Health care facilities must provide three types of safeguards under the HIPAA Security Rule: administrative, physical, and technical. Together, these safeguards protect electronic protected health information (ePHI) from unauthorized access, alteration, and loss. Every covered entity, from a solo dental practice to a large hospital system, is required to have all three in place.
Administrative Safeguards
Administrative safeguards are the policies, procedures, and workforce management practices that govern how a facility handles patient information. They form the largest and most detailed category of HIPAA requirements, covering nine distinct standards. The core idea is straightforward: before you can protect data with locks or software, you need clear rules and trained people.
The foundation of administrative safeguards is the security management process. This requires every facility to conduct a thorough risk analysis, identifying where ePHI lives, how it moves, and what could go wrong. Based on that analysis, the facility must implement risk management measures that reduce vulnerabilities to a reasonable level. It also needs a sanction policy (consequences for employees who violate security rules) and a system for regularly reviewing activity logs on information systems.
Beyond risk management, administrative safeguards require facilities to:
- Assign a security official who is responsible for developing and implementing the security program
- Control workforce access so that only employees who need patient data for their job can reach it
- Train all staff on security awareness, including management, with periodic retraining whenever systems or operations change
- Establish incident procedures for identifying, responding to, and documenting security breaches
- Create contingency plans that include data backups, disaster recovery, and emergency-mode operations so patient information stays accessible even during a crisis
- Evaluate compliance on a regular basis to make sure safeguards are actually working
Facilities that work with outside vendors, such as billing companies or cloud storage providers, must also have written business associate agreements that hold those partners to the same security standards.
Physical Safeguards
Physical safeguards are the measures that protect a facility’s buildings, equipment, and hardware from unauthorized access, theft, and environmental hazards like floods or fires. The HIPAA Security Rule defines them as “physical measures, policies, and procedures to protect a covered entity’s electronic information systems and related buildings and equipment, from natural and environmental hazards, and unauthorized intrusion.”
In practical terms, this means controlling who can physically enter areas where ePHI is stored or accessed. A server room, for instance, should have locked doors with access limited to authorized personnel. A workstation in a busy clinic hallway needs positioning or privacy screens so that passersby can’t read patient records on the monitor. Facilities must also have policies for workstation use that specify how and where devices can be operated.
Device and media controls round out this category. When a facility retires a computer, donates old equipment, or disposes of a hard drive, it needs procedures to ensure all ePHI is permanently removed. The same applies to portable devices like USB drives and backup tapes. Physical safeguards also cover the movement of hardware within a facility, requiring documentation when equipment containing patient data changes hands or locations.
Technical Safeguards
Technical safeguards are the technology tools and related policies that directly protect ePHI within electronic systems. They cover four main standards: access control, audit controls, integrity, and transmission security.
Access control is the most detailed. Every user who touches a system containing patient data must have a unique login identifier so the facility can track who accessed what and when. Systems must include emergency access procedures so clinicians can still reach critical patient information during a crisis. Two additional specifications, automatic logoff after a period of inactivity and encryption of stored data, are “addressable,” meaning facilities must either implement them or document why an alternative measure works just as well.
Audit controls require facilities to deploy mechanisms that record and examine activity in any system containing ePHI. Think of it as a digital security camera: the system logs who logged in, what records they viewed, and what changes they made.
The integrity standard protects ePHI from being improperly altered or destroyed. Facilities need electronic mechanisms that can confirm data hasn’t been tampered with, whether it’s sitting in a database or moving between systems. Transmission security builds on this by requiring safeguards against unauthorized access to ePHI traveling over a network, such as when a lab sends results to a physician’s office. Encryption of data in transit is addressable here as well.
Required vs. Addressable Specifications
Not every HIPAA implementation specification works the same way. Some are labeled “required,” meaning there is no flexibility: the facility must implement them, period. Unique user identification and emergency access procedures fall into this category.
Others are labeled “addressable,” which does not mean optional. When a specification is addressable, the facility must assess whether it’s reasonable and appropriate given its size, technical infrastructure, and resources. If it is, the facility implements it. If not, the facility can either adopt an equivalent alternative measure or, in rare cases, choose not to implement it at all. The critical requirement is documentation. Every decision about an addressable specification must be recorded in writing, including the factors considered and the risk assessment that informed the choice.
This flexibility exists by design. A two-physician family practice has different resources and risks than a 500-bed hospital. The Security Rule uses scalable, technology-neutral principles so that both can comply in ways consistent with their circumstances. Factors like cost, organizational size, and existing technical infrastructure all play a role in what counts as “reasonable and appropriate.”
Penalties for Non-Compliance
The Office for Civil Rights (OCR) at HHS enforces HIPAA and applies a four-tier penalty structure based on the level of negligence involved. At the lowest tier, where a facility genuinely didn’t know about a violation, fines start at $141 per violation. At the highest tier, where willful neglect goes uncorrected for more than 30 days, the minimum jumps to $71,162 per violation, with a maximum of $2,134,831. All four tiers share a calendar-year cap of $2,134,831 for violations of a single provision.
These penalties apply to failures across all three safeguard categories. A facility that never conducted a risk analysis faces enforcement just as a facility that left a server room unlocked or failed to encrypt transmitted data would. In practice, incomplete risk analysis is one of the most common findings in OCR investigations, making administrative safeguards the area where many facilities first fall short.

