Healthcare Regulatory Compliance Guide

Practical guidance for healthcare teams and business associates

Healthcare Compliance Guide

\n\n

Practical guidance for healthcare teams and business associates

\n\n

Published: January 15, 2026 | Updated: March 8, 2026 | 16 min read

\n\n

Healthcare Compliance Overview

\n\n

Healthcare compliance now covers many rules at once. Your practice must follow federal, state, and field-specific laws. These laws overlap and clash. That demands a clear plan.

\n\n

Compliance officers must handle:

\n\n
    \n
  • HIPAA
  • \n
  • HITECH
  • \n
  • State privacy laws
  • \n
  • FDA rules
  • \n
  • CMS conditions
  • \n
  • Joint Commission standards
  • \n
  • Cybersecurity rules
  • \n
\n\n

They often manage these at the same time.

\n\n

The hard part is not learning each law. It is managing how they overlap and sometimes clash. A policy that meets HIPAA may fall short of state rules. A control that passes Joint Commission review may not meet CMS audit needs.

\n\n

Teams that treat each law on its own create gaps, waste effort, and drive up costs. This guide gives compliance officers a unified approach. It maps the major healthcare rules and shows where they meet. It gives you a clear method for building one program that covers all.

\n\n

HIPAA: The Foundation of Healthcare Compliance

\n\n

Privacy Rule, Security Rule, and Breach Notification

\n\n

The Health Insurance Portability and Accountability Act (HIPAA) is a core health data law. Every team that handles health data (PHI) must follow three key HIPAA rules.

\n\n

The Privacy Rule

\n\n

The Privacy Rule sets rules for how PHI can be used and shared. It gives patients rights over their health data. It requires minimum needed use, privacy notices, and clear consent steps. Covered teams and business associates must apply Privacy Rule needs to all forms of PHI - digital, paper, and spoken.

\n\n

The Security Rule

\n\n

The Security Rule sets technical, physical, and admin protections for electronic PHI (ePHI). It requires risk reviews, access controls, audit controls, data checks, and secure transfer. The Security Rule lets teams scale protections to their size. But that freedom can create confusion. For more detail, see our HIPAA Security Rule setup guide.

\n\n

The Breach Notification Rule

\n\n

The Breach Notification Rule requires teams to alert affected people, HHS, and the media when unsecured PHI is exposed. The rule sets clear timelines, content needs, and reporting levels. See our guide on HIPAA Breach Notification compliance to prepare your practice.

\n\n

HIPAA Enforcement in 2026

\n\n

OCR enforcement in 2026 shows several clear trends:

\n\n
    \n
  • More reviews: OCR now checks a larger share of reported breaches, including smaller ones.
  • \n
  • Higher settlements: Average settlement amounts keep rising. Several have topped $4 million.
  • \n
  • Focus on wide failures: OCR targets teams with broad gaps, not just single incidents.
  • \n
  • Patient access: OCR pursues teams that fail to give patients timely access to their records.
  • \n
  • Ransomware: Teams hit by ransomware must show their security steps hold up.
  • \n
\n\n

For a full overview of HIPAA rules, see our complete HIPAA compliance guide.

\n\n

HITECH Act: Strengthening HIPAA

\n\n

How HITECH Expanded HIPAA Rules

\n\n

The HITECH Act passed in 2009. It expanded HIPAA's reach and enforcement power. Many rules teams link to HIPAA actually come from HITECH.

\n\n

Key HITECH additions include:

\n\n
    \n
  • Business associate direct liability: Before HITECH, only covered teams faced direct HIPAA liability. HITECH made business associates subject to the Security Rule and key Privacy Rule parts.
  • \n
  • Breach alert needs: HITECH created the Breach Notification Rule. It requires covered teams and business associates to report breaches of unsecured PHI.
  • \n
  • Higher fines: HITECH set the fine structure. These reach $1.9 million per breach type per year, adjusted for inflation.
  • \n
  • State AG enforcement: HITECH let state attorneys general bring civil suits for HIPAA breaches on behalf of their residents.
  • \n
  • EHR adoption incentives: HITECH provided incentives for Electronic Health Records (EHR) use. It also required security rules for those systems.
  • \n
  • Audit program: HITECH directed HHS to run regular audits of covered teams and their business associates.
  • \n
\n\n

HITECH's Ongoing Relevance

\n\n

Many teams treat HITECH as old news. Its rules are now part of HIPAA enforcement. That view is a mistake.

\n\n

HITECH's fine increases, business associate needs, and breach alert rules are still enforced. They appear often in settlement deals. Make sure your program covers HITECH rules alongside core HIPAA rules.

\n\n

State Privacy and Security Laws

\n\n

Navigating the State Patchwork

\n\n

HIPAA sets a federal floor for health data protection. But many states have passed laws that go further. Teams in multiple states must follow the strictest rules that apply to them.

\n\n

Key areas where state laws may exceed HIPAA:

\n\n
    \n
  • Breach alert timelines: Several states require notice within 30 days or less, vs. HIPAA's 60-day window.
  • \n
  • Data types covered: Some states protect data not covered by HIPAA. Examples include biometric data, genetic data, or consumer health info.
  • \n
  • Consumer health data: Washington, Connecticut, and other states passed consumer health data privacy laws. These laws apply outside HIPAA.
  • \n
  • Encryption needs: Some states require encryption, not just treat it as an option.
  • \n
  • Private right of action: Several state laws let people sue for privacy breaches. HIPAA has no such option.
  • \n
  • Fine structures: State fines may stack on top of federal HIPAA fines.
  • \n
\n\n

Building a Multi-State Compliance Strategy

\n\n

Teams in multiple states should take these steps:

\n\n
    \n
  • Map state laws for every state where you operate, have patients, or have staff.
  • \n
  • Find the strictest rules across all states that apply.
  • \n
  • Build policies to the highest standard rather than keeping separate ones for each state.
  • \n
  • Track new laws — state privacy rules are changing fast.
  • \n
  • Work with legal counsel who focus on multi-state healthcare privacy.
  • \n
\n\n

The trend toward stronger state privacy laws will not slow down. Teams that build flexible, high-standard programs now will adapt more easily as rules change.

\n\n

FDA Rules for Healthcare Technology

\n\n

Medical Device and Software Compliance

\n\n

The FDA regulates medical devices. This includes a growing software class called Software as a Medical Device (SaMD). Teams that develop, deploy, or use regulated devices must follow FDA rules. These overlap with HIPAA in key areas.

\n\n

Key FDA rule areas include:

\n\n
    \n
  • Quality System Regulation (QSR): Build and design controls for medical devices, including software validation needs.
  • \n
  • Cybersecurity guidance: FDA guidance requires makers to address security gaps throughout the device's life.
  • \n
  • Unique Device Identification (UDI): Tracking needs for medical devices that overlap with asset management and security controls.
  • \n
  • Adverse event reporting: Rules for reporting device safety events that may overlap with HIPAA breach reporting.
  • \n
  • Electronic records and signatures (21 CFR Part 11): Rules for systems that create, modify, keep, or send electronic records used in FDA-regulated work.
  • \n
\n\n

Where FDA and HIPAA Overlap

\n\n

The FDA and HIPAA overlap creates real compliance challenges. Here is where they meet:

\n\n
    \n
  • Connected medical devices that collect, store, or send ePHI must meet both FDA cybersecurity rules and HIPAA Security Rule safeguards.
  • \n
  • EHR systems used in clinical trials must meet both HIPAA privacy rules and FDA data accuracy needs.
  • \n
  • Incident response for a security event on a medical device may trigger both HIPAA breach alerts and FDA adverse event reporting.
  • \n
  • Risk management for medical devices must cover both patient safety (FDA) and data privacy (HIPAA) risks.
  • \n
\n\n

Coordinate your FDA quality management and HIPAA programs. That avoids duplication and ensures controls meet both sets of rules.

\n\n

CMS Conditions of Participation and Compliance Needs

\n\n

Medicare and Medicaid Compliance

\n\n

CMS sets Conditions of Participation (CoPs). Providers must meet these to join Medicare and Medicaid programs. These conditions overlap a lot with HIPAA and other rules.

\n\n

Key CMS compliance areas include:

\n\n
    \n
  • Patient rights: CMS requires policies protecting patient privacy that align with - and sometimes go beyond - HIPAA Privacy Rule needs.
  • \n
  • Quality review and improvement (QAPI): Teams must run full quality programs that include data analysis and tracking.
  • \n
  • Medical records: CMS requires accurate, complete, and timely medical records with proper privacy safeguards.
  • \n
  • IT needs: CMS has set rules for EHR use, data sharing, and interop that overlap with HIPAA Security Rule needs.
  • \n
  • Emergency prep: CMS emergency prep needs overlap with HIPAA backup planning needs.
  • \n
  • Conditions of Payment: Billing and coding rules that carry their own fine structures.
  • \n
\n\n

CMS Audits and Surveys

\n\n

CMS compliance is checked through surveys by state agencies and accrediting bodies. These surveys look at:

\n\n
    \n
  • Policy and procedure records
  • \n
  • Staff training records and skill reviews
  • \n
  • Physical setting and safety steps
  • \n
  • Patient care quality indicators
  • \n
  • Privacy practices
  • \n
\n\n

Teams that align their HIPAA records with CMS survey needs make audits smoother. That also reduces the load on staff.

\n\n

Joint Commission Standards

\n\n

Accreditation and Beyond

\n\n

The Joint Commission is the main accrediting body for US hospitals and health systems. Accreditation is voluntary. But most states require it for Medicare participation. It is widely seen as a benchmark for healthcare quality and safety.

\n\n

Joint Commission standards that intersect with compliance include:

\n\n
    \n
  • Information Management (IM) standards: Rules for data accuracy, privacy, and security that align with HIPAA Security Rule needs.
  • \n
  • Leadership (LD) standards: Rules for oversight, compliance programs, and ethical conduct.
  • \n
  • Human Resources (HR) standards: Rules for staff training and credentialing that overlap with HIPAA workforce needs.
  • \n
  • Performance Improvement (PI) standards: Rules for data-driven quality work that overlap with CMS QAPI needs.
  • \n
  • Environment of Care (EC) standards: Physical security and safety rules that overlap with HIPAA physical protections.
  • \n
  • Emergency Management (EM) standards: Emergency prep needs that align with HIPAA backup planning.
  • \n
\n\n

Leveraging Accreditation for Compliance

\n\n

Joint Commission accreditation shows a commitment to quality and safety. Teams can use accreditation work to their benefit:

\n\n
    \n
  • Map Joint Commission standards to HIPAA, CMS, and state rules to find overlap.
  • \n
  • Use Joint Commission survey findings to spot gaps across all frameworks.
  • \n
  • Align records and evidence for Joint Commission surveys with audit needs.
  • \n
  • Train staff on combined standards, not framework-specific rules.
  • \n
\n\n

Framework Overlap and Integration

\n\n

Mapping Common Needs

\n\n

The major healthcare frameworks share a lot of common ground. Mapping these overlaps is key to efficient compliance. One control can meet multiple rules at once.

\n\n

Common Needs Across Frameworks

\n\n\n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n
Requirement AreaHIPAAHITECHJoint CommissionState Laws
Risk assessmentRequiredEnhancedRequiredVaries
Access controlsRequiredRequiredRequiredOften required
EncryptionAddressableEmphasizedExpectedOften required
Audit loggingRequiredRequiredRequiredOften required
Incident responseRequiredRequired (notification)RequiredRequired
Workforce trainingRequiredRequiredRequiredOften required
Business continuityRequiredRequiredRequiredVaries
Records retention6 years6 yearsVaries (3+ years)Varies
Patient rightsRequiredEnhancedRequiredOften enhanced
\n\n

Identifying Unique Needs

\n\n

The overlap is large, but each framework also has unique needs you must address:

\n\n
    \n
  • HIPAA: Minimum necessary standard, de-identification rules, patient access rights.
  • \n
  • HITECH: Business associate breach alerts, fine tier structure, meaningful use rules.
  • \n
  • CMS: Quality measures, payment conditions, survey readiness.
  • \n
  • Joint Commission: Tracer method compliance, sentinel event reporting, National Patient Safety Goals.
  • \n
  • FDA: Design controls, device labeling, adverse event reports.
  • \n
  • State laws: State breach timelines, consumer health data protections, private right of action.
  • \n
\n\n

Building a Unified Compliance Approach

\n\n

Setting Up a Compliance Program Framework

\n\n

A unified approach cuts duplication, lowers costs, and gives better protection. It beats running separate programs for each law. Building this takes a clear, step-by-step method.

\n\n

Step 1: Regulatory Inventory

\n\n

List every rule, standard, and need that applies to your team. Include federal laws, state laws, accreditation standards, contracts like BAAs, and field standards.

\n\n

Step 2: Requirements Mapping

\n\n

Map each framework's needs to a single control list. Group needs by area - access control, encryption, training, and so on. Find where one control can meet multiple needs.

\n\n

Step 3: Gap Analysis

\n\n

Compare your current controls to the unified map. Find gaps where controls are missing or too weak for one or more frameworks. Rank gaps by risk and legal exposure.

\n\n

Step 4: Control Setup

\n\n

Build and put in place controls that meet the strictest need in each area. This covers all frameworks without keeping separate control sets.

\n\n

Step 5: Records Integration

\n\n

Keep unified records that map each control to every framework need it covers. These speed up audit prep and show full compliance to any regulator.

\n\n

Step 6: Continuous Monitoring and Improvement

\n\n

Set up ongoing tracking to check control strength across all frameworks. Use findings from audits, incidents, and rule changes to keep the program sharp.

\n\n

The Compliance Program Elements

\n\n

Every healthcare compliance program needs seven core elements. HHS OIG guidance outlines these:

\n\n
    \n
  • Written policies and steps that address all relevant rules.
  • \n
  • Compliance officer and committee with authority, resources, and reach across the team.
  • \n
  • Training that covers all relevant frameworks, tailored to job roles.
  • \n
  • Clear communication channels, including anonymous reporting options.
  • \n
  • Internal tracking and auditing with regular checks of compliance health.
  • \n
  • Enforcement through discipline with clear, documented consequences for violations.
  • \n
  • Response and corrective action steps for identified issues.
  • \n
\n\n

Set up these elements to cover all relevant frameworks. Do not build separate systems for each.

\n\n

Audit Readiness Across Frameworks

\n\n

Preparing for Multiple Audit Types

\n\n

Healthcare teams face audits from many sources. Each has different formats, expectations, and timelines:

\n\n
    \n
  • OCR HIPAA audits: May be triggered by breach reports, complaints, or random selection. They focus on HIPAA Privacy, Security, and Breach Notification rules.
  • \n
  • CMS surveys: Run by state agencies or accrediting teams. They focus on conditions of participation.
  • \n
  • Joint Commission surveys: Unannounced surveys, done every three years, using the tracer method.
  • \n
  • State audits: Vary by state. May focus on licensure, privacy, or specific rules.
  • \n
  • Payor audits: Insurance companies and managed care teams may audit compliance with contract terms.
  • \n
  • Internal audits: Self-checks that find and fix issues before external auditors do.
  • \n
\n\n

Building an Audit-Ready Culture

\n\n

Audit readiness is not a once-a-year event. It is an ongoing stance. Teams that are always audit-ready face less disruption. They also get better results when audits happen.

\n\n

Key audit readiness practices:

\n\n
    \n
  • Central records: Keep a compliance records store that is organized, current, and open to auditors.
  • \n
  • Evidence collection: Collect proof of compliance actions often. Do not scramble to gather records before an audit.
  • \n
  • Mock audits: Run regular internal mock audits using the method and criteria of each expected audit.
  • \n
  • Staff readiness: Train staff on audit steps and expectations so they can answer auditor questions with ease.
  • \n
  • Findings tracking: Keep a central system for tracking audit findings, corrective actions, and resolution timelines.
  • \n
  • Rule tracking: Track rule changes, enforcement actions, and audit focus areas to anticipate shifts in auditor expectations.
  • \n
\n\n

Records Best Practices

\n\n

Records are the currency of compliance. Auditors judge compliance based on what teams can show through written evidence.

\n\n

Essential records include:

\n\n
    \n
  • Current policies and steps with version history and approval records
  • \n
  • Risk reviews with findings, fix plans, and progress tracking
  • \n
  • Training records showing finish dates, content covered, and test results
  • \n
  • Incident reports and review records with resolution notes
  • \n
  • Business associate agreements and vendor records
  • \n
  • Access control records including role definitions, access reviews, and change notes
  • \n
  • Audit logs from systems that hold ePHI
  • \n
  • Meeting notes from compliance committee and oversight actions
  • \n
\n\n

Keep all records for the longest retention period that applies across all frameworks. For HIPAA records, that is often six years.

\n\n

Emerging Compliance Challenges

\n\n

Artificial Intelligence and Machine Learning

\n\n

AI and machine learning in healthcare create new compliance challenges. These cut across multiple frameworks:

\n\n
    \n
  • HIPAA implications: AI systems that process PHI must follow the minimum necessary standard. De-identification must be strong enough to prevent re-identification through AI.
  • \n
  • FDA rule: AI/ML-based clinical decision tools may qualify as medical devices subject to FDA rules.
  • \n
  • Bias and equity: CMS and accreditation standards now address health equity. Teams must test AI systems for bias.
  • \n
  • Transparency: Patients and regulators want clear answers on how AI affects care decisions.
  • \n
\n\n

Interoperability and Data Exchange

\n\n

Federal interoperability rules require healthcare teams to support data exchange through standard APIs. These rules create new needs:

\n\n
    \n
  • Ensuring data exchange follows HIPAA privacy and security rules
  • \n
  • Managing patient consent and access rights for data sharing
  • \n
  • Securing API endpoints against blocked access attempts
  • \n
  • Watching third-party app access to your data
  • \n
\n\n

Telehealth and Remote Care

\n\n

Telehealth expanded greatly after 2020. That growth created lasting compliance challenges:

\n\n
    \n
  • Ensuring telehealth platforms meet HIPAA security rules
  • \n
  • Securing the home setups of remote healthcare workers
  • \n
  • Managing patient consent and records for virtual visits
  • \n
\n\n

Compliance FAQ

\n\n

How do we prioritize when multiple frameworks have conflicting needs?

\n\n

True conflicts between healthcare frameworks are rare. Most apparent conflicts come from different levels of detail. When needs seem to clash, follow the strictest one. That often meets all relevant frameworks.

\n\n

If a real conflict exists, consult legal counsel and document your analysis and your decision. Also engage with regulators for guidance when facing a genuine conflict.

\n\n

What is the most efficient way to manage compliance across multiple frameworks?

\n\n

Build a unified compliance program with one control list. Map each control to every framework need it satisfies. This cuts duplication, reduces costs, and gives full coverage.

\n\n

Use a common risk review method, combined records, and cross-team compliance committees. Address all relevant frameworks in a coordinated way.

\n\n

How often should we conduct compliance reviews?

\n\n

At minimum, run a full risk review once a year. Update it whenever big changes hit your team, technology, or rule environment. Some frameworks may call for more frequent reviews.

\n\n

Internal audits should happen at least once a year. High-risk areas may need more frequent checks. Use ongoing tracking to back up regular reviews.

\n\n

Do small healthcare teams need to comply with all these frameworks?

\n\n

The relevant frameworks depend on your size, type, and activities. All teams that handle PHI must follow HIPAA. CMS rules apply to Medicare and Medicaid participants. Joint Commission standards apply to accredited teams. State laws apply based on where you work.

\n\n

Small teams may have fewer relevant frameworks. But the ones that apply must be fully addressed. A unified approach helps small teams get the most from what they have.

\n\n

How should we handle a rule change that affects multiple compliance frameworks?

\n\n

Set up a process that tracks changes across all relevant frameworks. When a change occurs, check its impact on your control list. Find any gaps or updates needed. Then update policies and steps, inform affected staff, and document your review and response.

\n\n

Cross-reference changes against your framework map. This ensures a change in one area covers all related controls.

\n\n

Compliance Takeaways

\n\n

Healthcare compliance in 2026 demands a strategic, unified approach. Your program must address the full range of relevant rules. Teams that build unified programs covering HIPAA, HITECH, state laws, FDA, CMS, and accreditation standards operate more efficiently. They also maintain stronger audit readiness.

\n\n

Multi-framework compliance requires skill, resources, and ongoing effort. One Guy Consulting helps healthcare teams build integrated compliance programs that address all relevant rules through one efficient framework. We cover everything from initial rule mapping to ongoing tracking and audit support. We give you the guidance to navigate the healthcare compliance landscape with ease. Contact us today to build a compliance program that protects your team across every framework that applies.