need cloud hosting platforms for their business.
By Dhanvi Mathur October 8, 2025
A comprehensive comparison of traditional hosting vs. cloud hosting solutions to help you decide what’s best for your business.
An expert from ER Tech Pros teaches cybersecurity best practices to a small business owner.
By Jadys Diez October 1, 2025
Learn the basics of the cybersecurity solutions that every small business needs, plus practical steps to strengthen defenses and stay compliant.
Ultimate Guide to choose between Managed IT services and In House IT services
By Dhanvi Mathur September 11, 2025
Discover the differences between managed IT services and in-house IT — how ER Tech Pros helps SMBs grow with scalable, secure, and affordable IT solutions.
An employee is undergoing quarterly cybersecurity awareness training to stay vigilant and aware of c
By Jadys Diez September 3, 2025
See the top three ways cybersecurity awareness training helps healthcare safeguard sensitive data and stay regulation-ready.
Providers are utilizing managed cybersecurity services to prevent cybersecurity threats.
By Jadys Diez July 29, 2025
Find out why cybersecurity threats are targeting financial data in healthcare and how to protect your systems before it’s too late.
Show More

Healthcare & Tech Articles

A healthcare provider follows strict cybersecurity measures as they log in to their work laptop.
By Dhanvi Mathur December 9, 2025
Protect your healthcare organization from ransomware, data breaches, and cybersecurity threats with ER Tech Pros.
Office staff members use VoIP for business calls, showcasing its flexibility and convenience for mod
By Dhanvi Mathur December 2, 2025
Discover the top 7 benefits of switching to VoIP for business, from cost savings and flexibility to improved collaboration and secure communication.
By Dhanvi Mathur November 25, 2025
Imagine locking up your healthcare practice at night: lights off, doors secured, alarm systems on. You rest easy knowing that even while you sleep, something is watching over what matters most, keeping everything safe. That’s exactly what managed cloud hosting can do for your practice’s digital world, be it a small business or a multi-location specialty. It acts like a 24/7 security system – monitoring, protecting, and maintaining your IT environment around the clock. Your patient data, clinical applications, and digital records have an always-on shield, so you can focus on providing quality care with peace of mind.  In this blog, we’ll explore the seven biggest benefits of managed cloud hosting for small practices and how it can help enhance patient care, strengthen data protection, and run your operations more efficiently.
More Posts