
Guarding patient-protected health information is a mandatory aspect of healthcare today. HIPAA was originally set forth to regulate how and when medical information can be disclosed, but there were gaps. To fill these gaps, HHS developed a series of additional rules. The Security Rule is one of them.
If you’d like to learn more about the Privacy Rule, check out our other post here.
The United States passed the Health Insurance Portability and Accountability Act (HIPAA) in 1996 to improve the safety and privacy of medical information following the advent of electronic health records (EHR). Before this, there weren’t federal laws to regulate the protection and exchange of medical records.
Instead, these were fairly lawless times in this regard. While most healthcare providers would act reasonably, there were plenty of issues. For example, patients couldn’t always get copies of their medical records. Their employers, however, could acquire them via their health insurance provider.
Additionally, because EHR technology was fairly new, it was not a guarantee that these services were constantly updated for security. In many cases, there was little stopping these companies from using mediocre security measures to save money on development.
These issues and more continued until The Department of Health and Human Services (HHS) intervened by creating HIPAA. This defined important terms like protected health information (PHI) and set regulatory baselines for how medical information can be disclosed.

As the healthcare industry continues to evolve with the development of new, better technologies, HHS works hard to maintain protections. For example, consider how much the internet has changed since 1996.
Slate wrote an article about what the internet was like in 1996, citing that Americans with internet access spent an average of fewer than 30 minutes online every month. That’s wildly different than today. Now, many people spend 30 minutes online the moment they wake up.
Hacking was simpler, but there were far fewer resources to teach people how. There was no YouTube, there wasn’t even Google in 1996. If security guidelines today were the same as they were in 1996, it would likely be insufficient.
In 2005, HHS passed the Security Rule as the second major regulatory addition to HIPAA. This came 2 years after HHS wrote the Privacy Rule, which enhanced patients’ rights and protections regarding protected health information.
The Privacy Rule limits who can receive patient information, what information can be disclosed, and how it must be disclosed. The Security Rule further bolsters these privacy improvements by preventing unauthorized disclosure via medical record system breaches.
The Security Rule accomplishes this goal by setting baseline regulations for the security systems that safeguard protected health information for covered entities. This rule also extends to their business associates, thanks to the HITECH Act of 2009.
These safeguards fit into 3 distinct categories.
HIPAA defines administrative safeguards as “Administrative actions, and policies and procedures, to manage the selection, development, implementation, and maintenance of security measures to protect electronically protected health information (ePHI) and to manage the conduct of the covered entity’s workforce in relation to the protection of that information.” (45 C.F.R. § 164.304).
The physical safeguards involve a covered entity’s electronic data and the physical systems that house it (45 CFR §164.310). These policies help ensure that only authorized users can access ePHI on the covered entity’s computer servers. Certified electronic health records technology (CEHRT) can fulfill some of these requirements, but likely not all.
The Technical safeguards cover the policies and procedures for the use of the technology used by covered entities to control access to ePHI (45 CFR §164.312).
Now, we will look more closely at the various Security Rule categories and the requirements of each.
The administrative safeguards compose more than half of the new regulations introduced in the Security Rule. The full official list of administrative safeguard requirements can be found at 45 CFR § 164.308.
This is the longest of the 3 types of safeguards, but for good reason. With human error accounting for 95% of system breaches, setting up quality administrative security measures is especially essential.
These are separated into part A and part B. Part B allows covered entities to share records with business associates with a signed business associate agreement (BAA). The business associate must appropriately safeguard all protected health information created and/or received.
Part A covers all of the administrative safeguards required for covered entities and their business associates in 8 sections. In order to maintain compliance with the Administrative Safeguards of the HIPAA Security Rule, covered entities and business associates must:
If you would like a deeper look at this aspect of HIPAA, HHS created this “Security Series” administrative safeguards document. This document provides more detailed information about every aspect of administrative safeguards. It will help your organization successfully set up the required security measures detailed above.
The technical safeguards cover the system requirements for digitally storing protected health information. The full official list of technical safeguard requirements can be found at 45 CFR § 164.308.
The technical safeguards fit into 5 sections. In order to be compliant with the technical safeguards of the HIPAA Security Rule, covered entities and business associates must:
While these are the baseline standards, healthcare organizations should always try to provide the best security possible. While the technical safeguards help prevent breaches of PHI, these guidelines are fairly static. True protection requires understanding and responding to the development of new methods and technologies utilized by hackers.
If you would like a deeper look at this aspect of HIPAA, HHS created this “Security Series” technical safeguards document.
The physical safeguards outline requirements for the protection of physical protected health information. The full official list of physical safeguard requirements can be found at 45 CFR § 164.308.
The physical safeguards are separated into 4 sections. In order to be compliant with the physical safeguards of the HIPAA Security Rule, covered entities and business associates must:
If you would like a deeper look at this aspect of HIPAA, HHS created this “Security Series” physical safeguards document.
By separating the Security Rule guidelines into three categories, HHS manages to cover several threat vectors hackers would otherwise use to gain entry to sensitive medical information. Is this enough though to protect against HIPAA breaches?
The baseline regulations the Security Rule imposes are thorough, as HHS designed them to protect data from every angle. Unfortunately, the strict yet vague language of HIPAA makes it difficult to know what the true baseline is.
This is a point of frustration for many healthcare professionals, but there’s a good reason for it. As HHS wrote and improved HIPAA, they’ve cautiously avoided overwhelming small healthcare organizations. They understand that both security needs and budgets vary wildly across the spectrum and fear that overly stringent regulations could force small organizations to shut down.
As such, if guidelines aren’t specific, healthcare organizations should always budget for strong security measures. HIPAA fines can reach up to 1.5 million per violation category per year. This can quickly outweigh the costs of adequate security.
In cases of HIPAA violations, HHS determines the severity of the penalties by considering two main factors. The first is the damage of the breach, which is impacted by the breach size and the type of information. The second is the culpability and response of the covered entity or business associate responsible for the breach.
Consider the exact text of 45 CFR § 164.308 (e ii) of the technical safeguards. This says covered entities and business associates must: “Implement a mechanism to encrypt electronic protected health information whenever deemed appropriate.”
This is great because encryption is important whenever anybody shares sensitive information digitally. But a quick google search will reveal that there are many types of encryption. How can you avoid selecting an insufficient type of encryption?
ChartRequest doesn’t just comply with HIPAA regulations, we strive to provide the safest platform possible. When your team uses our platform, our stringent security measures (that exceed Security Rule compliance) protect them.
Our best-in-class security infrastructure uses 128 to 256-bit SSL end-to-end encryption to protect user information. Additionally, we utilize several advanced security measures to prevent attacks from all angles. Among these include:
Not only are requests easier for your team to fulfill, but they’re also easy for requestors to create. After navigating to our app via the ChartRequest button on your website, your patients can follow our streamlined workflow to create their requests in just minutes.