Last Update: 04/05/2026 at 2:50 PM EST
HHS Tightens HIPAA Encryption Rules
Coverage from Mondaq, Vantage Point, and others
Articles
18
Latest Article
03/16
Active Days
262
Executive Summary
HHS is tightening HIPAA safeguards in 2026, pushing encryption, MFA, testing, and incident response to better protect ePHI and cut breach risk.
- HIPAA encryption remains addressable, but risk assessments often make it required for ePHI
- HHS OCR expects encryption at rest and in transit or documented equivalent safeguards
- AES-256, TLS 1.2 or 1.3, and strong key management are cited as baseline controls
- Proposed 2026 HIPAA updates add annual testing, MFA, network segmentation, and formal incident response
- Business associate agreements will need clearer encryption, reporting, audit logging, and recovery terms
- OCR can impose corrective action plans and civil monetary fines for clear encryption gaps or weak documentation
- Encrypted ePHI with uncompromised keys may qualify for safe harbor and avoid breach notification
Quick Facts
- What: HIPAA encryption and security requirements are being tightened
- Where: US healthcare systems handling ePHI
- Why: To reduce breach risk and protect electronic protected health information
- Who: HHS OCR, covered entities, and business associates
- When: During 2026 rule updates and legislative action

