LexClawFrameworks & Standards
FrameworksHIPAA Security
sector specificv2013 (proposed update 2025)Published

HIPAA Security Rule

HIPAA Security

The HIPAA Security Rule establishes national standards to protect electronic protected health information (ePHI). It requires covered entities and business associates to implement administrative, physical, and technical safeguards.

Issuing Body
U.S. Department of Health and Human Services (HHS)
Version
2013 (proposed update 2025)
Published
2003-02-20
Controls
20
Mapped Laws
Control IDTitleDomainMaturity
HIPAA-164.308(a)(1)
Security Management Process
Implement policies and procedures to prevent, detect, contain, and correct security violations. Includes risk analysis, risk management, sanction policy, and information system activity review.
defined
HIPAA-164.308(a)(2)
Assigned Security Responsibility
Identify the security official who is responsible for the development and implementation of the policies and procedures required for the entity.
defined
HIPAA-164.308(a)(3)
Workforce Security
Implement policies and procedures to ensure that all members of its workforce have appropriate access to electronic protected health information, and to prevent those workforce members who do not have access from obtaining access.
defined
HIPAA-164.308(a)(4)
Information Access Management
Implement policies and procedures for authorizing access to electronic protected health information that are consistent with the applicable requirements of subpart E of this part.
defined
HIPAA-164.308(a)(5)
Security Awareness and Training
Implement a security awareness and training program for all members of its workforce including management. Includes protection from malicious software, log-in monitoring, and password management.
defined
HIPAA-164.308(a)(6)
Security Incident Procedures
Implement policies and procedures to address security incidents. Includes identification and response to suspected or known security incidents, mitigation of harmful effects, and documentation.
defined
HIPAA-164.308(a)(7)
Contingency Plan
Establish and implement policies and procedures for responding to an emergency or other occurrence that damages systems containing ePHI. Includes data backup, disaster recovery, emergency mode operation, testing, and applications/data criticality analysis.
defined
HIPAA-164.308(a)(8)
Evaluation
Perform a periodic technical and nontechnical evaluation, based initially upon the standards implemented under this rule and subsequently, in response to environmental or operational changes affecting the security of ePHI.
defined
HIPAA-164.308(b)(1)
Business Associate Contracts
A covered entity may permit a business associate to create, receive, maintain, or transmit electronic protected health information on the covered entity's behalf only if the covered entity obtains satisfactory assurances that the business associate will appropriately safeguard the information.
defined
HIPAA-164.310(a)(1)
Facility Access Controls
Implement policies and procedures to limit physical access to its electronic information systems and the facility or facilities in which they are housed, while ensuring that properly authorized access is allowed.
defined
HIPAA-164.310(b)
Workstation Use
Implement policies and procedures that specify the proper functions to be performed, the manner in which those functions are to be performed, and the physical attributes of the surroundings of a specific workstation or class of workstation that can access ePHI.
defined
HIPAA-164.310(c)
Workstation Security
Implement physical safeguards for all workstations that access electronic protected health information, to restrict access to authorized users.
defined
HIPAA-164.310(d)(1)
Device and Media Controls
Implement policies and procedures that govern the receipt and removal of hardware and electronic media that contain electronic protected health information into and out of a facility, and the movement of these items within the facility.
defined
HIPAA-164.312(a)(1)
Access Control
Implement technical policies and procedures for electronic information systems that maintain electronic protected health information to allow access only to those persons or software programs that have been granted access rights.
managed
HIPAA-164.312(b)
Audit Controls
Implement hardware, software, and/or procedural mechanisms that record and examine activity in information systems that contain or use electronic protected health information.
managed
HIPAA-164.312(c)(1)
Integrity Controls
Implement policies and procedures to protect electronic protected health information from improper alteration or destruction.
managed
HIPAA-164.312(d)
Person or Entity Authentication
Implement procedures to verify that a person or entity seeking access to electronic protected health information is the one claimed.
managed
HIPAA-164.312(e)(1)
Transmission Security
Implement technical security measures to guard against unauthorized access to electronic protected health information that is being transmitted over an electronic communications network.
managed
HIPAA-164.316(a)
Policies and Procedures
Implement reasonable and appropriate policies and procedures to comply with the standards, implementation specifications, or other requirements of this subpart.
defined
HIPAA-164.316(b)(1)
Documentation
Maintain the policies and procedures implemented to comply with this subpart in written (which may be electronic) form. Retain documentation for 6 years from the date of its creation or the date when it last was in effect, whichever is later.
defined