Key Takeaways:
- HIPAA compliance for software development is not a one-time certification — it is an architecture decision, a development practice, a deployment strategy, and an ongoing operational commitment that affects every layer of your application.
- The 2026 HIPAA Security Rule update introduces the most significant changes since the HITECH Act: encryption is no longer “addressable” — it is required for all ePHI. MFA is mandatory for all users accessing systems containing ePHI. Continuous monitoring replaces annual-only risk assessments.
- HIPAA’s four rules — Privacy, Security, Breach Notification, and Omnibus — each impose different obligations on software developers. The Security Rule’s technical safeguards (access controls, audit logs, encryption, integrity controls, transmission security) are the ones that directly shape your code and architecture.
- Every third-party vendor that touches PHI must execute a Business Associate Agreement (BAA) before any data flows. This includes your cloud provider, monitoring tools, analytics platforms, email services, and your development partner.
- HIPAA violation penalties range from $141 per violation (unknowing) to $2.13 million per violation category per year (willful neglect). A single data breach can trigger penalties across multiple categories simultaneously.
What Is HIPAA and Why It Matters for Software Development
The Health Insurance Portability and Accountability Act (HIPAA) is a federal law enacted in 1996 that establishes national standards for protecting the privacy and security of individually identifiable health information. For software developers, HIPAA compliance means building applications that meet strict requirements for how protected health information (PHI) is created, received, stored, transmitted, and accessed.
HIPAA applies to your software if it will be used by a HIPAA covered entity (healthcare providers, health plans, healthcare clearinghouses) or a business associate, AND the software will create, receive, store, or transmit PHI in any form.
The consequences of non-compliance are severe. In 2024 alone, over 540 organizations reported health data breaches to the HHS Office for Civil Rights, affecting more than 112 million individuals. Penalties for HIPAA violations range from $141 per violation for unknowing infractions up to $2.13 million per violation category per year for willful neglect. Beyond financial penalties, breaches destroy patient trust and can permanently damage an organization’s reputation.
HIPAA compliance is not something you bolt onto a finished application. It starts at the architecture level and influences every decision from database design to API authentication to deployment infrastructure. Organizations that treat compliance as an afterthought consistently spend 2–3x more on remediation than those that build it in from day one.
For a broader view of how HIPAA fits into the overall healthcare software development landscape, see our Healthcare Software Development Guide.
HIPAA Rules Overview: Privacy, Security, Breach Notification, Omnibus
HIPAA is not a single regulation — it is a framework of rules, each addressing different aspects of health information protection. Software developers need to understand all four.
The Privacy Rule
The Privacy Rule governs how PHI can be used and disclosed. For software developers, the key requirements include the Minimum Necessary Standard (your application should only access the minimum PHI necessary to accomplish its purpose), patient rights to access and amend their records, requirements for consent and authorization before sharing PHI, and restrictions on using PHI for marketing or research without explicit authorization.
The Security Rule
The Security Rule is the most technically relevant rule for software development. It requires covered entities and business associates to implement administrative, physical, and technical safeguards to protect electronic PHI (ePHI). This is where encryption, access controls, audit logging, and all the technical implementation requirements live. Sections 4, 5, and 6 of this guide cover each safeguard category in detail.
The Breach Notification Rule
The Breach Notification Rule requires covered entities to notify affected individuals, the HHS Secretary, and in some cases the media within 60 days of discovering a breach of unsecured PHI. For developers, this means building detection and alerting systems that can identify unauthorized access, providing comprehensive audit trails for forensic investigation, and supporting the notification workflow when breaches occur.
The Omnibus Rule
The Omnibus Rule (2013) expanded HIPAA’s reach to business associates and their subcontractors, increased penalties for non-compliance, and strengthened breach notification requirements. For software vendors, the critical implication is that if your software has persistent access to PHI, you are a business associate and must comply with all applicable HIPAA regulations — not just the technical ones.
2026 Security Rule Updates: What Changed
The 2026 update to the HIPAA Security Rule introduces the most significant changes since the HITECH Act of 2009. These changes directly affect how healthcare software is built, deployed, and maintained.
Encryption Is Now Required (Not Addressable)
Previously, encryption was an “addressable” implementation specification — meaning organizations could document why an alternative measure was reasonable and appropriate. Under the 2026 rule, encryption is mandatory for all ePHI at rest and in transit. There are no exceptions. All data storage must use AES-256 or equivalent encryption. All data transmission must use TLS 1.2 or higher. Full disk encryption is required for any device or server that stores ePHI.
MFA Is Mandatory
Multi-factor authentication is now required for all users accessing systems containing ePHI. This applies to web applications, mobile apps, API access, and administrative interfaces. Acceptable MFA methods include biometric authentication (Face ID, Touch ID), hardware tokens or authenticator apps, and one-time codes via SMS (though hardware-based methods are preferred).
Continuous Monitoring Replaces Annual-Only Assessments
Annual risk assessments are no longer sufficient as a standalone practice. The 2026 rule requires continuous monitoring of systems containing ePHI, real-time intrusion detection and alerting, regular vulnerability scanning (not just annual penetration testing), and documented patch management timelines with enforcement.
What This Means for Developers
Every healthcare application built or updated in 2026 must treat encryption and MFA as baseline requirements — not optional features. Applications that previously relied on password-only authentication need to be retrofitted. Infrastructure that stores ePHI without full encryption must be remediated. For guidance on implementing these requirements in your specific technology stack, Taction provides HIPAA-compliant app development services with the 2026 rule changes built in from day one.
Technical Safeguards: The Developer’s Checklist
The Security Rule’s technical safeguards are the requirements that directly translate into code, configuration, and architecture decisions.
Access Controls (§ 164.312(a))
Access controls restrict who can access ePHI and what they can do with it. Implementation requirements include unique user identification (every user must have a unique ID — no shared accounts), emergency access procedures (documented process for accessing ePHI during emergencies), automatic logoff (sessions must timeout after a configurable period of inactivity), and encryption and decryption (all ePHI must be encrypted at rest and decryptable only by authorized users).
In practice, this means implementing Role-Based Access Control (RBAC) where permissions are assigned to roles rather than individuals, enforcing the principle of least privilege across all user types, maintaining a centralized identity management system, and logging every access grant and revocation.
Audit Controls (§ 164.312(b))
Audit controls require recording and examining all activity in systems containing ePHI. Your audit logging must capture who accessed what data and when, what action was performed (read, write, modify, delete), from what device and IP address, whether the access was successful or denied, and any changes to system configuration or user permissions.
Audit logs must be tamper-proof — stored in write-once, append-only storage — and retained for a minimum of six years. They must be reviewable on demand for compliance audits and security investigations.
Integrity Controls (§ 164.312(c))
Integrity controls protect ePHI from unauthorized alteration or destruction. This requires implementing checksums or digital signatures on stored data, version control for clinical records, database transaction logging with rollback capability, and input validation to prevent injection attacks that could modify data.
Transmission Security (§ 164.312(e))
All ePHI transmitted over networks must be encrypted using TLS 1.2 or higher for all API communications, encrypted VPN connections for administrative access, certificate pinning for mobile applications, and secure WebSocket connections for real-time data (telemedicine, RPM).
Authentication (§ 164.312(d))
The system must verify the identity of any person or entity seeking access to ePHI. Under the 2026 rule, this means MFA is required for all users — not just administrators. Implement authentication using industry-standard protocols (OAuth 2.0, SAML 2.0, OpenID Connect) and consider SMART on FHIR for clinical application authorization.
For a downloadable version of this checklist, visit our HIPAA Compliance Checklist for Software Development.
Administrative Safeguards: What Your Organization Must Do
Administrative safeguards are the policies, procedures, and organizational requirements that support technical compliance. They are equally important but often overlooked by development teams.
Security Management Process
Every organization handling ePHI must conduct a formal risk analysis identifying vulnerabilities and threats to ePHI, implement a risk management plan to address identified vulnerabilities, maintain a sanction policy for workforce members who violate security policies, and review information system activity (audit logs, access reports, security incident tracking) on a regular basis.
Workforce Security
Organizations must implement procedures for authorizing workforce access to ePHI, clearance procedures for granting access, and termination procedures that revoke access immediately when workforce members leave. This extends to contractors, temporary staff, and development team members with access to production systems or test data containing PHI.
Security Awareness and Training
All workforce members with access to ePHI must receive HIPAA security training at onboarding and regular refresher training thereafter. Training must cover security reminders and updates, procedures for guarding against and detecting malicious software, login monitoring and password management, and procedures for reporting security incidents.
Contingency Planning
Organizations must develop and maintain data backup procedures (daily encrypted backups with offsite storage), a disaster recovery plan (documented and tested procedures for restoring ePHI systems), an emergency mode operation plan (procedures for continuing critical processes during emergencies), and testing and revision procedures (regular testing of contingency plans and updates based on results).
Business Associate Contracts
Every business associate relationship must be governed by a written BAA before any PHI is shared. This is covered in detail in Section 9 of this guide.
Physical Safeguards
Physical safeguards protect the physical infrastructure that houses ePHI. While these are less directly relevant to software developers, they affect infrastructure decisions.
Facility Access Controls
Data centers, server rooms, and any physical location where ePHI is stored or processed must have controlled access with identity verification, visitor logs and escort procedures, and documented procedures for emergency facility access.
Workstation Use and Security
Policies must govern which workstations can access ePHI, how workstations are physically secured (screen locks, cable locks, privacy screens), and remote work security requirements (encrypted VPN, company-managed devices).
Device and Media Controls
Organizations must maintain policies for hardware and media disposal (data wiping, destruction), hardware and media reuse (verified erasure before reassignment), movement of hardware and electronic media (tracking and encryption), and data backup and storage (encrypted offsite backup).
For organizations migrating physical infrastructure to cloud environments, Taction offers healthcare cloud migration services that address both the technical migration and the compliance documentation requirements.
HIPAA Compliance for Cloud Infrastructure
Cloud-native architecture has become the standard deployment model for healthcare software. However, not all cloud services are HIPAA-eligible, and compliance responsibility is shared between the cloud provider and the customer.
The Shared Responsibility Model
Cloud providers (AWS, Azure, GCP) are responsible for the security of the cloud — physical data centers, network infrastructure, and hypervisor security. You are responsible for security in the cloud — operating system configuration, application security, data encryption, access management, and audit logging.
BAA Coverage
Before deploying any ePHI to a cloud platform, you must execute a BAA with the cloud provider. AWS, Azure, and GCP all offer BAAs, but critically, not every service within each platform is covered. Only services explicitly listed in the provider’s BAA documentation may be used with ePHI. Using a non-covered service (even accidentally) creates a compliance violation.
Cloud Architecture Requirements
HIPAA-compliant cloud architecture requires encryption at rest for all storage services (S3, RDS, EBS on AWS; Blob Storage, SQL Database on Azure), encryption in transit for all API calls and data transfers, network isolation using VPCs/VNets with security groups restricting access, logging and monitoring via CloudTrail/CloudWatch (AWS) or Azure Monitor/Azure Sentinel, identity management using IAM roles with least-privilege access policies, and backup and disaster recovery across multiple availability zones or regions.
AWS vs Azure vs GCP for Healthcare
All three major cloud providers support HIPAA workloads. AWS has the broadest set of HIPAA-eligible services (140+) and the longest track record in healthcare. Azure integrates well with Microsoft-centric healthcare organizations and offers strong Active Directory integration. GCP offers competitive pricing and strong data analytics capabilities through BigQuery. The choice depends on your existing technology ecosystem, team expertise, and specific integration requirements.
HIPAA Compliance for Mobile Apps
Mobile healthcare applications face unique compliance challenges due to device-level vulnerabilities, app store distribution requirements, and the blurred line between personal and professional devices.
Data Storage on Devices
PHI stored on mobile devices must be encrypted using hardware-backed encryption (iOS Keychain, Android Keystore). Local databases containing PHI must use encrypted database libraries (SQLCipher or equivalent). Cache and temporary files must be encrypted or purged on session end. Screenshots and app preview images must not display PHI (implement screenshot blocking).
Authentication and Session Management
Mobile apps must implement MFA for all user authentication (2026 requirement), biometric authentication as one MFA factor where available, secure session management with configurable timeout, and remote wipe capability for lost or stolen devices.
Network Security
All network communication must use certificate pinning to prevent man-in-the-middle attacks, encrypted connections (TLS 1.2+) for all API calls, offline mode that encrypts any locally cached PHI, and detection of compromised networks (open WiFi warnings).
App Store Compliance
Both Apple and Google have specific requirements for healthcare apps. Apple requires a privacy nutrition label disclosing data collection, and apps handling health data face additional review scrutiny. Google requires a Data Safety section and compliance with Google Play’s health app policies. Neither app store review constitutes HIPAA compliance — that remains your responsibility entirely.
Push Notification Compliance
Push notifications must never contain PHI. Use generic notifications (“You have a new message”) that require authentication to view the actual content. This applies to both iOS and Android notification systems.
For a deeper dive into mobile-specific HIPAA requirements, see our blog post on HIPAA Compliance for Mobile Apps.
Business Associate Agreements: What Developers Need to Know
A Business Associate Agreement (BAA) is a legally binding contract between a HIPAA covered entity and a business associate (or between two business associates) that establishes the permitted and required uses and disclosures of PHI.
When Is a BAA Required?
A BAA is required whenever a third party creates, receives, maintains, or transmits PHI on behalf of a covered entity. For software development, this includes your development partner (if they have access to production PHI or test data containing PHI), your cloud infrastructure provider (AWS, Azure, GCP), monitoring and logging services that may capture PHI in log data, email services used for patient communication, analytics platforms processing data derived from PHI, and payment processors handling healthcare billing data.
What a BAA Must Include
A BAA must specify the permitted uses and disclosures of PHI, requirements for safeguarding PHI (encryption, access controls, audit logging), breach notification obligations and timelines, requirements for returning or destroying PHI at contract termination, and provisions for HHS audit and compliance verification.
Subcontractor BAAs
Under the Omnibus Rule, business associates must execute BAAs with their own subcontractors who handle PHI. This creates a chain of accountability. If your cloud provider uses a subcontractor for data storage, that subcontractor must also be under a BAA.
Common BAA Mistakes
The most common BAA failures include using cloud services not covered by the provider’s BAA, failing to execute BAAs with monitoring or analytics tools that capture PHI in logs, assuming that de-identified data does not require a BAA (it depends on the de-identification method), and not updating BAAs when the scope of PHI access changes.
HIPAA Audit Preparation: Step-by-Step
Preparing for a HIPAA audit — whether from the HHS Office for Civil Rights (OCR), a client, or a third-party assessor — requires organized documentation and demonstrable compliance across all safeguard categories.
Step 1: Organize Your Documentation
Assemble your complete risk assessment (current within the past year), risk management plan with remediation tracking, all policies and procedures related to PHI handling, workforce training records with completion dates, BAA inventory for all business associate relationships, and incident response plans and breach notification procedures.
Step 2: Verify Technical Controls
Confirm that encryption is implemented for all ePHI at rest and in transit, access controls are configured with least-privilege permissions, MFA is enforced for all users accessing ePHI systems, audit logs are being captured, stored securely, and reviewed regularly, and vulnerability scanning and penetration testing have been conducted within required timeframes.
Step 3: Review Administrative Controls
Verify that workforce security procedures are documented and followed, sanction policies exist and have been communicated, contingency plans (backup, disaster recovery, emergency mode) are documented and tested, and security awareness training is current for all workforce members.
Step 4: Assess Physical Controls
Confirm that facility access controls are in place for all locations housing ePHI systems, device and media disposal procedures are documented, and workstation use and security policies are current.
Step 5: Test Your Breach Response
Conduct a tabletop exercise simulating a breach scenario. Verify that your team can identify the breach, contain it, assess the scope, notify affected parties within the required timeline, and document the entire process.
For a template to structure your risk assessment, download our HIPAA Security Risk Assessment Template.
Common HIPAA Violations in Software Development
Understanding the most common violations helps development teams avoid them proactively.
Insufficient Access Controls
Granting developers broad access to production databases containing PHI, using shared accounts for system administration, or failing to revoke access when team members leave the project. Every individual must have unique credentials with role-appropriate permissions.
Unencrypted PHI in Transit or at Rest
Transmitting PHI over unencrypted connections, storing PHI in unencrypted databases, or using non-encrypted backup storage. Under the 2026 rule, there is no acceptable alternative to encryption.
Inadequate Audit Logging
Failing to log access to PHI, not retaining logs for the required six-year period, using log storage that can be modified or deleted, or not reviewing logs regularly for suspicious activity.
Using Non-BAA-Covered Services
Deploying PHI to cloud services not covered by the provider’s BAA, sending PHI through consumer email services (Gmail, Yahoo) without a BAA, or using analytics tools that capture PHI in logs without a BAA.
PHI in Test Environments
Using production data containing real PHI for testing, development, or QA without proper authorization, de-identification, or equivalent security controls. Test environments must either use properly de-identified data or maintain the same security controls as production.
Missing or Outdated Risk Assessments
Failing to conduct risk assessments, conducting them only at project launch without ongoing updates, or failing to document remediation actions for identified risks.
HIPAA vs SOC 2 vs HITRUST
Healthcare organizations often encounter multiple compliance frameworks. Understanding how they relate helps you prioritize and avoid redundant effort.
| Aspect | HIPAA | SOC 2 | HITRUST CSF |
|---|---|---|---|
| What It Is | Federal law | Voluntary audit framework | Industry certification framework |
| Who Requires It | Required for all PHI handlers | Requested by enterprise clients | Requested by large health systems |
| Scope | PHI protection only | Broad security (5 Trust Principles) | Comprehensive (maps to HIPAA, SOC 2, NIST, ISO) |
| Certification | No official certification | Audit report (Type I or Type II) | Validated assessment + certification |
| Cost | Internal (risk assessment, controls) | $30K – $100K+ for audit | $50K – $200K+ for assessment |
| Timeline | Ongoing | 3–12 months for Type II | 6–18 months for certification |
| Renewals | Continuous compliance | Annual audit | Every 2 years |
HIPAA is non-negotiable — if you handle PHI, you must comply. SOC 2 is increasingly expected by enterprise healthcare clients as proof that your security practices have been independently audited. HITRUST is the most comprehensive but also the most expensive and time-consuming — it is typically pursued by organizations selling to large health systems that mandate it.
Many organizations start with HIPAA compliance, add SOC 2 when enterprise clients require it, and pursue HITRUST only when specific large contracts demand it. Taction Software maintains HIPAA, SOC 2, and ISO 27001 certifications to meet the requirements of healthcare clients at every scale.
For a detailed comparison, see our blog post on SOC 2 vs HIPAA for Healthcare Software.
CTA: Get a Free HIPAA Compliance Assessment Not sure where your application stands on HIPAA compliance? Schedule a free 30-minute assessment with our healthcare compliance architects. We will review your current state, identify gaps, and provide a prioritized remediation roadmap. Book Free HIPAA Assessment →
Related Resources:
- Healthcare Software Development Guide
- HIPAA Compliance Checklist (Free Download)
- HIPAA Compliance Cost for Software Development
- HIPAA Security Risk Assessment Template
- HIPAA-Compliant App Development
- HIPAA Compliance for Mobile Apps (Blog)
- HIPAA Software Development Checklist (Blog)
- SOC 2 vs HIPAA (Blog)
- Healthcare Cloud Migration
- Healthcare Integration Guide: HL7, FHIR & Mirth Connect
- Telemedicine App Development
- Patient Portal Development
- EHR/EMR Development
- Certifications & Compliance
- Case Studies
- Free Consultation
Frequently Asked Questions
No. There is no officially recognized HIPAA certification issued by the federal government. Any vendor claiming their software is “HIPAA certified” is using a marketing term, not a regulatory designation. What you can demonstrate is compliance through documented risk assessments, implemented controls, and third-party audits.
HIPAA compliance typically adds 15–25% to the base development cost. This covers encryption implementation, access control architecture, audit logging infrastructure, penetration testing, compliance documentation, and ongoing risk assessments. For specific cost ranges, see our HIPAA Compliance Cost Guide.
If your mobile app creates, receives, stores, or transmits PHI and is used by or on behalf of a HIPAA covered entity or business associate, then yes — HIPAA applies fully. Consumer wellness apps that do not involve covered entities may not be subject to HIPAA but may fall under FTC regulations.
HIPAA references NIST standards and recommends AES-128 or AES-256 encryption. In practice, AES-256 has become the industry standard for healthcare applications. TLS 1.2 or higher is required for data in transit. Under the 2026 Security Rule, encryption is mandatory — not addressable.
Yes. If your cloud provider stores, processes, or transmits ePHI on your behalf, you must have a signed BAA in place before any PHI is deployed. AWS, Azure, and GCP all offer BAAs, but only for specific services listed in their BAA documentation.
Risk assessments must be conducted at least annually and whenever there is a significant change to your environment (new systems, new integrations, new business associate relationships). The 2026 rule also requires continuous monitoring to supplement periodic formal assessments.
You must notify affected individuals within 60 days of discovering the breach. If the breach affects 500+ individuals, you must also notify the HHS Secretary and prominent media outlets. Breaches affecting fewer than 500 individuals are reported to HHS annually. Your breach response plan should be documented, tested, and ready to execute before any breach occurs.
Using production PHI for testing is a common HIPAA violation. You should use properly de-identified data (following HIPAA’s Safe Harbor or Expert Determination methods) or synthetic data for all testing and development environments. If you must use real PHI for testing, the test environment must maintain the same security controls as production.

