![](https://suchlaw.com/wp-content/uploads/2025/02/v2-phpyf-88rpl.jpg)
More than two decades have passed since the establishment of the HIPAA Security Rule, which laid the groundwork for safeguarding electronic protected health information (ePHI).
However, as both technology and cybersecurity threats have evolved dramatically, the deficiencies in the current Security Rule have come to light.
This gap has diminished its effectiveness in tackling the heightened cyber threats that the healthcare sector now faces.
Proposed Revisions Overview
On December 27, 2024, the Office for Civil Rights (OCR) within the Department of Health and Human Services (HHS) released a Notice of Proposed Rulemaking that outlines significant updates to the HIPAA Security Rule.
These revisions aim to enhance security measures by updating existing standards, better equipping the healthcare industry to respond to the escalating risks of cyber attacks.
A key goal of these updates is to clarify compliance pathways within the Security Rule.
The proposed modifications include substantial changes to the current HIPAA Security Rule.
While these changes may appear complex at first glance, they are intended to align the requirements more closely with established best practices in cybersecurity, as detailed in frameworks like the National Institute of Standards and Technology (NIST) Cybersecurity Framework.
For organizations already following these practices, many new requirements might feel familiar and may have already been implemented.
The real challenge for these entities will likely revolve around new administrative responsibilities.
These responsibilities include updating policies, revising agreements with business associates, adhering to more detailed documentation standards (such as mapping requirements), and strengthening vendor management.
On the other hand, organizations that have struggled with existing Security Rule compliance or that are looking to integrate it with new technologies for managing PHI may face significant demands in terms of both financial investments and human resources to comply with the forthcoming changes.
Key Changes to the HIPAA Security Rule
- The distinction between “Addressable” and “Required” implementation specifications will be removed, making adherence to all aspects of the HIPAA Security Rule mandatory for all organizations.
- Entities are now required to compile a detailed technology asset inventory and develop a network mapping strategy.
Effective data protection hinges on a thorough understanding of where data is stored, who has access, and how it moves through various systems, including those managed by third-party entities.
- Increased specificity in risk analysis requirements will guide organizations in performing thorough assessments of risks and vulnerabilities that could impact the confidentiality, integrity, and availability of ePHI.
This analysis must be closely linked to the technology asset inventory.
- Organizations must formulate plans for incident response and disaster recovery, necessitating documented strategies that ensure essential data can be restored within 72 hours of any disruption.
This requirement underscores the importance of operational resilience in an age of frequent cyber threats.
- Updates to access control measures will help organizations effectively monitor employee access to sensitive information, with protocols in place to immediately revoke access for any departing staff.
- Covered Entities are required to complete annual written checks to confirm that their Business Associates comply with the HIPAA Security Rule.
- Annual audits will be implemented to ensure adherence to the HIPAA Security Rule.
- The proposal introduces essential security controls, which include:
- Mandatory encryption of ePHI in both transit and at rest;
- Implementation of multi-factor authentication requiring two verification methods, such as a password and a physical ID;
- Regular updates and patches for management practices;
- Annual penetration testing;
- Biannual assessments for vulnerabilities;
- Strategies for network segmentation;
- Anti-malware protections; and
- Protocols for backing up and recovering ePHI.
Next Steps in the Process
The Proposed Rule was officially published in the Federal Register on January 6, 2025, initiating a public comment period lasting for 60 days, until March 7, 2025.
Organizations impacted by these regulations should carefully evaluate how the Proposed Rule will affect their systems and practices.
Providing feedback is crucial, as these changes could substantially influence necessary personnel, procedures, and technologies for compliance.
Source: Natlawreview