HIPAA—the Health Insurance Portability and Accountability Act—is the foundational federal law governing health data privacy and security in the United States. For digital health companies, HIPAA compliance is not a nice-to-have feature. It is a legal requirement that affects how you build your technology, structure your vendor relationships, train your team, and respond to incidents.
Yet HIPAA is also one of the most commonly misunderstood regulations in healthcare. Startups frequently either overestimate its scope (believing it applies to everything health-related) or underestimate its requirements (thinking a privacy policy and encryption are sufficient). This guide covers the essential HIPAA requirements every digital health founder needs to understand.
The Privacy Rule: Who Can See What
The HIPAA Privacy Rule establishes national standards for the protection of individually identifiable health information, known as protected health information (PHI). The Privacy Rule governs how covered entities and their business associates use and disclose PHI.
Key Privacy Rule requirements for digital health companies include:
- Notice of Privacy Practices (NPP): Covered entities must provide patients with a clear description of how their health information may be used and shared.
- Patient access rights: Patients have the right to access, inspect, and obtain copies of their health records, typically within 30 days of a request. Digital health companies must have processes to fulfill these requests.
- Authorization requirements: Uses and disclosures of PHI beyond treatment, payment, and healthcare operations generally require written patient authorization.
- Accounting of disclosures: Patients can request an accounting of certain disclosures of their PHI, and covered entities must be able to provide it.
A critical threshold question for digital health startups: are you a covered entity, a business associate, or neither? If your company provides healthcare services or bills insurance, you are likely a covered entity. If you handle PHI on behalf of a covered entity, you are a business associate. If you collect health-related data directly from consumers and are not involved in treatment or payment, you may not be subject to HIPAA at all—though you may still have obligations under state privacy laws and the FTC Act.
The Security Rule: Technical and Administrative Safeguards
The HIPAA Security Rule specifically addresses electronic PHI (ePHI) and requires covered entities and business associates to implement administrative, physical, and technical safeguards to ensure its confidentiality, integrity, and availability.
Administrative Safeguards
- Risk analysis: Conduct a thorough assessment of potential risks and vulnerabilities to ePHI in your environment. This is the single most important requirement and the one most frequently cited in enforcement actions.
- Risk management: Implement security measures sufficient to reduce risks identified in the risk analysis to a reasonable and appropriate level.
- Workforce training: Train all employees who handle ePHI on your security policies and procedures.
- Access management: Implement policies for granting and revoking access to ePHI based on job function, and maintain logs of who has access.
- Incident response: Establish procedures for identifying, responding to, and mitigating security incidents.
Technical Safeguards
- Access controls: Implement technical policies that limit access to ePHI to authorized users, including unique user identification, emergency access procedures, automatic logoff, and encryption.
- Audit controls: Implement mechanisms to record and examine activity in systems that contain or use ePHI.
- Integrity controls: Implement measures to protect ePHI from improper alteration or destruction.
- Transmission security: Implement measures to guard against unauthorized access to ePHI during electronic transmission, including encryption.
Business Associate Agreements
If your digital health company shares PHI with any third party—cloud hosting providers, analytics platforms, email services, payment processors, or any other vendor that may access PHI—you need a Business Associate Agreement (BAA) with that vendor.
A BAA is a legal contract that requires the business associate to:
- Use PHI only for permitted purposes defined in the agreement
- Implement appropriate safeguards to protect PHI
- Report any security incidents or breaches to the covered entity
- Ensure that any subcontractors who access PHI also agree to the same restrictions
- Make PHI available to satisfy patient access requests
- Return or destroy PHI at the termination of the agreement
Not every technology vendor will sign a BAA, and not every vendor needs one. If a vendor does not access, store, transmit, or process PHI, a BAA is not required. But if there is any possibility that a vendor could encounter PHI—including in log files, error messages, or support tickets—err on the side of obtaining a BAA.
The Minimum Necessary Standard
The minimum necessary standard requires covered entities to make reasonable efforts to limit the use, disclosure, and request of PHI to the minimum amount necessary to accomplish the intended purpose. This principle should guide your system architecture and data handling practices.
For digital health companies, the minimum necessary standard means:
- Role-based access controls that limit each employee's access to only the PHI they need for their specific job function
- API designs that return only the data fields needed for a specific function, not entire patient records
- Data analytics that use de-identified or aggregated data whenever possible rather than full PHI
- Vendor integrations scoped to share only the PHI elements necessary for the service provided
Breach Notification Requirements
When a breach of unsecured PHI occurs, HIPAA requires notification to affected individuals, the Department of Health and Human Services (HHS), and in some cases, the media. The notification requirements depend on the size of the breach:
- Breaches affecting fewer than 500 individuals: Notify affected individuals without unreasonable delay and no later than 60 days after discovery. Maintain a log and report to HHS annually.
- Breaches affecting 500 or more individuals: Notify affected individuals and HHS without unreasonable delay and no later than 60 days after discovery. Also notify prominent media outlets serving the affected jurisdiction. These breaches are posted publicly on the HHS "Wall of Shame."
A breach is presumed to have occurred any time PHI is accessed, used, or disclosed in a manner not permitted by the Privacy Rule, unless a risk assessment demonstrates a low probability that the PHI was compromised.
Common HIPAA Mistakes for Startups
Digital health startups commonly make several HIPAA errors that create significant risk:
- No risk assessment: This is the most cited deficiency in HHS enforcement actions. Every covered entity and business associate must conduct a risk assessment. There is no exception for small organizations or startups.
- Using non-HIPAA-compliant tools: Consumer-grade email, messaging, file-sharing, and video conferencing tools are not HIPAA compliant by default. You need enterprise or healthcare editions with BAAs.
- Assuming cloud providers handle compliance: Hosting on AWS, Google Cloud, or Azure does not make you HIPAA compliant. These platforms offer HIPAA-eligible services, but configuring them properly and maintaining compliance is your responsibility.
- Neglecting employee training: Every employee who accesses ePHI must receive HIPAA training. New hire orientation and annual refreshers are the minimum standard.
- No incident response plan: When a breach occurs, you need a documented process for investigation, containment, notification, and remediation. Creating this plan during an active breach is far too late.
HIPAA compliance is an ongoing process, not a one-time project. The regulatory requirements are substantive but manageable, and the cost of compliance is far less than the cost of a breach—both in financial penalties and in the loss of patient trust that is the foundation of any healthcare business.