Skip to main content
RSS Feed
·10 min read

HIPAA Encryption Requirements for Electronic Protected Health Information (ePHI)

Encryption under HIPAA has always occupied an awkward space. The Security Rule classifies it as "addressable," which many organizations have interpreted as optional. OCR's enforcement record tells a different story — and the proposed 2025 rule update would eliminate the ambiguity entirely.

Current encryption requirements under the Security Rule

The HIPAA Security Rule addresses encryption in two places:

Both specifications are classified as "addressable." Under the Security Rule's framework, this means you must assess the specification, and then either implement it, implement an equivalent alternative, or document why neither is reasonable and appropriate.

What "addressable" actually means

The addressable designation is the most misunderstood concept in the HIPAA Security Rule. It does not mean optional. It does not mean you can skip it if it is inconvenient or expensive. The Security Rule at 45 CFR § 164.306(d)(3) defines the process:

  1. Assess whether the implementation specification is a reasonable and appropriate safeguard for your environment, considering your risk analysis, your risk mitigation strategy, your current security measures, and cost.
  2. If it is reasonable and appropriate, implement it.
  3. If it is not reasonable and appropriate, document why and implement an equivalent alternative measure that achieves the same security objective.
  4. If neither the specification nor an alternative is reasonable and appropriate, document why.

The documentation requirement is critical. If you cannot produce a written determination explaining your decision — with reference to your specific risk analysis and environment — you have not met the addressable standard. You have simply skipped it.

How OCR actually treats unencrypted ePHI

In enforcement practice, the addressable designation has provided little protection for organizations that chose not to encrypt. OCR has consistently taken the position that encryption is reasonable and appropriate for virtually all covered entities, given the wide availability of encryption technology and its relatively low cost.

The pattern is especially clear with portable devices. When a laptop, USB drive, or smartphone containing unencrypted ePHI is lost or stolen, OCR's investigation almost invariably finds:

Willful neglect carries mandatory penalties under HITECH, with a minimum of $10,000 per violation if corrected within 30 days and $50,000 per violation if not corrected. Multiple OCR settlements involving unencrypted devices have resulted in penalties exceeding $1 million.

The encryption safe harbor

The Breach Notification Rule at 45 CFR § 164.402 defines "unsecured PHI" as PHI that is not rendered unusable, unreadable, or indecipherable to unauthorized persons. HHS guidance specifies that encryption using NIST-approved algorithms (AES-128, AES-256, or equivalent) satisfies this standard.

If ePHI is encrypted to this standard and the encryption key is not compromised along with the data, a loss or theft of the device is not a reportable breach. This safe harbor is enormously valuable:

The cost of implementing full-disk encryption on every laptop and workstation is trivial compared to the cost of a single breach investigation. This is why OCR has little patience for organizations that claim encryption is not "reasonable and appropriate."

The proposed 2025 update: encryption becomes mandatory

The proposed HIPAA Security Rule update published January 6, 2025 would eliminate the addressable/required distinction for all implementation specifications — including encryption. Under the proposed rule:

As of April 2026, the proposed rule is on OCR's finalization agenda. Whether it is finalized as proposed or modified, the direction is unambiguous: HHS wants encryption to be mandatory, not addressable.

Practical implementation: what to encrypt and how

If you are not already encrypting ePHI comprehensively, here is what needs to be covered:

Data at rest

Data in transit

What to do now

Whether the proposed rule is finalized tomorrow or in a year, the practical recommendation is the same:

  1. Audit your encryption status. Identify every location where ePHI exists — devices, servers, cloud services, email, backups, portable media — and verify whether it is encrypted.
  2. Close the gaps. Enable full-disk encryption on every device. Enable TLS on every transmission path. Encrypt backups. Eliminate unencrypted portable media.
  3. Document your decisions. Under current rules, document your assessment of encryption as an addressable specification. Under proposed rules, document your implementation. Either way, document.
  4. Verify your encryption meets NIST standards. The safe harbor requires NIST-approved algorithms. AES-128 or AES-256 for data at rest, TLS 1.2 or higher for data in transit.

How BlackSheep helps

BlackSheep's HIPAA compliance platform includes encryption verification as part of the technical safeguard assessment. It identifies where ePHI lives in your environment, verifies encryption status, flags gaps, and tracks remediation — so you know exactly where you stand, both under current rules and the proposed update.

Encryption is the single most cost-effective safeguard for ePHI. Make sure yours is complete.

Verify your encryption with BlackSheep

Free download: SEC Reg S-P compliance checklist

27-point checklist covering every Reg S-P requirement. Know exactly where your firm stands before the June 2026 deadline.

No spam. Unsubscribe anytime.