Your security and compliance glossary

All the terms you need to know when you’re trying to get compliance audit ready, fast.

Show filters

What are the HIPAA Safeguards?

HIPAA Safeguards are the administrative, technical, and physical safeguards that covered entities are required to maintain by the terms of the HIPAA Security Rule to protect individuals’ electronic protected health information (ePHI).


The Security Rule defines Administrative Safeguards as “administrative actions, and policies and procedures, to manage the selection, development, implementation, and maintenance of security measures to protect electronic protected health information and to manage the conduct of the covered entity’s workforce in relation to the protection of that information.” The Administrative Safeguards comprise more than half of the HIPAA Security Requirements. Administrative Safeguards include: 

  • Implementation of a Security Management Process
  • Designation of Security Personnel
  • Implementation of Information Access Management policies and procedures for authorizing access to ePHI
  • Provision of Workforce Training and Management
  • Performance of regular Evaluations against the requirements of the Security Rule


The Security Rule defines Technical Safeguards as “the technology and the policy and procedures for its use that protect electronic protected health information and control access to it.” The Technical Safeguards include:

  • Implementation of Access Control policies and procedures that allow only authorized persons to access ePHI
  • Implementation of Audit Controls to record and examine access and other activity in information systems that contain or use ePHI
  • Implementation of Integrity Controls, policies, and procedures to ensure ePHI is not destroyed or improperly altered
  • Implementation of technical security measures to ensure Transmission Security—guarding against unauthorized access to ePHI transmitted over an electronic network


The Security Rule defines Physical Safeguards as “physical measures, policies, and procedures to protect a covered entity’s electronic information systems and related buildings and equipment, from natural and environmental hazards, and unauthorized intrusion.” The Physical Safeguards include:

  • Management of Facility Access and Control, a covered entity must limit physical access to its facilities while ensuring that authorized access is allowed
  • Implementation of Workstation and Device Security policies and procedures to specify proper use of and access to workstations and electronic media

Additional resources you might like:

Compliance
Event
Strategies for scaling your GRC program with automation and AI

Join Vanta and Kobalt.io as we discuss what to consider when scaling your GRC program.

Compliance
Event
How to streamline security reviews with Trust Center

As the number and severity of third-party breaches continue to rise, companies are scrutinizing more closely not just on how they handle data, but how their vendors do as well. For security leaders, this means more security reviews are coming across their desks every day. Join us to learn how Vanta Trust Center can help streamline security reviews.

Compliance
Event
How to automate ISO 27001 and SOC 2 compliance

Join Vanta’s 45-minute live product demo on 21 May at 11 am BST. Two of our team members will walk you through the platform and answer questions throughout the session.

Additional resources you might like:

Compliance
Event
Strategies for scaling your GRC program with automation and AI

Join Vanta and Kobalt.io as we discuss what to consider when scaling your GRC program.

Compliance
Event
How to streamline security reviews with Trust Center

As the number and severity of third-party breaches continue to rise, companies are scrutinizing more closely not just on how they handle data, but how their vendors do as well. For security leaders, this means more security reviews are coming across their desks every day. Join us to learn how Vanta Trust Center can help streamline security reviews.

Compliance
Event
How to automate ISO 27001 and SOC 2 compliance

Join Vanta’s 45-minute live product demo on 21 May at 11 am BST. Two of our team members will walk you through the platform and answer questions throughout the session.

Compliance
Event
How to automate SOC 2 & ISO 27001 compliance

Join Vanta’s 45-minute live product demo on May 29 at 10 am PST. Two of our team members will walk you through the platform and answer questions throughout the session.

SOC 2
Event
Ask Me (Almost) Anything: Post-Audit Planning and Excellence

Navigate post-audit success with Vanta & A-LIGN. Get expert advice on leveraging findings for growth. Register for access or recording.

Company news
Blog
Celebrating international momentum at our first-ever VantaCon UK

We’re thrilled to host our first-ever VantaCon UK in London today as we continue to accelerate international momentum and expand our global footprint.

Compliance
Event
How to Automate ISO 27001 & SOC 2 Compliance

Join Vanta’s 45-minute live product demo on 16 May at 1pm AEST. Two of our team members will walk you through the platform and answer questions throughout the session.

Compliance
Event
How to demonstrate secure AI practices with ISO 42001

Join Vanta and A-LIGN for a Coffee and Compliance session on ISO 42001 —what it is, what types of organizations need it, and how it works.

Security
Guide
Growing pains: How to update and automate outdated security processes

Has your business outgrown its security processes? Learn how to update them in this guide.

Get compliant and
build trust, fast.

Two wind turbines on a white background.
Get compliant and build trust,
fast.
Get started