Blog
HIPAA

HIPAA Explained: What It Actually Requires and Why It Exists

January 27, 2026 · Formisoft Team

Formisoft

From the team at Formisoft, the HIPAA-ready platform for patient intake, scheduling, and payments. Learn more →

HIPAA was signed into law in 1996, and most healthcare organizations still don't fully understand what it requires. They know it's about "protecting patient data," but the specifics — which rules apply, what counts as a violation, what the actual technical requirements are — tend to get lost in a fog of compliance anxiety.

Here's a clear breakdown.

The Three Rules That Matter

HIPAA has several components, but three rules do most of the heavy lifting.

The Privacy Rule

This is the one most people think of when they hear "HIPAA." It establishes national standards for protecting medical records and personal health information. In practice, it means:

  • Patients have rights over their health information — they can request copies, corrections, and an accounting of disclosures.
  • There are hard limits on who can see health records and under what circumstances.
  • Healthcare providers, health plans, and clearinghouses must implement safeguards to protect health information.

The Privacy Rule covers all forms of PHI — paper, electronic, and verbal. Yes, that includes the conversation you're having about a patient in the hallway.

The Security Rule

The Security Rule is the Privacy Rule's technical sibling. It specifically addresses electronic protected health information (ePHI) and requires three categories of safeguards:

Administrative safeguards — risk assessments, workforce training, contingency plans, and assigning a security officer.

Physical safeguards — facility access controls, workstation security, and device/media handling procedures.

Technical safeguards — this is where the encryption requirements live:

  • AES-256 encryption for data at rest
  • TLS 1.3 for data in transit
  • Access controls with unique user IDs
  • Audit controls that log who accessed what and when
  • Integrity controls to prevent unauthorized data alteration

The Security Rule doesn't prescribe exact technologies, but it does require that whatever you choose is documented, reviewed, and adequate.

The Enforcement Rule

This is the teeth. It defines how violations are investigated and what happens when organizations get caught. The penalty tiers are steep:

  • Tier 1 (didn't know): $100 - $50,000 per violation
  • Tier 2 (reasonable cause): $1,000 - $50,000 per violation
  • Tier 3 (willful neglect, corrected): $10,000 - $50,000 per violation
  • Tier 4 (willful neglect, not corrected): $50,000 per violation

Annual caps reach $1.5 million per violation category. Criminal charges can lead to imprisonment. And beyond the financial penalties, a HIPAA breach obliterates patient trust in ways that are hard to quantify and harder to recover from.

What Compliance Actually Looks Like Day-to-Day

Knowing the rules is one thing. Implementing them is another. Here's what it takes in practice:

Risk assessments aren't optional. You need to regularly identify where ePHI lives, how it moves, and what could go wrong. This isn't a one-time audit — it's an ongoing process.

Access controls need to be granular. Not everyone on staff needs access to everything. Role-based permissions should be the default, not an afterthought.

Training has to be continuous. Annual HIPAA training is a minimum. When you adopt new tools or change workflows, people need to know how those changes affect compliance.

Business Associate Agreements (BAAs) are required. Every vendor that touches PHI needs a signed BAA. No exceptions. This includes your form platform, your cloud storage provider, your email service — any third party handling ePHI.

Breach response plans need to exist before breaches happen. You need documented procedures for identifying, containing, and reporting breaches, including the 60-day notification window for affected individuals.

The Digital Shift Makes This Harder — and Easier

The move to digital intake forms, telemedicine, and patient portals has expanded the attack surface for healthcare data. More systems, more integrations, more potential failure points.

But digital tools also make compliance more achievable when they're built correctly. Encryption can be automatic. Audit logs can be comprehensive without manual effort. Access controls can be enforced systematically rather than relying on human judgment.

The key is choosing tools designed with HIPAA requirements baked in — US-hosted infrastructure, encryption at rest and in transit, audit logging, BAA availability — rather than trying to retrofit compliance onto platforms that weren't built for it.

The Bottom Line

HIPAA isn't going away, and enforcement isn't slowing down. The organizations that handle it best aren't the ones with the biggest compliance budgets — they're the ones that understand the requirements clearly and build compliance into their workflows from the start.

If you're choosing software for your practice, verify the security specs. Ask about BAAs. Check where data is hosted. Look at audit logging capabilities. These aren't nice-to-haves — they're the minimum for handling patient data responsibly.

Ready to digitize your intake?

Start building HIPAA-ready patient intake forms in minutes.

Get Started