HIPAA Compliance for Startups: Complete Guide (2025)

Quick Facts

Aspect Details
What is HIPAA? Health Insurance Portability and Accountability Act (US federal law)
Enacted 1996 (Privacy Rule: 2003, Security Rule: 2005, Breach Notification: 2009)
Applies To Healthcare providers, health plans, healthcare clearinghouses, business associates
Protected Data PHI (Protected Health Information) – health data linked to individuals
Penalties $100 - $1.9M per violation (depending on culpability)
Compliance Cost $10,000 - $50,000 (small startups)
Timeline 3-6 months (average: 4-5 months)
Certification No formal certification (self-declaration + audits)
Enforcement HHS Office for Civil Rights (OCR) + state attorneys general
Key Requirement Business Associate Agreement (BAA) required

What is HIPAA?

HIPAA (Health Insurance Portability and Accountability Act) is a federal law enacted in 1996 that establishes national standards for protecting sensitive patient health information from being disclosed without the patient's consent or knowledge.

Key Components

HIPAA consists of 5 rules (called "Titles"), but startups primarily care about 3 rules:

  1. Privacy Rule (2003): Sets standards for protecting PHI (who can access, when, how)
  2. Security Rule (2005): Sets technical and organizational standards for securing electronic PHI (ePHI)
  3. Breach Notification Rule (2009): Requires notification when PHI is breached (60-day timeline)

Other rules (less relevant for most startups):

  • Transactions and Code Sets Rule: Standards for electronic health transactions (claims, eligibility)
  • Identifiers Rule: Standard identifiers for healthcare providers, health plans, employers

What is PHI?

PHI (Protected Health Information) is any health information that can be linked to an individual, including:

  • Medical records: Diagnoses, treatment plans, prescriptions, lab results
  • Health history: Past medical conditions, surgeries, allergies
  • Payment information: Health insurance info, billing records
  • Demographics: Name, address, DOB, SSN (when linked to health data)

Key point: PHI is any individually identifiable health information, not just medical records.

ePHI vs PHI

  • PHI: Protected Health Information (all forms: paper, electronic, oral)
  • ePHI: Electronic Protected Health Information (PHI stored or transmitted electronically)

Most startups deal with ePHI (health data in databases, apps, cloud systems).

HITECH Act (2009)

The HITECH Act (Health Information Technology for Economic and Clinical Health Act) expanded HIPAA in 2009:

  • Extended HIPAA to Business Associates (vendors/contractors handling PHI)
  • Increased penalties (up to $1.9M per violation)
  • Required breach notification
  • Introduced audits and enforcement

Impact: Health tech startups (Business Associates) are now directly liable for HIPAA compliance (not just covered entities).


Why HIPAA Matters for Startups

1. Legal Requirement (Not Optional)

Unlike SOC 2 or ISO 27001 (voluntary), HIPAA is mandatory if you handle PHI.

Consequence of non-compliance:

  • Civil penalties: $100 - $1.9M per violation
  • Criminal penalties: Up to $250K + 10 years in prison (for willful neglect)
  • Business shutdown (inability to serve healthcare customers)

2. Customer Requirement (Healthcare Industry)

Healthcare providers, hospitals, health plans, and health systems will not work with you unless you:

  1. Sign a Business Associate Agreement (BAA)
  2. Demonstrate HIPAA compliance (policies, procedures, safeguards)

Sales impact: Without HIPAA compliance, your sales team cannot close deals with healthcare customers.

3. Competitive Advantage

HIPAA compliance signals to customers that:

  • Your startup is established and trustworthy
  • You take data security seriously
  • You're ready for enterprise healthcare customers

Marketing value: Display "HIPAA Compliant" badge on website (increases conversion with healthcare buyers).

4. Reduces Data Breach Risk

Healthcare is the most targeted industry for cyberattacks:

  • Average healthcare data breach cost: $10M (highest of any industry)
  • Per-record breach cost: $408 (vs. $148 average across industries)

HIPAA safeguards (encryption, access controls, monitoring) reduce breach risk significantly.

5. Enables Upmarket Movement

HIPAA compliance unlocks enterprise healthcare customers:

  • Hospitals and health systems (typically $500K-$5M contracts)
  • Health plans and insurers (typically $1M-$10M contracts)
  • Large medical practices (typically $50K-$500K contracts)

ROI: A single enterprise healthcare deal can justify the $10K-$50K cost of HIPAA compliance.


2025 HIPAA Updates

In 2025, HHS proposed significant updates to the HIPAA Security Rule—the most substantial changes since the rule was enacted in 2005.

End of Self-Declared Compliance

Old model (pre-2025): Health tech companies could self-declare HIPAA compliance without independent verification.

New model (2025+): HHS proposes moving to "proven compliance" requiring:

  • Independent audits (annual or biennial)
  • Real-time monitoring and continuous risk assessments
  • Third-party verification of safeguards

Impact: Self-declaration no longer sufficient—must demonstrate compliance through audits and monitoring.

New Requirements (Proposed 2025)

1. Mandatory Annual Compliance Audits

Requirement: Conduct annual independent audits of HIPAA safeguards.

Details:

  • Audits must be performed by qualified independent auditors
  • Audit reports must document compliance with all HIPAA safeguards
  • Audit reports retained for 6 years

Impact: Increases cost ($5K-$15K per annual audit) and effort (audit preparation, evidence collection).

2. Regular Vulnerability Scanning & Penetration Testing

Requirement: Conduct regular vulnerability scans and annual penetration tests.

Details:

  • Vulnerability scans: At least quarterly (monthly recommended)
  • Penetration testing: At least annually
  • Remediate critical vulnerabilities within 30 days (high-risk: 7 days)

Impact: Requires security tools (Nessus, Qualys) and remediation processes.

3. 24-Hour PHI Access Revocation

Requirement: Revoke access to PHI within 24 hours of termination or role change.

Old standard: "Timely" (no specific timeframe)

New standard: 24 hours (specific timeframe)

Impact: Requires automated offboarding processes (manual offboarding too slow).

4. 72-Hour Disaster Recovery Requirement

Requirement: Cloud-based health systems must restore ePHI within 72 hours of system failure or disaster.

Details:

  • Applies to cloud-based systems (AWS, GCP, Azure)
  • Must test disaster recovery at least annually
  • Document recovery time objectives (RTOs) and recovery point objectives (RPOs)

Impact: Requires robust backup and disaster recovery infrastructure.

5. Comprehensive Network Mapping & Asset Management

Requirement: Maintain real-time documentation of PHI data flows across all systems.

Details:

  • Network diagrams showing all systems with PHI
  • Data flow diagrams showing how PHI moves (collection → storage → processing → transmission)
  • Asset inventory (all systems, devices, applications with PHI access)
  • Update documentation within 30 days of changes

Impact: Requires network discovery tools and data mapping processes.

Timeline

Proposed rule published: 2024 Comment period: Closed 2024 Final rule expected: Late 2025 or early 2026 Compliance deadline: TBD (likely 12-24 months after final rule)

Recommendation: Start implementing these requirements now (even if final rule delayed, these are security best practices).


Does HIPAA Apply to You?

HIPAA applies if you're a Covered Entity or Business Associate handling PHI.

Covered Entities (Always Subject to HIPAA)

Three types:

1. Healthcare Providers

Any provider of medical or health services who transmits health information electronically.

Examples:

  • Hospitals, clinics, medical practices
  • Doctors, nurses, dentists, therapists
  • Pharmacies, laboratories
  • Nursing homes, home health agencies

Electronic transmission includes: Claims, eligibility checks, referrals, authorizations (even if outsourced to clearinghouse).

2. Health Plans

Organizations that pay for or provide health care coverage.

Examples:

  • Health insurance companies (Aetna, UnitedHealthcare, Blue Cross Blue Shield)
  • HMOs, PPOs
  • Medicare, Medicaid
  • Employer-sponsored health plans (>50 employees)
  • Pharmacy benefit managers (PBMs)

Exceptions: Plans with <50 participants, administered entirely by employer (self-insured small employers).

3. Healthcare Clearinghouses

Entities that process health information between providers and health plans.

Examples:

  • Billing services
  • Claims processors
  • Community health information systems
  • Health information exchanges (HIEs)

Business Associates (Subject to HIPAA Since 2013)

Business Associate: Any person or entity that performs services for a Covered Entity involving the use or disclosure of PHI.

Examples of Business Associates:

  • Health tech SaaS: EHR vendors (Epic, Cerner), patient portals, telehealth platforms, health apps
  • Cloud providers: AWS, Google Cloud, Azure (when hosting PHI)
  • Data analytics: Analytics platforms processing PHI
  • Billing services: Medical billing companies, revenue cycle management
  • IT services: IT support accessing PHI, data backup services
  • Legal/consulting: Law firms, consultants accessing PHI

Key test: Do you create, receive, maintain, or transmit PHI on behalf of a Covered Entity?

  • Yes → You're a Business Associate → HIPAA applies
  • No → You're not a Business Associate → HIPAA does not apply

Subcontractors (Business Associates of Business Associates)

If you're a Business Associate and you hire a subcontractor to help you perform services involving PHI, the subcontractor is also a Business Associate.

Example:

  • Hospital (Covered Entity) hires Health Tech SaaS (Business Associate)
  • Health Tech SaaS uses AWS to host PHI (AWS = Subcontractor = Business Associate)
  • AWS uses third-party data center (Data center = Subcontractor = Business Associate)

Chain: Covered Entity → Business Associate → Subcontractor (BA) → Subcontractor (BA)

Each must sign BAA with the entity above them.

Does HIPAA Apply to Your Startup?

Yes, if:

  • ✅ You're a healthcare provider transmitting health info electronically (claims, referrals)
  • ✅ You're a health tech SaaS serving healthcare providers or health plans
  • ✅ You store, process, or transmit PHI on behalf of healthcare customers
  • ✅ You provide services to covered entities (analytics, billing, IT, consulting) involving PHI

No, if:

  • ❌ You're a consumer health/wellness app with no connection to healthcare providers (Fitbit, MyFitnessPal) – Exception: If you share data with healthcare providers, you may become a Business Associate
  • ❌ You're a general SaaS company not serving healthcare customers (Slack, Zoom) – Exception: If healthcare customers use your product to store PHI, you may need to sign BAAs
  • ❌ You provide services without accessing PHI (e.g., general IT services not touching PHI)

Gray areas:

  • Wearables/fitness trackers: Generally not HIPAA (wellness, not healthcare) – UNLESS integrated with EHR or prescribed by doctor
  • Mental health apps: May be HIPAA if working with therapists/psychiatrists (Business Associate)
  • HR wellness programs: Generally not HIPAA (employment records, not healthcare) – UNLESS health plan involved

Rule of thumb: If healthcare customers are asking you to sign a BAA, HIPAA applies to you.


Protected Health Information (PHI)

Understanding what constitutes PHI is critical for HIPAA compliance.

What is PHI?

PHI (Protected Health Information) is individually identifiable health information transmitted or maintained in any form (electronic, paper, oral) that:

  1. Relates to: Individual's past, present, or future physical or mental health condition, provision of healthcare, or payment for healthcare
  2. Identifies the individual (or could be used to identify)
  3. Is created or received by: Covered Entity or Business Associate

Key point: PHI is health information + identifiers.

The 18 HIPAA Identifiers

PHI includes health information linked to any of these 18 identifiers:

  1. Names (first, last, maiden)
  2. Geographic subdivisions smaller than state (street address, city, county, zip code)
    • Exception: First 3 digits of zip code OK if area has 20,000+ people
  3. Dates related to individual (birth, admission, discharge, death, age >89)
  4. Telephone numbers
  5. Fax numbers
  6. Email addresses
  7. Social Security numbers
  8. Medical record numbers
  9. Health plan beneficiary numbers
  10. Account numbers
  11. Certificate/license numbers
  12. Vehicle identifiers and serial numbers (VIN, license plates)
  13. Device identifiers and serial numbers (pacemaker serial number)
  14. Web URLs
  15. IP addresses
  16. Biometric identifiers (fingerprints, retina scans, voice prints)
  17. Full-face photos or comparable images
  18. Any other unique identifying number, characteristic, or code

Examples of PHI:

  • Patient's name + diagnosis → PHI
  • Email address + prescription → PHI
  • Phone number + appointment date → PHI
  • Medical record number + lab results → PHI
  • IP address + health survey responses → PHI

Not PHI (de-identified):

  • Diagnosis alone (no name, no identifiers) → Not PHI
  • Aggregate statistics (50 patients with diabetes) → Not PHI
  • De-identified dataset (all 18 identifiers removed) → Not PHI

ePHI (Electronic PHI)

ePHI: PHI that is stored or transmitted electronically.

Examples:

  • EHR/EMR systems (electronic medical records)
  • Health apps and patient portals
  • Databases with patient data
  • Emails containing PHI
  • Cloud storage with PHI
  • Backups of systems with PHI

HIPAA Security Rule applies specifically to ePHI (technical safeguards: encryption, access controls, audit logs).

De-Identification Methods

To remove PHI (and avoid HIPAA obligations), you can de-identify data using one of two methods:

Method 1: Safe Harbor

Remove all 18 HIPAA identifiers (listed above) + any other information that could identify the individual.

Result: Data is no longer PHI (can be used/disclosed without HIPAA restrictions).

Method 2: Expert Determination

Hire a qualified statistician to certify that the risk of re-identification is "very small."

Result: Data is no longer PHI (if statistician certifies).

Common use case: Research datasets, analytics (de-identify before analysis).


Covered Entities vs Business Associates

HIPAA distinguishes between Covered Entities (healthcare organizations) and Business Associates (vendors/contractors).

Covered Entities

Definition: Healthcare providers, health plans, and healthcare clearinghouses.

HIPAA obligations:

  • Implement all HIPAA safeguards (Privacy, Security, Breach Notification)
  • Sign Business Associate Agreements (BAAs) with all Business Associates
  • Train workforce on HIPAA
  • Designate Privacy Officer and Security Officer
  • Conduct risk assessments
  • Respond to patient rights requests (access, amendment, accounting of disclosures)

Examples:

  • Hospitals, clinics, medical practices
  • Health insurance companies
  • Pharmacies, laboratories

Business Associates

Definition: Any entity that performs services for a Covered Entity involving PHI.

HIPAA obligations:

  • Implement HIPAA Security Rule safeguards (for ePHI)
  • Implement applicable Privacy Rule requirements (limited data uses, minimum necessary)
  • Sign Business Associate Agreements (BAAs) with Covered Entities
  • Sign BAAs with subcontractors (if subcontractors access PHI)
  • Conduct risk assessments
  • Train workforce on HIPAA
  • Report breaches to Covered Entity (within 60 days)

Examples:

  • Health tech SaaS (EHR vendors, telehealth platforms, patient portals)
  • Cloud providers (AWS, Google Cloud, Azure)
  • IT services, data analytics, billing services

Key difference: Covered Entities have more obligations (patient rights, Privacy Officer, etc.). Business Associates have fewer obligations (primarily Security Rule + breach notification).

Most startups are Business Associates (not Covered Entities).


Business Associate Agreements (BAAs)

The Business Associate Agreement (BAA) is a required contract between a Covered Entity and a Business Associate.

When is a BAA Required?

Always required when:

  1. Covered Entity engages a Business Associate to perform services involving PHI
  2. Business Associate engages a subcontractor to perform services involving PHI

Example flow:

Hospital (Covered Entity)
  ↓ BAA required
Health Tech SaaS (Business Associate)
  ↓ BAA required
AWS (Subcontractor / Business Associate)
  ↓ BAA required
Third-party data center (Subcontractor / Business Associate)

No BAA required when:

  • Services don't involve PHI (e.g., payroll, general IT support not accessing PHI)
  • "Conduit" exception: Entities merely transmitting PHI (postal service, courier) – do not need BAA

What Must a BAA Include?

Federal regulations (45 CFR § 164.504(e)) require BAAs to include:

1. Permitted Uses and Disclosures

  • Define what the Business Associate is allowed to do with PHI
  • Example: "Business Associate may use and disclose PHI only to perform [services] on behalf of Covered Entity"

2. Restrictions on Uses and Disclosures

  • Business Associate cannot use or disclose PHI except as permitted by BAA or required by law
  • Business Associate must implement safeguards to prevent unauthorized use/disclosure

3. Safeguards Requirement

  • Business Associate must implement appropriate safeguards (administrative, physical, technical) to protect PHI
  • Must comply with HIPAA Security Rule (for ePHI)

4. Subcontractor Requirements

  • Business Associate must enter into BAAs with any subcontractors that access PHI
  • Subcontractors must agree to same restrictions as Business Associate

5. Breach Notification

  • Business Associate must report breaches of unsecured PHI to Covered Entity
  • Timeline: Within 60 days of discovery (sooner if possible)

6. Access to PHI (for patient rights)

  • Business Associate must provide PHI to Covered Entity (or directly to patients) within 30 days of request
  • Necessary for Covered Entity to fulfill patient right of access

7. Amendment of PHI

  • Business Associate must amend PHI if Covered Entity requests (to correct inaccuracies)

8. Accounting of Disclosures

  • Business Associate must provide information about disclosures to Covered Entity (for accounting of disclosures to patients)

9. Availability of Books and Records

  • Business Associate must make records available to HHS for compliance investigations

10. Return or Destruction of PHI

  • Upon termination of BAA, Business Associate must return or destroy all PHI
  • If not feasible, must extend protections and limit further uses/disclosures

BAA Template

Sample BAA structure:

BUSINESS ASSOCIATE AGREEMENT

This Business Associate Agreement ("Agreement") is entered into as of [Date]
between [Covered Entity Name] ("Covered Entity") and [Business Associate Name]
("Business Associate").

1. DEFINITIONS
   - Protected Health Information (PHI)
   - Electronic PHI (ePHI)
   - Breach
   - Unsecured PHI

2. PERMITTED USES AND DISCLOSURES
   Business Associate may use and disclose PHI only to perform [services]
   on behalf of Covered Entity.

3. OBLIGATIONS OF BUSINESS ASSOCIATE
   a. Not use or disclose PHI except as permitted by this Agreement
   b. Implement appropriate safeguards (HIPAA Security Rule)
   c. Report breaches to Covered Entity within [60] days
   d. Enter into BAAs with subcontractors
   e. Make PHI available to Covered Entity for patient access (30 days)
   f. Amend PHI upon Covered Entity request
   g. Provide accounting of disclosures
   h. Make books and records available to HHS

4. OBLIGATIONS OF COVERED ENTITY
   a. Provide Business Associate with Notice of Privacy Practices
   b. Notify Business Associate of any restrictions on PHI use

5. TERM AND TERMINATION
   a. Term: Until [date] or services complete
   b. Termination: If breach by Business Associate, Covered Entity may terminate
   c. Upon termination: Business Associate must return or destroy PHI

6. INDEMNIFICATION
   Business Associate indemnifies Covered Entity for breaches caused by
   Business Associate.

7. MISCELLANEOUS
   Governing law, dispute resolution, etc.

Where to get BAA templates:

  • HHS provides sample BAA provisions: Sample BAA
  • Health tech vendors often provide their own BAAs (review carefully before signing)

Common BAA Negotiation Points

Covered Entities typically want:

  • Business Associate to have cyber insurance ($1M-$5M)
  • Business Associate to conduct annual security audits
  • Indemnification (Business Associate pays for breaches caused by BA)
  • Breach notification within 24-48 hours (not 60 days)

Business Associates typically want:

  • Limit liability (cap indemnification at contract value)
  • Exclude consequential damages
  • Carve out subcontractor liability (BA not liable for AWS breaches)

Negotiation tip: Most healthcare customers have standard BAAs (difficult to negotiate). Focus on liability caps and insurance requirements.


HIPAA Rules Overview

HIPAA consists of three main rules relevant to startups:

1. Privacy Rule (45 CFR Part 160 and Part 164, Subparts A and E)

Effective: April 14, 2003

Purpose: Sets standards for protecting PHI (who can access, when, how).

Key requirements:

Notice of Privacy Practices

Covered Entities must provide patients with a Notice of Privacy Practices explaining:

  • How PHI is used and disclosed
  • Patient rights (access, amendment, accounting of disclosures)
  • Covered Entity's duties

Business Associates: Not required to provide Notice (only Covered Entities).

Minimum Necessary

Use and disclose only the minimum necessary PHI to accomplish the purpose.

Example: If billing department needs to process claim, provide claim info only (not entire medical history).

Patient Rights

Covered Entities must allow patients to:

  • Access their PHI (within 30 days)
  • Amend their PHI (correct inaccuracies)
  • Request restrictions on uses/disclosures
  • Request confidential communications (alternate phone number, address)
  • Accounting of disclosures (list of who received PHI in past 6 years)

Business Associates: Must assist Covered Entities in fulfilling patient rights (provide PHI within 30 days of request).

Permitted Uses and Disclosures

PHI may be used/disclosed without patient authorization for:

  • Treatment: Providing healthcare to patient
  • Payment: Billing, claims, reimbursement
  • Healthcare operations: Quality improvement, audits, case management

All other uses/disclosures require patient authorization.

Business Associates: Can only use/disclose PHI as permitted by BAA (typically: performing services for Covered Entity).

2. Security Rule (45 CFR Part 160 and Part 164, Subparts A and C)

Effective: April 20, 2005

Purpose: Sets technical and organizational standards for securing ePHI (electronic PHI).

Applies to: Covered Entities and Business Associates handling ePHI.

Key requirements:

Three Types of Safeguards

  1. Administrative Safeguards: Policies, procedures, workforce training
  2. Physical Safeguards: Physical access controls (locked doors, surveillance)
  3. Technical Safeguards: Encryption, access controls, audit logs

45 specifications (34 required, 11 addressable).

We'll cover these in detail in the HIPAA Safeguards section.

3. Breach Notification Rule (45 CFR Part 164, Subparts A and D)

Effective: September 23, 2009

Purpose: Requires notification when unsecured PHI is breached.

Key requirements:

What is a Breach?

Breach: Unauthorized acquisition, access, use, or disclosure of PHI that compromises the security or privacy of the PHI.

Exceptions (not breaches):

  1. Unintentional access/use by workforce member acting in good faith within scope of authority (and no further disclosure)
  2. Inadvertent disclosure from authorized person to another authorized person at same organization (and no further use)
  3. Unable to retain PHI: Recipient couldn't have retained PHI (e.g., sent to wrong fax, but recipient confirms didn't read/retain)

Breach Notification Timeline

If breach affects:

1-499 individuals:

  • Notify affected individuals: Within 60 days of discovery
  • Notify HHS (annual report): By March 1 of following year

500+ individuals:

  • Notify affected individuals: Within 60 days of discovery
  • Notify HHS: Within 60 days of discovery (not annual report)
  • Notify media: Within 60 days of discovery (prominent media outlets in affected areas)

Business Associate breaches:

  • Business Associate must notify Covered Entity within 60 days of discovery
  • Covered Entity then notifies individuals, HHS, media (as above)

Unsecured PHI

Unsecured PHI: PHI that is not encrypted or destroyed according to HIPAA standards.

Safe harbor: If PHI is encrypted (AES-256 or higher) or destroyed (shredding, wiping), breach notification not required.

Key point: Encrypt all ePHI to avoid breach notification obligations.


HIPAA Costs & Timeline

Cost Breakdown

HIPAA compliance costs vary based on company size, existing security maturity, and implementation approach.

Total First-Year Costs

Company Size Total Cost Breakdown
1-25 employees $10,000 - $30,000 Consultant: $5K-$15K, Tools: $3K-$8K, Training: $1K-$3K, Audit: $1K-$4K
26-50 employees $20,000 - $50,000 Consultant: $10K-$25K, Tools: $5K-$12K, Training: $2K-$5K, Audit: $3K-$8K
51-100 employees $30,000 - $80,000 Consultant: $15K-$40K, Tools: $8K-$20K, Training: $3K-$8K, Audit: $4K-$12K

Average for small health tech startups (10-50 employees): $15,000 - $40,000 first year

Cost Components

1. Consultant Fees (Optional but Recommended)

Service Cost When Needed
Gap analysis & risk assessment $5,000 - $10,000 Initial assessment (highly recommended)
Full implementation support $15,000 - $40,000 Don't have internal HIPAA expertise
Part-time support $8,000 - $20,000 Need guidance but can do some work internally
Policies & procedures $3,000 - $8,000 Writing HIPAA documentation

2. Compliance Platform (Optional)

Platform Annual Cost Features
Vanta $15,000 - $30,000 HIPAA + SOC 2 + ISO 27001 + multi-framework
Drata $12,000 - $25,000 HIPAA + SOC 2 + continuous monitoring
Secureframe $10,000 - $20,000 HIPAA + SOC 2 + GDPR
Sprinto $10,000 - $18,000 HIPAA + SOC 2 + ISO 27001
Thoropass $12,000 - $25,000 Expert-led HIPAA + SOC 2

3. Security Tools & Infrastructure

Tool Category Examples Annual Cost
Encryption AWS KMS, Azure Key Vault, Google Cloud KMS $500 - $2,000
Access controls (SSO/MFA) Okta, Auth0, Google Workspace $1,000 - $5,000
Logging/Monitoring Datadog, Splunk, Papertrail $1,000 - $10,000
Vulnerability Scanning Nessus, Qualys, AWS Inspector $500 - $3,000
Backup & DR AWS Backup, Veeam, Backblaze $1,000 - $5,000
Training KnowBe4, SANS Security Awareness $500 - $2,000
Documentation Confluence, Notion, Google Workspace $500 - $2,000

Total tools: $3,000 - $15,000/year

4. Internal Labor

Role Time Commitment Equivalent Cost
HIPAA Compliance Officer (project lead) 40% time for 4-6 months $25,000 - $50,000
Security Lead (technical implementation) 30% time for 4-6 months $15,000 - $30,000
IT/DevOps 20% time for 4-6 months $10,000 - $20,000
HR/People Ops 10% time for 4-6 months $3,000 - $8,000

Total internal labor: 150-300 hours (equivalent $50K-$110K if fully outsourced)

5. Audit (2025+ Requirement)

Audit Type Cost Frequency
Internal audit (readiness check) $3,000 - $8,000 Once (before going live)
External audit (third-party) $5,000 - $15,000 Annual (proposed 2025 requirement)

Annual Maintenance Costs

Year 2+ (Ongoing Compliance):

Cost Category Annual Cost
Annual audit (2025+ requirement) $5,000 - $15,000
Compliance platform $10,000 - $30,000 (if using)
Tools/infrastructure $3,000 - $15,000
Training (annual refresher) $500 - $2,000
Internal labor (ongoing maintenance) 50-100 hours/year
Total Year 2+ $18,000 - $62,000/year

Timeline Breakdown

Average: 3-6 months from project start to HIPAA-ready (most startups: 4-5 months)

Optimistic Timeline (3 months)

For: Startups with existing security practices, dedicated security person, compliance platform

Phase Duration Activities
Assessment & planning Week 1-2 Risk assessment, gap analysis, scope definition
Administrative safeguards Week 3-5 Policies, procedures, training program, designate officers
Physical safeguards Week 3-4 Facility access controls (if applicable), device security
Technical safeguards Week 5-10 Encryption, access controls, audit logs, backups
Documentation & training Week 11-12 Finalize documentation, train workforce
Audit & remediation Week 12-13 Internal audit, fix gaps
Go live Week 14 Begin serving healthcare customers, signing BAAs

Total: 3-4 months

Realistic Timeline (4-6 months)

For: Most startups (moderate security maturity, part-time compliance person)

Phase Duration Activities
Assessment & planning Week 1-4 Risk assessment, gap analysis, consultant selection
Administrative safeguards Week 5-10 Policies, procedures, training program
Physical safeguards Week 5-8 Facility security, device controls
Technical safeguards Week 11-18 Encryption, access controls, logging, monitoring, backups
Documentation & training Week 19-22 Finalize docs, train all employees
Audit & remediation Week 23-26 Internal audit, fix gaps, external audit (optional)
Go live Week 26 HIPAA-ready, sign BAAs with customers

Total: 6 months

Conservative Timeline (6-12 months)

For: Startups with minimal security practices, no dedicated security person, complex architecture

Duration: 6-12 months (highly variable)


HIPAA Safeguards

The HIPAA Security Rule requires three types of safeguards to protect ePHI:

  1. Administrative Safeguards: Policies, procedures, and processes
  2. Physical Safeguards: Physical access to facilities and devices
  3. Technical Safeguards: Technology to protect ePHI

45 specifications total:

  • Required (R): 34 specifications (must implement)
  • Addressable (A): 11 specifications (implement if reasonable and appropriate, or document why not and implement alternative)

Administrative Safeguards (9 Standards, 29 Specifications)

Administrative safeguards are policies, procedures, and processes for managing security.

1. Security Management Process (R)

Implement policies and procedures to prevent, detect, contain, and correct security violations.

Specifications:

  • Risk Analysis (R): Conduct risk assessment to identify ePHI threats and vulnerabilities
  • Risk Management (R): Implement measures to reduce risks to reasonable and appropriate level
  • Sanction Policy (R): Apply sanctions to workforce members who violate security policies
  • Information System Activity Review (R): Review logs, audit reports, security incidents

Implementation:

  • Annual risk assessment (identify assets, threats, vulnerabilities, likelihood, impact)
  • Risk treatment plan (mitigate, accept, transfer, avoid)
  • Disciplinary policy (warnings, termination for security violations)
  • Quarterly log reviews (access logs, failed logins, anomalies)

2. Assigned Security Responsibility (R)

Designate a Security Officer responsible for developing and implementing security policies.

Implementation:

  • Appoint Security Officer (CTO, VP Eng, or security lead)
  • Document responsibilities in job description
  • Provide adequate resources (budget, time, tools)

3. Workforce Security (R)

Implement procedures to ensure workforce members have appropriate access to ePHI.

Specifications:

  • Authorization and/or Supervision (A): Authorize and supervise workforce members with ePHI access
  • Workforce Clearance Procedure (A): Verify workforce member is cleared for ePHI access (background checks, training)
  • Termination Procedures (A): Revoke access upon termination (within 24 hours)

Implementation:

  • Access request and approval process (manager approval required)
  • Background checks for employees with ePHI access
  • Offboarding checklist (revoke access within 24 hours)

4. Information Access Management (R)

Implement policies to authorize and limit access to ePHI.

Specifications:

  • Isolating Healthcare Clearinghouse Functions (R): If clearinghouse, isolate functions (not applicable to most startups)
  • Access Authorization (A): Authorize access based on job role (role-based access control)
  • Access Establishment and Modification (A): Procedures for granting/modifying access

Implementation:

  • Role-based access control (RBAC): Define roles (admin, clinician, read-only), assign least privilege
  • Access request form (name, role, systems needed, business justification)
  • Quarterly access reviews (review all users, remove unnecessary access)

5. Security Awareness and Training (R)

Train workforce on security policies and procedures.

Specifications:

  • Security Reminders (A): Periodic security reminders (quarterly emails, posters)
  • Protection from Malicious Software (A): Procedures to detect and prevent malware
  • Log-in Monitoring (A): Monitor login attempts (failed logins, unusual activity)
  • Password Management (A): Password policy (complexity, expiration, MFA)

Implementation:

  • Annual HIPAA security training for all employees (online course + certificate)
  • Quarterly security awareness emails (phishing tips, password hygiene)
  • Anti-virus/anti-malware on all devices (endpoint protection)
  • MFA required for all ePHI access
  • Password policy (min 12 characters, complexity, 90-day expiration)

6. Security Incident Procedures (R)

Respond to security incidents (breaches, unauthorized access, malware).

Specifications:

  • Response and Reporting (R): Identify, respond to, report security incidents

Implementation:

  • Incident response plan (roles, escalation, containment, recovery, notification)
  • Incident response team (Security Officer, IT, legal, communications)
  • Incident log (track all incidents, root cause, remediation)
  • Breach assessment (if incident is breach, follow Breach Notification Rule)

7. Contingency Plan (R)

Plan for emergencies, disasters, and system failures.

Specifications:

  • Data Backup Plan (R): Backup ePHI (daily backups, offsite storage)
  • Disaster Recovery Plan (R): Restore ePHI after disaster (RTO: 72 hours per 2025 rule)
  • Emergency Mode Operation Plan (R): Continue operations during emergency (workarounds, manual processes)
  • Testing and Revision Procedures (A): Test DR plan annually
  • Applications and Data Criticality Analysis (A): Identify critical systems/data (prioritize recovery)

Implementation:

  • Automated daily backups (databases, file storage)
  • Offsite backup storage (separate geographic region)
  • Disaster recovery plan (RTO: 72 hours, RPO: 24 hours)
  • Annual DR test (restore from backup, verify data integrity)
  • Business impact analysis (identify critical systems, acceptable downtime)

8. Evaluation (R)

Conduct periodic technical and non-technical evaluations of security safeguards.

Implementation:

  • Annual security audit (internal or external)
  • Quarterly vulnerability scans
  • Annual penetration testing
  • Document findings and remediation

9. Business Associate Contracts and Other Arrangements (R)

Enter into Business Associate Agreements (BAAs) with vendors handling ePHI.

Specifications:

  • Written Contract or Other Arrangement (R): BAA must be in writing, include required provisions

Implementation:

  • Sign BAA with every vendor that accesses ePHI (AWS, Google, Stripe, Twilio, etc.)
  • BAA checklist (ensure all required provisions included)
  • Vendor inventory (list all vendors, BAA status, renewal dates)

Physical Safeguards (4 Standards, 6 Specifications)

Physical safeguards protect physical access to facilities, devices, and workstations with ePHI.

1. Facility Access Controls (R)

Limit physical access to facilities with ePHI.

Specifications:

  • Contingency Operations (A): Allow access during emergencies
  • Facility Security Plan (A): Document physical security measures (locks, cameras, badges)
  • Access Control and Validation Procedures (A): Control and validate visitor access (visitor logs, escorts)
  • Maintenance Records (A): Document repairs and modifications to physical security (door locks, cameras)

Implementation:

  • Locked doors, badge access (key cards, PIN codes)
  • Visitor log (name, date, time, purpose, escort)
  • Surveillance cameras (entrances, server rooms)
  • Escort policy (visitors must be escorted)

Note: If fully cloud-based (no physical offices or data centers), document this in policies and note physical safeguards are handled by cloud provider (AWS, GCP, Azure).

2. Workstation Use (R)

Policies for workstation use (laptops, desktops, tablets with ePHI access).

Implementation:

  • Workstation security policy (lock screen when away, no shared devices, no ePHI on personal devices)
  • Clean desk policy (no PHI on desks, lock documents in drawers)
  • Screen privacy filters (prevent shoulder surfing)

3. Workstation Security (R)

Physical safeguards for workstations (prevent unauthorized access).

Implementation:

  • Automatic screen lock (after 5-15 minutes inactivity)
  • Cable locks for laptops (in offices)
  • Encrypted hard drives (full-disk encryption: FileVault, BitLocker)

4. Device and Media Controls (R)

Secure devices and media containing ePHI (laptops, USB drives, hard drives, backups).

Specifications:

  • Disposal (R): Securely dispose of ePHI and devices (shredding paper, wiping drives)
  • Media Re-use (R): Remove ePHI before re-using media (wipe drives before repurposing)
  • Accountability (A): Track movement of devices/media (inventory, check-in/check-out)
  • Data Backup and Storage (A): Backup ePHI, store securely

Implementation:

  • Asset inventory (all laptops, servers, USB drives with ePHI)
  • Secure disposal procedure (shred paper, wipe drives with NIST 800-88 standards)
  • Media sanitization (before selling/donating devices)
  • Device tracking (who has which device, location)

Technical Safeguards (5 Standards, 10 Specifications)

Technical safeguards are technology to protect ePHI.

1. Access Control (R)

Limit ePHI access to authorized users.

Specifications:

  • Unique User Identification (R): Assign unique user ID to each user (no shared accounts)
  • Emergency Access Procedure (R): Establish procedure for emergency access (break-glass accounts)
  • Automatic Logoff (A): Auto-logoff after inactivity period
  • Encryption and Decryption (A): Encrypt ePHI (AES-256 or higher)

Implementation:

  • Unique usernames (no shared accounts, generic accounts)
  • Emergency access (break-glass accounts for system failures, logged and reviewed)
  • Auto-logoff (15-30 minutes inactivity)
  • Encryption at rest (AES-256 for databases, file storage)
  • Encryption in transit (TLS 1.2+ for all ePHI transmission)

2. Audit Controls (R)

Log and monitor activity on systems with ePHI.

Implementation:

  • Centralized logging (aggregate logs from all systems: AWS CloudTrail, Google Cloud Logging, Azure Monitor)
  • Log ePHI access (who accessed, when, what action)
  • Log retention (minimum 6 years per HIPAA, 1 year practical minimum)
  • Log reviews (quarterly reviews, investigate anomalies)

3. Integrity (R)

Protect ePHI from improper alteration or destruction.

Specifications:

  • Mechanism to Authenticate ePHI (A): Verify ePHI hasn't been altered (checksums, digital signatures)

Implementation:

  • Checksums (verify file integrity after transmission or storage)
  • Version control (track changes to ePHI, audit trail)
  • Write-once storage (immutable backups)

4. Person or Entity Authentication (R)

Verify identity of persons/entities accessing ePHI.

Implementation:

  • Multi-factor authentication (MFA) required for all ePHI access
  • Strong passwords (12+ characters, complexity, 90-day expiration)
  • Biometric authentication (fingerprint, facial recognition) for mobile devices

5. Transmission Security (R)

Protect ePHI transmitted over networks.

Specifications:

  • Integrity Controls (A): Ensure ePHI is not improperly modified during transmission (encryption, checksums)
  • Encryption (A): Encrypt ePHI during transmission (TLS 1.2+, VPN)

Implementation:

  • TLS 1.2+ (HTTPS) for all web traffic
  • VPN required for remote access to production systems
  • Email encryption (S/MIME, TLS) for PHI transmitted via email
  • Secure file transfer (SFTP, not FTP)

6-Month HIPAA Compliance Roadmap

This roadmap assumes you're implementing HIPAA compliance over 6 months (realistic timeline for most health tech startups).

Month 1: Assessment & Planning

Month 2: Administrative Safeguards

Month 3: Physical & Technical Safeguards

Month 4: Technical Safeguards (continued)

Month 5: Documentation & Training

Month 6: Audit & Go Live


Phase 1: Assessment & Planning

Duration: Weeks 1-4 (Month 1)

Goal: Understand HIPAA requirements, assess current state, identify gaps, plan implementation.

Step 1: Determine HIPAA Applicability

Activity: Confirm whether HIPAA applies to your startup.

Questions:

  • Are you a Covered Entity (healthcare provider, health plan, clearinghouse)?
  • Are you a Business Associate (vendor to healthcare customers, handling PHI)?
  • Do you create, receive, maintain, or transmit PHI?

Deliverable: Applicability determination (document: Yes, HIPAA applies because [reason])

Step 2: Define Scope

Activity: Define what systems, data, and processes are in scope for HIPAA.

Scope considerations:

  • In-scope systems: Production environment, databases with PHI, applications handling PHI
  • In-scope data: What data qualifies as PHI? (patient names, DOB, medical records, etc.)
  • In-scope processes: User access, data transmission, backup/recovery, incident response
  • Out-of-scope: Non-production environments (dev, staging), systems without PHI

Deliverable: HIPAA Scope Document (1-2 pages: which systems, data, processes are covered)

Step 3: Assemble HIPAA Team

Roles:

  • Privacy Officer: Oversees Privacy Rule compliance (patient rights, minimum necessary) – can be same as Security Officer for small startups
  • Security Officer: Oversees Security Rule compliance (technical safeguards, risk assessment)
  • HIPAA Compliance Manager: Project lead, coordinates implementation (often same as Security Officer)
  • IT/DevOps: Implements technical safeguards (encryption, access controls, logging)
  • HR/People Ops: Implements workforce safeguards (background checks, training, offboarding)
  • Legal: Reviews BAAs, policies, breach response

Time commitment:

  • Security Officer: 40% time for 6 months
  • IT/DevOps: 30% time for 6 months
  • Others: 10-20% as needed

Tip: If you lack HIPAA expertise, hire a consultant (part-time or full-time for 3-6 months).

Step 4: Conduct Risk Assessment

Activity: Identify risks to ePHI (required by Security Management Process safeguard).

Process:

  1. Identify assets: Systems, applications, databases, devices with ePHI
  2. Identify threats: Unauthorized access, ransomware, insider threat, data loss, system failure
  3. Identify vulnerabilities: No MFA, unencrypted data, weak passwords, unpatched systems
  4. Assess risks: Likelihood × Impact = Risk level (High / Medium / Low)

Example risk:

  • Asset: Production database (contains patient PHI)
  • Threat: Unauthorized access by external attacker
  • Vulnerability: No MFA, database publicly accessible
  • Likelihood: High (common attack)
  • Impact: High (breach of 10,000 patient records, $500K penalty)
  • Risk level: High
  • Treatment: Implement MFA, restrict database to VPN only, enable encryption

Deliverable: Risk Assessment Report (10-20 pages, 30-50 risks identified)

Step 5: Gap Analysis

Activity: Compare current state to HIPAA requirements (identify gaps).

Process:

  1. Review all 45 HIPAA specifications (Administrative, Physical, Technical)
  2. For each specification, assess current state:
    • ✅ Implemented
    • ⚠️ Partially implemented (needs improvement)
    • ❌ Not implemented (gap)
  3. Prioritize gaps (High / Medium / Low priority)
  4. Estimate remediation effort (hours/weeks)
Common gaps: Gap Priority Effort
No documented HIPAA policies High 2-4 weeks
No MFA on production systems High 1 week
No encryption at rest High 2-3 weeks
No annual security training High 1-2 weeks
No BAAs with vendors High 2-4 weeks
No incident response plan Medium 2-3 weeks
No audit logs Medium 2-3 weeks
No disaster recovery plan Medium 3-4 weeks

Deliverable: Gap Analysis Report (spreadsheet: Specification, Current State, Gap, Priority, Effort, Owner, Target Date)

Step 6: Create Implementation Plan

Activity: Create roadmap for closing gaps.

Deliverable: Implementation Plan (Gantt chart or timeline: which gaps to remediate, by when, by whom)


Phase 2: Administrative Safeguards

Duration: Weeks 5-12 (Months 2-3)

Goal: Implement administrative safeguards (policies, procedures, training, officers).

Step 1: Write HIPAA Policies & Procedures

Activity: Document HIPAA policies and procedures.

Required policies:

  1. HIPAA Security Policy (master policy)
  2. Risk Management Policy
  3. Sanction Policy (disciplinary actions)
  4. Information System Activity Review Policy (log reviews)
  5. Workforce Security Policy (authorization, termination)
  6. Access Control Policy (RBAC, least privilege)
  7. Security Awareness and Training Policy
  8. Incident Response Policy
  9. Contingency Plan (backup, disaster recovery)
  10. Business Associate Management Policy
  11. Physical Security Policy (if applicable)
  12. Workstation Use and Security Policy
  13. Device and Media Controls Policy
  14. Audit Control Policy
  15. Encryption Policy
  16. Password Policy

Procedures (20-30 procedures):

  • User access provisioning and deprovisioning
  • Access rights review (quarterly)
  • Security training (annual)
  • Incident response
  • Breach notification
  • Backup and recovery
  • Vulnerability management
  • Vendor risk assessment

Templates: Use HIPAA policy templates (free: search "HIPAA policy templates" or paid: buy from compliance vendors)

Effort: 40-60 hours (can be done by consultant or Security Officer)

Deliverable: HIPAA Policies & Procedures Package (80-150 pages total)

Step 2: Designate Privacy Officer and Security Officer

Activity: Formally appoint Privacy Officer and Security Officer.

Documentation:

  • Job descriptions (include HIPAA responsibilities)
  • Appointment letters (signed by CEO)
  • Organizational chart (show reporting lines)

Deliverable: Officer appointment documentation

Step 3: Implement Workforce Security

Activity: Implement workforce security procedures.

Tasks:

  1. Background checks: Conduct for all employees with ePHI access (Checkr, GoodHire)
  2. Confidentiality agreements: All employees sign HIPAA confidentiality agreement
  3. Onboarding process: Document IT account setup, access provisioning, training
  4. Offboarding process: Document access revocation (within 24 hours of termination)

Deliverable: Workforce security procedures, background check records, confidentiality agreements

Step 4: Implement Access Management

Activity: Implement access control procedures.

Tasks:

  1. Role-based access control (RBAC): Define roles (admin, clinician, billing, read-only), assign least privilege
  2. Access request process: Access request form, manager approval required
  3. Quarterly access reviews: Review all users, remove unnecessary access

Deliverable: RBAC matrix (role → permissions), access request forms, access review logs

Step 5: Implement Incident Response

Activity: Create incident response plan and team.

Components:

  1. Incident response plan: Roles, escalation, containment, recovery, notification
  2. Incident response team: Security Officer, IT, legal, communications
  3. Incident log: Track all incidents, root cause, remediation
  4. Breach assessment: Process for determining if incident is breach (requires notification)

Deliverable: Incident response plan (10-20 pages), incident response team roster, incident log template

Step 6: Obtain Business Associate Agreements (BAAs)

Activity: Sign BAAs with all vendors handling ePHI.

Process:

  1. Vendor inventory: List all vendors with ePHI access (AWS, Google Cloud, Stripe, Twilio, email, analytics)
  2. Request BAAs: Contact vendors, request signed BAA
  3. Review BAAs: Ensure BAAs include all required provisions
  4. Track BAAs: Maintain BAA repository (Google Drive folder), track renewal dates

Common vendors requiring BAAs:

  • Cloud providers (AWS, Google Cloud, Azure, Heroku)
  • SaaS tools (Google Workspace, Slack, Zoom, Intercom – if used for PHI)
  • Payment processors (Stripe, PayPal – if processing health transactions)
  • Email/SMS (SendGrid, Twilio – if transmitting PHI)
  • Analytics (Segment, Mixpanel – if analyzing PHI)

Deliverable: Vendor inventory (spreadsheet), signed BAAs from all vendors


Phase 3: Physical Safeguards

Duration: Weeks 5-10 (Month 2-3, concurrent with Administrative)

Goal: Implement physical safeguards (facility access, workstation security, device controls).

Step 1: Facility Access Controls

Activity: Secure physical facilities (offices, data centers).

Tasks:

  1. Locked doors: Key cards, PIN codes, keys
  2. Visitor log: Name, date, time, purpose, escort
  3. Surveillance cameras: Entrances, server rooms
  4. Escort policy: Visitors must be escorted in areas with ePHI

Note: If fully cloud-based (no physical offices or data centers), document this in policies and note physical safeguards are handled by cloud provider.

Deliverable: Facility security procedures, visitor log template

Step 2: Workstation Use & Security

Activity: Secure workstations (laptops, desktops).

Tasks:

  1. Workstation security policy: Lock screens when away, no shared devices, no ePHI on personal devices
  2. Automatic screen lock: 5-15 minutes inactivity
  3. Full-disk encryption: FileVault (Mac), BitLocker (Windows)
  4. Clean desk policy: No PHI on desks, lock documents

Deliverable: Workstation security policy, configuration guides

Step 3: Device and Media Controls

Activity: Secure devices and media with ePHI.

Tasks:

  1. Asset inventory: All laptops, servers, USB drives, hard drives with ePHI
  2. Secure disposal: Shred paper, wipe drives (NIST 800-88 standards)
  3. Device tracking: Who has which device, location
  4. Media sanitization: Wipe drives before selling/donating

Deliverable: Asset inventory (spreadsheet), disposal procedures


Phase 4: Technical Safeguards

Duration: Weeks 11-20 (Months 3-5)

Goal: Implement technical safeguards (encryption, access controls, audit logs, backups).

Step 1: Encryption

Activity: Encrypt all ePHI (at rest and in transit).

Tasks:

  1. Encryption at rest: AES-256 for databases (AWS RDS encryption, Google Cloud SQL encryption, Azure SQL encryption), file storage (S3 encryption, Google Cloud Storage encryption)
  2. Encryption in transit: TLS 1.2+ (HTTPS) for all web traffic, TLS for API/database connections, VPN for remote access

Tools:

  • AWS: KMS (Key Management Service), RDS encryption, S3 encryption
  • Google Cloud: Cloud KMS, Cloud SQL encryption, Cloud Storage encryption
  • Azure: Azure Key Vault, SQL encryption, Blob Storage encryption

Deliverable: Encrypted production systems (evidence: screenshots, configs)

Step 2: Access Controls (Technical)

Activity: Implement technical access controls.

Tasks:

  1. Unique user IDs: No shared accounts
  2. Multi-factor authentication (MFA): Required for all ePHI access (Okta, Auth0, Google Authenticator, Duo)
  3. Auto-logoff: 15-30 minutes inactivity
  4. Strong passwords: 12+ characters, complexity, 90-day expiration (or passwordless with MFA)

Tools:

  • SSO/MFA: Okta, Auth0, Google Workspace, Azure AD, Duo

Deliverable: MFA enabled (all users), password policy configured

Step 3: Audit Controls (Logging)

Activity: Implement audit logging for all ePHI access.

Tasks:

  1. Centralized logging: Aggregate logs from all systems (AWS CloudTrail, Google Cloud Logging, Azure Monitor, Datadog, Splunk, Papertrail)
  2. Log ePHI access: Who accessed, when, what action (read, write, delete)
  3. Log retention: Minimum 6 years (HIPAA requirement), 1 year practical minimum
  4. Quarterly log reviews: Investigate anomalies, failed logins, unauthorized access

Tools:

  • Logging: Datadog, Splunk, ELK Stack, Papertrail, AWS CloudTrail, Google Cloud Logging, Azure Monitor

Deliverable: Centralized logging configured, log retention policy, log review schedule

Step 4: Integrity Controls

Activity: Protect ePHI from improper alteration or destruction.

Tasks:

  1. Checksums: Verify file integrity (SHA-256 hashes)
  2. Version control: Track changes to ePHI (audit trail)
  3. Immutable backups: Write-once storage (prevent tampering)

Deliverable: Integrity controls configured (checksums, version control)

Step 5: Transmission Security

Activity: Protect ePHI transmitted over networks.

Tasks:

  1. TLS 1.2+: All web traffic (HTTPS)
  2. VPN: Required for remote access to production
  3. Email encryption: S/MIME or TLS for PHI via email (or use secure patient portal, don't email PHI)
  4. Secure file transfer: SFTP (not FTP)

Deliverable: TLS configured (all endpoints), VPN configured

Step 6: Backup & Disaster Recovery

Activity: Implement backup and disaster recovery.

Tasks:

  1. Automated daily backups: Databases, file storage
  2. Offsite backup storage: Separate geographic region (AWS S3 cross-region, Google Cloud Storage multi-region)
  3. Disaster recovery plan: RTO (Recovery Time Objective): 72 hours, RPO (Recovery Point Objective): 24 hours
  4. Annual DR test: Restore from backup, verify data integrity

Tools:

  • AWS: RDS automated backups, S3 versioning, AWS Backup
  • Google Cloud: Cloud SQL backups, Cloud Storage versioning, Persistent Disk snapshots
  • Azure: SQL automated backups, Blob Storage snapshots, Azure Backup

Deliverable: Automated backups configured, DR plan documented, DR test results


Phase 5: Documentation & Training

Duration: Weeks 21-24 (Month 5-6)

Goal: Finalize documentation and train workforce.

Step 1: Finalize HIPAA Documentation

Activity: Compile all HIPAA documentation in one place.

Documentation package:

  • HIPAA policies and procedures (15-20 policies, 20-30 procedures)
  • Risk assessment report
  • Risk treatment plan
  • Security Officer and Privacy Officer appointments
  • Business Associate Agreements (all vendors)
  • Asset inventory
  • Access control matrix (RBAC)
  • Incident response plan
  • Disaster recovery plan
  • Training materials

Organization: Create HIPAA documentation repository (Google Drive, Confluence, SharePoint)

Deliverable: Complete HIPAA documentation package (organized, version-controlled)

Step 2: Develop Training Program

Activity: Create HIPAA security awareness training for workforce.

Training topics:

  • What is HIPAA? (Privacy Rule, Security Rule, Breach Notification Rule)
  • What is PHI? (18 identifiers)
  • How to handle PHI (minimum necessary, secure transmission, no PHI on personal devices)
  • Password security (strong passwords, no sharing, MFA)
  • Phishing awareness (don't click suspicious links, report phishing emails)
  • Physical security (lock screens, clean desk, visitor escorts)
  • Incident reporting (how to report security incidents, who to contact)
  • Breach notification (what is a breach, when to report)

Format:

  • Online course (30-60 minutes, with quiz and certificate)
  • Annual refresher (shorter course, 15-30 minutes)

Tools:

  • KnowBe4 (security awareness training platform)
  • SANS Security Awareness (online courses)
  • Custom training (build your own with Google Slides + quiz)

Deliverable: HIPAA training course (online), training materials (slides, handouts)

Step 3: Train Workforce

Activity: Train all employees on HIPAA security.

Process:

  1. All employees complete HIPAA training (online course + certificate)
  2. New hires complete training within 30 days of hire
  3. Annual refresher training (every 12 months)
  4. Track training completion (spreadsheet: employee name, date completed, certificate)

Deliverable: Training completion records (all employees trained)

Step 4: Create Incident Response Contacts

Activity: Document incident response contacts (internal and external).

Contacts:

  • Internal: Security Officer, Privacy Officer, IT lead, legal counsel, CEO
  • External: Breach notification law firm (have lawyer on retainer for breach response), forensics firm (for breach investigation), cyber insurance carrier

Deliverable: Incident response contact list


Phase 6: Audit & Maintenance

Duration: Weeks 25-28 (Month 6-7)

Goal: Audit HIPAA compliance, remediate gaps, go live.

Step 1: Conduct Internal Audit

Activity: Test HIPAA safeguards internally (before external audit or customer due diligence).

Scope: Audit all implemented safeguards (Administrative, Physical, Technical)

Process:

  1. Review documentation: Are policies/procedures complete?
  2. Test controls: Collect evidence, verify controls are operating (sample logs, access reviews, training records)
  3. Interview personnel: Ask how controls are performed in practice
  4. Identify nonconformities: Document gaps or failures

Example tests:

  • Access control: Review access rights for 10 users—do they match roles? (Test RBAC)
  • Encryption: Verify database and file storage are encrypted (check configs)
  • Audit logs: Review logs from past 3 months—are ePHI accesses logged?
  • Training: Review training records—did all employees complete training?

Deliverable: Internal audit report (findings, recommendations)

Step 2: Remediate Findings

Activity: Fix any gaps found during internal audit.

Timeline: 1-2 weeks

Process:

  1. For each finding, create corrective action plan
  2. Implement corrective action
  3. Collect evidence of remediation
  4. Close out finding

Deliverable: Corrective action report

Step 3: External Audit (Optional but Recommended)

Activity: Hire external auditor to assess HIPAA compliance.

When to do external audit:

  • Before serving your first healthcare customer (de-risk)
  • Annually (proposed 2025 requirement)
  • Customer due diligence (some customers require external audit report)

Cost: $5,000 - $15,000 (varies by company size, scope)

Deliverable: External audit report

Step 4: Go Live (Begin Serving Healthcare Customers)

Activity: You're now HIPAA-ready. Begin signing BAAs with healthcare customers.

Process:

  1. Sign BAAs: Healthcare customers provide BAA, you review and sign
  2. Customer due diligence: Some customers request HIPAA documentation (policies, audit report, security questionnaire)
  3. Ongoing compliance: Maintain safeguards (quarterly access reviews, annual training, log reviews)

Deliverable: Signed BAAs with customers

Step 5: Ongoing Maintenance

Activity: Maintain HIPAA compliance (ongoing).

Activities:

  • Quarterly: Access reviews, log reviews, vulnerability scans
  • Annual: Security training (all employees), risk assessment review, policies review, disaster recovery test, external audit
  • As needed: Incident response, breach notification, offboarding (revoke access within 24 hours)

Time commitment: 5-10 hours/week (Security Officer)

Cost: $18,000 - $62,000/year (audits, tools, training, labor)


Common HIPAA Controls

Here are 30 common HIPAA controls organized by safeguard type.

Administrative Safeguards

  1. Risk assessment – Annual risk assessment (identify ePHI risks)
  2. Risk management – Implement controls to mitigate risks
  3. Sanction policy – Disciplinary action for security violations
  4. Information system activity review – Quarterly log reviews
  5. Security Officer designation – Appoint Security Officer
  6. Workforce authorization – Access based on job role (RBAC)
  7. Background checks – Screen employees with ePHI access
  8. Termination procedures – Revoke access within 24 hours
  9. Access reviews – Quarterly review of user access rights
  10. Security training – Annual HIPAA training for all employees
  11. Incident response plan – Document incident response procedures
  12. Breach assessment – Process for determining if incident is breach
  13. Data backup – Daily automated backups
  14. Disaster recovery – DR plan (RTO: 72 hours)
  15. DR testing – Annual disaster recovery test
  16. Security audit – Annual internal or external audit
  17. Business Associate Agreements (BAAs) – Sign BAAs with all vendors

Physical Safeguards

  1. Facility access controls – Locked doors, badge access
  2. Visitor log – Track all facility visitors
  3. Workstation security – Automatic screen lock (15 minutes)
  4. Full-disk encryption – Encrypt laptops (FileVault, BitLocker)
  5. Asset inventory – Track all devices with ePHI
  6. Secure disposal – Shred paper, wipe drives (NIST 800-88)

Technical Safeguards

  1. Unique user IDs – No shared accounts
  2. Multi-factor authentication (MFA) – Required for all ePHI access
  3. Encryption at rest – AES-256 for databases, file storage
  4. Encryption in transit – TLS 1.2+ (HTTPS)
  5. Audit logging – Log all ePHI access (who, when, what)
  6. Log retention – Retain logs for 6 years (HIPAA requirement)
  7. VPN – Required for remote access to production

HIPAA Penalties

HIPAA violations can result in severe civil and criminal penalties.

Civil Penalties (HHS Office for Civil Rights)

HIPAA civil penalties are tiered based on culpability:

Tier Violation Type Penalty (Per Violation) Annual Maximum
Tier 1 Did not know (and could not have known with reasonable diligence) $100 - $50,000 $1,500,000
Tier 2 Knew or should have known (but not willful neglect) $1,000 - $50,000 $1,500,000
Tier 3 Willful neglect (but corrected within 30 days) $10,000 - $50,000 $1,500,000
Tier 4 Willful neglect (not corrected within 30 days) $50,000 - $1,900,000 $1,900,000

Key points:

  • Penalties are per violation (not per breach). Example: If 10,000 patient records breached, potentially 10,000 violations.
  • Annual maximum: $1.9M per violation category per year
  • Willful neglect: Conscious, intentional failure to comply (e.g., knowing encryption is required but choosing not to implement)

Criminal Penalties (Department of Justice)

HIPAA criminal penalties apply to knowing violations:

Violation Type Penalty
Knowingly obtaining or disclosing PHI Up to $50,000 + 1 year in prison
Obtaining PHI under false pretenses Up to $100,000 + 5 years in prison
Obtaining PHI with intent to sell, transfer, or use for commercial advantage, personal gain, or malicious harm Up to $250,000 + 10 years in prison

Key point: Criminal penalties typically apply to individuals (employees, executives), not companies.

Notable HIPAA Enforcement Actions

Largest HIPAA settlements:

Year Entity Settlement Violation
2024 Rite Aid $7.25M No risk assessment, inadequate device security
2024 Doctors' Management Services $100K Lack of BAA with vendor
2023 Novant Health $1.62M Impermissible disclosure of PHI on website tracking
2022 EyeCare Leaders $600K Ransomware attack (lacked encryption, risk assessment)
2019 Anthem $16M Data breach (79M records) – inadequate security
2018 Anthem (follow-up) $39.5M Data breach settlement (OCR + states)
2016 Advocate Health Care $5.55M Stolen unencrypted laptops (4 breaches)

Common violations in enforcement actions:

  1. Lack of risk assessment (most common)
  2. No encryption (unencrypted devices stolen/lost)
  3. Inadequate access controls (no MFA, weak passwords)
  4. No Business Associate Agreements (vendors not under contract)
  5. Delayed breach notification (not reporting within 60 days)

Takeaway: Implement risk assessment and encryption first (most likely to trigger enforcement if absent).


HIPAA vs SOC 2 vs ISO 27001

Many health tech startups pursue multiple compliance frameworks. Here's how they compare:

Aspect HIPAA SOC 2 ISO 27001
Type Federal law (US) Auditing framework (US) International standard
Mandatory? Yes (if handling PHI) No (voluntary) No (voluntary)
Geographic focus United States United States Worldwide (especially Europe)
Scope PHI protection Customer data security Information security management
Certification No (self-declaration + audits) No (attestation report) Yes (certificate)
Cost $10K-$50K (first year) $20K-$50K (Type 2) $10K-$50K (first year)
Timeline 3-6 months 6-12 months (Type 2) 3-6 months
Penalties $100 - $1.9M per violation None (voluntary) None (voluntary)
Enforcement HHS OCR, DOJ None None
Who needs it? Healthcare providers, BAs SaaS, cloud, data processing (US) International customers, EU
Key requirement Business Associate Agreement SOC 2 report (Type 1 or Type 2) ISO 27001 certificate

Control Overlap

HIPAA vs SOC 2: 70-80% overlap (many SOC 2 controls satisfy HIPAA safeguards)

HIPAA vs ISO 27001: 60-70% overlap (ISO 27001 is broader, HIPAA is PHI-specific)

SOC 2 vs ISO 27001: 90% overlap (very similar controls)

Multi-Framework Strategy

Common combinations:

Health tech startup serving healthcare customers:

  1. HIPAA (mandatory)
  2. SOC 2 (if also serving non-healthcare customers or if healthcare customers require both)

Health tech startup serving international healthcare customers:

  1. HIPAA (mandatory for US healthcare)
  2. ISO 27001 (for EU/international healthcare customers)

Total cost (HIPAA + SOC 2): $40K-$80K (vs. $30K-$50K for HIPAA alone) – only 30-50% premium for both

Strategy: Implement HIPAA first (mandatory), then add SOC 2 or ISO 27001 if customers require (incremental effort: 20-30%).


Common Mistakes

Avoid these common HIPAA compliance mistakes:

1. Treating HIPAA as One-Time Project

Mistake: Implement HIPAA once, then forget about it.

Impact: Controls lapse (access not reviewed, training not renewed) → fail future audits or customer due diligence.

Fix: Assign ongoing ownership (Security Officer), maintain controls continuously (quarterly access reviews, annual training).

2. No Risk Assessment

Mistake: Skipping risk assessment (required by Security Management Process safeguard).

Impact: Most common HIPAA violation in enforcement actions. Risk assessment is required (not optional).

Fix: Conduct annual risk assessment (identify assets, threats, vulnerabilities, likelihood, impact). Document findings and risk treatment plan.

3. No Encryption

Mistake: Not encrypting ePHI (at rest or in transit).

Impact: Second most common violation. If unencrypted device lost/stolen → breach notification required → OCR investigation → penalties.

Safe harbor: If ePHI is encrypted (AES-256+), breach notification not required (even if device lost/stolen).

Fix: Encrypt all ePHI (databases, file storage, laptops) at rest. Use TLS 1.2+ for all ePHI transmission.

4. No BAAs with Vendors

Mistake: Using vendors (AWS, Google, Stripe) without signed Business Associate Agreements.

Impact: HIPAA violation. Covered Entities and Business Associates must sign BAAs with all vendors handling PHI.

Fix: Request BAAs from all vendors. Maintain BAA repository (Google Drive folder). Track renewal dates.

5. Delayed Breach Notification

Mistake: Discovering breach but not notifying HHS, affected individuals, or Covered Entity within 60 days.

Impact: Separate HIPAA violation (Breach Notification Rule). OCR may impose penalties for delayed notification (even if breach itself wasn't your fault).

Fix: Implement breach assessment process (immediate determination: is this a breach?). If breach, notify within 60 days (sooner if possible).

6. Using Personal Devices for PHI

Mistake: Allowing employees to access PHI from personal laptops or phones (BYOD).

Impact: Personal devices often lack security controls (no encryption, no MFA, no remote wipe). If device lost/stolen → breach.

Fix: Prohibit PHI on personal devices OR implement MDM (Mobile Device Management) with encryption, MFA, remote wipe.

7. Emailing PHI Unencrypted

Mistake: Sending PHI via regular email (not encrypted).

Impact: Email is unencrypted by default (plain text over internet). Transmission Security safeguard requires encryption.

Fix: Use encrypted email (S/MIME, TLS) OR secure patient portal (don't email PHI). Train employees: "Never email PHI."

8. No Training Records

Mistake: Training employees on HIPAA but not documenting completion.

Impact: Auditor/customer asks for training records → can't provide → looks like no training conducted.

Fix: Use training platform (KnowBe4, SANS) that auto-generates completion certificates. Or track manually in spreadsheet (name, date, topic, certificate).

9. Ignoring Subcontractors

Mistake: Signing BAA with Covered Entity but not signing BAAs with your own subcontractors (AWS, Google).

Impact: Business Associates must sign BAAs with subcontractors who access PHI. Not doing so is a HIPAA violation.

Fix: Sign BAAs with all subcontractors handling PHI (cloud providers, SaaS tools, email services).

10. No Offboarding Process

Mistake: Employees terminated but access not revoked (or revoked days/weeks later).

Impact: 2025 requirement: Revoke access within 24 hours. Delayed offboarding = security risk (disgruntled ex-employees can access PHI).

Fix: Automated offboarding (use SSO like Okta to centrally revoke access). Offboarding checklist (IT confirms access revoked within 24 hours).


HIPAA Compliance Tools

These tools help automate HIPAA compliance and reduce manual effort.

Compliance Platforms (All-in-One)

Platform Cost Best For Key Features
Vanta $15K-$30K/year HIPAA + SOC 2 + multi-framework Auto-evidence, risk assessment, policy library, BAA management
Drata $12K-$25K/year HIPAA + SOC 2 + continuous monitoring Real-time monitoring, policy templates, training tracking
Secureframe $10K-$20K/year Budget-conscious, early-stage Affordable, HIPAA + SOC 2 + GDPR templates
Sprinto $10K-$18K/year HIPAA + SOC 2 focus Compliance automation, evidence collection
Thoropass $12K-$25K/year Expert-led HIPAA implementation Consultant + platform hybrid, audit support

Security Tools (Point Solutions)

Category Tool Cost Use Case
Encryption AWS KMS, Google Cloud KMS, Azure Key Vault $500-$2K/year Encrypt ePHI at rest
SSO/MFA Okta, Auth0, Google Workspace, Azure AD $1K-$5K/year Centralized access control, MFA
Logging Datadog, Splunk, Papertrail, ELK Stack $1K-$10K/year Centralized audit logs
Vulnerability Scanning Nessus, Qualys, AWS Inspector $500-$3K/year Quarterly vulnerability scans
Backup & DR AWS Backup, Veeam, Backblaze $1K-$5K/year Automated backups, disaster recovery
Training KnowBe4, SANS Security Awareness $500-$2K/year HIPAA security training
MDM (Mobile Device Management) Jamf, Microsoft Intune, Workspace ONE $500-$3K/year Secure mobile devices, remote wipe

HIPAA-Specific Resources

Resource Provider Use Case
BAA templates HHS Sample BAA provisions
Risk assessment template NIST Risk assessment methodology (NIST 800-30)
HIPAA policies Compliance vendors Policy templates (purchase or free)
Breach notification service ID Experts, Kroll Breach notification and credit monitoring for affected individuals

FAQ

1. Is HIPAA compliance required for my health tech startup?

Yes, if you handle PHI on behalf of healthcare customers (providers, health plans). Most health tech SaaS companies are Business Associates and are directly subject to HIPAA (since 2013 HITECH Act).

2. How long does HIPAA compliance take?

Average: 3-6 months (most startups: 4-5 months)

Optimistic: 2-3 months (with compliance platform, strong existing security)

Conservative: 6-12 months (DIY, minimal existing security)

3. How much does HIPAA compliance cost?

First year: $10K-$50K (depending on DIY vs consultant vs platform)

Ongoing (Year 2+): $18K-$62K/year (audits, tools, training, labor)

4. Is there a HIPAA certification?

No. Unlike ISO 27001 (which has formal certification), HIPAA is self-declaration. You declare HIPAA compliance based on implementing required safeguards.

However: The 2025 proposed rule would require annual audits (moving toward "proven compliance").

Common misconception: Some vendors claim to be "HIPAA certified" (misleading—there's no official HIPAA certification).

5. Do I need a Business Associate Agreement (BAA)?

Yes, if you're a Business Associate (vendor to healthcare customers handling PHI). Healthcare customers will require you to sign a BAA before doing business.

Also yes, if you're a Covered Entity hiring vendors to handle PHI. You must sign BAAs with all vendors (AWS, Google, Stripe, email providers, etc.).

6. What happens if I have a data breach?

If breach affects:

  • 1-499 individuals: Notify affected individuals within 60 days, report to HHS by March 1 of following year
  • 500+ individuals: Notify affected individuals within 60 days, report to HHS within 60 days, notify media

If you're a Business Associate: Notify Covered Entity within 60 days. Covered Entity then notifies individuals/HHS/media.

Safe harbor: If ePHI is encrypted (AES-256+), breach notification not required.

7. Can I use cloud providers (AWS, Google Cloud, Azure) for PHI?

Yes, but you must sign a Business Associate Agreement (BAA) with the cloud provider.

Good news: AWS, Google Cloud, and Azure all offer HIPAA-compliant services and provide BAAs:

  • AWS: Sign BAA via AWS Artifact, use HIPAA-eligible services (RDS, S3, EC2, etc.)
  • Google Cloud: Sign BAA via Google Cloud console, use HIPAA-compliant products
  • Azure: Sign BAA via Microsoft Volume Licensing or Azure portal, use HIPAA-compliant services

8. Do I need HIPAA if I'm just a wellness app (not healthcare)?

Generally no, if you're a consumer wellness app with no connection to healthcare providers (Fitbit, MyFitnessPal).

However, you may need HIPAA if:

  • You integrate with EHRs or share data with healthcare providers (becomes Business Associate)
  • Doctor prescribes your app as part of treatment (may become Business Associate)
  • You're a "personal health record" (PHR) vendor offering services to healthcare providers (Business Associate)

Rule of thumb: If healthcare customers are asking you to sign BAAs, HIPAA applies.

9. What's the difference between HIPAA and GDPR?

HIPAA: US federal law protecting health information (PHI)

GDPR: EU regulation protecting personal data (broader than health data)

Key differences:

  • Scope: HIPAA = health data only; GDPR = all personal data
  • Geography: HIPAA = US; GDPR = EU (worldwide reach)
  • Enforcement: HIPAA = HHS OCR; GDPR = Data Protection Authorities (EU)
  • Penalties: HIPAA = up to $1.9M/year; GDPR = up to €20M or 4% revenue

If serving both US healthcare and EU customers: You need both HIPAA and GDPR compliance (about 50% overlap).

10. Can I self-declare HIPAA compliance without an audit?

Yes (currently), but this is changing.

Current (pre-2025): You can self-declare HIPAA compliance (no formal certification required). Implement safeguards, document compliance, sign BAAs with customers.

Proposed (2025+): HHS proposes requiring annual audits (independent verification). Self-declaration would no longer be sufficient.

Recommendation: Conduct internal or external audit before signing BAAs with customers (de-risk customer due diligence).


Key Resources

Official Resources

Compliance Platforms

Free Templates & Guides

Related Guides


Need Help with HIPAA Compliance?

HIPAA compliance can be complex. Whether you're just starting or preparing for a customer audit, we can help.

Schedule a Consultation to discuss:

  • Whether HIPAA applies to your startup
  • Risk assessment and gap analysis
  • Policies and procedures development
  • Technical safeguards implementation (encryption, access controls, logging)
  • Business Associate Agreement review and negotiation
  • Compliance platform recommendations
  • Audit preparation
  • Ongoing compliance maintenance

Promise Legal helps health tech startups navigate HIPAA compliance with practical, cost-effective strategies.


Related Topics:

View All Startup Legal Topics

This button allows you to scroll to the top or access additional options. Alt + A will toggle accessibility mode.