Your security and compliance glossary

All the terms you need to know when you’re trying to get compliance audit ready, fast.

Show filters

What are the HIPAA Safeguards?

HIPAA Safeguards are the administrative, technical, and physical safeguards that covered entities are required to maintain by the terms of the HIPAA Security Rule to protect individuals’ electronic protected health information (ePHI).

The Security Rule defines Administrative Safeguards as “administrative actions, and policies and procedures, to manage the selection, development, implementation, and maintenance of security measures to protect electronic protected health information and to manage the conduct of the covered entity’s workforce in relation to the protection of that information.” The Administrative Safeguards comprise more than half of the HIPAA Security Requirements. Administrative Safeguards include: 

  • Implementation of a Security Management Process
  • Designation of Security Personnel
  • Implementation of Information Access Management policies and procedures for authorizing access to ePHI
  • Provision of Workforce Training and Management
  • Performance of regular Evaluations against the requirements of the Security Rule

The Security Rule defines Technical Safeguards as “the technology and the policy and procedures for its use that protect electronic protected health information and control access to it.” The Technical Safeguards include:

  • Implementation of Access Control policies and procedures that allow only authorized persons to access ePHI
  • Implementation of Audit Controls to record and examine access and other activity in information systems that contain or use ePHI
  • Implementation of Integrity Controls, policies, and procedures to ensure ePHI is not destroyed or improperly altered
  • Implementation of technical security measures to ensure Transmission Security—guarding against unauthorized access to ePHI transmitted over an electronic network

The Security Rule defines Physical Safeguards as “physical measures, policies, and procedures to protect a covered entity’s electronic information systems and related buildings and equipment, from natural and environmental hazards, and unauthorized intrusion.” The Physical Safeguards include:

  • Management of Facility Access and Control, a covered entity must limit physical access to its facilities while ensuring that authorized access is allowed
  • Implementation of Workstation and Device Security policies and procedures to specify proper use of and access to workstations and electronic media

{{cta_withimage13="/cta-modules"}}

Additional resources you might like:

Comparisons and reviews
Blog
Best TPRM software for 2026

Discover the best third-party risk management software solutions for 2026.

Compliance
Events
Getting Ready for APRA CPS 230/234 Compliance

Join our Q&A-led session that will highlight the most common CPS 234 readiness questions, and explore how CPS 230 builds on these foundations.

Comparisons and reviews
Blog
The best SOC 2 compliance software for 2026

Discover the best ISO 27001 compliance software options for 2026: Vanta, Drata, Secureframe, Devle and Sprinto.

Additional resources you might like:

Comparisons and reviews
Blog
Best TPRM software for 2026

Discover the best third-party risk management software solutions for 2026.

Compliance
Events
Getting Ready for APRA CPS 230/234 Compliance

Join our Q&A-led session that will highlight the most common CPS 234 readiness questions, and explore how CPS 230 builds on these foundations.

Comparisons and reviews
Blog
The best SOC 2 compliance software for 2026

Discover the best ISO 27001 compliance software options for 2026: Vanta, Drata, Secureframe, Devle and Sprinto.

Comparisons and reviews
Blog
The best ISO 27001 compliance software for 2026

Discover the best ISO 27001 compliance software options for 2026, including Vanta.

Compliance
Blog
What is vendor compliance, and why does it matter?

Learn about vendor compliance and its key regulations and requirements across industries.

Compliance
Blog
CRI Cyber Profile: A complete guide for financial institutions

Get in-depth insights into the CRI Cyber Profile and what it means for financial institutions.

Compliance
Blog
How to choose the right AI standard: A 7-point guide

Discover the seven essential questions that help you choose an AI standard for your organization.

Compliance
Blog
Government contracting compliance 101: Everything you should know

Understand the regulations and standards government contractors must meet—and the challenges involved.

Compliance
Events
Beyond Compliance: Building a Scalable Trust Program with Vanta

Join us to see how high-growth companies use Vanta to build trust, stay audit-ready, and scale with confidence.