Your security and compliance glossary

All the terms you need to know when you’re trying to get compliance audit ready, fast.

Show filters

What is the HIPAA Security Rule?

The HIPAA Security Rule is a 2005 addition to the original Health Insurance Portability and Accountability Act of 1996 (HIPAA). HIPAA required the Secretary of the US Department of Health and Human Services (HHS) to develop regulations protecting the privacy and security of certain health information. 


The HIPAA Security Rule operationalizes the protections contained in the HIPAA Privacy Rule by addressing the administrative, physical, and technical safeguards that organizations called covered entities must put in place to secure individuals’ electronic protected health information or ePHI.


Specifically, covered entities must:

  • Ensure the confidentiality, integrity, and availability of all ePHI they create, receive, maintain, or transmit
  • Identify and protect against reasonably anticipated threats to the security or integrity of the information
  • Protect against reasonably anticipated, impermissible uses or disclosures
  • Ensure compliance by their workforce


A primary goal of the Security Rule is to protect the privacy of individuals’ health information while allowing covered entities to adopt new technologies to improve the quality and efficiency of patient care. The Security Rule is designed to be flexible and scalable so a covered entity can implement policies, procedures, and technologies appropriate for the entity’s size, organizational structure, and risks to consumers’ ePHI.

Additional resources you might like:

Compliance
Events
Navigating Fintech Compliance in an Evolving Regulatory Landscape

Join Vanta and Codat for a deep-dive on how to future-proof your fintech’s compliance strategy and transform it into a competitive advantage. 

GRC
Events
The New Growth Playbook: How GRC Unlocks Trust and Speed at Scale

Join experts from Vanta, and Sensiba for a practical discussion on how to evolve your approach to risk and compliance — turning it from a blocker into a business accelerator.

SOC 2
Events
Demo: Automating Compliance for SOC 2, ISO 27001, HIPAA, and More

Join our demo to learn how Vanta helps organizations streamline compliance for frameworks like SOC 2, ISO 27001, HIPAA, and more.

Additional resources you might like:

Compliance
Events
Navigating Fintech Compliance in an Evolving Regulatory Landscape

Join Vanta and Codat for a deep-dive on how to future-proof your fintech’s compliance strategy and transform it into a competitive advantage. 

GRC
Events
The New Growth Playbook: How GRC Unlocks Trust and Speed at Scale

Join experts from Vanta, and Sensiba for a practical discussion on how to evolve your approach to risk and compliance — turning it from a blocker into a business accelerator.

SOC 2
Events
Demo: Automating Compliance for SOC 2, ISO 27001, HIPAA, and More

Join our demo to learn how Vanta helps organizations streamline compliance for frameworks like SOC 2, ISO 27001, HIPAA, and more.

Vendor Risk Management
Events
Demo: Navigating Third-Party Risk Through Vanta’s Vendor Risk Management

Watch this on-demand demo to learn how Vanta’s Vendor Risk Management solution automates and streamlines security reviews so that you can spend less time on repetitive work and more time strengthening your security posture.

GRC
Events
Turning Chaos Into Clarity: Continuous Security at Scale

Watch this on-demand demo to learn how automated, continuous trust management replaces manual processes, helps you stay audit-ready, strengthens risk insights, and turns your GRC program into a business advantage.

SOC 2
Events
Demo: Automating SOC 2, ISO 27001 & More with Vanta

Watch this on-demand demo that will showcase how Vanta simplifies compliance, centralises security workflows, and automates evidence collection across 35+ frameworks like SOC 2, ISO 27001 and more.

Product updates
Events
Vanta Office Hour: Unlock the Power of Vanta AI

Check out this on-demand session designed to help you get more out of Vanta AI. We'll take you behind the scenes with a product demo.

Compliance
Guide / Report
The ultimate guide to FedRAMP: A requirements guide for authorization

Learn about FedRAMP authorization, from impact levels to compliance steps, to unlock opportunities with U.S. federal agencies.

Compliance
Events
Secure from the Start: How Founders Build Compliance Into Early-Stage Growth

Hear from the Head of Information Security at Robin AI and the Co-Founder & CEO of Pavlov as they share how they embedded security and compliance into their startup journey, without slowing down innovation.