Hunchbite
ServicesGuidesCase StudiesAboutContact
Start a project
Hunchbite

Software development studio focused on craft, speed, and outcomes that matter. Production-grade software shipped in under two weeks.

+91 90358 61690hello@hunchbite.com
Services
All ServicesSolutionsIndustriesTechnologyOur ProcessFree Audit
Company
AboutCase StudiesWhat We're BuildingGuidesToolsPartnersGlossaryFAQ
Popular Guides
Cost to Build a Web AppShopify vs CustomCost of Bad Software
Start a Project
Get StartedBook a CallContactVelocity Program
Social
GitHubLinkedInTwitter

Hunchbite Technologies Private Limited

CIN: U62012KA2024PTC192589

Registered Office: HD-258, Site No. 26, Prestige Cube, WeWork, Laskar Hosur Road, Adugodi, Bangalore South, Karnataka, 560030, India

Incorporated: August 30, 2024

© 2026 Hunchbite Technologies Pvt. Ltd. All rights reserved.· Site updated February 2026

Privacy PolicyTerms of Service
Home/Guides/HIPAA for Health Tech Founders: What You're Actually Required to Do
Choosing a Partner

HIPAA for Health Tech Founders: What You're Actually Required to Do

Building anything that touches health data? Here's whether HIPAA applies to you, what it requires, and what you need in place before you sign your first healthcare customer.

By HunchbiteMarch 30, 202613 min read
HIPAAhealthtechcompliance

"Do we need to be HIPAA compliant?" is one of the most common questions in healthtech — and the answer is more nuanced than most founders expect. Some companies that assume they need HIPAA compliance don't. Others that assume they don't absolutely do. Getting it wrong in either direction creates real problems.

This guide covers who HIPAA actually applies to, what it requires, and what you need to have in place before you handle your first piece of health data in a regulated context.

Who HIPAA actually applies to

HIPAA applies to two categories of entities: Covered Entities and Business Associates.

Covered Entities are:

  • Healthcare providers who conduct certain electronic transactions (hospitals, clinics, individual physicians, pharmacies)
  • Health plans (insurance companies, employer-sponsored health plans, Medicare/Medicaid)
  • Healthcare clearinghouses (companies that process health information between different formats)

Business Associates are companies that perform functions or services for Covered Entities that involve access to Protected Health Information (PHI). This is where most healthtech startups land.

If you're building:

  • A practice management system used by a medical practice
  • A telehealth platform connecting patients to providers
  • A healthcare data analytics tool used by a hospital
  • A billing or claims processing tool for healthcare organizations
  • A patient communication tool used by a clinic

...you are almost certainly a Business Associate the moment a Covered Entity uses your product and PHI flows through it.

What HIPAA does NOT automatically cover:

A consumer wellness app where users voluntarily track their own health information — like a step counter or mood journal — is not automatically covered by HIPAA. If that app has no relationship with a healthcare provider and doesn't use the data for clinical purposes, it may fall outside HIPAA's scope.

However, this doesn't mean you're operating in a regulatory vacuum. The FTC's Health Breach Notification Rule applies to consumer health apps and requires notification to the FTC and affected consumers in the event of a breach. And consumer health data is increasingly covered by state privacy laws (California, Washington's My Health MY Data Act).

The test: do you receive PHI from, or on behalf of, a Covered Entity? If yes, you're a Business Associate and HIPAA applies.

What counts as PHI: the 18 identifiers

Protected Health Information is health information that is both (a) individually identifiable and (b) held or transmitted by a Covered Entity or Business Associate.

"Individually identifiable" means it can be linked to a specific person. HIPAA specifies 18 categories of identifiers that, when combined with health information, make that information PHI:

  1. Names
  2. Geographic data smaller than a state (including address, city, zip code)
  3. Dates directly related to an individual (birth date, admission date, discharge date — but not year alone)
  4. Phone numbers
  5. Fax numbers
  6. Email addresses
  7. Social Security numbers
  8. Medical record numbers
  9. Health plan beneficiary numbers
  10. Account numbers
  11. Certificate/license numbers
  12. Vehicle identifiers (VINs, license plates)
  13. Device identifiers and serial numbers
  14. Web URLs
  15. IP addresses
  16. Biometric identifiers (fingerprints, voiceprints)
  17. Full-face photographs and comparable images
  18. Any other unique identifying number or code

Note that IP addresses and email addresses are on this list. A user's health condition combined with their email address is PHI. A patient record with their IP address in the access log is PHI. The list is broader than most founders assume.

The Safe Harbor de-identification standard

HIPAA provides a path to escape its requirements: de-identified data. Data from which all 18 identifiers have been removed is no longer considered PHI and can be used, shared, and analysed without HIPAA restrictions.

This is the HIPAA Safe Harbor standard. If you remove all 18 identifiers and have no reason to believe the remaining information could identify an individual, the data is no longer PHI.

In practice, de-identification is harder than it sounds:

  • Zip codes must be reduced to the first 3 digits if the geographic area has fewer than 20,000 people
  • All dates must be replaced with year alone or removed entirely
  • Any "other" unique identifying numbers must be removed or replaced with non-identifying codes
  • You must document your de-identification process and methodology

De-identified data is genuinely useful — it can be used for research, analytics, and product improvement without HIPAA constraints. But achieving proper Safe Harbor de-identification requires care and documentation. Claiming de-identification without actually removing all 18 identifiers is a compliance violation.

The 4 HIPAA rules that matter for a software company

HIPAA is actually four separate rules. Here's what each means for your product:

1. The Privacy Rule Governs the use and disclosure of PHI. The core principle: PHI can only be used for treatment, payment, and healthcare operations — or with patient authorization. As a Business Associate, you process PHI only as directed by the Covered Entity you serve and for the purposes they've authorized. You cannot use patient data for your own analytics or product improvement without explicit permission.

2. The Security Rule This is the one that most directly affects your engineering team. The Security Rule requires administrative, physical, and technical safeguards to protect electronic PHI (ePHI). Specific requirements include:

  • Access controls (unique user IDs, automatic logoff, encryption)
  • Audit logging (every access to ePHI must be logged)
  • Integrity controls (ensuring ePHI isn't altered improperly)
  • Transmission security (encryption in transit)
  • Risk analysis (a documented analysis of threats and vulnerabilities)
  • Workforce training and policies

The Security Rule is largely what distinguishes "HIPAA compliant" architecture from standard SaaS architecture.

3. The Breach Notification Rule If there's a breach of unsecured PHI, you must notify the Covered Entity you serve without unreasonable delay and within 60 days of discovery. The Covered Entity then has its own notification obligations to patients and HHS. "Unsecured" means unencrypted — if PHI was encrypted and the keys weren't compromised, different rules apply. Breach notification is stricter and more complex than GDPR notification in healthcare.

4. The Omnibus Rule (2013) Extended HIPAA's requirements directly to Business Associates. Before 2013, Business Associates were primarily governed by their contracts with Covered Entities. After the Omnibus Rule, HHS can enforce HIPAA directly against Business Associates — which is why most significant recent enforcement actions involve tech companies, not just hospitals.

What a Business Associate Agreement is and why it matters

A BAA is a mandatory HIPAA contract between a Covered Entity and any Business Associate. It specifies how PHI can be used, the obligations of the Business Associate to protect it, and what happens in a breach.

You need a BAA with every Covered Entity customer before they send you PHI.

You also need BAAs with your own subcontractors that touch PHI — your "subcontractors" in HIPAA terms. This is where startups frequently miss things:

Vendor BAA available?
AWS Yes (through AWS Artifact)
Google Cloud Yes
Microsoft Azure Yes
Slack Only for Enterprise Grid, with restrictions
Google Workspace Yes (for eligible plans)
Zoom Yes (for healthcare plans)
Standard Slack (free/Pro/Business+) No
Twilio Yes
SendGrid Yes
Consumer-grade tools generally Typically no

The critical point: a BAA from your cloud provider is necessary but not sufficient for HIPAA compliance. AWS signing a BAA with you means AWS has agreed to certain obligations regarding the infrastructure they provide. It does not mean your application is HIPAA compliant. Everything you build on top of that infrastructure still needs to meet the Security Rule requirements.

"We're on AWS and have a BAA" is not a HIPAA compliance statement. It's a prerequisite.

What "HIPAA compliant hosting" actually means vs. what it doesn't

"HIPAA compliant hosting" is a marketing term that describes infrastructure that has agreed to sign a BAA and has implemented appropriate physical and operational security controls at the data center level. It covers:

  • Physical security of data centers
  • Redundancy and availability controls
  • Backup and disaster recovery at the infrastructure level
  • The vendor's access to your data governed by the BAA

It does not cover:

  • How you configure your databases and access controls
  • Whether your application encrypts PHI properly
  • Whether you have audit logging of PHI access
  • Whether your workforce has HIPAA training
  • Whether you conduct regular risk analyses
  • Whether your application has proper authentication controls

Most HIPAA violations in software companies are not about the data center. They're about misconfigured applications, inadequate access controls, or missing audit logs. The hosting provider can't fix those.

The cost of non-compliance: OCR fines and enforcement

The HHS Office for Civil Rights (OCR) enforces HIPAA. Fines are tiered based on culpability:

Tier Description Minimum per violation Maximum per violation
Tier 1 Did not know $100 $50,000
Tier 2 Reasonable cause $1,000 $50,000
Tier 3 Willful neglect, corrected $10,000 $50,000
Tier 4 Willful neglect, not corrected $50,000 $1.9 million

The maximum annual penalty per violation category is $1.9 million. Penalties can stack across multiple violations.

Recent enforcement actions illustrate the range:

  • Montefiore Medical Center: $4.75 million settlement (2024) for inadequate access controls that allowed an employee to steal and sell patient data
  • Enzo Biochem: $4.5 million settlement (2024) after ransomware accessed 2.4 million patients' data
  • Multiple smaller organizations: five and six-figure settlements for failure to complete risk analyses, which is one of OCR's current enforcement priorities

In 2024, OCR specifically launched a HIPAA Security Rule risk analysis enforcement initiative. If you're a Business Associate without a documented risk analysis, you're exposed.

Beyond OCR fines, HIPAA violations can trigger state attorney general actions and, in egregious cases, criminal referrals to the Department of Justice.

The 6 things to implement before you take your first health customer

If you're at the point of a healthcare organization asking about HIPAA compliance, here's the minimum viable checklist:

1. Execute a BAA with the customer. Before they send you any PHI, the BAA must be signed. This is your contractual obligation and theirs. No BAA, no PHI. Every enterprise health customer will ask for this.

2. Sign BAAs with your own PHI-touching vendors. AWS, your monitoring tools, your logging infrastructure — sign their BAAs. Identify every tool in your stack that receives or processes PHI and confirm a BAA exists.

3. Implement access controls on PHI. Unique user authentication. Role-based access so users only see PHI they need. Automatic session timeouts. MFA on accounts with PHI access.

4. Set up audit logging for PHI access. Every read, write, and delete of PHI must be logged. Who accessed it, when, from where. Retained for six years. This is one of the most commonly missing requirements in startups moving into healthcare.

5. Encrypt PHI at rest and in transit. Encryption in transit (TLS 1.2 or higher) is table stakes. Encryption at rest for databases and storage containing PHI, with key management that meets the Security Rule requirements.

6. Complete a documented risk analysis. A risk analysis is a formal assessment of the threats and vulnerabilities to your ePHI. It doesn't have to be a 200-page document — it does need to be written down, cover your specific systems, identify risks, and document how you're addressing them. OCR has made risk analysis compliance an explicit enforcement priority.

These six items don't make you fully HIPAA compliant on every dimension, but they address the most common enforcement areas and the minimum that sophisticated healthcare customers will verify during vendor due diligence.


Get a HIPAA readiness review before your first health customer does it for you

Hunchbite reviews healthtech products for HIPAA gaps, Security Rule compliance, and vendor contract issues — giving you a clear picture of what needs to change before enterprise healthcare customers put you through their security questionnaires.

→ Technical Audit

Call +91 90358 61690 · Book a free call · Contact form

FAQ
Does HIPAA apply to my app if users voluntarily enter their own health data?
Not automatically, no. HIPAA applies to Covered Entities (healthcare providers, health plans, clearinghouses) and their Business Associates — not to consumer apps in general. If a user voluntarily enters their own health data into a fitness or wellness app that has no relationship with a healthcare provider, that data is typically not PHI under HIPAA. However, if your app connects to a healthcare provider, handles insurance data, or stores clinical information used for treatment decisions, the analysis changes. The FTC's Health Breach Notification Rule may also apply to consumer health apps even when HIPAA doesn't. When in doubt, get a legal opinion — the cost of being wrong is high.
What is a BAA and which of my vendors need one?
A Business Associate Agreement (BAA) is a contract required by HIPAA between a Covered Entity or Business Associate and any vendor that creates, receives, maintains, or transmits PHI on their behalf. You need a BAA with every vendor that touches PHI: your cloud hosting provider (AWS offers a BAA — sign it through AWS Artifact), your database provider, your monitoring and logging tools if they capture PHI, and any analytics or support tools that receive patient data. AWS offers a BAA; Slack only offers one for Enterprise Grid with restrictions; Google Workspace offers a BAA for eligible plans. Most consumer-grade tools do not offer BAAs and cannot be used with PHI.
How much does it cost to become HIPAA compliant?
For a startup, the primary cost of HIPAA compliance is engineering time, not licensing fees. There's no certification body you pay — HIPAA is a regulatory requirement enforced by the HHS Office for Civil Rights. The engineering work typically covers implementing access controls, audit logging, encryption, and breach notification capabilities. If you need a compliance platform (Vanta, Drata, Secureframe), expect $10,000–$30,000 per year. If you're engaging a HIPAA consultant for a readiness assessment, $5,000–$25,000 depending on scope. Legal review of BAAs and policies adds further cost. For a seed-stage startup, budget $20,000–$60,000 in total one-time investment, plus ongoing maintenance.
Next step

Ready to move forward?

If this guide resonated with your situation, let's talk. We offer a free 30-minute discovery call — no pitch, just honest advice on your specific project.

Book a Free CallSend a Message
Continue Reading
Choosing a Partner

How to Structure Equity for a Technical Co-Founder

A practical guide for non-technical founders on how to split equity with a technical co-founder — what factors should drive the number, what vesting protects you both, and how to have the conversation before it becomes a crisis.

11 min read
Choosing a Partner

Fixed Price vs Hourly Development: Which Model Actually Works?

An honest comparison of fixed-price and hourly billing for software development — when each model makes sense, the hidden risks of both, and how to structure an engagement that protects you.

10 min read
All Guides