HIPAA Is Getting Stricter
HHS has been signaling for years that HIPAA enforcement is shifting from complaint-driven to proactive, and 2026 makes that shift concrete. The updated Security Rule amendments remove the distinction between "required" and "addressable" implementation specifications. Everything is now required unless you can document a specific, reasonable alternative.
For New Jersey medical offices, this means the days of treating your HIPAA risk assessment as a checkbox exercise are over. OCR auditors are looking at actual technical controls, not just paperwork.
Risk Assessment Is Non-Negotiable
Every covered entity must conduct and document a thorough risk assessment annually. This isn't a questionnaire your office manager fills out. It's a technical evaluation of how ePHI flows through your systems: where it's stored, who can access it, how it's transmitted, and what vulnerabilities exist at each point.
We conduct these assessments for medical practices throughout southern New Jersey, and the most common finding is that practices don't have a complete inventory of where patient data actually lives. Data ends up on shared drives, personal devices, cloud storage accounts, and email attachments that nobody tracks.
Encryption: At Rest and In Transit
Under the updated rule, encryption of ePHI at rest and in transit is required across the board. Full-disk encryption on every workstation and laptop that handles patient data, TLS for email containing PHI, and encrypted backups are now baseline expectations.
If your practice still sends unencrypted emails with patient information or stores files on unencrypted local drives, that's a finding waiting to happen. The fix isn't complicated: BitLocker for Windows workstations, enforced TLS policies on your email provider, and encrypted backup solutions cover the majority of scenarios.
Access Controls and Audit Logs
The principle of least privilege applies to every system in your practice. Staff should only have access to the patient data they need for their specific role. Your front desk scheduler doesn't need the same EMR permissions as your billing specialist.
Audit logging requirements are also more explicit now. You need to log and review who accesses ePHI, when they access it, and what they do with it. Your EMR likely has audit logging built in, but someone in your organization needs to actually review those logs on a regular schedule and document that review.
Business Associate Agreements Matter
Every vendor that touches your patient data needs a current Business Associate Agreement. That includes your IT provider, your cloud backup vendor, your email host, and any billing service. Under the updated rule, business associates face the same security requirements you do.
Review your BAAs annually. Make sure they reflect what each vendor actually does with your data, and verify that your vendors are meeting their obligations. If your IT provider can't show you their own security practices, that's a red flag.
Getting Compliant Doesn't Have to Be Overwhelming
The key is to approach HIPAA compliance systematically rather than reactively. Start with the risk assessment, prioritize the highest-risk findings, and work through them methodically. Document everything. If OCR comes knocking, they want to see that you're making reasonable, good-faith efforts to protect patient data, not that you have a perfect score on every control.