Your security and compliance glossary

All the terms you need to know when you’re trying to get compliance audit ready, fast.

Show filters

What is the HIPAA Privacy Rule?

The HIPAA Privacy Rule is a 2003 addition to the original Health Insurance Portability and Accountability Act of 1996 (HIPAA). HIPAA required the Secretary of the US Department of Health and Human Services (HHS) to develop regulations protecting the privacy and security of certain health information. 


The HIPAA Privacy Rule sets national standards to safeguard individuals’ medical records and other protected health information (PHI) and establishes when PHI may be used and disclosed. The HIPAA Privacy Rule applies to health plans, health care clearinghouses, and health care providers that conduct certain health care transactions electronically. 


The HIPAA Privacy Rule requires appropriate safeguards to protect the privacy of personal health information and sets limits and conditions on the uses and disclosures of such information without patient authorization. The Privacy Rule also gives patients rights over their health information, including rights to examine and obtain a copy of their health records and  request corrections.


Companies seeking to establish and maintain HIPAA compliance must fulfill the requirements of the initial Act of 1996, its subsequent amendments and additions—including the HIPAA Privacy Rule—and any related legislation.

Additional resources you might like:

Vendor Risk Management
Events
AI broke your Third Party Risk Management program. Now what?

In this webinar, we'll show you exactly where traditional TPRM breaks down in an AI-first world, and how one team rebuilt their program to actually keep up.

Compliance
Events
Learn how to automate compliance for SOC 2, ISO 27001, and more

Register to learn how Vanta’s Agentic Trust Platform helps fast-moving startups and security teams get audit-ready fast and stay continuously compliant.

Compliance
Blog
How do you perform quarterly access reviews?

Without periodic access reviews, former employees may retain access to sensitive data after termination. Learn how to perform effective quarterly access reviews.

Additional resources you might like:

Vendor Risk Management
Events
AI broke your Third Party Risk Management program. Now what?

In this webinar, we'll show you exactly where traditional TPRM breaks down in an AI-first world, and how one team rebuilt their program to actually keep up.

Compliance
Events
Learn how to automate compliance for SOC 2, ISO 27001, and more

Register to learn how Vanta’s Agentic Trust Platform helps fast-moving startups and security teams get audit-ready fast and stay continuously compliant.

Compliance
Blog
How do you perform quarterly access reviews?

Without periodic access reviews, former employees may retain access to sensitive data after termination. Learn how to perform effective quarterly access reviews.

Product updates
Events
Turn Every Promise into Predictable Trust: Customer Commitments in Action

Join us for a live demo of Customer Commitments and see how Vanta turns contracts into structured, actionable intelligence.

SOC 2
Events
SOC 2 Basics: A 30 Minute Guide for Startups

Watch on demand to get a clear, founder-friendly intro to SOC 2 in just 30 minutes.

Compliance
Blog
Government contracting compliance 101: Everything you should know

Understand the regulations and standards government contractors must meet—and the challenges involved.

Compliance
Events
Beyond the Checkbox: Scaling Compliance Across European Regulations

Watch to learn how to scale your compliance program across NIS2, DORA, and the EU AI Act — without duplicating controls or overwhelming your team.

GDPR
Blog
How to make your website GDPR compliant in 8 steps

Learn the essential steps to achieve GDPR compliance for your website. Click here to learn the requirements and organizational benefits of GDPR compliance.

Compliance
Blog
Compliance risk: A guide to assess and manage it effectively

A guide to help you navigate the growing complexity of managing compliance risk.