Your security and compliance glossary

All the terms you need to know when you’re trying to get compliance audit ready, fast.

Show filters

What is the HIPAA Security Rule?

The HIPAA Security Rule is a 2005 addition to the original Health Insurance Portability and Accountability Act of 1996 (HIPAA). HIPAA required the Secretary of the US Department of Health and Human Services (HHS) to develop regulations protecting the privacy and security of certain health information. 


The HIPAA Security Rule operationalizes the protections contained in the HIPAA Privacy Rule by addressing the administrative, physical, and technical safeguards that organizations called covered entities must put in place to secure individuals’ electronic protected health information or ePHI.


Specifically, covered entities must:

  • Ensure the confidentiality, integrity, and availability of all ePHI they create, receive, maintain, or transmit
  • Identify and protect against reasonably anticipated threats to the security or integrity of the information
  • Protect against reasonably anticipated, impermissible uses or disclosures
  • Ensure compliance by their workforce


A primary goal of the Security Rule is to protect the privacy of individuals’ health information while allowing covered entities to adopt new technologies to improve the quality and efficiency of patient care. The Security Rule is designed to be flexible and scalable so a covered entity can implement policies, procedures, and technologies appropriate for the entity’s size, organizational structure, and risks to consumers’ ePHI.

Additional resources you might like:

Security
Event

Scaling Security Mammoth

In this on-demand webinar you'll learn: How being ISO 27001 certified benefits your business The five main requirements in the certification process How automation can lead to a more cost-effective path to ISO 27001 compliance The value of continuous security monitoring during the two-year surveillance audit

Security
Event

Coffee & Compliance: What is your secrets strategy?

Join Rob Picard, Security Lead at Vanta, and Brian Vallelunga, CEO and Founder of Doppler for the newest episode of Coffee & Compliance as they reveal secrets… about secrets strategy.

Security
Blog

Vulnerability scanning tools: What are they and how should they be used?

Keeping your data secure relies on tracking down and fixing vulnerabilities. Find those open doors in your system with vulnerability scanning tools.

Get compliant and
build trust, fast.