In February 2024, OCR announced a $4.75 million settlement with a nonprofit health system that failed to conduct an enterprise-wide risk analysis — leaving the protected health information of over 300,000 individuals exposed for years. The root cause wasn't a sophisticated cyberattack. It was a fundamental breakdown in PHI HIPAA compliance: the organization never fully inventoried where PHI resided across its systems. If your organization handles health data in any capacity, this case should be a wake-up call.
What Counts as PHI Under HIPAA — And Why It Matters More Than You Think
Protected health information isn't limited to medical records. Under the Privacy Rule (45 CFR §160.103), PHI includes any individually identifiable health information transmitted or maintained in any form — electronic, paper, or oral. That means appointment reminders, billing records, insurance claims, lab results, and even voicemails containing patient details all qualify.
Healthcare organizations consistently struggle with identifying every location where PHI exists. A scheduling spreadsheet on a shared drive, an unencrypted email thread between providers, a paper sign-in sheet at the front desk — each one represents a compliance obligation. Without mapping these data flows, your organization cannot achieve meaningful PHI HIPAA compliance.
The PHI HIPAA Compliance Framework: Three Rules Working Together
True compliance isn't governed by a single regulation. It requires adherence to three interconnected rules under 45 CFR Part 164:
- The Privacy Rule establishes who can access, use, and disclose PHI and under what conditions. It mandates the minimum necessary standard — your workforce should only access the PHI needed to perform their specific job function.
- The Security Rule applies specifically to electronic PHI (ePHI) and requires administrative, physical, and technical safeguards. Encryption, access controls, audit logs, and contingency planning all fall here.
- The Breach Notification Rule requires covered entities and business associates to notify affected individuals, HHS, and in some cases the media within specific timeframes when unsecured PHI is compromised.
Each rule creates obligations that overlap. A risk analysis under the Security Rule informs your Privacy Rule policies. A breach discovered under the Notification Rule triggers a review of your safeguards. Your organization must address all three to maintain defensible compliance.
Risk Analysis: The PHI Compliance Step Most Organizations Get Wrong
OCR has made one thing abundantly clear through years of enforcement: the failure to conduct a thorough, enterprise-wide risk analysis is the single most cited HIPAA violation. Between 2019 and 2024, risk analysis deficiencies appeared in the vast majority of resolution agreements and civil money penalties.
A compliant risk analysis under 45 CFR §164.308(a)(1) requires you to identify every system that creates, receives, maintains, or transmits ePHI. You must then evaluate threats and vulnerabilities to that data, assess the likelihood and impact of each risk, and implement security measures to reduce those risks to a reasonable level.
This is not a one-time checkbox. OCR expects your covered entity to update the risk analysis whenever you adopt new technology, change workflows, or experience a security incident. If your last assessment was two years ago and you've since migrated to a new EHR, your compliance posture has gaps.
Business Associate Agreements: Your PHI Leaves Your Building Every Day
Your organization likely shares PHI with dozens of vendors — billing companies, cloud storage providers, IT support firms, shredding services. Each one that handles PHI on your behalf is a business associate under HIPAA, and you need a signed business associate agreement (BAA) in place before any PHI changes hands.
The Omnibus Rule of 2013 extended direct liability to business associates for Security Rule and certain Privacy Rule violations. That means both parties face OCR enforcement if PHI is mishandled. In my work with covered entities, I've found that many organizations have outdated BAAs that don't reflect current data sharing practices. Audit your vendor relationships at least annually.
Workforce Training: The Human Layer of PHI Protection
Technical safeguards mean nothing if your workforce doesn't understand them. The Privacy Rule at 45 CFR §164.530(b) requires training for every member of your workforce — not just clinical staff, but billing clerks, receptionists, volunteers, and anyone who might encounter PHI.
Effective PHI HIPAA compliance training goes beyond reading a policy manual once a year. Your team needs to recognize phishing attempts, understand the minimum necessary standard, know how to report a suspected breach, and handle PHI disposal correctly. Enrolling your workforce in a structured HIPAA training and certification program ensures consistent education across every role in your organization.
OCR has penalized organizations where even a single untrained employee caused a breach. The cost of comprehensive training is negligible compared to a six-figure settlement.
Building a Defensible PHI HIPAA Compliance Program
Sustainable compliance requires more than policies sitting in a binder. Here's what a defensible program looks like in practice:
- Document everything. Your risk analysis, policies, training records, BAAs, and incident response logs must be retained for six years under HIPAA's documentation requirements.
- Appoint a Privacy Officer and Security Officer. These roles are required, not optional. In smaller practices, one person can fill both roles, but the responsibilities must be formally assigned.
- Publish and distribute your Notice of Privacy Practices. Patients must receive this notice, and your covered entity must make a good-faith effort to obtain written acknowledgment.
- Test your incident response plan. A breach will happen eventually. Whether it triggers notification obligations depends on how quickly and effectively your workforce responds.
- Reassess continuously. Compliance is a cycle, not a destination. Regulatory changes, new threats, and operational shifts all demand ongoing attention.
If you're unsure where your organization stands, start with the fundamentals. A platform like HIPAA Certify can help you establish baseline workforce compliance and identify the gaps that put your PHI — and your organization — at risk.
The Cost of Ignoring PHI HIPAA Compliance
OCR's enforcement actions tell a consistent story. Penalties under the HITECH Act's tiered structure range from $137 per violation for unknowing violations up to $2,067,813 per violation category per year (adjusted for inflation as of 2024). But financial penalties are only part of the equation.
Corrective action plans imposed by OCR often require two to three years of external monitoring, mandatory workforce retraining, and comprehensive policy overhauls. The reputational damage from a publicized breach can erode patient trust for far longer. For smaller practices, a single enforcement action can threaten viability.
PHI HIPAA compliance isn't an administrative burden — it's the operational foundation that allows your organization to handle the most sensitive data your patients entrust to you. Treat it accordingly.