HIPAA compliance for medical practices.
Privacy and Security Rule alignment under 45 CFR Parts 160, 162, and 164. Administrative, physical, and technical safeguards. Risk analysis, Business Associate Agreement management, breach notification readiness, and workforce training for healthcare organizations across North Carolina.
Related from Petronella Technology Group: HIPAA-compliant private LLMs - 5 architectures, and for DoD-adjacent healthcare contractors, the CMMC Level 1 self-assessment guide.
Risk-Assess. Remediate. Monitor.
Every HIPAA engagement at Petronella Technology Group runs through three stages. Each stage produces auditable artifacts your covered entity or business associate can hand to the Office for Civil Rights, a contracted auditor, or a downstream healthcare partner conducting due diligence.
Risk Analysis under 164.308(a)(1)(ii)(A)
We open every engagement with a NIST SP 800-66 Revision 2 risk analysis mapped to the four safeguard categories. The output is a quantified risk register the Office for Civil Rights expects to see.
- ePHI inventory: storage, transit, processing
- Threat modeling against 42 implementation specs
- Likelihood + impact scoring per asset
- Gap analysis vs current safeguards
- Prioritized remediation roadmap
Risk Management plan under 164.308(a)(1)(ii)(B)
We close gaps in order of risk score, not order of marketing. Policies and procedures are written for your environment, not pulled from a template library. Technical safeguards get deployed and validated.
- Policy and procedure authorship for 42 specs
- MFA enforcement on every ePHI-touching account
- FIPS-validated encryption at rest and in transit
- Workforce role-based training rollout
- Business Associate Agreement cascade refresh
Continuous Evaluation under 164.308(a)(8)
HIPAA is not a one-time project. The Evaluation standard requires periodic technical and non-technical review. We operate the program continuously and produce the six-year documentation trail required by 164.316(b)(2)(i).
- Quarterly safeguard reviews
- Annual tabletop exercises and breach drills
- Audit log retention and correlation
- Vendor BAA inventory maintenance
- OCR-ready evidence binder, always current
Self-Audit vs Petronella-Led HIPAA Program
Every healthcare practice owner asks the same question: can we run HIPAA in-house, or do we hire it out? Here is the side-by-side, criterion by criterion. The honest answer for solo practitioners is yes you can - the honest answer for any practice with more than three workforce members is almost always no, you should not.
Penny answers the phone. Petronella signs the BAA same day.
We are headquartered at 5540 Centerview Dr., Suite 200, Raleigh, NC 27606. Penny - our front-line AI agent - answers before the third ring, asks three qualifying questions, and books your free 15-minute HIPAA readiness consult on Craig's calendar. From signed engagement to BAA execution is typically same day.
What HIPAA actually requires
HIPAA is a family of federal regulations codified at 45 CFR Parts 160, 162, and 164. Four rules sit inside that family, and every one of them carries enforcement teeth:
- Privacy Rule - governs how Protected Health Information may be used and disclosed in any form, electronic, paper, or oral. Sets the minimum necessary standard at 164.502(b) and the patient access right at 164.524.
- Security Rule (45 CFR Part 164 Subpart C) - governs the confidentiality, integrity, and availability of electronic PHI through 22 standards and 42 implementation specifications (20 Required, 22 Addressable). Read our Security Rule compliance overview for the full structure.
- Breach Notification Rule - sets a 60-day notification clock once a breach is confirmed under the four-factor analysis at 164.402. No size threshold. No "we did not mean to" exemption.
- Enforcement Rule - defines the four-tier penalty structure, with willful-neglect violations capped at $2,067,813 per category per calendar year as adjusted for inflation. Tier 1 (unknown) starts at $137.
These rules apply to every covered entity (health plans, healthcare clearinghouses, and healthcare providers that transmit health information electronically) and every business associate (and subcontractor of a business associate) that creates, receives, maintains, or transmits PHI. The HITECH Act of 2009 made business associates directly liable under the Security Rule, which is why we sign a BAA on day one of every engagement.
A working HIPAA program rests on three legs. One: an inventory of where ePHI lives and moves. Two: administrative, physical, and technical safeguards proportionate to the risk profile of that inventory. Three: documentation that proves both items are happening on a continuous basis. The Office for Civil Rights resolution agreements published since 2013 read, almost without exception, like a documentation autopsy. The cited deficiencies are rarely "you got hacked" - they are "you cannot produce evidence of a current risk analysis."
Required vs Addressable - the spec that catches every practice
Required implementation specifications must be implemented exactly as the rule describes them. There is no flexibility. Addressable specifications must be evaluated, and if reasonable and appropriate, implemented as described. If they are not reasonable and appropriate for the regulated entity, the entity must document why, and implement an equivalent alternative measure that achieves the same objective. The trap at 164.306(d)(3)(ii)(B)(2) is that "Addressable" is widely misread as "optional." It is not. An undocumented Addressable specification is, in practice, a finding waiting to happen.
Where most practices have gaps
After two decades of healthcare engagements - dental, primary care, behavioral health, ambulatory surgery, and specialty practice - the patterns are predictable. We see the same handful of failures over and over:
- Default Microsoft 365 and Google Workspace tiers do not include a BAA out of the box. HIPAA-eligible variants do, but the addendum has to be executed and the tenant has to be hardened. Most practices do neither.
- Termination procedures forget to revoke access on the day someone leaves (covered in detail on our workforce security page). Former employees still receiving EHR notifications six months later is a finding we have personally surfaced inside engagements.
- Six-year documentation retention under 164.316(b)(2)(i) collides with default platform log retention of 30 to 365 days. Audit logs rotate out of existence before they would have been needed in a breach investigation. Our audit controls page covers the fix.
- Annual workforce training videos check the 164.308(a)(5) box but do not change behavior unless they are mapped to the practice's actual risks - our 2026 annual security awareness training course is built specifically to close that gap.
- Vendor BAA cascades go stale when sub-vendors get onboarded without anyone updating the inventory. The billing service signs a BAA. The billing service then signs a BAA with the clearinghouse. The clearinghouse signs a BAA with the cloud host. Three layers down, no one in the covered entity remembers that chain exists - and OCR will follow it on inquiry.
- Sanctions tracking - 164.308(a)(1)(ii)(C) - rarely exists outside HR. If a workforce member commits a Privacy Rule violation and there is no record of corrective action, the deficiency is documented in the breach investigation, not the personnel file.
- Patient access requests under 164.524 are routinely fumbled. The 30-day clock, the format-of-choice requirement, the cost-of-copies cap - all of these are repeated OCR enforcement themes, and all of them are documentation failures, not technology failures.
Our HIPAA security risk assessment exists specifically to surface those gaps before OCR does. Our HIPAA checklist walks the same ground at no cost so you can see where you stand before scoping work.
How a real Petronella engagement runs
Our team is CMMC-RP certified - the credential that overlaps significantly with HIPAA Security Rule discipline because both regimes derive from NIST SP 800-171 / 800-53 control families. The organization is CMMC-AB Registered Practitioner Organization #1449. We sign a BAA the same day we sign a Master Services Agreement. We are a business associate to every healthcare client, and we accept the direct HITECH liability that comes with it.
Phase 1 - Risk Analysis (weeks 1 to 3)
A typical HIPAA program engagement opens with a Risk Analysis under 164.308(a)(1)(ii)(A) using NIST SP 800-66 Revision 2 mapped to the four safeguard categories, with a quantified risk register that becomes the input to the Risk Management plan under 164.308(a)(1)(ii)(B). We catalog every system that touches ePHI - the EHR, the practice management software, the lab interface, the imaging server, the prescription gateway, the patient portal, every smartphone with the EHR app installed, every workstation with browser access, every backup target. Each asset gets a likelihood-and-impact score, and the resulting register orders the remediation roadmap.
Phase 2 - Policy and Workforce Layer (weeks 4 to 8)
From the risk analysis we author or refresh the policy and procedure set covering all 42 implementation specifications. The Privacy Rule body of policies - notice of privacy practices, minimum-necessary determinations, patient access, accounting of disclosures, amendments - is updated for current Omnibus Rule and 2024 reproductive-health rulemaking. The Security Rule policies are tied directly to the risk register: every Required spec gets a policy, every Addressable spec gets either a policy or a documented alternative. We design the workforce HIPAA training program, build the BAA inventory, and stand up incident response with documented annual tabletops.
Phase 3 - Technical Safeguards (weeks 6 to 12, overlapping)
For practices that want the technical layer handled too, we run HIPAA managed IT services covering tenant hardening, MFA enforcement on every account that touches ePHI under 164.312(d), FIPS-validated encryption at rest and in transit, audit logging that actually correlates and meets the six-year retention rule, automated patch and vulnerability cadence, endpoint detection and response on every clinical workstation, network segmentation between clinical and guest Wi-Fi, and quarterly internal vulnerability scans against the in-scope estate. The technical layer plugs into the same documentation engine as the policy layer.
Phase 4 - Continuous Evaluation (ongoing)
For organizations that need their hosting environment inside the BAA boundary, our HIPAA compliant hosting in Raleigh bundles managed infrastructure with the compliance program under one BAA. The documentation engine is delivered through our HIPAA compliance platform so policies, evidence, and training records live in one auditable place. Quarterly safeguard reviews, annual penetration testing (in-house team, no third-party markup), annual tabletop exercises, BAA re-attestation, and a continuously-current OCR evidence binder are the deliverables you can point a regulator or a contracted auditor at on any business day.
HIPAA, breach notification, and AI workloads
The Breach Notification Rule presumes a breach has occurred upon any acquisition, access, use, or disclosure of unsecured PHI in a manner not permitted under the Privacy Rule, unless a four-factor risk analysis at 45 CFR 164.402 demonstrates a low probability that the PHI was compromised. The four factors are: (1) the nature and extent of the PHI involved, including the types of identifiers and likelihood of re-identification; (2) the unauthorized person who used the PHI or to whom the disclosure was made; (3) whether the PHI was actually acquired or viewed; (4) the extent to which the risk to the PHI has been mitigated.
Affected individuals must be notified within 60 days of discovery. Breaches affecting 500 or more individuals must be reported to HHS and prominent media inside the same 60 days and posted to the public OCR breach portal. Late or incomplete reporting compounds into a separate violation. Breaches affecting fewer than 500 individuals are logged and reported to HHS annually within 60 days after calendar year-end.
Our breach response playbook is part of every HIPAA engagement, and our data breach forensics team handles confirmed incidents end to end - containment, evidence preservation, chain-of-custody documentation, root-cause analysis, and the Notification Rule clock. Craig holds DFE certification #604180 and CCNA, CWNE, and CMMC-RP credentials, which means the forensics work product can hold up to scrutiny in litigation and regulatory proceedings.
The AI inference problem - why your staff cannot paste PHI into ChatGPT
For clinical AI workloads, the same risk framework now extends to model inference pipelines. Any path where ePHI lands in a third-party LLM without an executed BAA is an impermissible disclosure under 164.502. Free-tier ChatGPT, free-tier Claude.ai, free-tier Gemini - none of these are HIPAA-eligible. The paid enterprise tiers from several major LLM vendors do offer BAAs, but the tenant has to be configured for it and the data-processing terms have to be reviewed. If your practice is evaluating ambient scribing, claims automation, prior authorization, or any AI workload that touches PHI, talk to us before deployment, not after.
For the deeper architecture analysis on what HIPAA-compliant LLM stacks actually look like, including private inference inside the BAA boundary, see our analysis of HIPAA-compliant private LLMs across five architecture patterns.
HIPAA program scope - what's in, what's not
The Privacy Rule scope is all PHI in any form. The Security Rule scope is electronic PHI only. A printed appointment list left on a counter is a Privacy Rule concern; a USB stick with an unencrypted patient export is both a Privacy Rule and a Security Rule concern. Both rules apply to the same covered entity simultaneously, so program design has to cover both. Our engagements always bracket both rules unless the client explicitly requests a Security-Rule-only assessment.
What is out of scope: research data that has been de-identified under the Safe Harbor method at 164.514(b)(2) or the Expert Determination method at 164.514(b)(1) is no longer PHI and is outside HIPAA. Education records covered by FERPA are excluded. Employment records held by a covered entity in its role as employer are excluded. Workers' compensation records have a narrow disclosure carve-out at 164.512(l). We help scope all of these on a per-engagement basis.
How Petronella connects HIPAA, CMMC, and broader cybersecurity
For healthcare contractors that also touch the Department of Defense supply chain - medical device manufacturers, federal medical research recipients, VA contractors - HIPAA sits alongside CMMC and NIST SP 800-171. We consult across all three CMMC levels: Level 1 (17 controls for Federal Contract Information), Level 2 (110 NIST SP 800-171 practices for Controlled Unclassified Information), and Level 3 (24 enhanced NIST SP 800-172 practices for the highest CUI sensitivity). The control overlap with HIPAA is significant: HIPAA's audit-controls standard at 164.312(b) maps to NIST AU controls; HIPAA access-control at 164.312(a) maps to NIST AC controls. Practices in this dual-regime situation should not run two independent programs - they should run one unified control set with HIPAA-specific and CMMC-specific evidence overlays. We do this routinely. See our CMMC compliance pillar and the broader cybersecurity program overview for how the regimes intersect, and our vCISO services for the executive-layer governance that makes a unified program possible.
HIPAA Compliance services
Pick the path that matches what you need next. Or book a free 15-minute consult through the contact form and Penny will route you.
HIPAA Implementation Playbook
The full lay of HIPAA: Privacy Rule, Security Rule, Breach Notification, and Enforcement, with the safeguards that move the needle for small and mid-size practices.
Read the guide →HIPAA Security Risk Assessment
NIST SP 800-66 Rev 2 risk analysis under 164.308(a)(1)(ii)(A) with a quantified risk register and a prioritized remediation roadmap. The controlling document for your whole program.
See the assessment →HIPAA Risk Assessment Checklist
A working checklist that walks every Security Rule family with the artifact OCR will expect to see. Free to use before you scope a full assessment.
Open the checklist →HIPAA Workforce Training
Role-based training mapped to the risks identified in your Risk Analysis, not a generic annual video. Completion records, sanctions tracking, and six-year retention built in.
View training →HIPAA Managed IT Services
Done-for-you technical safeguards: tenant hardening, MFA, FIPS-validated encryption, audit logging with six-year retention, patch cadence, and BAA management under one roof.
Explore managed IT →HIPAA Compliant Hosting
Managed HIPAA hosting plus the compliance program (SRA, policies, training, in-house pen test, IR retainer) under a single BAA. Custom-quoted retainer based on org size, regulatory pressure, and engagement depth.
See hosting →Business Associate Agreement (BAA)
Required elements under 45 CFR 164.314(a)(2), subcontractor flow-down, breach reporting, audit rights, and termination procedures. Omnibus-current language.
Read the BAA guide →HIPAA to NIST Mapping
Every Security Rule implementation specification mapped to NIST SP 800-53 controls. The crosswalk used for dual-regime engagements (HIPAA + CMMC, HIPAA + HITRUST).
View the crosswalk →Immutable Backup and Disaster Recovery
The 3-2-1-1-0 backup rule with immutable storage and tested RTO/RPO so a ransomware event stays a recovery, not a breach. Evidence for 164.308(a)(7) Contingency Plan and the Data Backup Plan implementation spec the OCR will request.
See backup and DR →24/7 Cyber Incident Response Retainer
NIST SP 800-61 incident response retainer plus credentialed DFE forensics handoff for the 164.308(a)(6) Security Incident Procedures standard and the 60-day Breach Notification clock under 164.404. Practiced via annual tabletop, evidenced for OCR.
See incident response →HIPAA compliance, answered
The questions every healthcare practice asks before scoping a real HIPAA engagement. Answers grounded in 45 CFR Parts 160, 162, and 164, recent OCR resolution agreements, and 23 years of healthcare client work.
What does HIPAA actually require?
HIPAA is codified at 45 CFR Parts 160, 162, and 164. The Privacy Rule covers PHI in any form. The Security Rule (Part 164 Subpart C) covers electronic PHI through 22 standards and 42 implementation specifications (20 Required, 22 Addressable). The Breach Notification Rule sets a 60-day clock. The Enforcement Rule defines penalties up to $2,067,813 per category per calendar year for willful neglect.
Every covered entity and every business associate that creates, receives, maintains, or transmits PHI is in scope. The HITECH Act of 2009 made business associates directly liable under the Security Rule.
Who needs a HIPAA compliance program?
Every covered entity (health plans, healthcare clearinghouses, and healthcare providers that transmit health information electronically in connection with a HIPAA-covered transaction) and every business associate that creates, receives, maintains, or transmits PHI on behalf of a covered entity.
Subcontractors of business associates are also business associates and need a downstream BAA. There is no employee-count exemption. A solo practitioner who submits one electronic claim is a covered entity.
What is electronic protected health information (ePHI)?
Electronic protected health information is any individually identifiable health information that is created, received, maintained, or transmitted in electronic form by a covered entity or business associate. Any of the 18 HIPAA Privacy Rule identifiers (name, address, dates, contact info, SSN, medical record number, device or vehicle ID, URL or IP, biometric, photo, and others) connected to health information makes the data ePHI.
Data stripped of all 18 identifiers via Safe Harbor at 164.514(b)(2), or de-identified through Expert Determination at 164.514(b)(1), is outside HIPAA scope.
When is a Business Associate Agreement (BAA) required?
A BAA is required between a covered entity and any business associate, and between a business associate and any subcontractor handling PHI on its behalf. Required elements appear at 45 CFR 164.314(a)(2): permitted uses, prohibited disclosures, safeguard requirements, breach reporting obligations, flow-down to subcontractors, return or destruction of PHI on termination, and audit rights.
Pre-2013 BAA templates often miss Omnibus Rule requirements - refresh any template drafted before 2013.
What encryption standard does HIPAA require?
The HIPAA Security Rule treats encryption as Addressable rather than Required, but OCR enforcement treats unencrypted ePHI as effectively presumptive non-compliance. The standard reference is FIPS 140-2 (transitioning to FIPS 140-3) for cryptographic modules: AES-256 for data at rest and TLS 1.2 minimum (TLS 1.3 preferred) for data in transit.
Encryption also provides Breach Notification Rule protection. Encrypted PHI lost or stolen is generally not a reportable breach because the encryption renders the data unusable, unreadable, or indecipherable under HHS guidance.
What is the HIPAA breach notification threshold?
There is no minimum threshold. Any unauthorized acquisition, access, use, or disclosure of unsecured PHI is presumptively a breach unless the four-factor risk assessment in 45 CFR 164.402 demonstrates low probability of compromise.
Affected individuals must be notified within 60 days of discovery. Breaches affecting 500 or more individuals must be reported to HHS and prominent media within 60 days. Breaches affecting fewer than 500 individuals are logged and reported annually to HHS within 60 days after year-end.
How long must HIPAA documentation be retained?
Six years from the later of (1) the date of creation or (2) the date the document was last in effect, per 45 CFR 164.316(b)(2)(i). This applies to written policies and procedures, training records, audit logs, risk analyses, BAAs, sanctions records, and incident records.
State law may impose longer retention. Where it does, the longer period controls.
What is the difference between Required and Addressable implementation specifications?
Required specifications must be implemented as written. Addressable specifications must be evaluated; if reasonable and appropriate, they must be implemented. If not, the regulated entity must document why and implement an alternative measure that achieves the same objective per 164.306(d)(3)(ii)(B)(2).
Addressable does not mean optional. Skipped Addressable specifications without a documented alternative are a common OCR finding.
Does ChatGPT or another LLM need a BAA?
Yes, if it processes ePHI. Sending PHI to a third-party LLM without an executed Business Associate Agreement is an impermissible disclosure under 45 CFR 164.502.
Several LLM vendors now offer HIPAA-eligible tiers with a BAA; consumer tiers do not. We help practices evaluate the BAA terms, scope tenant configuration to keep PHI inside the BAA boundary, and document an AI Acceptable Use policy that the workforce can actually follow.
Are small practices under 50 employees exempt from HIPAA?
No. There is no employee-count exemption from the HIPAA Privacy or Security Rule. A solo practitioner who submits one electronic claim is a covered entity. Some Group Health Plans below 50 participants are exempt from certain parts of HIPAA, but that is a narrow plan-side carve-out and does not extend to providers.
Practice size does affect what is "reasonable and appropriate" under the flexibility-of-approach standard at 164.306(b)(2), but every covered entity has the same obligation to address every standard.
HIPAA depth library
Every spoke we have written - Security Rule control families, NIST mapping, NC service areas, and related healthcare resources. Expand any section to navigate.
HIPAA Security Rule control library - all 22 standards explained
- Security Management Process
- Assigned Security Responsibility
- Workforce Security
- Information Access Management
- Security Awareness & Training
- Security Incident Procedures
- Contingency Plan
- Evaluation
- Business Associate Contracts
- Business Associate Agreement (BAA)
- Facility Access Controls
- Workstation Use
- Workstation Security
- Device & Media Controls
- Access Control
- Audit Controls
- Integrity
- Person or Entity Authentication
- Transmission Security
- Security Rule Compliance Overview
- HIPAA Security Guide
- HIPAA to NIST Mapping
- NIST SP 800-66 Implementation
HIPAA compliance by city - North Carolina service areas
- Angier, NC
- Apex, NC
- Burlington, NC
- Carrboro, NC
- Cary, NC
- Chapel Hill, NC
- Charlotte, NC
- Clayton, NC
- Concord, NC
- Durham, NC
- Fayetteville, NC
- Fuquay-Varina, NC
- Garner, NC
- Gastonia, NC
- Goldsboro, NC
- Greensboro, NC
- Henderson, NC
- High Point, NC
- Hillsborough, NC
- Holly Springs, NC
- Jacksonville, NC
- Knightdale, NC
- Louisburg, NC
- Mebane, NC
- Morrisville, NC
- Pittsboro, NC
- Raleigh, NC
- Research Triangle Park, NC
- Rolesville, NC
- Sanford, NC
- Smithfield, NC
- Wake Forest, NC
- Wendell, NC
- Wilmington, NC
- Winston-Salem, NC
- Zebulon, NC
Related HIPAA topics & healthcare resources
- Healthcare verticals
- Healthcare IT and cybersecurity
- Healthcare cybersecurity vertical
- Healthcare IT services
- Clinical trials and research compliance
- Dental practice compliance
- HIPAA for dental practices
- HIPAA tools and platforms
- Free HIPAA checklist
- HIPAA compliant texting
- ComplianceArmor HIPAA software
- vCISO services
- AI for healthcare and HIPAA workloads
- Guides and pillars
- HIPAA implementation guide
- CMMC compliance pillar
- Cybersecurity pillar
- Compliance frameworks pillar
- Digital forensics guide
Ready to talk HIPAA?
Free 15-minute readiness consult, signed BAA same day as the engagement, and a NIST SP 800-66 Rev 2 risk analysis as the first deliverable. Penny will route you to Craig.