HIPAA Security Rule 2026 Update: Q3 Deadlines for CEs
Posted: April 15, 2026 to Compliance.
HHS issued proposed changes to the HIPAA Security Rule in December 2024, and covered entities now face a set of Q3 2026 implementation targets that tighten encryption, audit logging, and — for the first time explicitly — AI and third-party vendor controls. This guide walks through what changed, who's affected, and the twelve actions every covered entity should complete before the end of Q3.
Petronella Technology Group has served healthcare covered entities and business associates since 2002. Our team includes four CMMC-Registered Practitioners and our founder Craig Petronella wrote the HIPAA Compliance Guide available on Amazon. We work with hospital systems, physician groups, ambulatory surgery centers, and the business associates who support them across the Eastern US. This analysis reflects our reading of the proposed rule plus what we're seeing auditors focus on in actual 2026 engagements.
What Changed in the Proposed Rule
The proposed 45 CFR 164 Subpart C update moves several previously "addressable" implementation specifications to "required" and introduces new specifications in three areas: encryption, contingency planning, and third-party risk management. The effective date for most provisions is 180 days after the final rule publishes. Industry expectation is a Q2 2026 final rule, which places the compliance deadline squarely in Q3-Q4 2026.
Encryption at rest and in transit becomes required
Under the current rule, encryption is an "addressable" specification — meaning you can document why you chose a compensating control instead. The proposed rule makes encryption of electronic Protected Health Information (ePHI) required at rest and in transit, with limited exceptions. Covered entities relying on network-segmentation-only controls must plan for full encryption coverage.
Multi-factor authentication becomes required
MFA moves from best practice to required for all access to ePHI. SMS-based 2FA is not acceptable under the proposed rule guidance — HHS references NIST SP 800-63B Authenticator Assurance Level 2 or higher, which excludes SMS.
Audit log retention tightens
The current rule requires audit logs without specifying a retention period. The proposed rule sets a minimum retention of 12 months for audit logs tied to ePHI access, modification, or export events. Several covered entities we work with are currently at 90 days.
New: third-party and AI vendor oversight
This is the most consequential change for mid-market covered entities. The proposed rule adds specific obligations around "new or emerging technology" vendors including generative AI services. Covered entities must document:
- The specific ePHI data categories that flow to each vendor.
- The vendor's Business Associate Agreement (BAA) coverage of that data flow.
- The vendor's ability to produce audit logs on demand.
- Contingency procedures if the vendor suffers a breach or ceases operations.
In practice this means ChatGPT Team, Google Gemini, and Microsoft Copilot without an appropriate BAA and without audit log access are not compliant vendors for ePHI-touching workflows. We've written extensively on private AI alternatives that do meet this bar.
New: contingency planning drills
Written contingency plans are not enough under the proposed rule. Covered entities must conduct tabletop exercises at least annually, with documented results and corrective actions for identified gaps.
New: vulnerability scanning cadence
Quarterly vulnerability scanning of the ePHI boundary is proposed as a required specification. Annual penetration testing is also referenced, though still addressable in the draft text.
Who Has To Act
The proposed rule applies to all covered entities (health plans, health care clearinghouses, and most healthcare providers) and all business associates that handle ePHI on their behalf. Small practices are not exempt — HHS specifically addressed the small-practice burden in the Regulatory Impact Analysis and declined to create a size-based carve-out.
In our client base the typical mid-market covered entity is a 10-200 provider practice, a regional hospital system, or a physician-managed network. The typical business associate is a billing company, a health-IT SaaS firm, a managed IT services provider, or a revenue cycle management firm.
Twelve Actions Before Q3 2026
1. Encrypt everything
Every workstation: BitLocker with TPM and recovery keys in your key management. Every server: full-volume encryption. Every backup: encrypted with keys distinct from production. Every transit: TLS 1.2 minimum, TLS 1.3 preferred, no legacy SSL anywhere.
2. Remove SMS MFA
Audit your ePHI-accessing systems for SMS-based 2FA. Replace with FIDO2 hardware keys (YubiKey, Google Titan) or TOTP (Microsoft Authenticator, Google Authenticator, Duo). Budget roughly $50-80 per employee for hardware keys.
3. Inventory AI and LLM usage
Survey every department. Identify every generative AI tool in active use — sanctioned and unsanctioned. For each, determine whether ePHI has flowed to the tool, whether a BAA exists, and whether the vendor can produce audit logs on demand. Most practices find at least three unsanctioned tools.
4. Extend audit log retention to 12 months
Check your SIEM, EHR audit module, and identity provider log retention. Extend as needed. If storage cost is a concern, consider tiered retention (hot 90 days, warm 9 months, cold archive) rather than cutting coverage.
5. Run a tabletop exercise
Pick a realistic scenario — ransomware hitting your EHR, an insider exfiltrating records, a business associate breach. Run a 90-minute facilitated walkthrough with your IT, compliance, legal, and executive leadership. Document gaps. Assign owners.
6. Quarterly vulnerability scan cadence
If you're currently at annual scanning, schedule quarterly scans for the ePHI boundary. Use authenticated scans where possible — network-only scans miss application-layer vulnerabilities.
7. Update your risk analysis
45 CFR 164.308(a)(1)(ii)(A) already requires periodic risk analysis. Update yours to reflect the proposed rule changes. Document data flows, vendor relationships, and new AI-related risks explicitly.
8. Revise BAA templates
Existing BAAs may not cover new AI vendor requirements. Work with counsel to revise templates and flag existing BAAs that need amendments before Q3.
9. Review breach notification procedures
The 60-day notification window is unchanged, but HHS has signaled tighter enforcement on timeliness. Ensure your procedure has a named 24/7 on-call, a drafted notification template, and a legal-review SLA under 48 hours.
10. Document the "contingency vendor" list
If your current SaaS vendor fails or breaches, who's your fallback? The proposed rule expects this to be documented.
11. Staff training refresh
Annual HIPAA training with a measurable completion rate is expected. Add a specific module on AI and generative-tool usage with respect to ePHI.
12. Fund the work
The HHS Regulatory Impact Analysis estimates first-year compliance cost at $9 billion industry-wide, or roughly $30K-$80K per mid-market covered entity for the year one lift. Budget now.
Penalty Tiers in 2026
The HIPAA civil penalty structure adjusts annually for inflation. For 2026, HHS updated the four-tier structure:
- Tier 1 (Unknowing): $137 to $68,928 per violation, up to $2.067M per identical violation per year.
- Tier 2 (Reasonable Cause): $1,379 to $68,928 per violation.
- Tier 3 (Willful Neglect, Corrected): $13,785 to $68,928 per violation.
- Tier 4 (Willful Neglect, Not Corrected): $68,928 to $2,067,813 per identical violation per year.
The OCR's 2026 settlement schedule shows median mid-market covered-entity settlements running $250,000 to $800,000. These numbers are why the $9B industry cost estimate is considered conservative by every compliance counsel we've asked.
Three Questions for Your Compliance Officer This Week
1. "Can we produce every ePHI access event for a named patient over the past 12 months in under 4 hours?" If no, audit log coverage is inadequate.
2. "Which generative AI tools have our staff used with patient data in the past 90 days?" If you don't have a confident answer, you need an inventory now.
3. "Have we run a ransomware tabletop in the past 12 months, and do we have the written after-action?" If no, schedule one this quarter.
How Petronella Technology Group Can Help
Three engagement paths for the Q3 2026 deadline:
HIPAA Quick Scan — $497. A 3-business-day review of your Security Rule posture against the proposed-rule requirements. Written findings letter with a red/yellow/green score across the twelve actions above. Ideal for a first-pass readiness check or a board-level briefing. Start Quick Scan.
HIPAA Audit — $1,997. Full 45 CFR 164 Subpart C audit including Security Rule, Privacy Rule, and Breach Notification Rule coverage. Risk analysis update, BAA review, and 90-minute leadership readout. Satisfies 164.308(a)(1)(ii)(A) risk analysis requirement. Start full Audit.
Free HIPAA Compliance Guide. A 24-page playbook covering the Security Rule, the proposed 2026 changes, and practical remediation steps. Download the guide.
Petronella Technology Group, 5540 Centerview Dr, Raleigh NC 27606. Founded 2002. BBB A+ since 2003. Craig Petronella holds the CMMC-RP, CCNA, CWNE, and DFE #604180. Questions: (919) 348-4912 or contact our compliance team.