Your security and compliance glossary

All the terms you need to know when you’re trying to get compliance audit ready, fast.

Show filters

What are the HIPAA Safeguards?

HIPAA Safeguards are the administrative, technical, and physical safeguards that covered entities are required to maintain by the terms of the HIPAA Security Rule to protect individuals’ electronic protected health information (ePHI).

The Security Rule defines Administrative Safeguards as “administrative actions, and policies and procedures, to manage the selection, development, implementation, and maintenance of security measures to protect electronic protected health information and to manage the conduct of the covered entity’s workforce in relation to the protection of that information.” The Administrative Safeguards comprise more than half of the HIPAA Security Requirements. Administrative Safeguards include: 

  • Implementation of a Security Management Process
  • Designation of Security Personnel
  • Implementation of Information Access Management policies and procedures for authorizing access to ePHI
  • Provision of Workforce Training and Management
  • Performance of regular Evaluations against the requirements of the Security Rule

The Security Rule defines Technical Safeguards as “the technology and the policy and procedures for its use that protect electronic protected health information and control access to it.” The Technical Safeguards include:

  • Implementation of Access Control policies and procedures that allow only authorized persons to access ePHI
  • Implementation of Audit Controls to record and examine access and other activity in information systems that contain or use ePHI
  • Implementation of Integrity Controls, policies, and procedures to ensure ePHI is not destroyed or improperly altered
  • Implementation of technical security measures to ensure Transmission Security—guarding against unauthorized access to ePHI transmitted over an electronic network

The Security Rule defines Physical Safeguards as “physical measures, policies, and procedures to protect a covered entity’s electronic information systems and related buildings and equipment, from natural and environmental hazards, and unauthorized intrusion.” The Physical Safeguards include:

  • Management of Facility Access and Control, a covered entity must limit physical access to its facilities while ensuring that authorized access is allowed
  • Implementation of Workstation and Device Security policies and procedures to specify proper use of and access to workstations and electronic media

{{cta_withimage13="/cta-modules"}}

Additional resources you might like:

GRC
Events
The New Growth Playbook: How GRC Unlocks Trust and Speed at Scale

Join experts from Vanta, and Sensiba for a practical discussion on how to evolve your approach to risk and compliance — turning it from a blocker into a business accelerator.

Comparisons and reviews
Blog
Why enterprise leaders choose Vanta over Drata to prove and manage trust

Learn how Vanta is uniquely equipped to meet the needs of large, complex organizations.

SOC 2
Events
Demo: Automating Compliance for SOC 2, ISO 27001, HIPAA, and More

Join our demo to learn how Vanta helps organizations streamline compliance for frameworks like SOC 2, ISO 27001, HIPAA, and more.

Additional resources you might like:

GRC
Events
The New Growth Playbook: How GRC Unlocks Trust and Speed at Scale

Join experts from Vanta, and Sensiba for a practical discussion on how to evolve your approach to risk and compliance — turning it from a blocker into a business accelerator.

Comparisons and reviews
Blog
Why enterprise leaders choose Vanta over Drata to prove and manage trust

Learn how Vanta is uniquely equipped to meet the needs of large, complex organizations.

SOC 2
Events
Demo: Automating Compliance for SOC 2, ISO 27001, HIPAA, and More

Join our demo to learn how Vanta helps organizations streamline compliance for frameworks like SOC 2, ISO 27001, HIPAA, and more.

Vendor Risk Management
Events
Demo: Navigating Third-Party Risk Through Vanta’s Vendor Risk Management

Register for our product demo that will showcase Vanta’s Vendor Risk Management Solution.

GRC
Events
Turning Chaos Into Clarity: Continuous Security at Scale

Watch this on-demand demo to learn how automated, continuous trust management replaces manual processes, helps you stay audit-ready, strengthens risk insights, and turns your GRC program into a business advantage.

SOC 2
Events
Demo: Automating SOC 2, ISO 27001 & More with Vanta

Watch this on-demand demo that will showcase how Vanta simplifies compliance, centralises security workflows, and automates evidence collection across 35+ frameworks like SOC 2, ISO 27001 and more.

GRC
Events
The New Rules of Trust: Compliance, Risk, and AI

Watch on-demand as Ashish Rajan, CISO at Kaizenteq (and host of the Cloud Security Podcast), and Faisal Khan, GRC Subject Matter Expert at Vanta have a tactical conversation on what it really takes to mature compliance, risk, and trust in the age of AI.

Compliance
Guide / Report
The ultimate guide to FedRAMP: A requirements guide for authorization

Learn about FedRAMP authorization, from impact levels to compliance steps, to unlock opportunities with U.S. federal agencies.

Compliance
Events
Secure from the Start: How Founders Build Compliance Into Early-Stage Growth

Hear from the Head of Information Security at Robin AI and the Co-Founder & CEO of Pavlov as they share how they embedded security and compliance into their startup journey, without slowing down innovation.