Your security and compliance glossary

All the terms you need to know when you’re trying to get compliance audit ready, fast.

Show filters

What are the rules of HIPAA?

The Health Insurance Portability and Accountability Act (HIPAA) is composed of a number of standards or rules by which compliance can be monitored. HIPAA Rules include the Privacy, Security, and Breach Notification Rules, as well the Transactions and Code Set Standards, Identifier Standards, Enforcement Rule, Omnibus Final Rule, and the HITECH Act.


The HIPAA Privacy Rule sets national standards to safeguard individuals’ medical records and other protected health information (PHI), and establishes when PHI may be used and disclosed. The HIPAA Security Rule specifies safeguards to protect the confidentiality, integrity, and availability of electronic protected health information (ePHI). The HIPAA Breach Notification Rule requires that, in the event of a breach of unsecured PHI, notification of the breach is communicated to affected individuals, the U.S. Department of Health & Human Services (HHS), and in some cases, the media. HIPAA Rules apply to covered entities and business associates.

It is important that organizations that work in or with the healthcare industry, or that have access to protected health information (PHI), are aware of the HIPAA Rules and adhere to their standards. Adhering to the HIPAA Rules will help ensure that an organization is protecting the privacy and security of patients’ PHI, and is prepared to alert required individuals and institutions in the case of an incident of non-compliance.

Additional resources you might like:

Compliance
Blog
Government contracting compliance 101: Everything you should know

Understand the regulations and standards government contractors must meet—and the challenges involved.

SOC 2
Events
Learn How to Automate Compliance for SOC 2, ISO 27001, and More

Register to see how Vanta helps fast-moving startups and security teams get audit-ready fast and stay continuously compliant, turning compliance into a deal accelerator, not a blocker.

Compliance
Events
Beyond the Checkbox: Scaling Compliance Across European Regulations

Register to learn how to scale your compliance program across NIS2, DORA, and the EU AI Act — without duplicating controls or overwhelming your team.

Additional resources you might like:

Compliance
Blog
Government contracting compliance 101: Everything you should know

Understand the regulations and standards government contractors must meet—and the challenges involved.

SOC 2
Events
Learn How to Automate Compliance for SOC 2, ISO 27001, and More

Register to see how Vanta helps fast-moving startups and security teams get audit-ready fast and stay continuously compliant, turning compliance into a deal accelerator, not a blocker.

Compliance
Events
Beyond the Checkbox: Scaling Compliance Across European Regulations

Register to learn how to scale your compliance program across NIS2, DORA, and the EU AI Act — without duplicating controls or overwhelming your team.

Compliance
Blog
Compliance risk: A guide to assess and manage it effectively

A guide to help you navigate the growing complexity of managing compliance risk.

Product updates
Events
Goodbye, Audit Chaos. Hello, Calm-pliance.

Register for this edition of Vanta Delivers to see how we’re putting audit chaos behind us and moving forward into Calm-pliance.

Product updates
Blog
New in Vanta | February 2026

Vanta’s latest releases give teams more control over audits, automated TPRM evidence collection, and more.

Comparisons and reviews
Blog
The best TPRM software for 2026

Discover the best third-party risk management software solutions for 2026.

Compliance
Events
Getting Ready for APRA CPS 230/234 Compliance

Watch this on demand session to learn the most common CPS 234 readiness questions, and undersand how CPS 230 builds on these foundations.

Comparisons and reviews
Blog
The best SOC 2 compliance software for 2026

Here are the best SOC 2 compliance software platforms, including Vanta and others.