If you build software for healthcare, work with doctors or clinics, or handle patient data in any form — HIPAA compliance isn't optional. It's the law, and the penalties for getting it wrong can end a small business.

This guide cuts through the complexity. We cover what HIPAA actually requires from a small company, what Protected Health Information (PHI) really means, and the practical steps you need to take starting today.

Who needs to worry about HIPAA? Covered entities (healthcare providers, health plans, clearinghouses) and their business associates — anyone who creates, receives, maintains, or transmits PHI on behalf of a covered entity. If you're building a telehealth app, a clinic management tool, or any product that touches patient data — you're likely a business associate.

What Is PHI? (And What's Not)

PHI is any information that can identify a patient and relates to their health, healthcare delivery, or payment for healthcare. The key is the 18 identifiers — if data contains any of these AND relates to health, it's PHI.

The 18 HIPAA Identifiers

Names
Dates (except year)
Phone numbers
Email addresses
Social Security Numbers
Medical record numbers
Health plan IDs
Account numbers

PHI that has been de-identified (all 18 identifiers removed or encrypted so re-identification is not reasonably possible) is no longer subject to HIPAA. If you're working with truly de-identified data, you're not a business associate — but get a legal opinion before relying on this.

The Three HIPAA Rules You Must Know

1. The Privacy Rule

Governs who can access PHI and under what circumstances. Covered entities can't share PHI without patient authorization unless it's for treatment, payment, or healthcare operations. Your privacy policy must actually match your data practices.

2. The Security Rule

The part most technical teams focus on. Requires administrative, physical, and technical safeguards to protect electronic PHI (ePHI). We'll cover these in detail below.

3. The Breach Notification Rule

If PHI is compromised, you must notify affected individuals within 60 days of discovery. If the breach affects 500+ people in a state, you must also notify HHS and local media. Reportable breaches are more common than companies expect.

The Three Safeguard Categories

HIPAA separates requirements into three categories. Most startups concentrate on technical safeguards — but auditors will review all three.

Technical

Encryption, access controls, audit logs, automatic logoff, transmission security

Administrative

Risk analysis, security officer, workforce training, incident response, BAAs

Physical

Workstation controls, device disposal, facility access management

Technical Safeguards (Most Common Gaps)

The following are required for any system handling ePHI. These are where small companies get caught:

Common mistake: Using Gmail, Slack, Google Drive, or Dropbox to share patient data. None of these are HIPAA-compliant by default. You need a Business Associate Agreement (BAA) with each vendor, and most consumer-grade tools don't offer one.

Administrative Safeguards

These are the policies and procedures that prove you take HIPAA seriously:

Physical Safeguards

HIPAA Penalties Are Not a Slap on the Wrist

The HHS Office for Civil Rights (OCR) has been increasingly aggressive in enforcement. Fines are calculated per violation, not per incident.

Tier 1: Unknowing
$100 – $50,000/violation
Up to $25,000/year per requirement
Tier 2: Reasonable Cause
$1,000 – $50,000/violation
Up to $100,000/year per requirement
Tier 3: Willful Neglect (Fixed)
$10,000 – $50,000/violation
Up to $250,000/year per requirement
Tier 4: Willful Neglect (Not Fixed)
$50,000/violation minimum
Up to $1.5M/year per requirement

In 2023, the average HIPAA settlement was $1.2 million. Even a "small" breach at a 20-person startup can easily exceed $100,000 in combined fines, breach notification costs, and credit monitoring for affected patients.

What about state laws? Many states have their own healthcare privacy laws that may be stricter than HIPAA. California's CMIA and Texas's Medical Records Privacy Act are two notable examples. If you operate in multiple states, you need to understand the most restrictive requirements that apply to you.

Getting Started: Your First 5 Steps

  1. Conduct a HIPAA Risk Analysis. Before anything else. Know where PHI exists in your systems and what risks it faces. This is required by law and is the foundation of everything else.
  2. Identify every vendor that touches PHI. Your EHR, your messaging tool, your email provider, your cloud host. Get BAAs signed with every one of them. No BAA = no PHI.
  3. Encrypt everything. Full-disk encryption on all devices. TLS on all connections. If you can afford nothing else, do this.
  4. Write your HIPAA policies. Minimum: Privacy Policy, Security Policy, Incident Response Plan, Workforce Training Policy. Make sure they reflect what you actually do.
  5. Designate a Security Officer. Give someone explicit responsibility. Even if it's a co-founder wearing multiple hats, having a named owner prevents compliance from falling through the cracks.

Automate your HIPAA compliance evidence collection

RiskForge monitors access controls, audit logs, and encryption status across your tech stack — alerting you to gaps before they become reportable breaches.

Start Free Trial — No Credit Card