The Complete Guide to HIPAA Compliance for Tech Companies
Everything tech companies need to know about HIPAA — from determining if it applies to you, through BAAs and technical safeguards, to building a maintainable compliance program.
Does HIPAA Even Apply to Your Tech Company?
This is the first question, and getting it wrong is expensive in both directions — over-investing in unnecessary compliance, or ignoring obligations and facing penalties up to $2.13 million per violation category per year.
HIPAA applies to you if:You're a covered entity (healthcare provider, health plan, or healthcare clearinghouse) or — far more commonly for tech companies — a business associate: any organization that creates, receives, maintains, or transmits Protected Health Information (PHI) on behalf of a covered entity.
Common scenarios where tech companies become business associates:HIPAA Fundamentals for Tech Leaders
Protected Health Information (PHI)
PHI is any individually identifiable health information. It's broader than people think. The 18 HIPAA identifiers include obvious ones (name, SSN, medical record numbers) and less obvious ones:
The HIPAA Rules
Three rules matter most:
Privacy Rule: Governs how PHI can be used and disclosed. Establishes patient rights (access, amendment, accounting of disclosures). Primarily applies to covered entities, but business associates have obligations too. Security Rule: Requires administrative, physical, and technical safeguards for ePHI. This is where tech companies spend most of their compliance effort. Breach Notification Rule: Requires notification to individuals, HHS, and sometimes media when unsecured PHI is breached.Business Associate Agreements (BAAs)
A BAA is the legal contract that makes you a business associate. It's not optional — HIPAA requires it before a covered entity can share PHI with you.
Your BAA must include:The HIPAA Security Rule: What Tech Companies Actually Need
The Security Rule has three safeguard categories. Here's what each means in practice for tech companies.
Administrative Safeguards
These are the policies, procedures, and people controls:
Security Management Process Risk analysis — Comprehensive assessment of risks to ePHI. Must cover all systems, processes, and personnel that interact with ePHI. Required at least annually and whenever significant changes occur Risk management plan — Documented measures to reduce identified risks to a reasonable and appropriate level Sanction policy — Consequences for workforce members who violate HIPAA policies Information system activity review — Regular review of audit logs, access reports, and security incident tracking Workforce Security Authorization procedures — Process for determining which workforce members need access to ePHI Workforce clearance — Background checks and clearance for personnel who access ePHI Termination procedures — Revoke all access to ePHI immediately upon separation. Recover all devices and credentials Information Access Management Access authorization policy — How access to ePHI is granted based on role and minimum necessary principle Access establishment and modification — Procedures for creating, modifying, and reviewing access Separation of duties — Where appropriate, separate roles to prevent unauthorized access Security Awareness and Training Security reminders — Periodic security updates to workforce (can be email newsletters, Slack messages, or brief updates) Protection from malware — Endpoint protection and awareness about malicious software Login monitoring — Alert on and review failed login attempts Password management — Training on creating and protecting passwords (or modern authentication) Security Incident Procedures Incident response plan — Documented procedures for identifying, responding to, and mitigating security incidents Incident tracking — Log all security incidents, including those that don't result in a breach Contingency Plan Data backup plan — Regular backups of ePHI, tested restoration Disaster recovery plan — Procedures to restore systems and data after an emergency Emergency mode operation plan — How to continue critical processes during a crisis Testing and revision — Regular testing of contingency plans (at least annually) Applications and data criticality analysis — Identify which systems are critical for ePHI access Evaluation Periodic technical and non-technical evaluation — Assess whether your security measures still meet the Security Rule requirements. Required after operational changesPhysical Safeguards
For tech companies, physical safeguards primarily apply to offices and employee workstations. Cloud data center security is covered by your cloud provider's BAA.
Facility access controls — Badge access, visitor logs for areas where ePHI is accessible Workstation use — Policies for how workstations that access ePHI are used (privacy screens, clean desk) Workstation security — Physical security of workstations (locked offices, cable locks for laptops) Device and media controls — Policies for hardware disposal (wiping drives), media reuse, and device trackingTechnical Safeguards
This is where tech companies typically focus — and where your engineering choices matter most.
Access Controls Unique user identification — Every user who accesses ePHI has a unique ID. No shared accounts Emergency access procedure — How to access ePHI during an emergency when normal access procedures might fail Automatic logoff — Sessions expire after a period of inactivity Encryption and decryption — ePHI is encrypted at rest using AES-256 or equivalent Audit Controls Audit logging — Record who accessed ePHI, when, from where, and what they did Log integrity — Ensure audit logs can't be tampered with (immutable logging, write-once storage) Log retention — Retain audit logs for at least 6 years Regular log review — Analyze logs for unauthorized access or anomalies Integrity Controls Data integrity mechanisms — Electronic measures to confirm ePHI hasn't been improperly altered or destroyed Authentication of ePHI — Methods to verify that ePHI received has not been altered in transit (checksums, digital signatures) Transmission Security Encryption in transit — All ePHI transmitted over networks is encrypted (TLS 1.2+ minimum, TLS 1.3 preferred) Integrity controls for transmission — Mechanisms to ensure data isn't modified in transitArchitecture Patterns for HIPAA-Compliant Tech
Multi-Tenant vs. Single-Tenant
Single-tenant (dedicated infrastructure per healthcare customer):The Minimum Necessary Principle
HIPAA's "minimum necessary" principle requires you to limit ePHI access to the minimum needed for any given purpose. In practice:
Encryption Strategy
At rest:Breach Response and Notification
When Is It a Breach?
A breach is the acquisition, access, use, or disclosure of unsecured PHI in a manner not permitted by the Privacy Rule. There's a presumption that any impermissible use or disclosure is a breach unless you can demonstrate a low probability that PHI was compromised, based on:
Notification Requirements
To the covered entity (your customer):Building Your Incident Response Plan
HIPAA Compliance Costs for Tech Companies
Initial Setup Costs
| Item | Small Tech (< 25 employees) | Mid-Size Tech (25-200) | Enterprise (200+) |
|---|---|---|---|
| Risk assessment | $5K-$15K | $15K-$40K | $40K-$100K+ |
| Policy development | $5K-$15K | $10K-$30K | $25K-$75K |
| Technical controls | $5K-$25K | $20K-$75K | $75K-$250K+ |
| Training program | $1K-$5K | $5K-$15K | $15K-$50K |
| Compliance platform | $3K-$10K/year | $10K-$25K/year | $25K-$100K+/year |
| Legal review | $5K-$15K | $10K-$30K | $25K-$75K |
| Total initial | $25K-$85K | $70K-$215K | $200K-$650K+ |
Ongoing Annual Costs
| Item | Small Tech | Mid-Size Tech | Enterprise |
|---|---|---|---|
| Risk assessment (annual) | $5K-$10K | $10K-$25K | $25K-$50K |
| Penetration testing | $5K-$15K | $15K-$30K | $30K-$75K |
| Compliance platform | $3K-$10K | $10K-$25K | $25K-$100K+ |
| Training | $1K-$3K | $3K-$10K | $10K-$25K |
| Audit/assessment | $5K-$15K | $15K-$40K | $40K-$100K+ |
| Total annual | $20K-$55K | $55K-$130K | $130K-$350K+ |
Cost Reduction Strategies
Common HIPAA Mistakes in Tech Companies
1. Not Knowing PHI Is in Your System
This happens more than you'd think. A customer starts putting patient notes in a "comments" field. An integration pulls in data with embedded health information. A support ticket contains ePHI.
Fix: Implement data discovery and classification. PrivaBase's data mapping can help identify where personal and health data lives across your systems.2. Missing BAAs with Vendors
You signed a BAA with AWS, but what about your monitoring tool? Your error tracking service? Your CI/CD platform if it processes ePHI in tests?
Fix: Maintain a comprehensive vendor inventory with BAA status. Review every vendor that could access production systems or data.3. Logging PHI in Application Logs
Your application logs probably contain request bodies, error details, and debug information. If any of that includes ePHI, your logging infrastructure needs HIPAA compliance.
Fix: Implement log scrubbing for PHI. Log transaction IDs and metadata, not data values. Ensure logging tools have BAAs.4. Using Production PHI in Development
Developers copying production data to local machines or staging environments for testing is a violation.
Fix: Create synthetic test data or properly de-identify production data for non-production use. Never copy real ePHI outside the production environment.5. Inadequate De-Identification
"We just removed the names" isn't sufficient. HIPAA defines two de-identification methods:
6. Ignoring Mobile and Remote Work
Workforce members accessing ePHI from personal devices, home networks, or public Wi-Fi creates risk.
Fix: MDM for company devices, VPN requirements for remote access, MFA everywhere, remote wipe capability for lost devices.Building a Sustainable HIPAA Program
HIPAA compliance isn't a project — it's an ongoing program. Here's how to make it sustainable:
Embed Compliance in Development
Automate What You Can
Review Cycles
| Activity | Frequency |
|---|---|
| Risk assessment | Annual + after significant changes |
| Policy review | Annual |
| Access reviews | Quarterly |
| Security training | Annual + new hire onboarding |
| Penetration testing | Annual |
| Disaster recovery testing | Annual |
| Vendor assessment | Annual for critical vendors |
| Audit log review | Monthly |
| Incident response testing | Annual tabletop exercise |
Getting Started
If HIPAA compliance feels overwhelming, remember: you don't need to do everything at once. Start with the highest-impact items:
HIPAA compliance is a journey. The important thing is to start — deliberately, systematically, and with the right tools to make it sustainable.
Ready to begin?Ready to check your compliance?
Scan your website for free and get an instant compliance report covering GDPR, CCPA, and more.
Free Compliance Scan →