The HIPAA Security Rule must be followed by all covered entity organizations that handle electronic protected health information (PHI) and must address HIPAA security. The HIPAA Security Rule applies to health plans, health care clearinghouses, and to any health care provider who transmits health information in electronic form in connection with a transaction for which the Secretary of HHS has adopted standards under HIPAA and to their business associates.  It is the responsibility of these organizations who are focused on HIPAA compliance to safeguard all protected health information and demonstrate this through a carefully crafted HIPAA compliance plan with HIPAA Security Standards and designation of a HIPAA security officer as required by the Security Rule.

Create a Security Plan

The Security rule was adopted to implement provisions of the Health Insurance Portability and Accountability Act (HIPAA). This rule sets the standards for ensuring that only those who should have access to electronic protected health information (EPHI) will have actually have access. The Privacy Rule requires covered entities to have in place appropriate administrative, physical, and technical safeguards and to implement those safeguards reasonably.

HIPAA Security Policy – Topics

  • History of Security Rule
  • General Overview
  • Administrative Safeguards
  • Physical Safeguards
  • Technical Safeguards
  • Organizational Policies and Procedures and Documentation Requirements
  • Security Rule Requirements for Risk Analysis and Risk Management
HIPAA Security Policies

We offer Security Policies that will help you prepare for Security Rule Compliance. These are easily modifiable for immediate use. They cover all the policies & procedures necessary to be compliant with the Privacy Rule & HITECH Regulations.

Template Security Plans – Contact Us

Contact us for your HIPAA Security Policies

Security Policies

HIPAA Security

HIPAA Compliance policies and procedures must be implemented to ensure compliance with the HIPAA Rules. The policies implement appropriate administrative, technical, and physical safeguards to protect the privacy and security of PHI. This includes all forms of PHI which is either written, verbal or electronic. As a result, a covered entity will have to protect the confidentiality, integrity, and availability of PHI and electronic (e-PHI). In addition to be fully prepared an entity must also perform a full Security Risk Analysis to assess the health and security of their HIPAA program.

Appoint a Security Officer

A HIPAA Security Officer, once appointed will oversee the HIPAA Security program. They are responsible for oversight of the program and for tracking, investigating, resolving and documenting all privacy and security complaints and investigative steps taken. They ensure there is no retaliation against any workforce member or other individual for reporting a PHI breach or filing a HIPAA complaint.

Implement a Training Plan

The program must implement a training plan that trains workforce members on the requirements and policies that apply to them in their individual roles. The training program must train all workforce members upon employment on HIPAA and policies and procedures and on a regular basis thereafter. The OCR does not accept the term “Certification,” but rather wants to confirm all personnel have received appropriate training.


A HIPAA compliance plan holds providers and workforce members accountable for protecting PHI. Naturally this occurs through its policies, procedures and guidelines. In addition, the plan also outlines the consequences of a PHI breach or any violation of the policies in the compliance plan. By having a plan in place, it will help mitigate any breaches of PHI that might occur in the future. Finally, HIPAA compliance plans also ensure proper training of all workforce members, which includes employees, physicians, volunteers and trainees.

HIPAA Associates Will Help

Our professionals will assist you with all of these important policies and procedures. HIPAA Associates develops and consults on HIPAA compliance plans that include HIPAA privacy and security, policies and procedures and breach reporting requirements in compliance with the HIPAA Rules. Of great importance, HIPAA Associates is always available to assist you when questions arise regarding the HIPAA Rule. HIPAA consulting is the main focus of our organization. We would be happy to discuss with you how we can help with your program.

Frequently Asked Questions:

Do we need a HIPAA Compliance Plan?

Any covered entity that handles protected health information (PHI) must be prepared to protect that information.  This is done by creating and implementing a HIPAA compliance plan with policies and procedures to safeguard PHI.  The plan will outline the steps you will have to take in the event of a breach.  This will ensure that all workforce members are properly trained on how to handle PHI in all its forms.

HIPAA Associates is prepared to create the perfect compliance plan for your organization that has all the necessary policies, procedures and training you will need to keep your PHI safe.

HIPAA Security Compliance

How do I handle a breach?

It is important to follow all the steps to report a breach to the OCR.  Every breach is different and must be handled on a case by case basis.  A full breach analysis must be performed to determine if there was an impermissible use or disclosure that compromises the security of protected health information.

Factors to be addressed are:
1. The nature and extent of the breach including identifiers
2. The unauthorized person to whom disclosure is made
3. Whether the PHI was acquired or viewed
4. The extent to which the risk to PHI has been mitigated.
HIPAA Associates can help your organization through this process to ensure you follow all the important steps.

How to create a Compliance Plan

  • Implement Policies & Standards

    Policies and procedures help establish the rules your organization will need to carry out the requirements of federal health care program guidelines.

HIPAA Security Policies Required
  • Designate a Compliance Officer

The compliance officer will be responsible for operating and monitoring the compliance program.

Learn about HIPAA Security Policies
  • Conduct an effective training program

All personnel should receive training on fraud & abuse laws as well as the compliance program.

Training on Compliance
  • Develop effective lines of communication

Employees must have avenues available for reporting concerns internally. Anonymous reporting must be available.

Communicating Security Policies
  • Conduct internal monitoring and auditing

A good program will have an ongoing process to evaluate and assess the organization for inappropriate behavior.

Security Safeguards
  • Enforce standards of conduct with guidelines

An organization must have well published standards of conduct. The plan should clearly state the implications and penalties of violating the standards.

HIPAA Penalties
  • Respond promptly to violations and take corrective action

An organization must ensure timely and effective remedial action for offenses.

Protected Health Information