ComplyGuideComplyGuide
HomeSoftwareLearn
Submit a Tool
ComplyGuideComplyGuide

Find and compare the best compliance automation tools. Trusted by thousands of compliance professionals.

Directory

  • All Vendors

Frameworks

  • SOC 2
  • HIPAA
  • GDPR
  • ISO 27001
  • PCI DSS
  • FedRAMP
  • NIST CSF

Resources

  • Learn

For Vendors

  • Submit a Tool
  • Premium Subscription
  • Claim Your Listing

Company

  • About
  • Contact
  • Privacy Policy
  • Terms of Service

© 2026 ComplyGuide. All rights reserved.

Made for compliance professionals

Get a RecommendationBrowse Tools
Home/Learn/HIPAA/HIPAA Security Rule Explained
Requirements
11 min read|January 15, 2025|Reviewed: March 20, 2026

HIPAA Security Rule Explained

Quick Answer

The HIPAA Security Rule establishes national standards requiring covered entities and business associates to implement administrative, physical, and technical safeguards to protect electronic Protected Health Information (ePHI).

Reviewed by ComplyGuide Editorial Team·Updated January 15, 2025

HIPAA Security Rule Overview

The HIPAA Security Rule (45 CFR Part 160 and Subparts A and C of Part 164) specifically focuses on protecting electronic Protected Health Information (ePHI). While the Privacy Rule covers all forms of PHI, the Security Rule addresses the specific risks of electronic data and requires three categories of safeguards: administrative, physical, and technical.

Key Takeaways

  • The Security Rule applies specifically to ePHI (electronic Protected Health Information)
  • Three safeguard categories: administrative (people/processes), physical (facilities/devices), technical (technology)
  • Safeguards are classified as "required" or "addressable" — addressable does NOT mean optional
  • Risk assessment is the cornerstone — all other safeguards flow from risk analysis results
  • The Security Rule is technology-neutral — it specifies what to achieve, not which tools to use

Understanding Required vs Addressable

❗ "Addressable" Does Not Mean Optional

HIPAA classifies safeguards as either Required (R) or Addressable (A). "Addressable" means you must assess whether the safeguard is reasonable and appropriate for your environment. If it is, you must implement it. If it's not, you must document why and implement an equivalent alternative measure. You cannot simply skip addressable safeguards.

Administrative Safeguards

Administrative safeguards are policies and procedures designed to manage the selection, development, implementation, and maintenance of security measures to protect ePHI. They account for more than half of the Security Rule's requirements.

Administrative Safeguard Standards
StandardKey RequirementsType
Security Management ProcessRisk analysis, risk management, sanction policy, information system activity reviewR
Assigned Security ResponsibilityDesignate a security official responsible for policies and proceduresR
Workforce SecurityAuthorization/supervision procedures, workforce clearance, termination proceduresA
Information Access ManagementAccess authorization, access establishment/modification, isolating healthcare clearinghouse functionsR/A
Security Awareness and TrainingSecurity reminders, malware protection, login monitoring, password managementA
Security Incident ProceduresResponse and reporting procedures for security incidentsR
Contingency PlanData backup, disaster recovery, emergency mode operations, testing, applications/data criticality analysisR/A
EvaluationPeriodic technical and non-technical evaluation of securityR
Business Associate ContractsSatisfactory assurances from business associatesR

Physical Safeguards

Physical Safeguard Standards
StandardKey RequirementsType
Facility Access ControlsContingency operations, facility security plan, access control/validation, maintenance recordsA
Workstation UsePolicies for workstation use and physical environmentR
Workstation SecurityPhysical safeguards restricting access to workstationsR
Device and Media ControlsDisposal, media re-use, accountability, data backup and storageR/A

Technical Safeguards

Technical Safeguard Standards
StandardKey RequirementsType
Access ControlUnique user identification (R), emergency access (R), automatic logoff (A), encryption and decryption (A)R/A
Audit ControlsMechanisms to record and examine access to systems containing ePHIR
IntegrityMechanisms to authenticate ePHI, protect from improper alteration/destructionA
Person or Entity AuthenticationVerify identity of persons/entities seeking access to ePHIR
Transmission SecurityIntegrity controls (A), encryption (A) for ePHI transmitted over electronic networksA

Implementation Priorities

Security Rule Implementation Order

Start with risk assessment, then build out safeguards based on identified risks

1. Risk Analysis

Identify threats, vulnerabilities, and risks to ePHI

2. Risk Management

Implement measures to reduce risks to reasonable levels

3. Policies & Training

Document safeguards and train workforce

4. Technical Controls

Deploy access controls, encryption, audit logging

5. Ongoing Monitoring

Review, evaluate, and update safeguards regularly

Does the Security Rule require encryption?

Encryption is classified as "addressable" under the Security Rule. This means you must assess whether encryption is reasonable and appropriate for your environment. In virtually all modern technology contexts, encryption (at rest and in transit) is considered reasonable and appropriate. Not encrypting ePHI requires documented justification and an equivalent alternative — which is extremely rare in practice.

Does the Security Rule require specific technologies?

No. The Security Rule is technology-neutral. It specifies what safeguards you must achieve but doesn't mandate specific products, platforms, or technologies. This allows organizations to choose solutions appropriate for their size, complexity, and budget.

How often must technical safeguards be evaluated?

The Security Rule requires periodic evaluation but doesn't specify exact frequency. Best practice is to evaluate technical safeguards at least annually, and whenever significant changes occur in your environment (new systems, organizational changes, or after a security incident).

What's the penalty for violating the Security Rule specifically?

Security Rule violations follow the same HIPAA penalty structure: $100-$50,000 per violation depending on the level of knowledge/neglect, with annual maximums of $25,000-$1.9 million per violation category. OCR can also require corrective action plans and monitoring.

Implement HIPAA Security Safeguards

Find tools to help you implement and monitor HIPAA Security Rule requirements.

Browse HIPAA Security Tools
HIPAA
Security Rule
safeguards
ePHI

On this page

HIPAA Security Rule OverviewUnderstanding Required vs AddressableAdministrative SafeguardsPhysical SafeguardsTechnical SafeguardsImplementation Priorities

HIPAA Tools & Comparisons

Explore HIPAA compliance tools, pricing, and side-by-side comparisons.

Best HIPAA ToolsAll HIPAA VendorsMore HIPAA Guides

Related Articles

Overview
12 min read

What Is HIPAA? A Complete Guide to HIPAA Compliance

HIPAA (Health Insurance Portability and Accountability Act) is a US federal law that sets national standards for protecting sensitive patient health information (PHI) from being disclosed without the patient's consent or knowledge.

Requirements
9 min read

HIPAA Privacy Rule: What You Need to Know

The HIPAA Privacy Rule establishes standards for how covered entities may use and disclose Protected Health Information (PHI), gives patients rights to access and control their health data, and requires a Notice of Privacy Practices.

Implementation
10 min read

How to Conduct a HIPAA Risk Assessment

A HIPAA risk assessment is a systematic process to identify threats and vulnerabilities to ePHI, assess their likelihood and impact, and determine appropriate safeguards. It's the single most important HIPAA requirement and the foundation of your entire compliance program.