HIPAA Compliance Services
Protect patient data and meet HIPAA Security Rule, Privacy Rule, and Breach Notification Rule requirements. PTG serves healthcare organizations throughout the Raleigh-Durham Triangle.
What Is HIPAA?
The Health Insurance Portability and Accountability Act (HIPAA) of 1996 establishes national standards for protecting the privacy and security of individually identifiable health information, known as Protected Health Information (PHI). HIPAA compliance is enforced by the U.S. Department of Health and Human Services (HHS) Office for Civil Rights (OCR).
HIPAA consists of several rules that together define the requirements for handling PHI:
- Privacy Rule (45 CFR Part 164, Subpart E): Establishes standards for the use and disclosure of PHI. Defines patient rights regarding their health information, including the right to access, amend, and receive an accounting of disclosures.
- Security Rule (45 CFR Part 164, Subpart C): Requires administrative, physical, and technical safeguards to ensure the confidentiality, integrity, and availability of electronic PHI (ePHI). Contains 54 implementation specifications organized into 18 standards.
- Breach Notification Rule (45 CFR Part 164, Subpart D): Requires covered entities and business associates to notify affected individuals, HHS, and in some cases the media, following a breach of unsecured PHI.
- Omnibus Rule (2013): Extended HIPAA requirements directly to business associates and their subcontractors, strengthened breach notification requirements, and increased penalties for non-compliance.
Who Must Comply with HIPAA?
HIPAA applies to two categories of organizations:
- Covered Entities: Health plans, healthcare clearinghouses, and healthcare providers who transmit health information electronically. This includes hospitals, physician practices, dental offices, pharmacies, health insurance companies, and any provider that files electronic claims.
- Business Associates: Organizations that perform functions or activities involving PHI on behalf of covered entities. This includes IT service providers, cloud hosting companies, billing services, EHR vendors, medical transcription services, document shredding companies, and consultants who access PHI.
The Raleigh-Durham area is home to major healthcare systems including UNC Health, WakeMed, and Duke Health, along with thousands of physician practices, dental offices, behavioral health providers, and healthcare technology companies. All of these organizations -- and their IT service providers -- must comply with HIPAA.
HIPAA Security Rule Requirements
The Security Rule is the primary technical component of HIPAA and the area where most organizations need the greatest assistance. It requires three categories of safeguards:
Administrative Safeguards (Section 164.308)
- Security management process including risk analysis and risk management
- Assigned security responsibility (designating a Security Officer)
- Workforce security including authorization and supervision procedures
- Information access management
- Security awareness and training for all workforce members
- Security incident procedures for reporting and responding to incidents
- Contingency planning including data backup, disaster recovery, and emergency operations
- Evaluation through periodic technical and non-technical assessments
- Business associate contracts and other arrangements
Physical Safeguards (Section 164.310)
- Facility access controls including contingency operations and access control procedures
- Workstation use and security policies
- Device and media controls for disposal, re-use, and movement of ePHI-containing equipment
Technical Safeguards (Section 164.312)
- Access control including unique user identification, emergency access procedures, automatic logoff, and encryption
- Audit controls to record and examine system activity
- Integrity controls to protect ePHI from improper alteration or destruction
- Person or entity authentication
- Transmission security including encryption of ePHI in transit
Penalties for HIPAA Non-Compliance
HIPAA penalties are tiered based on the level of culpability and can be assessed per violation, per year. The HITECH Act increased penalty amounts and gave state attorneys general authority to bring HIPAA enforcement actions.
- Tier 1 -- Lack of Knowledge: $100 to $50,000 per violation, up to $25,000 per year for identical violations
- Tier 2 -- Reasonable Cause: $1,000 to $50,000 per violation, up to $100,000 per year
- Tier 3 -- Willful Neglect (Corrected): $10,000 to $50,000 per violation, up to $250,000 per year
- Tier 4 -- Willful Neglect (Not Corrected): $50,000 per violation, up to $1.5 million per year
Beyond financial penalties, HIPAA breaches result in mandatory notification to affected patients, public disclosure on the HHS "Wall of Shame" for breaches affecting 500 or more individuals, potential criminal prosecution, class action lawsuits, and severe reputational damage.
How PTG Helps with HIPAA Compliance
Risk Analysis
Comprehensive Security Rule risk analysis identifying threats, vulnerabilities, and risks to ePHI across your organization.
Policy Development
HIPAA-compliant policies and procedures covering all Security Rule administrative, physical, and technical safeguards.
Technical Controls
Implementation of encryption, access controls, audit logging, endpoint protection, and secure communications for ePHI.
Staff Training
Security awareness training for all workforce members covering PHI handling, phishing prevention, and incident reporting.
BAA Management
Review and development of Business Associate Agreements to ensure your vendors meet HIPAA requirements.
Incident Response
Breach notification support and incident response planning to meet the 60-day notification requirement.
HIPAA Risk Analysis: The Foundation of Compliance
The HIPAA Security Rule requires all covered entities and business associates to conduct an "accurate and thorough assessment of the potential risks and vulnerabilities to the confidentiality, integrity, and availability of electronic protected health information" (45 CFR 164.308(a)(1)(ii)(A)).
A proper HIPAA risk analysis is not a checklist exercise. It requires:
- Identifying all systems that create, receive, maintain, or transmit ePHI
- Identifying threats (natural, human, and environmental) to those systems
- Identifying vulnerabilities that could be exploited by those threats
- Assessing the likelihood and impact of each threat-vulnerability combination
- Determining the current level of risk and documenting risk management decisions
- Documenting the entire analysis and maintaining it as a living document
The HHS Office for Civil Rights has consistently cited inadequate risk analysis as the most common HIPAA violation in enforcement actions. PTG conducts thorough risk analyses that satisfy OCR requirements and serve as the foundation for your entire HIPAA compliance program.
HIPAA Compliance FAQ
What is the difference between PHI and ePHI?
Protected Health Information (PHI) refers to individually identifiable health information in any form -- paper, oral, or electronic. Electronic PHI (ePHI) specifically refers to PHI that is created, received, maintained, or transmitted in electronic form. The Security Rule applies specifically to ePHI, while the Privacy Rule covers all forms of PHI.
How often should a HIPAA risk analysis be conducted?
The Security Rule does not specify a frequency, but the HHS Office for Civil Rights recommends conducting a risk analysis regularly and whenever there are significant changes to your environment, such as new systems, new facilities, or changes in how ePHI is handled. Most organizations conduct a comprehensive risk analysis annually.
What is a Business Associate Agreement (BAA)?
A BAA is a written contract between a covered entity and a business associate that establishes the permitted uses and disclosures of PHI, requires the business associate to implement appropriate safeguards, and defines breach notification responsibilities. HIPAA requires BAAs with all business associates.
What triggers the HIPAA Breach Notification Rule?
A breach is defined as the acquisition, access, use, or disclosure of PHI in a manner not permitted by the Privacy Rule that compromises the security or privacy of the PHI. Covered entities must notify affected individuals within 60 days of discovering the breach. Breaches affecting 500 or more individuals also require notification to HHS and prominent media outlets.
Does HIPAA require encryption?
Encryption is an "addressable" implementation specification under the Security Rule, meaning organizations must implement encryption or document why an equivalent alternative is reasonable and appropriate. In practice, encryption of ePHI at rest and in transit is considered a best practice and is expected by OCR in most circumstances.
How does HIPAA apply to cloud services?
Cloud service providers that create, receive, maintain, or transmit ePHI on behalf of covered entities are business associates under HIPAA. They must sign a BAA and comply with applicable Security Rule requirements. Using a HIPAA-eligible cloud service does not automatically make your deployment HIPAA-compliant -- your configuration and usage must also satisfy the rules.
What HIPAA training is required?
The Security Rule requires security awareness and training for all workforce members, including management. Training must cover malicious software protection, login monitoring, and password management at minimum. The Privacy Rule also requires training on policies and procedures regarding PHI. Training must be provided to new workforce members and periodically refreshed.
Can PTG serve as a HIPAA business associate?
Yes. PTG signs Business Associate Agreements with healthcare clients and maintains HIPAA-compliant security practices in our own operations. Our team is trained on HIPAA requirements and handles ePHI according to Security Rule safeguards.
Protect Your Patients and Your Practice
Schedule a HIPAA risk analysis with PTG to identify gaps and build a robust compliance program.
Schedule a Free Consultation Call us: 919-348-49125540 Centerview Dr., Suite 200, Raleigh, NC 27606
Why Choose Petronella Technology Group
Petronella Technology Group has been a trusted IT and cybersecurity partner for businesses across Raleigh, Durham, Chapel Hill, Cary, Apex, and the Research Triangle since 2002. Led by CEO Craig Petronella, a Licensed Digital Forensic Examiner, CMMC Certified Registered Practitioner, and MIT-certified professional in cybersecurity, AI, blockchain, and compliance, PTG brings deep expertise to every engagement.
With BBB accreditation since 2003 and more than 2,500 businesses served, PTG has the experience and track record to deliver results. Craig Petronella is an Amazon number-one best-selling author of books including "How HIPAA Can Crush Your Medical Practice," "How Hackers Can Crush Your Law Firm," and "The Ultimate Guide To CMMC." He has been featured on ABC, CBS, NBC, FOX, and WRAL, and serves as an expert witness for law firms in cybercrime and compliance cases.
PTG holds certifications including CCNA, MCNS, Microsoft Cloud Essentials, and specializes in CMMC 2.0, NIST 800-171/172/173, HIPAA, FTC Safeguards, SOC 2 Type II, PCI DSS, GDPR, CCPA, and ISO 27001 compliance. Our forensic specialties include endpoint and networking cybercrime investigation, data breach forensics, ransomware analysis, data exfiltration investigation, cryptocurrency and blockchain analysis, and SIM swap fraud investigation.
Frequently Asked Questions
What compliance frameworks does PTG help businesses implement?
How long does it take to achieve compliance certification?
What happens if a business fails a compliance audit?
What is the difference between SOC 2 Type I and Type II?
Can one compliance framework satisfy multiple regulatory requirements?
Ready to Get Started?
Contact Petronella Technology Group today for a free consultation. Serving Raleigh, Durham, Chapel Hill, and the Research Triangle since 2002.
919-348-4912 Schedule a Free Consultation5540 Centerview Dr., Suite 200, Raleigh, NC 27606