HIPAA requires covered entities and business associates to implement appropriate safeguards to protect electronic protected health information (PHI). While there are no specific encryption or decryption standards, there are still best practices.
Encryption is an "addressable" requirement, meaning organizations must assess their needs based on potential risks. The HHS clarifies that "An addressable implementation specification is not optional; rather, if an organization determines that the implementation specification is not reasonable and appropriate, the organization must document why it is not reasonable and appropriate and adopt an equivalent measure if it is reasonable and appropriate to do so."
Commonly used standards include Advanced Encryption Standard (AES) for data at rest, such as in hard drives, and Transport Layer Security (TLS) for data in transit, such as in email. The key is selecting methods that effectively safeguard ePHI according to the specific needs and risk factors of the organization.
Unlike other regulations that might prescribe specific technologies, HIPAA doesn’t mandate a single encryption standard. Instead, it provides flexibility, requiring covered entities and business associates to implement “appropriate” safeguards to protect ePHI.
Related: What happens to your data when it is encrypted?
If a breach occurs and ePHI is not encrypted, the organization may face significant penalties, as encryption could have prevented unauthorized access to the data.
HIPAA recommends strong encryption for mobile devices storing ePHI to protect data in the event of the device being lost or stolen.
Yes, cloud service providers handling ePHI must implement encryption for both data at rest and in transit, and they must sign a BAA to ensure HIPAA compliance.