Understanding the HIPAA Security Rule for Websites

The Security Rule is the most technically demanding part of HIPAA for website operators. Here is what it actually requires and how to implement it.

Published April 7, 2026 4 min read

What the Security Rule Covers

The HIPAA Security Rule (45 CFR Part 164, Subparts A and C) establishes national standards for protecting electronic protected health information (ePHI). It applies to covered entities and their business associates, and it governs any electronic system that creates, receives, maintains, or transmits ePHI — which includes websites, web applications, APIs, and the infrastructure they run on.

The rule is organized around three categories of safeguards: administrative, physical, and technical. Each category contains both required and addressable implementation specifications. Required specifications must be implemented as stated. Addressable specifications must be implemented if reasonable and appropriate — if not, the organization must document why an equivalent alternative is in place.


Required vs Addressable Specifications

A common misconception is that "addressable" means optional. It does not. An addressable specification must either be implemented as written or replaced with a documented equivalent measure. Ignoring an addressable specification without documentation is a violation.

For websites, key required specifications include:

  • Unique user identification (each user must have a unique login)
  • Audit controls (logging of access to ePHI systems)
  • PHI integrity mechanisms (ensuring data is not altered improperly)
  • Transmission security (HTTPS/TLS for ePHI in transit)

Key addressable specifications include automatic logoff, encryption of ePHI at rest, and authentication mechanisms. In practice, the risk environment of most web applications makes implementing all of these effectively required.


Risk Analysis: The Foundation of Compliance

The Security Rule's single most important requirement is conducting a thorough risk analysis (§164.308(a)(1)). This is the starting point for all other compliance work and the first thing OCR asks for during an investigation. A risk analysis must:

  • Identify all ePHI your organization creates, receives, maintains, or transmits
  • Identify all reasonably anticipated threats to that ePHI
  • Assess the likelihood and impact of each threat
  • Assess current controls and their effectiveness
  • Document findings and assign risk levels

For websites, the risk analysis must explicitly cover web application vulnerabilities, third-party integrations, server infrastructure, and data transmission pathways. The analysis must be updated whenever operations or the threat landscape changes significantly.


Workforce Controls and Training

Even the most technically secure website can be compromised by human error. The Security Rule requires workforce security training, access management, and sanction policies for violations. For web-focused teams, this means:

  • Training developers and administrators on HIPAA requirements before they access systems with ePHI
  • Implementing least-privilege access — developers should not have production database access unless required
  • Establishing a sanction policy that is actually enforced when employees violate HIPAA policies
  • Documenting all access grants, modifications, and terminations
  • Conducting security awareness training annually at minimum

Contingency Planning for Websites

The Security Rule requires a contingency plan covering data backup, disaster recovery, and emergency mode operations. For websites handling ePHI, this translates to:

  • Automated, encrypted backups of all databases containing ePHI
  • Tested restore procedures with documented recovery time objectives (RTOs)
  • A documented plan for continuing operations if your primary hosting environment is unavailable
  • Regular testing of backup integrity — not just backup creation

Many small practices overlook contingency planning until an incident occurs. A hosting outage that results in loss of patient records can trigger breach notification obligations if data cannot be recovered.

Check your site for free — Instant HIPAA compliance scan, no signup required.
Scan Now

Frequently Asked Questions

Does the Security Rule apply to business associates?
Yes. Since the HITECH Act of 2009, business associates are directly liable under the HIPAA Security Rule. This means your web developer, hosting provider, and any SaaS vendor with access to ePHI must comply with the Security Rule independently — not just through contractual BAA requirements, but as a matter of law.
What is the difference between ePHI and PHI?
PHI (Protected Health Information) is any individually identifiable health information held by a covered entity or business associate. ePHI is PHI that is created, stored, transmitted, or received in electronic form. The Security Rule applies specifically to ePHI. The Privacy Rule applies to all PHI, including paper records and verbal communications.
How often must a HIPAA risk analysis be updated?
HHS guidance states that risk analysis is an ongoing process. A formal update should occur when operations change significantly (new systems, new services, new vendors), when known threats evolve, after a security incident, and at minimum on an annual basis. The risk analysis must be documented and retained for at least six years.
Are encryption requirements mandatory under the Security Rule?
Encryption of ePHI at rest is an addressable specification, meaning you must implement it or document why an equivalent alternative is sufficient. Transmission security (encryption in transit via HTTPS/TLS) is required. In practice, the OCR has consistently treated the failure to encrypt stored ePHI without documented justification as a violation, making encryption effectively required for most organizations.

Related Articles