What is HIPAA (Health Insurance Portability and Accountability Act)?
The Health Insurance Portability and Accountability Act (HIPAA) is a federal law that establishes national standards for protecting patient health information. It applies to covered entities (healthcare providers, health plans, clearinghouses) and their business associates — including MSPs and technology vendors handling protected health information.
How HIPAA works
Three-step view of how it operates in practice.
Classify data
Identify where PHI (Protected Health Information) exists — EHR systems, email, storage, backups, third-party tools.
Implement safeguards
Apply administrative, physical, and technical safeguards per the HIPAA Security Rule: access controls, encryption, audit logs, risk analysis.
Document & train
Policies, procedures, BAAs with vendors, annual workforce training, and incident response plans — all must be documented.
HIPAA rule components
A clear breakdown of the common variants.
Privacy Rule
Protects individually identifiable health information — who can see PHI and under what circumstances.
Security Rule
Time-based one-time codes from an app like Microsoft Authenticator or Google Authenticator. Offline-capable and phishing-resistant against many attacks.
Breach Notification Rule
The user approves a sign-in with a tap on their phone. Easy to use but vulnerable to MFA fatigue attacks — always pair with number matching.
Enforcement Rule
FIDO2 keys like YubiKey, or device-bound passkeys. Phishing-resistant by design — the key will not authenticate against a fake domain.
Why HIPAA matters for SMBs
The Health Insurance Portability and Accountability Act (HIPAA) is a federal law that establishes national standards for protecting patient health information.
Common HIPAA mistakes
- No signed BAAs with vendorsAny vendor handling PHI (cloud, IT, shredding, email) needs a Business Associate Agreement. No BAA means you’re liable for their mistakes.
- Encryption only at restAdmins, finance, and anyone with access to money or sensitive data should use an app or hardware key — never SMS alone.
- No risk analysisThe Security Rule explicitly requires a risk analysis. Skipping it is the #1 OCR audit finding.
- Unfocused trainingAnnual HIPAA training that’s identical for everyone misses role-specific risks. Front desk, clinicians, and IT need different training.
HIPAA frequently asked questions
LogicalNet services related to MFA
Related glossary terms
Need HIPAA-aligned IT and security?
Talk to a LogicalNet identity expert. We will review your current environment, recommend the right MFA methods for each group of users, and help you deploy without disrupting the business.