HIPAA
Overview of HIPAA requirements
HIPAA Privacy Rule requirements

HIPAA Privacy Rule requirements

The HIPAA Privacy Rule establishes national standards for protecting individuals’ medical records and other individually identifiable health information, known as Protected Health Information (PHI). It governs how PHI may be used or disclosed, defines patient rights, and sets organizational responsibilities for safeguarding privacy. While the Privacy Rule applies to PHI in any form—electronic, paper, or oral—it works alongside the Security Rule, which focuses specifically on electronic PHI (ePHI). Together, these rules are designed to ensure the confidentiality, integrity, and availability of health information. The Privacy Rule has been expanded and clarified over time through the HITECH Act and subsequent guidance. Recent updates issued between 2024 and 2026 place additional emphasis on reproductive health care privacy, patient access rights, and oversight of business associates and their subcontractors. Permitted and required uses and disclosures The Privacy Rule allows covered entities to use or disclose PHI without patient authorization for certain core purposes, commonly referred to as treatment, payment, and healthcare operations (TPO). These uses support care delivery, billing, quality improvement, and other routine healthcare functions. In addition to permitted disclosures, HIPAA also defines required disclosures, including:
  • Providing individuals access to their own PHI
  • Issuing breach notifications when PHI is compromised
  • Disclosing PHI to the US Department of Health and Human Services during compliance investigations
The rule also recognizes that some disclosures are unavoidable. Incidental disclosures that occur despite reasonable safeguards are permitted, as long as the organization has implemented appropriate privacy controls. For routine uses and disclosures, covered entities must follow the minimum necessary standard, limiting access and sharing to the least amount of PHI required to accomplish the intended purpose. Patient rights under the Privacy Rule A central goal of the Privacy Rule is to give individuals greater control over their health information. Patients have the right to:
  • Access their PHI
  • Request amendments to inaccurate or incomplete records
  • Receive an accounting of certain disclosures
Requests must generally be fulfilled within 30 to 60 days, depending on the type of request and circumstances. Covered entities must also provide a Notice of Privacy Practices (NPP) that explains how PHI is used and disclosed, how individuals can exercise their rights, and how to file complaints. For providers offering direct treatment, acknowledgment of receipt is typically required. The rule includes additional protections when patients request:
  • Restrictions on disclosures to health plans for self-pay services
  • Confidential communications, such as directing information to a specific address or family member
When these requests meet HIPAA criteria, covered entities are required to honor them. Administrative responsibilities and organizational controls The Privacy Rule requires organizations to put formal governance structures in place. Covered entities must designate a privacy officer and a contact person responsible for handling complaints and inquiries. Organizations are expected to:
  • Train their workforce on privacy policies and procedures
  • Apply sanctions for workforce members who violate HIPAA requirements
  • Develop written policies governing authorizations, minimum necessary use, and disclosures
Valid authorizations must meet specific content requirements and are generally revocable by the individual. Business Associate Agreements (BAAs) must be in place with third parties that handle PHI, clearly defining permitted uses and required safeguards. For hybrid entities, HIPAA allows covered and non-covered functions to be separated. Only the components that handle PHI must comply with the Privacy Rule, provided proper segmentation and controls are maintained. Compliance context for modern organizations For organizations using compliance platforms such as Sprinto or similar tools, the Privacy Rule is often operationalized through:
  • Automated distribution and tracking of Notices of Privacy Practices
  • Centralized management of Business Associate Agreements
  • Logging and monitoring access to PHI
  • Tracking patient requests, authorizations, and response timelines
Privacy Rule controls frequently align with broader privacy and security frameworks, such as ISO/IEC 27001. Regular risk assessments, internal audits, and policy reviews help ensure ongoing compliance, especially as regulatory guidance continues to evolve. Recent updates reinforce expectations around timely patient access, business associate oversight, and defensible documentation—making consistent, well-documented privacy practices essential for audit readiness and regulatory review.

Download the SOC 2 prepkit for free.

We’ve consolidated all the basics. Check where you stand, and access ready-made templates to kickstart your SOC 2 journey.
soc 2 light shadow

The Sprinto advantage

The SOC 2 certification process can feel overwhelming. Sprinto simplifies this journey by automating up to 80% of the work, making it up to 5X faster and saving up to 60% of costs. Beyond just passing the audit, it maintains continuous compliance through real-time monitoring of security controls with 200+ integrations.  

With Sprinto doing the heavy lifting, you can focus on growing your business with the confidence that your security and compliance are always one step ahead.
hub-soc-2-dark
Sprinto: Your ally for all things compliance, risk, governance
support-team