TL;DR
| HIPAA safeguards protected health information and applies to healthcare providers and vendors handling health information. |
| HIPAA includes the Privacy, Security, and Breach Notification Rule. |
| Compliance requires safeguards like risk assessments, training, and vendor agreements. |
Many small businesses assume the Health Insurance Portability and Accountability Act (HIPAA) doesn’t apply to them, but that’s a risky assumption. About 55% of HIPAA fines today target small practices, and penalties can reach up to seven figures for serious errors.
If your company handles any personal health data, you’re likely subject to HIPAA rules. In this guide, we cut through the complexity and help you understand whether you must comply, what rules matter most, and how to stay compliant.
What is HIPAA, and who needs to comply?
The Health Insurance Portability and Accountability Act (HIPAA) is a US federal law that governs how organizations manage and protect Protected Health Information (PHI). Originally passed in 1996, HIPAA is central to how healthcare data is handled in the digital age, especially for small businesses that offer healthcare services or partner with those that do.
HIPAA applies to two categories of organizations: covered entities and business associates.
Covered entities
Covered entities are organizations that directly provide or manage healthcare services or health plans. These include:
- Healthcare providers include doctors, dentists, clinics, pharmacies, and mental health practitioners.
- Health plans, including employer-sponsored group health plans, health maintenance organizations (HMOs), and Medicare/Medicaid.
- Healthcare clearinghouses process non-standard health data into standard formats (e.g., billing services).
To be considered a covered entity, an organization must:
- Furnish, bill, or be paid for healthcare in the normal course of business.
- Transmit health information electronically using formats covered under HIPAA standards.
Note: Some entities, such as school-based health centers that serve only students or paper-only communications that never enter electronic systems, may be exempt.
Business associates
Business associates are vendors or partners that work on behalf of a covered entity and access, store, or process PHI as part of their work. These include:
- IT service providers managing healthcare software or storage.
- Billing companies or repricing firms.
- Cloud services or data transmission networks that host PHI.
- Consultants, lawyers, or auditors working with patient data.
A business associate must:
- Sign a business associate agreement (BAA) with a covered entity.
- Comply with HIPAA provisions, especially the Security Rule and Breach Notification Rule.
Again, not all vendors are business associates. For example, a janitorial service or internet provider wouldn’t fall under HIPAA unless they interact with PHI.
Important HIPAA rules relevant to small businesses
HIPAA is more than a single regulation. It’s a compilation of rules designed to protect health data. For small companies handling patient information, three key rules stand out: the Privacy Rule, the Security Rule, and the Breach Notification Rule.
1. HIPAA Privacy Rule
The Privacy Rule sets national standards for how PHI is used and shared. It applies to covered entities and business associates, regardless of business size. It:
- Limits how PHI can be used or disclosed without patient authorization.
- It allows individuals to access their medical records, request corrections, and receive details on how their data is used.
- Enforces the “minimum necessary” principle for sharing data.
For small providers and health-based startups, the Privacy Rule means controlling who can see or use patient data, and for what reason.
2. HIPAA Security Rule
The HIPAA Security Rule focuses specifically on electronic PHI and outlines how to protect it from threats like data breaches or unauthorized access.
It requires safeguards in three areas:
- Administrative. Examples include written policies, employee training, and risk assessments.
- Physical. Think controlled access to devices and data storage locations
- Technical. These include encryption, secure logins, firewalls, and audit trails.
Under the Security Rule, even a small clinic using cloud-based records must prove it has these security protocols to protect electronic PHI.
3. HIPAA Breach Notification Rule
The HIPAA Breach Notification Rule ensures transparency when something goes wrong, such as lost devices, unauthorized access, or hacking.
Important requirements of the rule include:
- Notifying affected individuals when unsecured PHI is compromised.
- Reporting breaches to the Department of Health and Human Services (HHS).
- Informing the media in case of large-scale breaches (typically a breach that involves over 500 individuals).
The rule outlines when, how, and what must be disclosed, and failing to report properly can lead to severe penalties.
Common HIPAA compliance requirements
Key HIPAA compliance requirements fall into three categories: administrative safeguards, physical safeguards, and technical safeguards.
Organizations can tailor their approach based on size and risk (known as HIPAA’s “flexibility of approach clause”), which is especially relevant for small businesses and startups.
However, skipping safeguards without a strong justification will result in non-compliance, no matter the size of your business.
1. Administrative safeguards
Administrative safeguards are considered the foundation of HIPAA’s operational controls. All compliant organizations must:
- Appoint a security officer responsible for HIPAA oversight and implementation.
- Regular risk assessments should be conducted to identify vulnerabilities in how PHI is accessed, stored, or shared.
- Develop and test a contingency plan (including data backup and recovery protocols).
- Train all staff (without direct PHI access) on privacy, security, and breach protocols.
- Sign and review business associate agreements for all vendors handling PHI.
- Establish access control policies and remove access for departing employees immediately.
- Create incident response procedures to log, investigate, and report security events.
2. Physical safeguards
Physical controls apply to wherever PHI is stored, whether onsite, on laptops, or in cloud-linked devices. Requirements include:
- Controlling physical access to systems and storage areas (like badge entry or server room locks).
- Securing workstations by limiting their use to business-only activities and restricting physical access.
- Tracking and disposing of devices that store PHI, such as hard drives, USBs, and backup media.
3. Technical safeguards
Technical safeguards are also called HIPAA’s “IT requirements.” These require organizations to:
- Implement access controls like unique user IDs, automatic log-off, and emergency access procedures.
- Encrypt PHI both in transit and at rest, where feasible.
- Use audit logs and monitoring tools to track who accessed what and when.
- Ensure data integrity so that ePHI is not improperly altered or destroyed.
- Authenticate users before granting system access to PHI.
Implementing all these safeguards can feel overwhelming for small businesses. Sprinto automates HIPAA compliance with continuous monitoring that catches gaps before they become costly violations.
You get guided implementation, automated workflows, and real-time alerts in one complete system so that you can say goodbye to endless checklists and manual tracking.
How can small businesses become HIPAA compliant?
To become HIPAA compliant as a small business, create and document HIPAA-related policies. The following steps include running a risk assessment, choosing HIPAA-compliant vendors, protecting data, and responding to violations quickly. Here are more details:
1. Create and document your policies
Write down clear, practical policies for how your team handles PHI. These should cover everything from password rules to email procedures to how employees report incidents. Ensure policies are shared, understood, and reviewed regularly as your business evolves.
It’s a good idea to assign a privacy or security officer to oversee training, documentation, and enforcement. If you’re a small team, this can be the same person.
2. Run a risk assessment
Every organization is expected to conduct an annual HIPAA risk assessment. This involves identifying where PHI is stored, accessed, or transmitted and evaluating the safety of your protections. Look for gaps (such as unsecured devices or broad access permissions) and create a plan to fix them.
3. Choose HIPAA-compliant vendors
If you rely on third-party services — cloud platforms, telehealth tools, billing software, or IT support — they must also meet HIPAA standards.
Before sharing any PHI, get a signed business associate agreement that outlines their responsibilities and ensures compliance. If your vendor uses subcontractors, they also need their own BAAs in place.
4. Protect the right kinds of data
PHI includes medical records as well as anything that can identify a patient, such as names, birthdates, email addresses, biometric data, or photographs.
It includes both electronic and physical records, as well as verbal exchanges. Your systems, staff, and vendors must treat all of these with the same level of care.
5. Respond to violations quickly
Outside hackers don’t cause most HIPAA violations. They happen inside your organization, in the form of lost devices, wrong email recipients, and unsafe verbal conversations.
Set up procedures for investigating issues, reporting breaches, and documenting what happened. Even if the breach is minor (affecting fewer than 500 individuals), you must notify affected individuals and HHS by the end of the year.
6. Stay ahead of HIPAA updates
HIPAA rules evolve, and 2025 will likely bring important policy changes your organization must stay on top of.
Set calendar reminders to view HHS announcements regularly, subscribe to compliance updates, or use Sprinto to track regulatory changes.
Penalties for HIPAA non‑compliance
HIPAA non-compliance fines start as low as $120 per violation, but can climb up to a million dollars if the issue is serious or repeated. If anyone in the organization knowingly mishandles patient data, they can face criminal charges, resulting in jail time and fines up to $250,000.
Authorities can also enforce a government-mandated corrective action plan for non-compliant organizations, which can stretch over months and drain both time and resources. In serious data breaches that impact customers across multiple states, your organization may be subjected to state-level fines and private lawsuits.
In 2024, Warby Parker, a retail company, was fined $1.5 million after a credential-stuffing attack exposed the electronic health information of nearly 200,000 customers. While not a traditional healthcare provider, Warby Parker collects and stores sensitive health data through its vision services.
This case shows that HIPAA applies to businesses other than clinics and hospitals. If your business handles protected health information, failing to secure it can result in serious consequences.
Take the first step towards HIPAA compliance with Sprinto
HIPAA compliance isn’t optional. And for small businesses handling health data, it’s not something you can afford to put off or get halfway right. However, many small organizations can find it difficult to stay compliant without dedicated teams or deep legal expertise.
That’s where Sprinto makes all the difference.
Sprinto offers a structured, all-in-one platform to help small businesses meet HIPAA obligations without drowning in manual work. Use it to:
- Run HIPAA-aligned risk assessments with built-in tools and expert guidance.
- Publish privacy and security policies tailored to your business context.
- Train staff on HIPAA requirements with pre-built role-specific modules.
- Manage vendors and business associate agreements from one dashboard.
- Monitor controls in real time to detect compliance mistakes before they become violations.
- Respond to incidents and manage breaches using dedicated response workflows.
In other words, Sprinto provides the tools and structure to ensure HIPAA compliance and maintain it.
Book a demo to get started today.
Frequently asked questions
You can use Google Workspace, Slack, or Zoom and still be HIPAA compliant, but only if you configure them correctly and have a signed BAA with the vendor. Not all services offer one by default.
Yes, if you’re a solo healthcare provider or consultant managing PHI, you’re still considered a covered entity or business associate under HIPAA.
HIPAA doesn’t offer official “certification.” However, businesses can complete third-party audits or assessments to demonstrate compliance readiness.
Srikar Sai
As a Senior Content Marketer at Sprinto, Srikar Sai turns cybersecurity chaos into clarity. He cuts through the jargon to help people grasp why security matters and how to act on it, making the complex accessible and the overwhelming actionable. He thrives where tech meets business.
Explore more
research & insights curated to help you earn a seat at the table.

















