Digital Health & Telemedicine Strategy

LESSON 03

Digital Health & Telemedicine Strategy

Building Trust: Data Security, Privacy & HIPAA for Health Startups

HIPAA compliance is not a checkbox — it is an operational discipline that determines whether a health startup can sell to any serious buyer.

13 min read

Health data is among the most sensitive and most regulated categories of personal information in the U.S. legal system. The Health Insurance Portability and Accountability Act — HIPAA — established a federal floor for the protection of individually identifiable health information in 1996, and a subsequent series of rules, amendments, and enforcement actions have built a compliance framework that governs not only how health information is stored and transmitted, but who can access it, for what purposes, and under what contractual obligations. Founders who treat HIPAA as a box to check before enterprise sales calls, rather than as a design constraint that should shape product architecture from day one, routinely discover the cost of that decision when a breach occurs or a large health system walks away from a procurement.

HIPAA applies to two categories of entities. Covered entities are the organizations at the center of healthcare delivery: health plans, healthcare clearinghouses, and most healthcare providers. Business associates are entities that receive, create, or transmit protected health information — abbreviated PHI — on behalf of a covered entity. A digital health company that stores patient records for a hospital is a business associate. A telemedicine company that processes clinical data on behalf of an employer health plan is a business associate. The practical implication is that most digital health companies are business associates, which means they must sign a Business Associate Agreement before receiving PHI, and they are independently liable for HIPAA compliance within their own systems.

Protected health information is any individually identifiable health information held or transmitted by a covered entity or business associate. The eighteen HIPAA identifiers — including name, address, dates, phone numbers, and social security numbers when combined with health data — define what counts as PHI. De-identification, the process of removing or generalizing these identifiers so that data can no longer reasonably be linked to an individual, is the mechanism by which data escapes PHI status and can be used more freely for analytics, research, or product development. The HIPAA Safe Harbor method requires removing all eighteen identifiers explicitly; the Expert Determination method allows statistical certification by a qualified expert. Both are legitimate, but neither is straightforward to implement without deliberate engineering investment.

The HIPAA Security Rule requires covered entities and business associates to implement administrative, physical, and technical safeguards for electronic PHI — abbreviated ePHI. Administrative safeguards include workforce training, risk analysis, and contingency planning. Physical safeguards include workstation and device controls. Technical safeguards include encryption, audit controls, and automatic logoff. The Security Rule is explicitly technology-neutral — it specifies what must be protected and how broadly, not which specific tools to use. This means the standard evolves with reasonable industry practice, and organizations that implemented a compliant posture in 2018 may find it insufficient against current enforcement standards.

Breach notification requirements under the HIPAA Breach Notification Rule impose time-bound obligations when PHI is impermissibly accessed, used, disclosed, or acquired. A breach affecting fewer than 500 individuals in a state must be reported to the Secretary of HHS within 60 days of the end of the calendar year. A breach affecting 500 or more individuals must be reported to HHS and to prominent media outlets in the affected state within 60 days of discovery. Affected individuals must be notified within 60 days regardless of scale. The clock starts at discovery, not at the breach event itself — which means a company that fails to detect a breach promptly can be exposed to both enforcement for the breach and for the detection failure.

The FTC's Health Breach Notification Rule — separate from HIPAA — extends breach notification obligations to health apps and vendors that are not HIPAA-covered entities or business associates. A fitness app, a mental health journaling product, or a direct-to-consumer telehealth service that collects health data but does not process it on behalf of a covered entity may fall entirely outside HIPAA and still be subject to FTC jurisdiction and breach notification requirements under its own rule. The 2023 FTC enforcement action against GoodRx confirmed that the agency interprets its health breach notification authority broadly, including unauthorized disclosure of health data for advertising purposes, even without a traditional data breach.

Trust in digital health is not a brand attribute — it is an operational posture that enterprise buyers audit before signing. Health systems and insurers conduct security reviews — often called vendor security assessments or third-party risk assessments — that probe infrastructure configuration, access controls, incident response procedures, and certification status. SOC 2 Type II certification, which documents that a company's security controls have operated effectively over a period of time rather than merely existing at a single point in time, has become the baseline credential required to enter procurement processes with most large health system buyers. Companies that wait to pursue SOC 2 until they have a large contract in the pipeline are often six to twelve months behind where they need to be.

The most expensive HIPAA compliance failure is the one you discover during a health system's security review, not your own.

This lesson is coming soon.

TERMS

Term of focus

Protected Health Information (PHI)

PHI is individually identifiable health information held or transmitted by a covered entity or business associate in any form, including electronic, paper, or oral. The HIPAA Privacy Rule's eighteen categories of identifiers define what makes health information individually identifiable. Any health data that a digital health company stores, processes, or transmits that can be linked to a specific individual is likely PHI, triggering the full range of HIPAA obligations.

A BAA is a contract that a covered entity must execute with any third party — its business associate — that creates, receives, maintains, or transmits PHI on its behalf. The BAA specifies the permitted uses of PHI, requires the business associate to implement appropriate safeguards, and obligates breach notification. A digital health company that receives PHI from a health system without a signed BAA is in violation of HIPAA regardless of how strong its technical controls are.

De-identification is the process of removing or transforming identifiers from health data so that it can no longer reasonably be used to identify an individual, removing it from PHI status and the obligations that attach to PHI. HIPAA recognizes two methods: Safe Harbor, which requires explicit removal of all eighteen specified identifiers, and Expert Determination, which requires a statistical analysis by a qualified person. De-identified data is commercially valuable for analytics and research, but achieving genuine de-identification — not just removing obvious fields — requires deliberate engineering and sometimes expert review.

SOC 2 Type II is an auditing standard developed by the American Institute of Certified Public Accountants that evaluates whether a service organization's security controls have operated effectively over an observation period — typically six to twelve months. Type II is more rigorous than Type I, which evaluates controls only at a single point in time. Health system buyers and enterprise payers have broadly standardized on SOC 2 Type II as a minimum security credentialing requirement for digital health vendors.

The HIPAA Security Rule establishes national standards for protecting electronic protected health information, requiring covered entities and business associates to implement administrative, physical, and technical safeguards. It is technology-neutral, specifying categories of protection rather than specific tools, which means compliance requires ongoing reassessment as technology and threat landscapes evolve. Failure to conduct and document a periodic risk analysis is among the most commonly cited deficiencies in HHS Office for Civil Rights enforcement actions.

The minimum necessary standard is a HIPAA Privacy Rule principle requiring that covered entities and business associates use, disclose, or request only the minimum amount of PHI necessary to accomplish the intended purpose. It applies to routine disclosures, access controls, and system design — a workforce member should not have access to patient records beyond what their role requires. Designing systems that routinely expose more PHI than necessary to complete a function is a compliance failure independent of whether a breach occurs.

The FTC Health Breach Notification Rule requires vendors of personal health records and related service providers — entities that are not HIPAA-covered entities — to notify consumers, the FTC, and in some cases media when unsecured personally identifiable health information is breached or impermissibly disclosed. The FTC has interpreted the rule expansively, including unauthorized sharing of health data with advertising platforms as a covered violation. Digital health companies that fall outside HIPAA jurisdiction are not outside health data breach liability.

BEFORE YOUR NEXT MEETING

Have we executed a Business Associate Agreement with every vendor that touches PHI in our infrastructure — including analytics platforms, customer support tools, and cloud storage providers?

What is our current PHI data map — where does PHI enter our systems, where is it stored, who has access to it, and where does it exit?

If we discovered a breach affecting 600 patients today, who in the organization owns the 60-day notification response, and have we tested that process?

Are we pursuing SOC 2 Type II, and if not, what is our current answer when a health system security review asks for it?

Does our product collect or transmit health data in any context where HIPAA does not apply, and have we assessed our FTC Health Breach Notification Rule exposure in those contexts?

REALITY CHECK

SOURCES

LESSON 03 OF 04