Patient ProtectPatient Protect

Regulatory update

The 2026 HIPAA Security Rule eliminates every loophole independent practices relied on.

“Addressable” safeguards are gone. Encryption, MFA, penetration testing, audit logging, and Business Associate verification all become mandatory — not recommended. Here is what changes, what it means for your practice, and what to do about it.

The change

What “addressable” meant — and why it’s gone.

Since the Security Rule was adopted in 2003, implementation specifications have been classified as either “required” or “addressable.” Required meant you must implement it. Addressable meant you must assess whether it’s reasonable and appropriate — and if you determine it is not, you can implement an equivalent alternative measure, or document why neither is necessary.

In practice, “addressable” became “optional.” Practices documented that encryption was too expensive, that MFA was too disruptive, that penetration testing was unnecessary for their size. Auditors accepted those justifications. The gap between what HIPAA intended and what practices actually did grew wider every year.

The 2026 rule eliminates the distinction entirely. Every specification becomes required. The documentation-as-defense era is over. What matters now is whether the control is implemented — not whether you wrote a paragraph explaining why it isn’t.

This rule affects every covered entity and Business Associate — regardless of size.

There is no small-practice exemption. A solo dentist and a hospital system face the same requirements. The difference is that the hospital has a CISO, a security team, and a seven-figure compliance budget. Most independent practices have none of those things — which is why this rule will hit them hardest.

The six mandates

What the rule requires — before and after.

Mandatory encryption of all ePHI

§164.312(a)(2)(iv), §164.312(e)(2)(ii)

AES-256 encryption at rest and TLS 1.3 in transit — no exceptions

Before (current rule)

Encryption was 'addressable' — practices could document why they chose not to encrypt and still be compliant. Most did exactly that.

After (2026 rule)

Every byte of ePHI must be encrypted at rest and in transit. No exceptions. No alternative measures. No documentation workarounds.

Multi-factor authentication for all ePHI access

§164.312(d)

MFA required for every user, every session, every system

Before (current rule)

MFA was not explicitly required. Password-only access was compliant. Shared logins were common in small practices.

After (2026 rule)

Every user accessing ePHI must authenticate with a second factor. Shared credentials become a violation. This applies to EHR, email, cloud storage, and every other system touching patient data.

Vulnerability scanning and penetration testing

§164.308(a)(8)

Vulnerability scans every 6 months, penetration testing annually

Before (current rule)

No specific scanning or testing frequency was mandated. Most independent practices have never conducted either.

After (2026 rule)

Vulnerability scans must be performed every six months. Full penetration testing must be performed annually. Results must be documented and remediation tracked.

Technology asset inventory and network map

§164.310(d)(1)

Written inventory of every system, device, and data flow touching ePHI

Before (current rule)

Practices were required to conduct risk assessments but not to maintain a formal asset inventory or network map.

After (2026 rule)

A written, up-to-date inventory of all technology assets — hardware, software, network infrastructure — and a data flow map showing where ePHI moves. This must be reviewed and updated as systems change.

Business Associate technical verification

§164.314(a)(2)

Verify that BAs actually implement the safeguards they promise

Before (current rule)

Having a signed BAA was sufficient. Practices were not required to verify that vendors actually implemented the controls they agreed to.

After (2026 rule)

Covered entities must verify — not just contractually require — that their Business Associates implement appropriate technical safeguards. Annual verification is expected.

72-hour incident notification

§164.408

Notify HHS within 72 hours of discovering a breach

Before (current rule)

60-day notification window for breaches affecting 500+ individuals. Smaller breaches reported annually.

After (2026 rule)

All breaches must be reported to HHS within 72 hours of discovery — regardless of size. This is a 95% reduction in the notification window.

Patient Protect

We built for this rule before it was written.

Patient Protect’s v2 platform was architected specifically for the 2026 Security Rule update. Every mandate below is already operational — not on a roadmap, not in development, not coming soon.

Encryption

AES-256-GCM at rest, TLS 1.3 in transit. Every session, every record, every backup.

Multi-factor authentication

SMS 2FA + Altcha challenge layer + browser fingerprinting. No shared credentials.

Penetration testing

Independent vulnerability scanning with zero Critical, High, or Medium findings.

Audit logging

Immutable per-session ePHI access logs retained 6+ years. Tamper-proof by architecture.

BA verification

Vendor Risk Scanner tracks BAA status and technical safeguard compliance in real time.

Asset inventory

ePHI Data Flow Mapper + technology asset tracking built into the compliance engine.

This page reflects the HIPAA Security Rule amendments as proposed in the January 6, 2025 NPRM (89 FR 980). Final rule language may differ. Patient Protect will update this page when the final rule is published. This is not legal advice — consult a qualified HIPAA compliance professional for guidance specific to your practice.