- VanRein Compliance
- Posts
- The VRC Newsletter (July 8)
The VRC Newsletter (July 8)
Encryption, SRAs, Vendor Oversight: HIPAA Just Got Tougher
Deep Dive: What’s New in HIPAA’s 2025 Security Rule
The Office for Civil Rights (OCR) has proposed its most significant update to the HIPAA Security Rule in over 20 years. While the rule is still in the Notice of Proposed Rulemaking (NPRM) phase, many of the updates are already influencing enforcement behavior, audits, and how Covered Entities and Business Associates are expected to protect electronic protected health information (ePHI).
If you haven’t reviewed your HIPAA compliance posture in the last year, now is the time, especially if you’re a smaller practice or vendor partner without a dedicated compliance team.
Here’s a breakdown of what’s coming and what you should be preparing for today.
🧾 1. Mandatory Annual System Inventories
OCR is proposing that organizations be required to maintain an up-to-date inventory of all systems that store, process, or transmit ePHI. This includes servers, laptops, mobile devices, cloud tools, and third-party platforms.
✅ What to do now:
Start documenting all assets connected to PHI including apps like email, EHRs, CRMs, transcription services, and shared drives.
📊 2. Strengthened Security Risk Assessments (SRAs)
Risk assessments have always been required, but under the proposed rule, they must be:
Annual
Documented
Comprehensive (covering technical, administrative, and physical safeguards)
OCR is likely to focus more audits on how the SRA was conducted, not just whether one exists.
✅ What to do now:
Make sure your SRA covers vendor access, mobile use, remote work risks, and backup procedures.
🔐 3. Mandatory Multifactor Authentication (MFA)
The NPRM would move MFA from an “addressable” safeguard to a required one for systems accessing ePHI, especially administrative portals, cloud systems, and remote access points.
✅ What to do now:
Enable MFA on email, EHRs, cloud storage, and any system used by staff with elevated access.
🔑 4. Encryption Requirements for PHI at Rest and in Transit
Encryption would become a default expectation. OCR may no longer accept vague “addressable” excuses. If PHI is not encrypted, you’ll need formal documentation and a compensating control strategy.
✅ What to do now:
Ensure encryption is enabled for:
Laptops and mobile devices
Cloud storage and backups
Emails and file transfers
USB drives (if used)
🛠️ 5. Incident Response Drills & Planning
The proposed rule adds emphasis on practical preparedness, including the need to:
Have a tested Incident Response Plan (IRP)
Conduct periodic drills or tabletop exercises
Retain documentation of testing and lessons learned
✅ What to do now:
Review your IRP and conduct a mock drill, especially one involving ransomware or data loss.
🤝 6. Vendor Management & BA Oversight
OCR is cracking down on poorly managed Business Associate Agreements (BAAs) and unchecked vendor access. You’ll need to:
Maintain active BAAs
Vet vendors for compliance and incident history
Ensure BA vendors can report incidents within required timeframes
✅ What to do now:
Audit your vendor list. Are all BAAs current? Have vendors signed off on security requirements?
🧱 7. Network Segmentation & Access Controls
Organizations must demonstrate role-based access, strong login management, and—where possible—network segmentation between PHI systems and general use systems.
✅ What to do now:
Evaluate whether staff have only the access they need and whether unnecessary connections can be cut off.
⚠️ Why Smaller Practices Should Take This Seriously
Many smaller providers and vendors rely on templates, outdated risk assessments, or inherited practices from years ago. OCR’s proposed rule is a wake-up call: size is no longer a buffer from enforcement. If you’re handling PHI, your controls will be judged with the same expectations as larger entities.
📬 Already a VRC client? We can bundle our services saving you money and time!
🎯 Don’t Wait for HIPAA 2.0 to Become a Problem
While the 2025 Security Rule isn’t final yet, the direction is clear: HIPAA compliance must be intentional, documented, and resilient. This isn’t about checking boxes; it’s about protecting trust.
📋 In our next article, we’ll dive deeper into two areas where most organizations are falling short: encryption and vendor control.
Be Pro-Active: HIPAA 2.0’s Encryption & Vendor Control
As the proposed 2025 HIPAA Security Rule takes shape, two areas are standing out as top compliance gaps for many organizations: Encryption and Business Associate (BA) management.
These are no longer just IT concerns. They’re strategic compliance imperatives. And if you’re a covered entity or BA handling PHI, now is the time to ask: are you ready?
🔐 Encryption: More Than a Setting
The updated HIPAA proposal shifts encryption from an “addressable” safeguard to an expected default for both data at rest and data in transit.
This includes:
PHI stored in cloud services, EHRs, laptops, or mobile devices
PHI shared via email, portals, chat tools, or file transfers
Backups and disaster recovery copies
External storage (e.g., USB drives)
Under the new rule, if you’re not encrypting PHI, you’ll need documented compensating controls and formal justification.
✅ Quick Check:
Are all company laptops encrypted?
Do you use encrypted email or secure portals to share PHI?
Are mobile devices used for work secured and enrolled in MDM?
Are your backups encrypted and testable?
🤝 Vendor Controls: Your Risk Is Their Risk
HIPAA has long held Covered Entities responsible for vetting and overseeing their Business Associates but the proposed rule raises the stakes.
OCR is now pushing for:
Active BA Agreement (BAA) maintenance
Vendor due diligence and incident notification timeframes
Formal vetting of security practices and compliance posture
If your transcription vendor suffers a breach and notifies you late, you’re still responsible for delayed patient notifications or breach reporting.
✅ Quick Check:
Do you have BAAs on file for all vendors handling PHI?
Can your vendors report a security incident within 24–48 hours?
Are you reviewing vendor risk annually—or at all?
Have you documented who handles vendor compliance inside your organization?
🛠️ VanRein Compliance Supports You
At VRC, we don’t just hand you a policy template. We help you build a program that holds up under audit and real-world risk.
Here’s how we help:
✅ Encryption Posture Reviews – We walk you through where encryption should be applied and help close the gaps.
✅ Vendor Compliance Audits – We review your current vendor list, ensure BAAs are up to date, and identify missing documentation.
✅ Policy Development & Controls Mapping – We build policies that reflect what you actually do, then map them to HIPAA requirements.
✅ Risk Assessment & Documentation Support – All findings are organized and tracked inside VRC1, your live compliance workspace.
📬 Already a VRC client? We can bundle our services saving you money and time!
🎯 Let’s Strengthen Your Program Before the Rule Is Final
The 2025 Security Rule isn’t in effect yet, but enforcement priorities are already shifting.
Don’t wait until you're asked for documentation you don’t have.
