Evergreenhipaa

What Is HIPAA? Plain-English Guide for Healthcare Tech Companies

HIPAA (Health Insurance Portability and Accountability Act) is US federal law that sets national standards for protecting Protected Health Information (PHI). Learn what HIPAA requires, who must comply, and how healthcare tech companies achieve compliance.

By QuickTrust EditorialUpdated 2026-02-28

What Is HIPAA? Plain-English Guide for Healthcare Tech Companies

HIPAA — the Health Insurance Portability and Accountability Act — is a US federal law enacted in 1996 that establishes national standards for protecting sensitive patient health information, known as Protected Health Information (PHI), from being disclosed without the patient's knowledge or consent. For healthcare technology companies, digital health startups, and any software vendor that touches patient data, HIPAA compliance is not optional — it is a legal requirement with penalties reaching $1.9 million per violation category per year.


TL;DR — Key Takeaways

  • HIPAA applies to Covered Entities (healthcare providers, health plans, clearinghouses) and their Business Associates (software vendors, cloud providers, billing companies that handle PHI on their behalf)
  • HIPAA has three main rules: Privacy Rule, Security Rule, and Breach Notification Rule
  • PHI includes 18 categories of identifiers — anything that can link health information to a specific individual
  • Penalties range from $100 to $50,000 per violation, with annual caps of $1.9 million per violation category
  • HIPAA compliance requires ongoing operations — not a one-time certification
  • Most digital health companies also need a Business Associate Agreement (BAA) with every vendor that handles their PHI

What Does HIPAA Cover?

HIPAA was originally passed to improve healthcare insurance portability — to let people keep coverage when changing jobs. Over time, its scope expanded dramatically. Today, HIPAA is primarily known for its privacy and security requirements for health data, which were codified through subsequent regulations including the HIPAA Privacy Rule (2003), the HIPAA Security Rule (2005), and the HITECH Act (2009), which strengthened enforcement and extended liability to Business Associates.

What Is Protected Health Information (PHI)?

PHI is individually identifiable health information — any health-related data that can be linked to a specific person. The HIPAA Privacy Rule identifies 18 specific identifiers that, when paired with health information, constitute PHI:

Identifier CategoryExamples
NamesFull name, last name + first initial
Geographic dataStreet address, city, ZIP code (below state level)
DatesBirth dates, admission dates, discharge dates, death dates
Phone numbersMobile and landline
Fax numbersAny fax identifier
Email addressesPersonal or work email linked to health info
Social Security numbersFull or partial SSN
Medical record numbersAny medical ID
Health plan beneficiary numbersInsurance member IDs
Account numbersBank or financial account numbers
Certificate/license numbersDriver's license, professional license
Vehicle identifiersLicense plate, VIN
Device identifiersSerial numbers, device IDs
Web URLsIf linked to an individual
IP addressesIf identifiable to an individual
Biometric identifiersFingerprints, retinal scans, voiceprints
Full-face photographsAny comparable images
Other unique identifiersAny other unique identifying number or code

Electronic PHI (ePHI) is PHI stored or transmitted in electronic form — which is the primary concern for digital health companies and healthcare SaaS platforms.


Who Must Comply With HIPAA?

HIPAA applies to two categories of entities:

Covered Entities

  • Healthcare providers: Hospitals, physician practices, clinics, pharmacies, mental health providers, dentists — any provider that transmits health information electronically
  • Health plans: Insurance companies, HMOs, employer-sponsored health plans, Medicare, Medicaid
  • Healthcare clearinghouses: Entities that process non-standard health information into standard formats (or vice versa)

Business Associates

Any person or organization that performs functions or services for a Covered Entity that involve the creation, receipt, maintenance, or transmission of PHI. This is where most healthcare technology companies fall:

  • EHR/EMR software vendors
  • Telehealth platforms
  • Revenue Cycle Management (RCM) software companies
  • Healthcare data analytics platforms
  • Cloud storage providers storing ePHI
  • Billing and coding services
  • Medical transcription companies
  • Healthcare AI/ML companies processing patient records

If you build software for healthcare and it touches patient data, you are almost certainly a Business Associate. As a Business Associate, you must sign a Business Associate Agreement (BAA) with each Covered Entity you serve and comply with all applicable HIPAA Security Rule requirements.


The Three Core HIPAA Rules

1. The HIPAA Privacy Rule

The Privacy Rule governs how PHI can be used and disclosed. Key requirements:

  • PHI may only be used or disclosed for treatment, payment, or healthcare operations (the "TPO" exception) — or with explicit patient authorization
  • Patients have rights to access their own health records, request amendments, and receive an accounting of disclosures
  • Organizations must implement a minimum necessary standard — only access or share the minimum amount of PHI required for the task at hand
  • Written Notice of Privacy Practices must be provided to patients

2. The HIPAA Security Rule

The Security Rule applies exclusively to ePHI and requires Covered Entities and Business Associates to implement three types of safeguards:

Administrative Safeguards

  • Security management process (risk analysis + risk management)
  • Assigned security responsibility (a HIPAA Security Officer)
  • Workforce training and access management
  • Information access management
  • Contingency planning

Physical Safeguards

  • Facility access controls
  • Workstation use and security policies
  • Device and media controls (disposal, re-use, tracking)

Technical Safeguards

  • Access controls (unique user IDs, automatic logoff, encryption)
  • Audit controls — hardware, software, and procedural mechanisms to record and examine activity in information systems containing ePHI
  • Integrity controls — ensure ePHI is not improperly altered or destroyed
  • Transmission security — encryption of ePHI in transit

Unlike SOC 2 or ISO 27001, many HIPAA Security Rule specifications are addressable rather than required — meaning you can implement an equivalent alternative measure if the specified control is not reasonable and appropriate for your environment. However, addressable does not mean optional.

3. The HIPAA Breach Notification Rule

If a breach of unsecured PHI occurs, you have specific notification obligations:

Affected PartiesNotification Deadline
Affected individualsWithin 60 days of discovery
Department of Health and Human Services (HHS)Within 60 days (large breaches); within 60 days after end of calendar year (breaches affecting fewer than 500 individuals)
Prominent media outletsWithin 60 days (if breach affects 500+ residents of a state or jurisdiction)

HIPAA Penalties: What Is at Stake?

The Office for Civil Rights (OCR) at the HHS enforces HIPAA. Penalties are tiered by level of culpability:

TierCulpability LevelPer ViolationAnnual Cap
1Did not know$100 – $50,000$25,000
2Reasonable cause$1,000 – $50,000$100,000
3Willful neglect, corrected$10,000 – $50,000$250,000
4Willful neglect, uncorrected$50,000$1,900,000

Criminal penalties (through the DOJ) can reach $250,000 in fines and 10 years imprisonment for egregious violations.

Beyond regulatory fines, a HIPAA breach triggers state attorney general actions, class action lawsuits, reputational damage, and immediate loss of healthcare customers. The average cost of a healthcare data breach in 2024 was $9.77 million — the highest of any industry.


Common Misconceptions About HIPAA

Misconception 1: "We encrypt our database, so we're HIPAA compliant." Encryption is one technical safeguard out of dozens of administrative, physical, and technical requirements. Encryption alone does not make you HIPAA compliant.

Misconception 2: "HIPAA compliance is a one-time certification." HIPAA has no official government-issued "certification." Compliance is an ongoing operational posture — annual risk assessments, workforce training, access reviews, and policy updates are required continuously.

Misconception 3: "We don't directly treat patients, so HIPAA doesn't apply to us." If your software product processes, stores, or transmits PHI on behalf of a healthcare provider or health plan, you are a Business Associate and must comply with HIPAA.

Misconception 4: "Getting a BAA signed makes us HIPAA compliant." A BAA is a legal agreement — it establishes obligations but does not implement controls. You still need to build and operate the required administrative, physical, and technical safeguards.

Misconception 5: "HIPAA compliance and HIPAA certification are the same thing." There is no government-issued HIPAA certification. Third-party assessments (like HITRUST CSF certification) can validate your HIPAA compliance posture, but they are not the same as HIPAA itself.


StandardRelationship to HIPAA
HITRUST CSFA certifiable framework that incorporates HIPAA Security Rule requirements plus additional controls; widely accepted as proof of HIPAA compliance by health plans and hospital systems
SOC 2Not a HIPAA substitute, but SOC 2 controls overlap significantly with HIPAA Security Rule requirements; some enterprises accept SOC 2 + BAA as sufficient
GDPREU equivalent for personal data protection; applies when you handle data of EU residents; stricter consent requirements than HIPAA
CCPACalifornia state law for personal data; applies to health-adjacent data not covered by HIPAA

How QuickTrust Helps Healthcare Tech Companies Achieve HIPAA Compliance

HIPAA compliance for a digital health startup or healthcare SaaS company requires more than a policy template — it requires engineering implementation across your entire infrastructure. QuickTrust's in-house Security and DevOps engineers handle the implementation work your team does not have time for:

What QuickTrust delivers for HIPAA:

  • Formal risk analysis and risk management documentation meeting Security Rule requirements
  • ePHI data mapping — identify where PHI lives across all systems, storage, and third-party integrations
  • Access control implementation — IAM policies, MFA enforcement, role-based access, automatic session timeout
  • Audit logging — enable and centralize audit trails for all ePHI access across cloud infrastructure
  • Encryption configuration — at-rest encryption for databases and storage; TLS enforcement for all ePHI in transit
  • BAA management — identify all Business Associates, execute BAAs, maintain your BAA inventory
  • Workforce training — HIPAA-specific security awareness training program for all staff
  • Incident response playbook — tailored breach notification procedures meeting 60-day reporting requirements
  • Contingency planning — backup, disaster recovery, and business continuity documentation

Result: Audit-ready HIPAA posture in 6–10 weeks. 90% reduction in internal engineering time. 100% audit pass rate.


HIPAA FAQ

Does HIPAA apply to mobile health apps?

It depends. If a mobile app is offered by or on behalf of a Covered Entity (for example, a hospital's patient portal app), HIPAA applies. If a consumer wellness app independently collects health data without a relationship to a Covered Entity, HIPAA may not apply — though FTC regulations and state laws may still govern how that data is handled.

What is the difference between HIPAA and HITECH?

The Health Information Technology for Economic and Clinical Health (HITECH) Act of 2009 strengthened HIPAA in three key ways: it extended HIPAA's Security Rule requirements directly to Business Associates (previously only Covered Entities were directly liable), it increased penalties significantly, and it added breach notification requirements. HITECH effectively made HIPAA much more enforceable for the SaaS and cloud era.

How long does it take to achieve HIPAA compliance?

With dedicated resources and an engineering team, a healthcare SaaS company can typically reach a defensible HIPAA compliance posture in 8–16 weeks. QuickTrust's engineering-included model compresses this timeline by eliminating the gap between policy writing and actual implementation.

Do we need a dedicated HIPAA Security Officer?

Yes. The HIPAA Security Rule requires organizations to designate a Security Official responsible for developing and implementing security policies and procedures. For small companies, this can be a fractional or part-time role. QuickTrust's vCISO-equivalent security leadership can serve this function.

What should we do if we have a potential HIPAA breach?

Immediately invoke your incident response plan. Assess whether the incident constitutes a breach under HIPAA's four-factor risk assessment (probability that PHI was compromised). Document everything. Engage legal counsel. If confirmed, begin your 60-day notification clock. QuickTrust helps clients build breach response runbooks before incidents happen.


Ready to Achieve HIPAA Compliance?

Whether you're a digital health startup preparing for your first enterprise health system deal or a growing healthcare SaaS company facing an OCR audit, QuickTrust's engineers implement the controls — not just the paperwork.

Get your HIPAA compliance assessment at trust.quickintell.com

Engineering-included. Audit-ready in 6–10 weeks. 100% audit pass rate.

Ready to get HIPAA compliant?

Our engineers implement HIPAA safeguards, prepare evidence, and coordinate your assessment.

Get HIPAA Compliant

Related Articles