In February 2024, OCR settled with a healthcare system for $4.75 million after investigators found the organization had failed to implement even basic security safeguards HIPAA has required since 2005. The gaps weren't exotic — no enterprise-wide risk analysis, no encryption on portable devices, no access controls tied to job function. These are foundational requirements that OCR has enforced for nearly two decades, yet they remain the most common points of failure in breach investigations.
What Security Safeguards HIPAA Actually Requires Under the Security Rule
The HIPAA Security Rule, codified at 45 CFR Part 164, Subpart C, establishes three categories of safeguards that every covered entity and business associate must implement to protect electronic protected health information (ePHI): administrative, physical, and technical. These aren't suggestions. They are regulatory mandates with enforcement teeth.
What trips up most organizations is the "addressable" versus "required" distinction. An addressable specification doesn't mean optional. It means your organization must assess whether the safeguard is reasonable and appropriate. If you decide not to implement it, you must document why and implement an equivalent alternative. OCR has penalized organizations that treated "addressable" as "ignorable."
Administrative Safeguards: The Category That Drives Most Violations
Administrative safeguards account for more than half of the Security Rule's requirements — and in my work with covered entities, they generate the most enforcement exposure. The centerpiece is the risk analysis requirement under §164.308(a)(1). OCR has made this the single most cited deficiency in settlement agreements and corrective action plans.
Your risk analysis must be comprehensive, covering every system that creates, receives, maintains, or transmits ePHI. It must be documented and updated regularly — not conducted once and filed away. Organizations that treat risk analysis as an annual checkbox exercise consistently fail OCR audits.
Other critical administrative safeguards include:
- Workforce training — §164.308(a)(5) requires security awareness and training for all workforce members, not just clinical staff
- Access management — Establishing policies for authorizing, modifying, and terminating access to ePHI
- Incident response procedures — Documented processes for identifying, responding to, and mitigating security incidents
- Contingency planning — Data backup, disaster recovery, and emergency mode operation plans
- Business associate management — Ensuring every business associate with ePHI access has a compliant BAA in place
Workforce training deserves special emphasis. A single untrained employee clicking a phishing link can expose thousands of patient records. Investing in HIPAA training and certification for your workforce directly addresses this administrative safeguard and creates documented evidence of compliance.
Physical Safeguards That Go Beyond Locked Doors
Physical safeguards under §164.310 protect the physical infrastructure and devices that house ePHI. Healthcare organizations consistently underestimate this category because they think it only applies to server rooms. It applies to every workstation, every mobile device, every printer in a hallway, and every decommissioned hard drive.
Facility access controls must limit physical access to ePHI systems based on role and need. Workstation use and security policies must govern how and where devices accessing ePHI can be used. Device and media controls must address the disposal, reuse, and movement of hardware containing PHI.
OCR's 2023 enforcement actions included multiple cases where organizations failed to track devices containing ePHI or allowed workforce members to remove laptops without encryption. Physical safeguards aren't just about building security — they follow ePHI wherever it travels.
Technical Safeguards: Encryption, Access Controls, and Audit Logs
Technical safeguards under §164.312 are the controls built into your information systems. Four areas demand immediate attention from every covered entity:
- Access controls — Unique user identification, emergency access procedures, automatic logoff, and encryption/decryption of ePHI
- Audit controls — Hardware, software, and procedural mechanisms to record and examine access to ePHI
- Integrity controls — Mechanisms to authenticate ePHI and confirm it hasn't been altered or destroyed improperly
- Transmission security — Encryption of ePHI transmitted over electronic networks
Encryption remains the most impactful technical safeguard your organization can deploy. Under the Breach Notification Rule, encrypted ePHI that is lost or stolen is not considered a reportable breach — because the data is rendered unusable without the decryption key. This single control can save your organization from the financial, legal, and reputational consequences of a breach notification.
The Minimum Necessary Standard and Security Safeguards
Security safeguards HIPAA mandates work hand-in-hand with the minimum necessary standard from the Privacy Rule. Your technical and administrative controls should ensure that workforce members access only the PHI necessary to perform their job functions. Role-based access controls are not just a technical best practice — they are a regulatory expectation that connects the Security Rule to the Privacy Rule.
Organizations that implement broad access privileges — giving every employee access to every patient record — face dual exposure under both rules. OCR views this as a failure of both administrative safeguards and privacy protections.
How OCR Evaluates Your Security Safeguards During an Investigation
When OCR opens an investigation — whether triggered by a breach report, a patient complaint, or a compliance review — their first request is almost always your risk analysis and risk management plan. From there, they examine policies, training records, technical configurations, and business associate agreements.
Documentation is everything. An organization that has implemented strong security safeguards but cannot produce documentation proving it will fare poorly in an OCR investigation. Every policy decision, risk assessment finding, training session, and technical implementation must be documented and retained for six years under §164.530(j).
Building a Defensible Security Safeguards Program
Start with a current, comprehensive risk analysis. Map every ePHI flow in your organization. Identify gaps in your administrative, physical, and technical safeguards. Prioritize remediation based on risk severity. Train your entire workforce — not just once, but on an ongoing basis.
Organizations looking to establish a compliant foundation should explore HIPAA Certify's workforce compliance programs, which address the training and documentation requirements that OCR investigators scrutinize most closely.
The security safeguards HIPAA requires aren't aspirational goals. They are enforceable mandates that OCR has backed with penalties ranging from $100 to $2,067,813 per violation category per year. The organizations that avoid enforcement actions are the ones that treat these safeguards as operational priorities — embedded in daily workflows, not buried in a policy binder.