Secure Controls Framework
↓ Download SCF
GRC Fundamentals ▼
SCF Certified ▼
Organization-Level SCF Certifications
SCF Conformity Assessment Program (CAP)SCF Assessment Guides
SCF Training & Individual-Level Certifications
SCF PractitionerSCF ArchitectSCF Assessor
FAQAboutSwag
GRC Fundamentals

Health Insurance Portability and Accountability Act (HIPAA)

HIPAA and HITECH together form a robust regulatory framework placing significant cybersecurity obligations on healthcare organizations and their business associates.

LAW OVERVIEW

GRC-Focused Overview of HIPAA and HITECH Compliance

The Health Insurance Portability and Accountability Act (HIPAA) and the Health Information Technology for Economic and Clinical Health (HITECH) Act are central to ensuring the privacy and security of electronic protected health information (ePHI). For healthcare providers, Business Associates (BA) and Covered Entities (CE) must understand these laws through a cybersecurity lens because it is not just a legal necessity, but rather a risk management imperative.

This page provides a cybersecurity-focused summary of HIPAA and HITECH from a GRC practitioner’s perspective, including: the history of these laws; the consequences of non-compliance; practical compliance strategies; high-profile enforcement actions; and the role of high-quality documentation in audit readiness and breach resilience.

Name

Health Insurance Portability and Accountability Act (HIPAA) and Health Information Technology for Economic and Clinical Health (HITECH)

Type

Statutory (Law)

HIPAA Source

Public Law 104-191

HITECH Source

American Recovery and Reinvestment Act of 2009 (ARRA)

Enforced By

HHS Office for Civil Rights (OCR)

Applies To

Covered Entities (CEs) and their Business Associates (BAs) handling electronic protected health information (ePHI)

Certification
Available

No official certification. Private schemes available: SCF CAP (SCF Certified – HIPAA Security Rule) and HITRUST.

TL / DR — Too Long / Didn’t Read

HIPAA and HITECH together form a robust regulatory framework that places significant cybersecurity obligations on healthcare organizations and their business associates. These laws are not static checklists but evolving mandates that require periodic risk assessments, workforce engagement and technology adaptation.

• The stakes are high. For those who neglect their cybersecurity responsibilities, the following may result: multimillion-dollar penalties; public breach notifications; and lasting reputational harm. • Conversely, organizations that embrace comprehensive risk-based programs — underpinned by high-quality documentation — are better positioned to defend against threats, demonstrate compliance and earn the trust of their patients and partners. • Cybersecurity is no longer just an IT issue in healthcare; it is a legal, operational and strategic concern that defines organizational resilience in an era of relentless digital risk.

ORIGINS & HISTORY

HIPAA — Original Healthcare Law and HITECH — Modernizing HIPAA

HIPAA was enacted in 1996 with the initial aim of improving the portability and continuity of health insurance coverage. By 2003, the Privacy Rule and the Security Rule were promulgated under HIPAA’s Administrative Simplification provisions. The Security Rule marked a pivotal shift in cybersecurity compliance by requiring covered entities to implement “reasonable and appropriate” security measures.

Passed as part of the American Recovery and Reinvestment Act (ARRA) of 2009, the HITECH Act expanded HIPAA’s scope and enforcement power.

HIPAA Privacy Rule

Focuses on the protection of all Protected Health Information (PHI), whether it be electronic, paper, or oral. Requires covered entities to provide appropriate safeguards to protect the privacy of PHI and sets limits on the uses and disclosures that may be made without patient authorization.

HIPAA Security Rule

Specifically addresses safeguards for electronic PHI (ePHI), mandating administrative, physical and technical controls. Requires covered entities to ensure the confidentiality, integrity, and availability of all ePHI they create, receive, maintain, or transmit.

HITECH — Mandatory Breach Notification

Entities must notify affected individuals and the Department of Health and Human Services (HHS) in the event of a data breach. Breaches affecting 500 or more individuals in a state or jurisdiction must also be reported to prominent media outlets serving the area.

HITECH — Extended Liability and Increased Penalties

Business associates became directly liable for compliance under HITECH. The Act established tiered penalty structures with maximum annual fines of up to $1.5 million per violation category and directed HHS to conduct periodic audits, which intensified regulatory oversight.

PENALTIES & RAMIFICATIONS

HIPAA / HITECH — Ramifications of Non-Compliance

Failing to meet HIPAA/HITECH requirements can lead to serious financial, reputational, legal and operational consequences. The HHS Office for Civil Rights (OCR) is the primary enforcement body for HIPAA and has consistently emphasized accountability in cybersecurity practices.

HITECH introduced a four-tiered penalty structure that scales based on the severity and willfulness of the violation:

Tier 1 — Unknowing Violation

Minimum: $100 per violation | Maximum: $50,000 per violation. The covered entity was unaware of the violation and could not have reasonably known about it with due diligence.

Tier 2 — Reasonable Cause

Minimum: $1,000 per violation | Maximum: $50,000 per violation. The covered entity should have known about the violation even without intent to violate HIPAA.

Tier 3 — Willful Neglect (Corrected)

Minimum: $10,000 per violation | Maximum: $50,000 per violation. A willful neglect violation that was corrected within a 30-day period.

Tier 4 — Willful Neglect (Uncorrected)

Minimum: $50,000 per violation | Maximum: $1.5 million per category per year. The most serious tier: willful neglect that was not corrected within the required timeframe.

Criminal charges under 42 U.S. Code § 1320d-6 may also apply for intentional misuse or disclosure of ePHI. Public breach notifications, required for incidents involving 500 or more individuals, can significantly damage brand trust and stakeholder confidence. Corrective Action Plans (CAPs) imposed by OCR often include intensive remediation efforts, third-party audits and reporting obligations, diverting resources from core business operations.

IMPLEMENTATION

Common Methods for HIPAA/HITECH Cybersecurity Compliance

While HIPAA does not prescribe specific technologies, it requires CEs and BAs to implement a risk-based cybersecurity program tailored to their environment.

Risk Analysis and Risk Management

A foundational requirement under the Security Rule (§164.308(a)(1)): entities must conduct an enterprise-wide risk analysis that identifies and assesses threats to ePHI confidentiality, integrity and availability. Must be updated regularly or when significant operational changes occur, and forms the basis for selecting appropriate safeguards.

Security Safeguards: Administrative, Physical and Technical

Administrative: security management process, workforce training, contingency planning. Physical: facility access controls, workstation security, device/media controls. Technical: access controls, audit controls, integrity mechanisms, transmission security (e.g., encryption).

Business Associate Agreements (BAAs)

Organizations must enter into BAAs with third parties handling ePHI to ensure they also implement HIPAA-compliant safeguards. These agreements are not just legal formalities, but enforceable contracts.

Breach Notification Procedures

Policies must define incident response protocols, timelines and communication plans for notifying affected individuals and regulatory bodies as mandated by HITECH.

Workforce Training and Awareness

Security awareness training is an ongoing requirement. Personnel must be trained on security policies and incident response protocols and such training must be documented.

Logging, Monitoring and Auditing

HIPAA requires audit controls to record and examine activity in information systems that contain or use ePHI. Log review and proactive alerting are essential components of modern compliance strategies.

REAL-WORLD ENFORCEMENT

Public Examples of HIPAA / HITECH Enforcement Actions

Numerous organizations have been fined due to HIPAA violations, many stemming from cybersecurity failures. These recent examples underscore that failures in foundational cybersecurity practices (e.g., risk assessments, access management, encryption and patching) frequently lead to HIPAA violations.

Anthem, Inc. – $16 Million (2018)

Breach: Cyberattack exposed the ePHI of nearly 79 million individuals. Findings: Failure to conduct an enterprise-wide risk analysis, implement adequate access controls, or monitor systems effectively. Significance: Largest HIPAA settlement to date; emphasized importance of preventive cybersecurity measures.

Premera Blue Cross – $6.85 Million (2020)

Breach: Phishing attack resulted in the exposure of 10.4 million individuals’ ePHI. Issues: Inadequate risk management and access controls; delayed breach discovery. Lesson: Organizations must monitor for unauthorized access and conduct timely investigations.

University of Rochester Medical Center – $3 Million (2019)

Violation: Lost unencrypted flash drive and stolen laptop with ePHI. Deficiency: Failure to encrypt mobile devices despite known risks. Takeaway: Encryption remains a critical safeguard under the Technical Safeguards.

Cottage Health – $3 Million Settlement with OCR and California AG (2019)

Breach: Misconfigured servers exposed ePHI to public internet. Errors: Lack of access controls and insufficient technical configuration reviews. Impact: Highlights the danger of basic security misconfigurations.

DOCUMENTATION VALUE

Understanding The Value of Quality Cybersecurity Documentation in HIPAA/HITECH Compliance

Effective compliance is not possible without thorough, well-maintained documentation. High-quality cybersecurity documentation serves several vital purposes in demonstrating HIPAA compliance.

Proves Compliance to Regulators and Auditors

Documentation is the primary evidence used by OCR to assess whether an entity has met its obligations. Policies, procedures, logs, risk assessments, training records and incident response plans are all subject to audit. Absence or poor quality of documentation is often treated as non-compliance, regardless of whether appropriate practices are being followed.

Enables Consistency Across the Organization

Well-written documentation ensures that employees, contractors and third-party partners understand their roles and responsibilities. This consistency is critical when responding to security incidents or fulfilling breach notification requirements.

Streamlines Risk Management and Control Mapping

Documentation that aligns with industry control frameworks — such as NIST SP 800-53, NIST CSF, or the Secure Controls Framework (SCF) — enables organizations to integrate HIPAA compliance into broader cybersecurity and enterprise risk management programs. A well-structured Risk Management Policy based on NIST 800-30 or 800-39 provides traceable justifications for security investments, and an Incident Response Plan aligned with NIST 800-61 supports timely breach containment and OCR response requirements.

Aids Legal Defense in the Event of a Breach

In enforcement proceedings or lawsuits, documentation that demonstrates due diligence and adherence to best practices can reduce penalties or serve as a mitigating factor. Organizations that maintain version-controlled, periodically reviewed policies tied to real-world risks demonstrate the governance maturity that regulators expect.

GET STARTED

See HIPAA / HITECH Mapped in the SCF

HIPAA/HITECH — and 80+ more laws, regulations, and frameworks — is mapped to specific SCF controls in the Common Controls Framework™. Download it free.