HIPAA Security Rule for Dental Practices: A Plain-English Guide
What HIPAA actually requires from a small dental or medical practice, mapped to the technical safeguards your IT setup needs to deliver.
What HIPAA actually requires from a small dental or medical practice, mapped to the technical safeguards your IT setup needs to deliver.
There is a recurring conversation that happens in our office. A new dentist or an office manager calls about IT, we ask about HIPAA, and they tell us their old IT vendor said “we’re HIPAA compliant.” When we ask what specifically that means, the answer is some version of “they had us sign a Business Associate Agreement.”
A BAA is necessary. It is not even close to sufficient. This post walks through what the HIPAA Security Rule actually requires, in language that doesn’t assume a compliance background.
When people say “HIPAA,” they usually mean one of three rules under the larger HIPAA umbrella:
This post is about the Security Rule. Specifically the technical safeguards under 45 CFR § 164.312, because that’s the part where IT can pass or fail you.
The Security Rule names five technical safeguards. The language in the regulation is dense; here it is in working English.
Every person who can see ePHI has their own login. No shared accounts. The system tracks who logs in and what they touch. When a hygienist leaves the practice on Friday, their access is gone by Monday.
The required pieces:
If your practice management software has one shared “Front Desk” login, you fail this control.
The system records who looked at what and when. The phrase the regulation uses is “implement hardware, software, and/or procedural mechanisms that record and examine activity.” In practice, this means your PMS, your file server, and your endpoint protection are all generating logs, and someone is responsible for reviewing them.
If a staff member opens a chart on a celebrity patient just because they’re curious, audit controls are how you catch it.
ePHI cannot be improperly altered or destroyed. The plumbing here includes endpoint protection that detects ransomware, file integrity monitoring on shared resources, and backups you have actually tested restoring from.
We see practices that have nightly backups that have never been tested. The first time you find out the backup is corrupt is the first time you actually need it.
You have to verify that the person logging in is who they say they are. In 2026, that means multi-factor authentication on everything that touches ePHI. Username and password alone is not enough. The IRS, OCR, and the FTC all consider single-factor authentication to be a finding.
ePHI in motion has to be protected. Email containing PHI gets encrypted. Remote access goes over a VPN or a Zero Trust gateway. Faxing happens over secure fax services, not consumer fax machines.
If your practice still emails attachments to referring providers in the clear, fix that this week.
Here is what the technical safeguards actually look like as a checklist for a 5-to-25-person dental or medical practice:
That last point is the one most practices skip. The Security Rule’s first administrative safeguard (164.308(a)(1)) is “conduct an accurate and thorough risk assessment.” Without one on file, every other control you have is hard to defend.
When a HIPAA audit happens — whether it’s OCR after a breach, a payer requesting documentation, or a malpractice carrier — the asks are predictable:
A surprising number of practices have all the controls in place but have not documented them. That is technically a finding. Documentation is the cheap part. Get it done.
OCR penalties for HIPAA violations scale. The 2024 caps run from about $137 per violation up to roughly $2.1M per violation per year for willful neglect. In practice, settlements for small healthcare practices land between $50,000 and $500,000, plus a corrective action plan that costs more in time and consulting.
The bigger cost is reputational. If your practice is named in an OCR breach notification, your patient acquisition takes a measurable hit for years.
If you want to see exactly where your practice stands without paying for a formal assessment, run our free HIPAA Gap Check. It maps your current state against the nine technical-safeguard areas above and emails you a written report. We don’t share it with anyone, and you don’t end up on a list.
The list of practices that should have done it earlier is long. The list that wishes they hadn’t is empty.
Free IT Blueprint Assessment. We walk your office, look at every system, and leave you with a written punch list.
Book Walkthrough