HIPAA Privacy Rule requirements
The HIPAA Privacy Rule establishes national standards for protecting individuals’ medical records and other individually identifiable health information, known as Protected Health Information (PHI). It governs how PHI may be used or disclosed, defines patient rights, and sets organizational responsibilities for safeguarding privacy.
While the Privacy Rule applies to PHI in any form—electronic, paper, or oral—it works alongside the Security Rule, which focuses specifically on electronic PHI (ePHI). Together, these rules are designed to ensure the confidentiality, integrity, and availability of health information.
The Privacy Rule has been expanded and clarified over time through the HITECH Act and subsequent guidance. Recent updates issued between 2024 and 2026 place additional emphasis on reproductive health care privacy, patient access rights, and oversight of business associates and their subcontractors.
Permitted and required uses and disclosures
The Privacy Rule allows covered entities to use or disclose PHI without patient authorization for certain core purposes, commonly referred to as treatment, payment, and healthcare operations (TPO). These uses support care delivery, billing, quality improvement, and other routine healthcare functions.
In addition to permitted disclosures, HIPAA also defines required disclosures, including:
- Providing individuals access to their own PHI
- Issuing breach notifications when PHI is compromised
- Disclosing PHI to the US Department of Health and Human Services during compliance investigations
- Access their PHI
- Request amendments to inaccurate or incomplete records
- Receive an accounting of certain disclosures
- Restrictions on disclosures to health plans for self-pay services
- Confidential communications, such as directing information to a specific address or family member
- Train their workforce on privacy policies and procedures
- Apply sanctions for workforce members who violate HIPAA requirements
- Develop written policies governing authorizations, minimum necessary use, and disclosures
- Automated distribution and tracking of Notices of Privacy Practices
- Centralized management of Business Associate Agreements
- Logging and monitoring access to PHI
- Tracking patient requests, authorizations, and response timelines
SOC Frameworks Overview
SOC 2 Basics
SOC 2 Compliance Process
SOC 2 Compliance Process
Sprinto: Your ally for all things compliance, risk, governance




