What Are the HIPAA IT Compliance Requirements for Medical Practices?
March 20, 2026 · 14 min read

HIPAA IT compliance for medical practices requires implementing three categories of safeguards—administrative, physical, and technical—to protect electronic protected health information (ePHI). In 2026, sweeping updates to the HIPAA Security Rule eliminate the "addressable" loophole, making multi-factor authentication (MFA), full encryption, network segmentation, and annual penetration testing mandatory for all covered entities and business associates. Failure to comply exposes practices to fines ranging from $141 to over $71,000 per violation.
What Is HIPAA IT Compliance and Who Does It Apply To?
The Health Insurance Portability and Accountability Act (HIPAA) Security Rule (45 CFR §§ 164.302–318) governs how all electronic protected health information (ePHI) must be secured. It applies to every covered entity—including physician practices, hospitals, dental offices, mental health providers, and specialty clinics—as well as every business associate that creates, receives, maintains, or transmits ePHI on their behalf.
Business associates include cloud storage vendors, EHR providers, billing companies, IT managed service providers, telehealth platforms, and any other third party with access to patient data. Under HIPAA, covered entities are legally responsible for ensuring their business associates maintain equivalent safeguards.
Non-compliance is not a theoretical risk. As of October 2024, the HHS Office for Civil Rights (OCR) had received over 374,321 HIPAA complaints and collected more than $144.8 million in penalties and settlements. In the first five months of 2025 alone, OCR announced ten resolution agreements stemming from data breaches, with penalties ranging from $25,000 to $3 million per incident.
What Are the Three Categories of HIPAA Safeguards?
HIPAA's Security Rule organizes protection requirements into three distinct safeguard categories. Every medical practice must address all three.
Administrative Safeguards
Administrative safeguards are the policies, procedures, and workforce management activities that form the foundation of a HIPAA security program. Key requirements include:
- Security Risk Analysis (SRA): A documented, organization-wide assessment identifying all risks to the confidentiality, integrity, and availability of ePHI. OCR has made this a top enforcement priority in 2025—risk analysis failure was cited in virtually every resolution agreement announced this year.
- Risk Management Plan: A written plan documenting how identified risks will be reduced to an acceptable level, with measurable milestones and assigned ownership.
- Designated Security Official: Every practice must appoint a qualified individual responsible for developing and implementing the security program.
- Workforce Training: All staff who interact with ePHI must receive documented, role-appropriate security training. Policies must include sanctions for non-compliance.
- Access Authorization and Supervision: Formal procedures for granting, reviewing, and revoking access to ePHI, including processes for terminated employees.
- Contingency Planning: Written data backup, disaster recovery, and emergency mode operation plans tested at least annually.
- Annual Compliance Evaluation: Under the 2026 proposed rule, covered entities must conduct a documented annual audit of their Security Rule compliance.
Physical Safeguards
Physical safeguards protect the facilities and equipment where ePHI is stored or accessed. Requirements include:
- Facility Access Controls: Procedures limiting physical access to server rooms, workstation areas, and data storage locations. The 2026 rule elevates this from "addressable" to fully required with mandatory documentation.
- Workstation Use Policies: Standards governing the physical environment of workstations, including screen positioning to prevent shoulder-surfing and mandatory lock policies when unattended.
- Device and Media Controls: Formal inventory, tracking, and certified destruction procedures for all hardware and portable media containing ePHI—including laptops, USB drives, mobile phones, and retired servers.
- Environmental Controls: Server rooms must have appropriate fire suppression, temperature controls, and uninterruptible power supplies (UPS).
Technical Safeguards
Technical safeguards are the technology-based controls that protect ePHI at rest, in transit, and in use. Under the 2026 Security Rule updates, these have been significantly strengthened:
- Access Control: Role-based access control (RBAC) limiting each user to the minimum ePHI necessary for their job function, with unique user IDs, emergency access procedures, and automatic session timeouts.
- Audit Controls: Comprehensive logging of all access to ePHI—who accessed what data, when, and from where—with regular review of audit logs.
- Integrity Controls: Technical mechanisms (checksums, digital signatures) ensuring ePHI has not been improperly altered or destroyed.
- Authentication: Identity verification before granting ePHI access, now required to include multi-factor authentication (MFA) under the 2026 rule.
- Transmission Security: Encryption of all ePHI in transit using TLS 1.2 or higher; SSL and TLS 1.0/1.1 no longer meet compliance standards.
What Are the 2026 HIPAA Security Rule Updates Medical Practices Must Know?
On December 27, 2024, HHS issued a Notice of Proposed Rulemaking (NPRM) representing the most significant overhaul of the HIPAA Security Rule since 2013. The rule is expected to be finalized in May 2026 with a 240-day compliance window, meaning practices should begin preparation immediately.
The most critical changes include:
- All "Addressable" Requirements Become Mandatory: The previous distinction between "required" and "addressable" safeguards is eliminated. If it was addressable before, it is required now—no exceptions without specific documented justification.
- Mandatory MFA: Multi-factor authentication is now required for all access to systems containing ePHI, including remote access, cloud portals, and EHR systems. At least two of the following factors must be used: something you know (password/PIN), something you have (authenticator app/hardware token), or something you are (biometrics).
- Mandatory Encryption: All ePHI must be encrypted both at rest and in transit. Acceptable standards are AES-256 for data at rest and TLS 1.2+ for data in transit. This eliminates the flexibility that allowed organizations to use alternative safeguards previously.
- Technology Asset Inventory and Network Map: Practices must maintain and annually update a complete inventory of all technology assets and a network map showing all ePHI data flows.
- Vulnerability Scanning and Penetration Testing: Vulnerability scans are required at least every six months; penetration testing must occur at least annually.
- Network Segmentation: Networks must be segmented to prevent lateral movement in the event of a breach.
- 72-Hour Incident Restoration: Written incident response and disaster recovery plans must include the capability to restore systems within 72 hours.
- Enhanced Business Associate Oversight: Business associates must provide annual written verification of their security measures; they must notify covered entities within 24 hours of activating their contingency plan.
- Anti-Malware Protection: Deployment of anti-malware software is now an explicit required control, along with patch management, unnecessary software removal, and disabling unused network ports.
What Is a HIPAA Security Risk Analysis and Why Is It the Most Enforced Requirement?
The Security Risk Analysis (SRA) is the cornerstone of HIPAA compliance and the single most commonly cited deficiency in OCR enforcement actions. In 2025, every one of the ten resolution agreements announced by OCR in the first five months involved failures in risk analysis.
A compliant risk analysis must:
- Identify the scope of all ePHI your practice creates, receives, maintains, or transmits
- Identify all potential threats and vulnerabilities to that ePHI (ransomware, phishing, insider threats, hardware theft, natural disasters)
- Assess the likelihood and impact of each threat materializing
- Evaluate the sufficiency of existing controls
- Document residual risk and develop a prioritized remediation plan
- Review and update the analysis annually or whenever significant operational changes occur
Under the 2026 rule, the SRA must be tied directly to your technology asset inventory and network map. The days of generic, template-based risk assessments that do not reflect your actual infrastructure are over.
Penalties for failing to conduct a compliant SRA have reached as high as $3 million in 2025 enforcement actions. The Warby Parker civil monetary penalty of $1.5 million in 2025 was explicitly tied to risk analysis, risk management, and monitoring failures.
What Are Business Associate Agreements (BAAs) and What Do They Need to Include?
A Business Associate Agreement is a legally required contract between a covered entity and any vendor that accesses, processes, or stores ePHI. Under HIPAA (45 CFR §§ 164.502(e) and 164.504(e)), operating without a signed BAA exposes both parties to serious liability.
Every BAA must address:
- Permitted uses and disclosures of PHI
- Prohibition on unauthorized further disclosure
- Required safeguards (the 2026 rule now requires specific language mandating MFA and encryption)
- Breach and security incident reporting obligations (including the new 24-hour contingency plan notification)
- Support for covered entity's patient rights obligations
- HHS access to practices and records
- Right to audit vendor security practices
- Return or certified destruction of PHI upon contract termination
- Subcontractor/downstream business associate requirements
Under the 2026 updates, BAAs must include annual security assessment obligations, specific MFA and encryption clauses, and incident response protocols. Practices should review all BAAs before the compliance deadline and require vendors to provide proof of HIPAA-compliant controls, preferably evidenced by SOC 2 Type II or HITRUST certification.
Common BAA Mistakes: Many practices discover they are sharing ePHI with vendors—billing companies, cloud backup providers, texting platforms, IT support firms—without a signed BAA. A thorough vendor audit is essential.
What Are the MFA and Encryption Requirements Under HIPAA in 2026?
Previously considered "addressable" (meaning practices could document alternative controls), MFA and encryption are now required specifications under the 2026 HIPAA Security Rule.
Multi-Factor Authentication Requirements
- Required for all users—employees, contractors, and business associates—accessing systems containing ePHI
- Must use at least two authentication factors from different categories
- Recommended solutions: authenticator apps (Microsoft Authenticator, Google Authenticator), hardware tokens (YubiKey), or biometric verification
- SMS-based MFA, while functional, is considered less secure; hardware tokens or authenticator apps are preferred
- Remote access (VPN, RDP, telehealth portals) requires MFA even if the underlying application also requires a password
- The Change Healthcare breach in 2024—the largest healthcare data breach in history at 190 million records—was attributed directly to the absence of MFA on a legacy server
Encryption Requirements
- At Rest: All stored ePHI must be encrypted using AES-256 or FIPS 140-2 compliant standards, including servers, databases, laptops, tablets, mobile devices, and backup systems
- In Transit: All ePHI transmitted across networks must use TLS 1.2 or higher; end-to-end encryption is required for email communications containing ePHI
- Portable Devices: Every laptop, tablet, or mobile device capable of accessing ePHI must have full-disk encryption enabled
- Important: Standard iMessage, SMS, and unencrypted email are not HIPAA-compliant for patient communications—practices must use HIPAA-compliant patient portals or secure messaging platforms
What Is the HIPAA Compliance Checklist for Medical Practices?
Use this practical checklist to assess and close gaps in your HIPAA IT compliance posture:
Administrative Controls Checklist
- ☐ Conduct a comprehensive, documented Security Risk Analysis annually
- ☐ Maintain a written Risk Management Plan with assigned owners and milestones
- ☐ Designate a qualified HIPAA Security Officer with documented authority
- ☐ Implement documented workforce training program with annual completion records
- ☐ Maintain access authorization and workforce clearance procedures
- ☐ Review and immediately revoke access for terminated employees
- ☐ Sign BAAs with all business associates before granting ePHI access
- ☐ Conduct annual compliance evaluation and document results
- ☐ Maintain and test written contingency, disaster recovery, and incident response plans
Technical Controls Checklist
- ☐ Deploy MFA on all systems containing or accessing ePHI
- ☐ Implement AES-256 encryption for all ePHI at rest
- ☐ Enforce TLS 1.2+ for all ePHI in transit
- ☐ Enable full-disk encryption on all laptops, tablets, and mobile devices
- ☐ Implement role-based access control (RBAC) with unique user IDs
- ☐ Configure automatic session timeouts on all workstations
- ☐ Deploy and monitor centralized audit logging for all ePHI access
- ☐ Implement network segmentation to isolate clinical systems
- ☐ Conduct vulnerability scans at least every six months
- ☐ Schedule and complete annual penetration testing
- ☐ Maintain updated technology asset inventory and network diagram
- ☐ Deploy enterprise anti-malware with behavioral detection
- ☐ Implement patch management policy with defined timelines
- ☐ Replace standard texting/email with HIPAA-compliant patient communication tools
Physical Controls Checklist
- ☐ Implement and document facility access controls for server/data storage areas
- ☐ Establish workstation use and positioning policies
- ☐ Maintain hardware inventory and certified destruction procedures
- ☐ Secure server rooms with environmental controls (temperature, fire suppression, UPS)
What Are the Penalties for HIPAA IT Non-Compliance?
HIPAA violations are categorized into four penalty tiers based on the level of negligence:
- Tier 1 – Lack of Knowledge: $141 to $35,581 per violation
- Tier 2 – Reasonable Cause: $1,424 to $71,162 per violation
- Tier 3 – Willful Neglect (Corrected): $14,232 to $71,162 per violation
- Tier 4 – Willful Neglect (Uncorrected): $71,162 minimum per violation
The maximum criminal penalty for intentional HIPAA violation is 10 years imprisonment. State attorneys general can also bring independent HIPAA enforcement actions—in 2024, one state AG fine exceeded $6.75 million, the largest HIPAA violation fine of that year.
Beyond direct fines, non-compliant organizations face corrective action plans (CAPs) requiring years of OCR monitoring, reputational damage, loss of patient trust, and civil litigation. Heritage Valley Health System paid $950,000 in 2024 for failing to conduct a risk analysis and lacking proper access controls. Cascade Eye and Skin Centers paid $250,000 for the same risk analysis failure.
How Does HIPAA Apply to Cloud Services, EHRs, and Telehealth Platforms?
Every cloud service, electronic health record (EHR) system, or telehealth platform that accesses, stores, or transmits ePHI on behalf of a covered entity is a business associate subject to HIPAA. Key considerations:
- Cloud Storage and Backup: Providers like AWS, Microsoft Azure, and Google Cloud can be HIPAA-compliant when properly configured and covered by a BAA—but configuration is the practice's responsibility.
- EHR Systems: Your EHR vendor must sign a BAA and maintain HIPAA-compliant technical controls including encryption, audit logging, and access controls.
- Telehealth Platforms: Consumer-grade video tools (standard Zoom, FaceTime, Skype) are not HIPAA-compliant for patient care. Use HIPAA-covered telehealth platforms with BAAs.
- Email: Standard email is not HIPAA-compliant for ePHI transmission. Practices must use encrypted email solutions with automatic PHI detection or HIPAA-compliant patient portals.
- Mobile Devices: Any personal or practice-owned device used to access ePHI must have MFA enabled, full-disk encryption, remote wipe capability, and a Mobile Device Management (MDM) solution.
What Should Medical Practices Do Right Now to Prepare for the 2026 HIPAA Changes?
With the final 2026 HIPAA Security Rule expected in May 2026 and a 240-day compliance window following finalization, practices should not wait. The direction of the rule is clear, and proactive implementation reduces breach risk immediately.
Recommended action timeline:
- Immediately: Conduct a gap analysis comparing your current security posture against the proposed rule requirements. Inventory all technology assets and identify all ePHI data flows.
- Within 30 days: Audit all vendor relationships and ensure BAAs are current and include required security provisions. Identify any vendors lacking signed BAAs.
- Q2 2026: Deploy MFA across all systems accessing ePHI. Begin encryption implementation for data at rest and in transit.
- Q3 2026: Complete network segmentation, schedule vulnerability scans, and engage a qualified vendor for annual penetration testing.
- Q4 2026: Update all written policies, procedures, and incident response plans. Complete annual workforce training. Finalize updated BAAs with all business associates.
How NorthStar Technology Group Can Help Your Medical Practice Achieve HIPAA IT Compliance
At NorthStar Technology Group, we live by the philosophy of "Protect to Propel"—meaning that the right security foundation does not slow your practice down; it enables it to grow, innovate, and serve patients with confidence. With 25+ years of experience serving healthcare providers in regulated environments, we understand that HIPAA compliance is not a one-time project but an ongoing program that must adapt to an evolving threat landscape and regulatory environment.
Our HIPAA IT compliance services include:
- Security Risk Analysis (SRA): Comprehensive, documentation-ready risk assessments aligned with OCR expectations and the 2026 proposed rule requirements
- MFA and Encryption Deployment: Rapid implementation of compliant multi-factor authentication and encryption across your entire clinical and administrative environment
- BAA Review and Vendor Assessment: Audit of all third-party relationships, BAA drafting and review, and vendor security verification
- Network Segmentation and Security Architecture: Design and implementation of segmented networks that isolate clinical systems and limit lateral movement
- Managed Detection and Response (MDR): 24/7 monitoring, audit log review, and incident response for practices that cannot maintain in-house security staff
- HIPAA Policy and Procedure Development: Written policies, workforce training programs, and documentation packages required for full compliance
- Penetration Testing and Vulnerability Management: Scheduled, HIPAA-aligned vulnerability scanning and annual penetration testing with remediation planning
Whether you are a solo practice preparing for your first formal risk analysis or a multi-location health system navigating the 2026 Security Rule changes, NorthStar Technology Group provides the expertise, tools, and ongoing support to protect your patients—and propel your practice forward.
Contact NorthStar Technology Group for a complimentary HIPAA IT compliance gap assessment. Our CISM-certified team will help you understand where you stand today and build a practical roadmap to full compliance.
About the author

Ken Satkunam, CISM
President & Founder, NorthStar Technology Group
Ken has spent over 25 years in IT leadership, serving in roles from technical support to CIO for organizations as large as 23,000 employees. He founded NorthStar Technology Group in 2000 to help regulated organizations build secure, compliant, and operationally resilient technology environments. Ken holds the Certified Information Security Manager (CISM) credential from ISACA and is the co-author of the Amazon best-seller "Cyber Attack Prevention." He has been quoted in industry publications including eWeek and DM News, and NorthStar has been recognized on the Inc. 5000 list in both 2024 and 2025.