Have You Checked Out the New HIPAA Cybersecurity Requirements for 2025?
Key Takeaways
- You must stay abreast of the new HIPAA cybersecurity requirements to understand how they impact you and your organization.
- Various emerging cyber threats, and the increasing number of cyberattacks has made the feds sit up and take notice.
- There have been no major updates or changes in the security and privacy requirements of PHI and ePHI since the publication of the Omnibus Final Rule in 2013.
- HHS published a notice of proposed rulemaking1 (NPRM) to modify the standards issued under the Security Rule of HIPAA and HITECH Act.
- These days there are few activities in healthcare which are outside the reach of technology making cybersecurity such a critical issue.
- OCR’s investigations led to the identification of areas where the healthcare providers lag in compliance as well as the significant increase in cyberattacks and breaches in recent years.
- Malicious activities gravely jeopardize not just data security, but also the smooth running of facilities, and quality of patient care given the ultra-dependence on electronic devices and computer connectivity/networks.
- The POTUS declared “Healthcare and Public Health” a critical infrastructure sector, and the HHS as Sector Risk Management Agency (SRMA).
- Robust privacy and security protections for PHI are areas of zero compromise. Therefore, HHS has updated terms of disclosure of PHI to provide greater clarity and specificity to regulated entities.
- Annual compliance audit has been made mandatory as has annual risk assessment.
- Regulated entities must inventory technology assets, while developing a network map of how ePHI travels through the provider’s electronic information systems to identify vulnerabilities and gaps.
- Security measures should factor in resilience after a cybersecurity disaster.
- Vulnerability scans must be carried out every six months, while penetration tests should be carried out at least once in 12 months.
- Administrative safeguards have been updated.
- All electronic devices, not just workstations, but all portable devices that create, store, and/or transmit ePHI must be encrypted. Those regulated entities which lack encryption at industry standards must provide written plans on how that can be rectified.
- HIPAA cybersecurity measures must be proactive, rather than reactive.
- Practice cybersecurity hygiene at all levels.
Introduction
Assuring cybersecurity has never been more critical, or more challenging. With AI and other cybersecurity threats increasing by the day, assuring data security has become dicier. Specifically, it has become more challenging for healthcare providers and covered entities to ensure the privacy, security, and availability of protected health information (PHI). When it comes to individually identifiable health information (IIHI), you must ensure its confidentiality, integrity, and availability (CIA) to stay compliant with HIPAA, and its ancillary rules, namely, the Privacy Rule, The Security Rule, the Omnibus Rule, and the Breach Notification Rule, apart from the Health Information Technology for Economic and Clinical Health (HITECH) Act of 2009.
Background
The Health Insurance Portability and Accountability Act of 1996 (HIPAA) was enacted to “improve portability and continuity of health insurance coverage in the group and individual markets … (and) to simplify the administration of health insurance”. The HITECH Act incentivized the conversion of all health records into an electronic format, the electronic health records (EHRs). However, with the passage of time, the authorities began to perceive that the transition from paper based records to electronic records more than doubled the inherent risks to CIA. The Security Rule was initially passed in 2003. It has since been modified a few times to limit not just disclosures, but also the uses of PHI. Remember that the Security Rule only applies to ePHI, not to paper records. It also applies to IIHI which is emailed or stored in an electronic format.
Omnibus Final Rule and afterwards: Subsequently, the Department of Health and Human Services (HHS) published an Omnibus Final Rule on January 25, 2013, in the Federal Register to strengthen the security, enforcements, and privacy provisos of HIPAA and HITECH to protect PHI in electronic and other formats. However, for more than a decade, there had been no major updates or changes in the security and privacy requirements of PHI and ePHI, though there had been some tweaks on sharing information.
Notice Of Proposed Rulemaking
Healthcare Industry Now Operates in a High Risk Environment
The Office for Civil Rights (OCR) investigates the compliance of covered entities with the provisos of the various HIPAA and its ancillary rules. Some of these investigations led to the identification of areas where the healthcare providers lag in the compliance of HIPAA cybersecurity as well as the significant increase in cyberattacks and breaches in recent years. The changes in the environment in which healthcare is provided these days have increased the threats to the privacy and security of PHI and ePHI. These days there are few activities in healthcare which are outside the reach of technology, or which do not rely on a robust computer network, and a stable electronic device. In all these, the patients are getting the worst of it as they are the most at risk of denial of service, and disruptions of procedures and services.
Ultra Dependence on Computer Networks and Electronic Devices
Healthcare providers are dependent on electronic devices and networks for varied activities. From setting up doctor appointments to sending reminders, meticulously documenting every step of a face to face encounter, and the steps taken for medical decision-making (MDM) to create elaborate electronic health records, this dependence shows up. Even when providing telehealth services doctors must be cautious about ensuring HIPAA cybersecurity. When patients are hooked on devices to track sleep patterns, physical activity, or vitals like pulse rate and heartbeats; a hacker can garner a significant amount of PHI. Coding, billing, submission of claims, even the fulfillment of prescriptions require protected health information to be in use, at rest, or in transit. Add to that, verification of insurance coverage, use of and access to facilities create vulnerability gaps. Bad actors can hack into healthcare systems to introduce malware, and perform other such malicious activities. These do not just gravely jeopardize data security, but also adversely impact the smooth running of facilities, and quality of patient care.
Alarming Increase in Data Breaches and Cybersecurity Incidents
Terms for Disclosure of PHI Updated
Robust privacy and security protections for PHI are areas of zero compromise. The HHS realized that some of the administrative requirements were overburdening the providers. Add to that the need for continuously improving quality of care. The proposals include strengthening the right to access own PHI, personally view the records, and if necessary, take photographs of own medical records while making notes. There have been modifications to the language describing situations when and to whom PHI may be disclosed, such as to avert a life threatening event. Therefore, the HHS has sought to provide regulated entities with greater clarity and specificity regarding how to fulfill their obligations to ensure HIPAA cybersecurity.
Mandatory Risk Assessment Requirements
OCR identified many areas which need to have vulnerability gaps closed. Compliance audit requires every covered entity and their business associates to carry out an audit and document compliance with each standard and implementation specification at least once every year. To that end, the term “addressable”, which healthcare providers thought made such requirements optional, has been removed from implementation requirements. The new proposed Security Rule updates are focused on carrying out risk analyses and assessments, and implementing control measures to manage risks. HIPAA covered entities (CEs) need to combat cyberattacks, improve incident response, and minimize risk by including cybersecurity practices which protect electronically created, stored, and transmitted health records more efficaciously. Therefore, CEs must inventory technology assets, while developing a network map of how ePHI travels through the provider’s electronic information systems to identify vulnerabilities and gaps. While such audits should be ongoing; now all CEs must carry out risk assessments at least once every year.
Security Measures Should Factor in Resilience After a Cybersecurity Disaster
The HHS has proposed that the technical standards of security measures, and their implementation should take into account their effectiveness in supporting the resilience of the regulated entity to recover from a major security incident, or natural calamity which has thrown the information system into disarray. Ideally, it should be woven into the CE’s disaster recovery plan. Therefore, the CEs should develop written procedures for data restoration where priority should be based on criticality within 72 hours. The proposals state, “…regulated entities will regularly evaluate the security measures they have applied to comply with the standards and implementation specifications based on the technology available and known risks and vulnerabilities at the time of the evaluation”. This means that all regulated entities must carry out vulnerability scans every six months, while penetration tests should be carried out at least once in 12 months.
Proposed Updates: Section 164.308—Administrative Safeguards
45 CFR 164.304 provides the definitions of “Administrative safeguards,” “Physical safeguards,” and “Technical safeguards”. “45 CFR 164.308(a)(6)(ii) requires regulated entities to identify and respond to suspected or known security incidents; to mitigate, to the extent practicable, harmful effects of security incidents that are known to the regulated entity; and to document security incidents and their outcomes”. Therefore, the HHS has proposed updating terminology and definitions by replacing the term “electronic storage media” with “electronic storage material”. It understood that there are many regulated entities which lack sufficient, in some cases any, technical safeguards by way of technical controls to avert improper access and/or viewing of ePHI. Therefore, CEs are now required to institute controls required for not just computer workstations, but also to mobiles, tablets, and other portable electronic devices such as flash drives, digital cameras etc. It also includes administrative safeguards such as terminating access of any and every employee leaving the organisation with immediate effect to ensure HIPAA cybersecurity. If global access to ePHI needs to be granted to more than one employee, the regulated entity must document the reasons in the policies and procedures.
Don’t Overlook Encryption
Be Proactive Rather than Reactive in Cybersecurity Measures
Practice HIPAA Cybersecurity Hygiene at all Levels
You would be well advised to follow the industry best practices such as elimination of default passwords, adoption of MFA, institution of offline backups, installation of critical patches within a reasonable time, implement minimum standard security controls, and transparency of impact and vulnerability disclosures. Further, HHS has suggested adopting a risk-based approach in their security program, while performing a risk analysis in a manner that conforms with guidance from NIST and CISA. In the NPRM, a definition of multifactor authentication has been added.
Conclusion

The HHS has not proposed anything revolutionary in its NPRM. It has stressed on the importance of relying on industry best practices of using appropriate anti-malware, strengthening data security through stronger, more effective access controls by having stronger password policies, and multifactor authentication, backed by network segmentation.
If You Need Guidance or Immediate Assistance
For help in identifying vulnerability gaps, penetration testing, setting up access controls, creation of HIPAA compliant data security policies and procedures, and other compliance needs.
Get in touch with us at: service@friggp2c.com, amit.sarkar@friggp2c.com, or Call us at: +1 (905) 261-9124 | +1 (905) 261-9123 | +1 (866) 907-7227 | +91 733-113-2288
About the Authors
Amit Sarkar (amit.sarkar@friggp2c.com) is the Founder of Frigg Business Solutions at Sheridan, Wyoming, USA, and Hyderabad, Telangana, India. A seasoned writer whose multiple articles have been published in HCCA and SCCE. He is a former CEO of a US Healthcare Regulatory Compliance service organization, and a senior global leader in HIPAA Compliance, IT Security, Risk Management, and Compliance Governance.
LinkedIn: Amit Sarkar | LinkedIn
A tenured business leader with over two decades of experience leading organizations across multiple domains including healthcare. He has seen the impact of security breaches first hand and has become a passionate advocate for security & compliance preparedness in organizations.
LinkedIn: Ayan Chatterjee | LinkedIn
Image Credit: Designed by Freepik and by vectorjuice / Freepik
445 CFR 164.312(a)(2)(iv)
545 CFR 164.306(d)(3)(ii)(B). 645 CFR 164.308(a)(1)(ii)(B).
7https://www.federalregister.gov/documents/2025/01/06/2024-30983/hipaa-security-rule-to-strengthen-the-cybersecurity-of-electronic-protected-health-information