Healthcare Encryption + ePHI Protection

HIPAA Data Protection for Healthcare Practices

End-to-end encrypted email, ePHI storage, BAA-aware workflows, Safe Harbor de-identification, and 10-year audit retention for medical practices, MSOs, dental groups, behavioral health, billing companies, and ambulatory surgery centers, engineered by Petronella Technology Group, Inc., Cyber AB RPO #1449, in business in Raleigh since 2002.

RPO #1449Cyber AB Registered Provider Org
Since 200223+ years of regulated-data engagements
A+ BBBAccredited business
4 CMMC-RPCertified practitioners on staff
DFE #604180Licensed Digital Forensic Examiner

What Does HIPAA-Compliant Data Protection Actually Require?

A HIPAA-compliant data-protection program needs six things in place: a signed Business Associate Agreement with every vendor that touches ePHI, true end-to-end encryption for email and stored data (not just TLS in transit), role-based access control mapped to clinical and billing functions under the minimum-necessary standard, an annual Risk Analysis with documented remediation, audit-log retention covering the six-year HIPAA documentation horizon, and a written Breach Notification Procedure with the workforce trained to execute it.

The rest of this page walks through exactly how Petronella Technology Group, Inc. builds and operates that program for medical practices, multi-specialty groups, MSOs, billing companies, behavioral health groups, ambulatory surgery centers, and healthcare technology vendors across North Carolina and nationally.

Ready to lock down ePHI?  Request a quote  or call us at (919) 348-4912.

Where ePHI Actually Flows in a Modern Practice

When a medical practice maps every place its electronic Protected Health Information actually lives and moves, the surface is wider than most clinical leaders expect. The EHR is the obvious one, and the one most carefully managed, but it is not the only one. We have audited mid-size practices where ePHI was discovered in nine distinct systems at once:

  • The EHR itself: clinical documentation, problem list, medication list, lab results, imaging links.
  • Email: referral letters, prior-authorization attachments, faxed records converted to PDF, clinician-to-clinician questions about specific patients.
  • The billing system: claims with diagnosis codes, AR aging detail, denial root-cause notes that often include clinical narrative.
  • Phone and fax: incoming records from referring providers, outbound prior-auth submissions to payers.
  • The patient portal: secure messages, intake forms, payment records.
  • Lab and imaging interfaces: point-to-point HL7 / FHIR feeds and the result files those interfaces drop.
  • Staff workstations and laptops: locally cached files, downloads, scanned documents, screenshots saved to a desktop.
  • Mobile devices: clinician phones with EHR mobile apps, attending tablets, BYOD endpoints with mail clients.
  • Third-party tools outside the EHR: survey platforms, marketing automation, scheduling apps, accountable-care reporting portals, payer-mandated upload sites.

The HHS Office for Civil Rights (OCR) maintains the public "Wall of Shame", the breach portal at ocrportal.hhs.gov where every breach affecting 500 or more individuals is posted. The breach pattern over the last several years has been heavily ransomware-driven, and the entry vector in published OCR resolution agreements is almost always one of three things: a successful phishing email, a stolen or unmanaged endpoint, or a misconfigured third-party tool sitting outside the BAA boundary. The encryption, access control, and monitoring layers we build into every healthcare engagement are designed against exactly those three failure modes.

Ransomware actors have specifically targeted small and mid-size healthcare providers because the financial pressure to restore access creates urgency, the operational impact of downtime is immediate and visible, and the data, clinical records, financial information, identity documents, has long-tail resale value. The cost of a single ransomware event at a small practice frequently exceeds $250,000 once business interruption, breach notification, regulatory engagement, identity-protection offerings, and remediation are added together. The encryption-plus-immutable-backup posture we deploy is built to make a successful ransomware encryption attempt yield no usable data and no working leverage.

HIPAA-compliant ePHI handling at a medical practice workstation with Petronella encryption

BAA Scope: Microsoft 365, Power BI, and the Vendors Outside the Tent

Before any ePHI moves anywhere outside the EHR, the covered entity must have a Business Associate Agreement (BAA) executed with each business associate that processes, stores, or transmits the data. The BAA establishes the vendor as a business associate under 45 CFR §164.502(e) and §164.504(e). Microsoft publishes its HIPAA-eligible-services list and the BAA itself in the Service Trust Portal at servicetrust.microsoft.com.

What the Microsoft BAA covers

  • Microsoft 365 mail, Teams, OneDrive, SharePoint, Exchange Online
  • Power BI service (Pro and Premium / Fabric capacity)
  • Microsoft Entra ID (Azure AD)
  • Azure SQL Database, Azure Storage, Azure Data Lake
  • Microsoft Sentinel and Microsoft Purview
  • On-Premises Data Gateway

Verify the eligibility list against the licensing of your specific tenant in the M365 admin center. The Microsoft HIPAA/HITECH BAA is a single agreement covering all eligible services in the tenant. See our companion page on HIPAA Power BI dashboards for the analytics side of this BAA boundary.

What the BAA does not do

  • It does not configure MIP sensitivity labels, DLP policies, sharing controls, or audit-log forwarding, that work is the covered entity's responsibility under the shared-responsibility model.
  • It does not extend to non-eligible Microsoft services (consumer Bing, consumer OneDrive, free Skype).
  • It does not cover third-party connectors, custom visuals, or apps that send data outside the Microsoft service boundary.
  • It does not absolve the covered entity of breach notification duties if a misconfiguration causes an impermissible disclosure.

The non-Microsoft surface is where BAA scope failures tend to live. Marketing automation that tracks email opens against patient lists, scheduling apps that synchronize calendars containing diagnosis-bearing appointment titles, fax-to-email gateways that store inbound faxes in third-party clouds, AI transcription tools added by individual clinicians without IT review, every one of those needs an executed BAA with the vendor, and many of them have BAAs in form only without the operational substrate to back them up. The annual vendor inventory we maintain for every healthcare client tracks BAA status, last-review date, and a brief assessment of the vendor's actual ability to honor the agreement.

The Petronella Encrypted System for ePHI

The Petronella encrypted data and email system is the secure-communication and encrypted-storage layer we deploy alongside the EHR. The encrypted system is engineered for end-to-end protection of ePHI in transit and at rest, with cryptographic keys stored on the user's own device rather than at a service-provider boundary. Below are the four functional pillars we deploy on a typical HIPAA engagement.

Encrypted email for clinical communication

Clinician-to-clinician messages, clinician-to-patient communications, referral attachments, prior-authorization submissions, and any inbound clinical record received from a referring provider all flow through the encrypted email channel rather than open SMTP. External recipients (patients, referring providers, labs, attorneys, payers) receive a free guest account, no license cost passed to the recipient, and can reply with encrypted attachments without leaving their existing inbox. The encryption is true end-to-end: the message is ciphertext from the sender's device to the recipient's device.

Encrypted storage with role-based access

The encrypted storage layer holds the documents that flow alongside the EHR, scanned consents, signed BAAs, IT documentation, HR records that touch workforce credentials, billing reconciliation files, prior-authorization packets, breach-response evidence. Access is controlled by role and scope, audited cryptographically, and revocable in seconds when a workforce change happens. The storage layer is separate from Microsoft 365's general file share so that the highest-sensitivity material has a defensible isolation boundary.

Encrypted matter rooms for case workflows

For workflows that span multiple parties, a complex referral package, a coordination-of-care collaboration with another practice, a defensive engagement with outside counsel, an OCR inquiry response, we open a per-matter encrypted room. Each room has explicit membership, a documented purpose, an audit log, and a retention schedule. When the matter closes, the room can be archived or destroyed under controlled procedures.

Safe Harbor de-identification patterns

For data shared with research collaborators, public-health agencies, or analytics partners, we apply the Safe Harbor method at 45 CFR §164.514(b)(2): strip the 18 specified identifiers, generalize dates to year-only, bucket patient ages 90 and above into a single category, and run the actual-knowledge test. Data that has been Safe-Harbored is no longer ePHI for the purpose of the Privacy Rule. The mapping salt for any potential controlled re-identification lives only inside the encrypted enclave and is never exposed to the analytics workspace.

The combined effect of these four pillars: clinicians can share what they need to share, patients and referring providers can read and reply without paying a license fee, the practice gets a defensible audit trail, and the cryptographic posture meets the HIPAA Encryption Safe Harbor at 45 CFR §164.402, meaning that even in the worst-case scenario of an encrypted-system endpoint being compromised, the protected data remains unusable to the attacker and the breach-notification calculus changes materially in the practice's favor.

Want a side-by-side of your current email security against the HIPAA Encryption Safe Harbor?  Request a HIPAA data-protection assessment. We surface every gap in two weeks with a remediation plan you can execute.

Minimum Necessary, Enforced: Role-Based Access Across the Practice

HIPAA's minimum-necessary standard at 45 CFR §164.502(b) requires that workforce members access only the protected health information they need to perform their assigned tasks. In practice, that means a front-desk staff member should not be able to read clinical notes, a billing specialist should not see mental-health diagnosis detail, and a nurse should see only their assigned panel of patients. Most practices we audit have a role catalog written somewhere, but the technical enforcement has gaps. We build the enforcement so the policy survives an audit and survives day-to-day clinical pressure.

RoleWhat they need to seeWhat they must not seeEnforcement
Front-desk staff Appointment status, copay due, eligibility check result, contact info for outreach Clinical notes, lab values, diagnosis codes, billing AR detail EHR role mapped to "Reception"; encrypted-system room access limited to scheduling-related material
Nurse / medical assistant Assigned provider's patients only, vitals, medication list, problem list, visit notes Patients outside their assigned pod; financial / AR data; HR records EHR pod-level filter; encrypted matter-room membership scoped to clinical-care collaborations
Clinician Their panel of patients, full clinical record, encounter history, lab trends, imaging Other clinicians' panels (without referral handoff); payroll; partner-level financials EHR NPI-based filter; encrypted email keyed to clinician's own device
Billing specialist Claims, denials, AR aging by payer and CPT, diagnosis code without clinical-note text Clinical notes verbatim; lab values; mental-health detail beyond what is required to bill EHR billing-only role; OLS / column hiding on note text in any reporting model
Practice manager Throughput, utilization, denial rate, no-show rate, payer mix, aggregated Patient-level identifiers; clinical notes De-identified semantic model, Safe Harbor patterns applied upstream of reporting
HIPAA Privacy / Security Officer Audit-trail dashboard: access reviews, sharing exceptions, label violations, breach-investigation evidence Clinical content (the compliance role does not need it for routine reviews) Workspace-level access to audit; no RLS on audit data; OLS on clinical columns
Owner / partner Practice-level financials, partner compensation, provider productivity Patient-identifiable clinical data without documented operational need Dual semantic models, one financial, one de-identified clinical

A few non-obvious enforcement patterns that survive audit pressure:

  • Quarterly access reviews using Microsoft Entra Access Reviews so workforce changes (terminations, role transfers, leaves of absence) propagate into ePHI access within days, not weeks.
  • Just-in-time elevation for the small set of high-privilege functions, workspace admin in Power BI, tenant admin in M365, encrypted-system administrator, so the routine state is least-privilege.
  • Documented break-glass for clinical emergencies, with mandatory after-action review of any elevated-access session.
  • Annual workforce training on minimum necessary, with practice-specific scenarios drawn from actual recent workflow questions.
Role-based access control for healthcare clients with the Petronella encrypted system

HIPAA Audit Premium: 10-Year Retention That Survives an OCR Inquiry

The HIPAA Security Rule at 45 CFR §164.316(b)(2) requires covered entities to retain documentation of policies, procedures, and audit activities for six years from the date of creation or the date when it was last in effect, whichever is later. Microsoft 365's native audit log retains 180 days at the Standard tier, one year at Audit (Premium), and ten years with the Long-Term Retention add-on. Power BI's native activity log retains 30 to 90 days. Practice management systems and EHR audit trails vary widely; few of them retain full event detail past one year without an export pipeline.

None of the default retention settings satisfy six years natively unless you specifically configure the long-term retention extension. Our default for HIPAA engagements is the HIPAA Audit Premium pattern: forward all auditable events from the EHR, Microsoft 365, Power BI, the encrypted system, the endpoint detection layer, and the network perimeter into Microsoft Sentinel (or the client's existing SIEM), apply a ten-year retention policy with the first 90 days in warm storage and the remainder in low-cost cold archive, and provision a Compliance Officer reporting workspace that lets the HIPAA Privacy or Security Officer see the audit posture without holding clinical content.

The ten-year horizon: beyond the HIPAA Security Rule's six-year floor: exists because state-level retention requirements, statutes of limitation on workforce claims, and OCR investigation timelines can each extend beyond six years. The marginal cost of holding the additional four years in cold archive is small relative to the cost of being unable to produce the evidence when an investigation arrives. See the related dashboard architecture on our HIPAA Power BI dashboards page for the reporting side of this pipeline.

ComplianceArmor® for HIPAA Documentation

HIPAA's administrative-safeguard requirements at 45 CFR §164.308 require a written Risk Analysis, written Privacy and Security policies, a Breach Notification Procedure, sanction policy, workforce training records, and a contingency plan. Multiply that by HIPAA's physical and technical safeguards and the documentation surface for a single covered entity is typically 200 to 400 pages of working documents.

We use ComplianceArmor®, Petronella's own compliance-documentation platform, to assemble that documentation set from the practice's actual environment rather than generic templates. ComplianceArmor® auto-generates the following deliverables for a HIPAA engagement, then a CMMC-RP staff member validates each one against the practice's specifics:

Privacy program documents

  • Notice of Privacy Practices (with state-law overlays)
  • Authorization for Use and Disclosure of PHI
  • Patient Rights Procedures (access, amendment, accounting of disclosures, restriction requests)
  • Minimum-Necessary Policy
  • De-identification Policy and Safe Harbor procedure

Security program documents

  • Security Management Process and Risk Analysis
  • Workforce Security and Sanction Policy
  • Access Control, Audit Control, and Integrity Controls
  • Transmission Security and Encryption Standards
  • Contingency Plan, Data Backup, Disaster Recovery, Emergency Mode Operation

Breach and incident

  • Breach Notification Procedure (individual, HHS, media as applicable)
  • Security Incident Response Plan
  • Forensic-evidence preservation procedure (paired with our managed IT on-call posture)
  • Workforce reporting channel and whistleblower protection

Business associate program

  • BAA template aligned with §164.504(e) and HITECH amendments at §164.314
  • Vendor risk-tier classification methodology
  • Annual BAA review checklist
  • Subcontractor downstream-BAA procedure

ComplianceArmor® is not a template marketplace, it generates documents that reflect the practice's actual environment (vendor list, EHR, workflows, workforce structure) and that a CMMC-RP staff member from Petronella Technology Group, Inc. signs as author of record. That author attestation matters when OCR asks who prepared the documentation.

Continuous Monitoring with Petronella XDR

The HIPAA Security Rule's audit-controls standard at 45 CFR §164.312(b) requires covered entities to implement hardware, software, and procedural mechanisms that record and examine activity in information systems that contain or use ePHI. The implementation-specification for information-system activity review at 45 CFR §164.308(a)(1)(ii)(D) requires regular review of records of information-system activity.

Petronella Extended Detection and Response (XDR) is our managed detection-and-response layer for healthcare clients. It deploys a hardened endpoint agent to every device that touches ePHI (workstations, laptops, the encrypted system endpoints, any clinician mobile device under BYOD policy), correlates endpoint events with Microsoft 365 audit, the EHR audit log where the EHR vendor permits export, and Microsoft Sentinel, and routes high-risk events to a 24x7 analyst pod in Raleigh.

The HIPAA Audit Controls (AU family) and Incident Response (IR family) implementation specifications are directly satisfied by the XDR layer's combination of continuous monitoring, documented response playbooks, evidence preservation procedure, and 24x7 staffing. We coordinate XDR alerts with the practice's HIPAA Privacy and Security Officer so any potentially reportable event reaches the right human decision-maker within minutes, not days.

Ongoing HIPAA Privacy and Security Officer Advisory: Petronella vCISO

HIPAA requires every covered entity to designate a Privacy Officer (45 CFR §164.530(a)) and a Security Officer (45 CFR §164.308(a)(2)). For practices that do not have a dedicated full-time officer in either seat, which is most small and mid-size practices, the Petronella vCISO program provides the fractional advisory layer.

Blake Rea, CMMC-RP, leads our HIPAA Privacy / Security Officer advisory engagements. Craig Petronella (CMMC-RP, DFE #604180-DFE, CCNA, CWNE) is the executive sponsor on every healthcare engagement. The vCISO retainer covers ongoing program advisory, Risk Analysis update cadence, workforce training oversight, BAA review on new vendor onboarding, OCR-readiness drills, and breach-response standby. Engagements are typically scoped from a fixed monthly retainer based on practice size, workforce count, and EHR complexity, Request a quote for a fixed-fee proposal.

Healthcare Verticals We Serve

Medical practices and multi-specialty groups

Independent primary care, specialty practices, and multi-specialty groups across North Carolina. Foundational HIPAA data-protection program plus EHR-integrated encrypted communication.

Management Services Organizations (MSOs)

Multi-entity rollups where HIPAA scope, BAA chain, and minimum-necessary controls must coordinate across practice locations and the MSO's central administrative entity.

Dental groups and DSOs

Dental Service Organizations and multi-location practices with operatory networking, dental imaging, and CDT-coded claims that fall under HIPAA when transmitted electronically.

Billing companies

Third-party billing organizations that operate as business associates to multiple covered-entity practices, multi-tenant data protection with strict per-client isolation.

Behavioral health and 42 CFR Part 2

Mental-health and substance-use practices subject to HIPAA plus the stricter confidentiality regime at 42 CFR Part 2, encrypted enclave pattern applied by default.

Urgent care and ambulatory surgery centers

High-velocity clinical environments with rapid patient turnover, surgical scheduling, anesthesia records, and post-op coordination that need tight audit posture without slowing throughput.

Single-specialty groups

Cardiology, orthopedics, ophthalmology, dermatology, OB-GYN, and other single-specialty groups with specialty-specific workflows (imaging archive, surgical scheduling, biopsy tracking).

Healthcare technology vendors

HealthTech vendors who handle ePHI as business associates to their healthcare customers, defensible BAA program plus secure architecture review for enterprise health-system deals.

Healthcare billing companies and CPA firms with healthcare clients also intersect with the FTC Safeguards Rule when they handle financial customer data alongside ePHI. See our FTC Safeguards Rule compliance page for the financial-services overlay on this same workflow.

Petronella partners with healthcare practices for HIPAA compliance and ePHI protection

How an Engagement Works: Request a Quote

Pricing for HIPAA data-protection engagements depends on practice size, workforce count, EHR complexity, vendor inventory, scope of existing remediation work, and whether ongoing vCISO advisory is part of the contract. We do not publish flat pricing because the variance across healthcare clients is large. We return a fixed-fee proposal within five business days after a 30-minute scoping call.

Phase 1: Discovery and BAA verification

  • BAA inventory and review (Microsoft, EHR vendor, billing vendor, every third-party tool that touches ePHI)
  • Current Risk Analysis review or fresh execution if absent or out of date
  • Vendor risk assessment and workforce scope mapping
  • Existing tenant configuration audit across email, storage, identity, mobile, endpoint
  • Deliverable: gap report + remediation plan + Phase 2 fixed-fee proposal

Phase 2: Build, harden, and document

  • Deploy the Petronella encrypted system for email and ePHI storage
  • Configure MIP labels, DLP policies, MFA, conditional access in M365
  • Audit-log pipeline to Sentinel or client SIEM with 10-year retention
  • ComplianceArmor®-generated documentation set, validated and signed by CMMC-RP staff
  • Workforce training delivered and recorded
  • Deliverable: HIPAA-ready environment with audit binder

Request a HIPAA Data-Protection Quote

Tell us about your practice. We will return a fixed-fee proposal within five business days after a scoping call. Everything you share is protected under our standard NDA; nothing leaves Petronella Technology Group, Inc.

Call Penny (919) 348-4912 Answers 24/7, can schedule a HIPAA expert at Petronella Technology Group, Inc.

12 Most-Asked HIPAA Data Protection Questions

Is Microsoft 365 HIPAA compliant out of the box?

Microsoft 365 is HIPAA-capable, not HIPAA-compliant out of the box. The covered entity must execute Microsoft's HIPAA Business Associate Agreement, enable the unified audit log, configure Microsoft Information Protection sensitivity labels, deploy Data Loss Prevention policies, enforce MFA, harden conditional access, and document the configuration in the Risk Analysis.

The Microsoft BAA is necessary but not sufficient, the covered entity owns the configuration work that turns BAA coverage into actual compliance.

Can email be encrypted to non-Microsoft recipients?

Yes. The Petronella encrypted data and email system delivers end-to-end encrypted messages to any recipient. External recipients (patients, referring providers, labs, attorneys, payers) receive a free, no-license guest account to read, reply, and attach files. The encryption is true end-to-end, the message is ciphertext from sender device to recipient device, so intermediate servers cannot read the content.

What is the difference between TLS, SSL, and true encrypted email?

TLS (the successor to SSL) protects the message between two mail servers, but the message is decrypted and stored in plaintext on every server that handles it. True end-to-end encryption keeps the message ciphertext from sender device to recipient device.

The HIPAA Encryption Safe Harbor exemption from breach notification at 45 CFR §164.402 applies only when the data was rendered unusable, unreadable, or indecipherable to unauthorized individuals through encryption that meets NIST guidance, TLS in transit alone does not qualify.

How does this work with my EHR: Epic, Cerner, athenahealth, eClinicalWorks, NextGen?

The encrypted system sits alongside the EHR, not inside it. The EHR remains the system of record for clinical documentation; the encrypted platform handles messaging, referral attachments, large file exchange with labs and specialists, and any workflow where ePHI must leave the EHR boundary.

We have integrated with Epic (Clarity / Caboodle), Oracle Health (formerly Cerner), athenahealth, eClinicalWorks, NextGen, Allscripts / Veradigm, and Greenway. For new integrations we work against FHIR R4 endpoints or vendor-provided export pipelines rather than the live transactional EHR.

What about text messages to patients?

Standard SMS is not HIPAA-compliant, text messages traverse carrier infrastructure unencrypted and PHI can be exposed on device lock screens. For appointment reminders and non-PHI communication, configure the messaging platform to send only the appointment time and a generic instruction to call the practice. For any messaging that requires PHI, use the EHR patient portal's secure messaging or invite the patient to a free encrypted-email guest account.

Do I need a HIPAA Risk Analysis every year?

The HIPAA Security Rule at 45 CFR §164.308(a)(1)(ii)(A) requires an accurate and thorough Risk Analysis. HHS OCR guidance and every published OCR settlement to date make clear that the Risk Analysis must be reviewed and updated periodically, and after any environmental or operational change.

The defensible operating standard is annual at minimum plus event-driven updates after any major IT change, vendor onboarding, ransomware incident, or workforce restructuring. We recommend annual with quarterly review checkpoints.

What is a Safe Harbor de-identification?

Safe Harbor is one of two HIPAA de-identification methods at 45 CFR §164.514(b)(2). It requires removal of 18 specified identifiers, names, geographic subdivisions smaller than a state, all elements of dates (except year) directly related to an individual, telephone and fax numbers, email addresses, SSNs, medical record numbers, account numbers, certificate and license numbers, vehicle and device identifiers, web URLs, IP addresses, biometric identifiers, full-face photographs, and any other unique identifying code, plus the actual-knowledge test.

Data that has been Safe-Harbored is no longer ePHI for the purpose of the Privacy Rule.

What happens if a laptop with ePHI is stolen?

If the laptop's storage was encrypted to NIST guidance (typically AES-256 full-disk encryption with BitLocker or FileVault) and the key was protected, the HIPAA Encryption Safe Harbor at 45 CFR §164.402 may exempt the loss from breach notification. If the laptop was unencrypted or the key was unprotected, the loss is presumptively a reportable breach.

The cost difference between encrypted and unencrypted endpoint loss is typically a four-to-six-figure number per laptop. We deploy full-disk encryption to every endpoint on day one of any engagement.

Do you have HIPAA-specific certifications?

Petronella Technology Group, Inc. operates as a Cyber AB Registered Provider Organization (RPO #1449) with four CMMC Registered Practitioner (CMMC-RP) staff. The CMMC framework's NIST 800-171 control basis substantially overlaps the HIPAA Security Rule's administrative, physical, and technical safeguards, the same risk-and-control mindset that audits us against CMMC also audits us against HIPAA.

We do not currently publish a HIPAA-specific certification for the firm. We do have an Amazon #1 best-selling HIPAA book ("How HIPAA Can Crush Your Medical Practice") and have delivered HIPAA Risk Analyses and Privacy Officer advisory engagements continuously since 2002. For engagements requiring a specific named credential beyond CMMC-RP, we pull in partner-network practitioners who hold the additional credential. Consult your privacy counsel on what specific certification, if any, your engagement requires.

How does Penny handle PHI?

Penny is Petronella's client-facing scheduling and general-routing AI receptionist. Penny is intentionally designed not to ingest, store, or process protected health information. The Penny boundary is set at intake, routing, and appointment scheduling; any clinical or PHI-bearing conversation is escalated to a human team member at PTG or routed to the practice's own secure channel.

Penny's transcripts and call logs are scrubbed of any clinical identifiers that may have been disclosed inadvertently before they are retained.

What is the BAA structure when we engage Petronella?

Petronella Technology Group, Inc. executes a Business Associate Agreement with every covered entity client whose engagement involves access to ePHI. The PTG BAA aligns with 45 CFR §164.504(e) and includes the HITECH amendments at §164.314, security incident reporting, restrictions on use and disclosure, satisfactory assurances from subcontractors, return or destruction of PHI at termination, and direct liability under HHS enforcement.

Subcontractor vendors that touch ePHI sign downstream BAAs with PTG so the obligation chain is intact end-to-end. The BAA review is the first deliverable of any HIPAA engagement.

How fast can we be HIPAA-ready?

For a small-to-mid practice with reasonable cooperation from clinical leadership and infrastructure not in active breach, we typically deliver foundational HIPAA readiness, signed BAA, executed Risk Analysis, deployed encryption for email and endpoints, role-based access controls, MFA enforcement, audit logging, workforce training, breach-notification procedure, in 30 to 60 days.

Larger groups, MSOs, behavioral health practices subject to 42 CFR Part 2, and any practice with an active OCR matter take longer because the remediation surface is larger. Consult your privacy counsel on active-matter timelines; we focus on the technical and operational program work.

About the Author and Team

Craig Petronella, CMMC-RP, founder of Petronella Technology Group, Inc.

Craig Petronella, CMMC-RP, DFE #604180-DFE

Founder and Principal of Petronella Technology Group, Inc. Cyber AB Registered Practitioner (CMMC-RP), Cisco Certified Network Associate (CCNA), Certified Wireless Network Expert (CWNE), Licensed Digital Forensic Examiner (License 604180-DFE), MIT Sloan AI Implications for Business Strategy alumnus, and Amazon #1 best-selling author of 14+ cybersecurity books, including How HIPAA Can Crush Your Medical Practice.

Craig is the executive sponsor on all PTG healthcare engagements. Blake Rea, CMMC-RP, leads day-to-day Privacy and Security Officer advisory work for vCISO clients. Justin Summers, CMMC-RP, and Jonathan Wood, CMMC-RP, round out the CMMC-RP team that staffs HIPAA engagements alongside other PTG engineers.

Meet the team · Verify our Cyber AB RPO #1449 listing · Browse Craig's books on Amazon

Make ePHI Safer Than the Status Quo

If you operate a medical practice, MSO, dental group, behavioral health practice, billing company, urgent care, or ambulatory surgery center, and you want a defensible HIPAA data-protection program that survives an OCR inquiry, Petronella Technology Group, Inc. is in Raleigh, NC and has been delivering this work since 2002.

Penny answers 24/7 and can schedule a HIPAA expert directly.

Related pages: Data Protection pillar · HIPAA Power BI Dashboards · ComplianceArmor® documentation · Petronella XDR · Petronella vCISO · Managed IT Services · Our Team · FTC Safeguards Rule

This page is informational and does not constitute legal or compliance advice. HIPAA, the HIPAA Encryption Safe Harbor, the Privacy Rule, the Security Rule, the Breach Notification Rule, 42 CFR Part 2, and state-level privacy regimes all have specific application to a covered entity's circumstances. Consult your privacy counsel on any matter where regulatory interpretation is determinative. Petronella Technology Group, Inc. delivers the technical, operational, and documentation work that supports a defensible compliance posture.