Skip to content

HIPAA

Protect healthcare data and achieve HIPAA compliance with CyberOrigen.

Overview

HIPAA (Health Insurance Portability and Accountability Act) protects sensitive patient health information (PHI). It applies to covered entities and their business associates.

HIPAA Rules

Privacy Rule

Protects PHI usage and disclosure:

  • Patient rights
  • Minimum necessary standard
  • Authorization requirements

Security Rule

Technical safeguards for ePHI:

CategoryRequirement
AdministrativePolicies, training, risk analysis
PhysicalFacility access, workstation security
TechnicalAccess controls, encryption, audit

Breach Notification Rule

Requires notification when PHI is compromised:

  • Patient notification (within 60 days)
  • HHS notification
  • Media notification (>500 individuals)

Security Rule Requirements

Administrative Safeguards

StandardImplementation
164.308(a)(1)Risk analysis and management
164.308(a)(2)Assigned security responsibility
164.308(a)(3)Workforce security
164.308(a)(4)Information access management
164.308(a)(5)Security awareness and training
164.308(a)(6)Security incident procedures
164.308(a)(7)Contingency plan
164.308(a)(8)Evaluation
164.308(b)(1)Business associate agreements

Physical Safeguards

StandardImplementation
164.310(a)(1)Facility access controls
164.310(b)Workstation use
164.310(c)Workstation security
164.310(d)(1)Device and media controls

Technical Safeguards

StandardImplementation
164.312(a)(1)Access control
164.312(b)Audit controls
164.312(c)(1)Integrity
164.312(d)Person/entity authentication
164.312(e)(1)Transmission security

Getting Started

1. Enable Framework

  1. Go to GRCFrameworks
  2. Click Enroll on HIPAA
  3. Click Enable

2. Risk Analysis

HIPAA requires documented risk analysis:

  1. Go to GRCRisk Register
  2. Identify ePHI locations
  3. Assess threats and vulnerabilities
  4. Document risk levels

3. Implement Safeguards

Address required and addressable standards:

  • Required: Must implement
  • Addressable: Implement or document alternative

Key Controls

Technical Controls

RequirementCyberOrigen Feature
164.312(a)(1) Access ControlAccess scanning, reviews
164.312(b) Audit ControlsAudit log tracking
164.312(c)(1) IntegrityFile integrity checks
164.312(e)(1) TransmissionTLS/encryption scanning

Administrative Controls

RequirementCyberOrigen Feature
164.308(a)(1) Risk AnalysisRisk register
164.308(a)(5) TrainingPolicy acknowledgment
164.308(a)(6) IncidentsRemediation workflow

PHI Identification

What is PHI?

Protected Health Information includes:

  • Names
  • Dates (birth, admission, discharge)
  • Phone/fax numbers
  • Email addresses
  • Social Security numbers
  • Medical record numbers
  • Health plan IDs
  • Account numbers
  • Certificate/license numbers
  • Vehicle identifiers
  • Device identifiers
  • URLs
  • IP addresses
  • Biometric identifiers
  • Photos
  • Any unique identifying number

ePHI Systems

Identify systems with electronic PHI:

  1. Go to GRCControl Library
  2. Map assets to PHI handling
  3. Track in asset inventory

Business Associate Agreements

BAA Requirements

Track vendor BAAs:

  1. Go to GRCVendors
  2. Add vendors with PHI access
  3. Upload BAA documents
  4. Track expiration dates

Vendor Risk Assessment

Assess BA security:

  • Security questionnaires
  • SOC 2 reports
  • Penetration test results

Evidence Collection

Automated Evidence

  • Access control scans
  • Encryption verification
  • Vulnerability assessments
  • Audit log exports

Manual Evidence

  • Policies and procedures
  • Risk analysis documentation
  • Training records
  • BAAs
  • Incident response plans

Control Mapping

HIPAA maps to other frameworks:

HIPAASOC 2ISO 27001
164.312(a)(1)CC6.1A.9.1.1
164.312(b)CC7.2A.12.4.1
164.312(e)(1)CC6.7A.10.1.1
164.308(a)(1)CC3.26.1

Breach Response

When to Notify

Notification required when:

  • Unauthorized access to PHI
  • Use or disclosure violating Privacy Rule
  • Cannot demonstrate low probability of compromise

Response Steps

  1. Identify breach scope
  2. Document investigation
  3. Notify individuals (within 60 days)
  4. Notify HHS
  5. Notify media (if >500 individuals)
  6. Remediate vulnerabilities

Common Gaps

RequirementIssueSolution
164.308(a)(1)No risk analysisComplete risk assessment
164.312(a)(2)(i)Shared accountsUnique user IDs
164.312(e)(1)Unencrypted emailEncryption solution
164.308(b)(1)Missing BAAsBAA tracking

Resources

Agentic AI-Powered Security & Compliance