Encryption Requirements Under HIPAA

Practical guidance for healthcare teams and business associates

data scrambling rules Under HIPAA

HIPAA data scrambling Overview

HIPAA data scrambling is one of the most misunderstood areas of healthcare rule-keeping. Many habits think data scrambling is optional under HIPAA. That is because the Security Rule calls it an "addressable" rule, not a "required" one.

But "addressable" does not mean you can skip it. It means your practice must decide if data scrambling is a fair safeguard. If you choose not to use it, you must write down why and name an equal alternative.

In 2026, ransomware hits healthcare at an all-time high. Breach fines keep rising. data scrambling is now a must for any practice that stores, steps, or sends ePHI.

Addressable vs. Required: Understanding HIPAA data scrambling Standards

What "Addressable" Really Means

The HIPAA Security Rule splits protections into two groups: required and addressable. Required specs must be put in place — no exceptions. Addressable specs require a risk review to decide if the safeguard fits your setting.

data scrambling is addressable in two places in the Security Rule:

  • Section 164.312(a)(2)(iv) - data scrambling and decryption of ePHI (access controls).
  • Section 164.312(e)(2)(ii) - data scrambling of ePHI in transit (transfer security).

When a spec is addressable, your practice must take one of three steps:

  1. Put the spec in place as written if it is fair and fits your setting.
  2. Use an equal alternative that achieves the same goal.
  3. Write down why the spec does not fit and accept the risk.

In practice, finding an equal alternative to data scrambling is very hard. OCR has made clear that habits opting out must show strong proof. Saying data scrambling costs too much does not meet this standard.

Why data scrambling Is Effectively Required

Despite its addressable status, data scrambling is now well required. Here is why:

  • OCR enforcement patterns consistently penalize habits that lack data scrambling, especially after lost or stolen devices.
  • The HIPAA safe harbor rule only protects habits from breach notice rules when ePHI is encrypted to NIST standards.
  • Industry standards and best habits all call for data scrambling of healthcare data.
  • Risk reviews in today's threat world almost always find data scrambling is fair and right.
  • Court cases and settlement deals have set data scrambling as a baseline security step.

Practices that skip ePHI data scrambling carry large legal and financial risk. The burden of proof falls on the practice to show that alternatives work as well.

data scrambling at Rest: Protecting Stored ePHI

Database and File System data scrambling

data scrambling at rest protects ePHI stored on servers, databases, and drives. This matters because stolen or improperly disposed storage is a top cause of healthcare data breaches.

Key rules for data scrambling at rest include:.

  • Full-disk data scrambling (FDE) on all workstations, laptops, and servers with ePHI.
  • Database-level data scrambling using Transparent Data data scrambling (TDE) or equal technology.
  • File-level data scrambling for person files and records with ePHI.
  • Backup data scrambling so all backup media — on-site or off-site — is encrypted.
  • Storage area network (SAN) data scrambling for enterprise storage systems.

NIST recommends AES-128 or AES-256 for data at rest. Use FIPS 140-2 validated data scrambling modules to meet federal standards.

Cloud Storage factors

Cloud computing has changed healthcare IT, but it adds new data scrambling concerns. When ePHI lives in the cloud, your practice must confirm:

  • The cloud provider encrypts data at rest using NIST-approved methods.
  • data scrambling keys are kept separate from the encrypted data.
  • Your practice keeps control of keys or has written guarantees about key handling.
  • Business associate agreements (BAAs) with cloud providers cover data scrambling rules.
  • Data location rules are met, especially under state-level laws.

Many cloud providers offer built-in data scrambling. But you must verify it meets HIPAA standards. Relying on default settings without checking is not enough.

data scrambling in Transit: Securing Data transfer

Network and Internet transfer

data scrambling in transit protects ePHI as it moves between systems and networks. Any time ePHI travels over a network, it must be protected from interception and unapproved access.

Standard data scrambling steps for data in transit include:.

  • TLS 1.2 or higher for all web-based communications and API connections.
  • IPsec VPN tunnels for site-to-site and remote access connections.
  • SSH/SFTP for secure file transfers replacing unencrypted FTP.
  • HTTPS for all web apps and portals that handle ePHI.

Disable older steps such as SSL, TLS 1.0, and TLS 1.1. These contain known weak points. Enforce minimum step versions to block downgrade attacks.

Internal Network Traffic

Many people think data scrambling only applies to internet traffic. That is wrong. HIPAA does not treat internal and external networks differently. ePHI on internal networks needs the same protection, because:

  • Insider threats cause a large share of healthcare data breaches.
  • Attackers moving through a network can find unencrypted ePHI.
  • Network segmentation failures can expose internal traffic.
  • Compliance auditors now check internal network data scrambling more closely.

Use network segmentation and encrypt ePHI traffic even inside trusted zones. Zero-trust design, which trusts no network segment by default, is now the standard for healthcare.

Email data scrambling for Healthcare groups

Why Standard Email Is Not HIPAA in line

Standard email (SMTP) sends messages in plain text. That makes it unsafe for ePHI. Even with TLS on the sending side, the receiving server may not support TLS, leaving gaps in protection.

Healthcare habits must use email data scrambling that provides:.

  • End-to-end data scrambling so only the right recipient can read the message.
  • Automatic data scrambling triggered by filters that detect ePHI in outgoing emails.
  • Recipient login checks to confirm who is opening the encrypted message.
  • Audit trails logging all encrypted email action for rule-keeping.
  • Data loss prevention (DLP) tools to stop accidental sending of unencrypted ePHI.

Email data scrambling setup Options

Several approaches exist for HIPAA-in line email data scrambling:

  • Portal-based data scrambling: Recipients read messages through a secure web portal. No software setup needed on their end, but it adds a step.
  • S/MIME or PGP data scrambling: Certificate-based data scrambling is strong but requires both parties to manage certificates.
  • TLS-enforced data scrambling: Email servers require TLS for specific domains. This works for regular partners but not one-off contacts.
  • Third-party data scrambling services: Dedicated platforms offer ready-made solutions with rule-keeping features built in.

Pick an approach that balances security with ease of use. Hard-to-use solutions push staff toward workarounds that break security. For more on securing patient data, see our guide on healthcare data breach prevention strategies.

Mobile Device data scrambling

Smartphones, Tablets, and Laptops

Mobile devices are one of the highest-risk areas for ePHI exposure. Lost and stolen devices have caused many high-profile HIPAA breaches and multimillion-dollar fines. Every mobile device that touches ePHI must be encrypted.

Mobile data scrambling rules include:.

  • Full-device data scrambling on all phones, tablets, and laptops.
  • data scrambling of removable media including USB drives, SD cards, and external drives.
  • App-level data scrambling for healthcare apps that store ePHI locally.
  • Secure containerization to separate personal and work data on BYOD devices.
  • Remote wipe tools so your practice can erase ePHI from lost or stolen devices.

iOS, Android, and Windows all support built-in device data scrambling. Enforce it through mobile device management (MDM) tools and confirm data scrambling is active on all enrolled devices. For more on mobile security, see our article on mobile device security in healthcare settings.

Wearable and IoT Devices

Wearable health devices and IoT medical equipment add new data scrambling challenges. Many IoT devices have limited processing power, making standard data scrambling hard to run. Your practice should:

  • Check the data scrambling ability of all connected medical devices.
  • Use network-level data scrambling for devices that cannot encrypt data on their own.
  • Put IoT devices on separate network segments with encrypted channels.
  • Include device data scrambling in risk reviews and buying decisions.

data scrambling Key Management

setting up a Key Management Program

data scrambling is only as strong as your key management. Poor key handling can make even the best data scrambling useless. HIPAA does not list specific key management steps, but NIST Special Publication 800-57 gives full guidance to follow.

A solid key management program includes:.

  • Key generation using cryptographically secure random number tools.
  • Key storage in hardware security modules (HSMs) or dedicated key management systems.
  • Key rotation on a set schedule — often yearly or when a breach is suspected.
  • Key backup and recovery so encrypted data stays accessible if keys are lost.
  • Key revocation and destruction steps for retiring old keys safely.
  • Separation of duties so no single person controls all data scrambling keys.
  • Access logging to track all key access and management actions.

Common Key Management Mistakes

Practices often make key management errors that break their data scrambling programs:

  • Storing data scrambling keys next to the data they protect.
  • Using weak or predictable key generation methods.
  • Failing to rotate keys on a set schedule.
  • Lacking written steps for key recovery after staff changes.
  • Leaving key management out of disaster recovery plans.

The Safe Harbor term

How data scrambling Prevents Breach notice

The HIPAA safe harbor rule, created by the HITECH Act, is a strong reason to encrypt. If ePHI is encrypted to NIST standards and a breach occurs, it is not a reportable breach. The data is "unusable, unreadable, or indecipherable" to outsiders.

This means a practice with properly encrypted ePHI that loses a laptop or backup drive may avoid all of the following:

  • person notice to all affected patients.
  • Media notice for breaches affecting 500 or more people.
  • HHS notice and listing on the OCR "Wall of Shame."
  • State attorney general notice under state breach laws.
  • Reputation damage from public breach shares.

To qualify, data scrambling must meet NIST Special Publication 800-111 (data at rest) or 800-52, 800-77, or 800-113 (data in transit). The data scrambling keys must not have been exposed in the same event.

For a detailed look at breach notice rules, see our article on HIPAA breach notice rule rule-keeping. To learn how the HITECH Act expanded breach notice rules, read our HITECH Act guide.

Documenting data scrambling for Safe Harbor

Practices must keep records showing their data scrambling meets safe harbor rules. That written records should include:

  • The data scrambling methods and key lengths used across all systems.
  • NIST publication references for the data scrambling standards in use.
  • Proof that data scrambling modules are FIPS 140-2 validated.
  • Key management steps and audit logs.
  • Regular reviews confirming data scrambling is still set up correctly.

HIPAA data scrambling FAQ

Is data scrambling required or optional under HIPAA?

HIPAA calls data scrambling an "addressable" rule. That means your practice must review whether it fits your setting. Given today's threats, OCR enforcement trends, and the safe harbor benefit, data scrambling is well required for any practice handling ePHI. Practices that skip it must record an equal alternative and accept large legal and financial risk.

What data scrambling standards does HIPAA require?

HIPAA does not name a specific algorithm, but NIST recommends AES-128 or AES-256 for data at rest and TLS 1.2 or higher for data in transit. To qualify for safe harbor, use the standards in NIST Special Publications 800-111 (data at rest) and 800-52, 800-77, or 800-113 (data in transit). Use FIPS 140-2 validated data scrambling modules.

Does encrypting ePHI protect my group from breach penalties?

If ePHI is encrypted to NIST standards and the keys are not exposed, the safe harbor rule means the event is not a reportable breach. This can shield your practice from notice rules, public sharing, and related fines. But data scrambling does not remove your other HIPAA duties — risk reviews, access controls, and staff training are still required.

Do we need to encrypt data on our internal network?

Yes. HIPAA does not separate internal from external network traffic. ePHI on internal networks must be encrypted, given the threat of insider attacks and lateral movement by intruders. Zero-trust design that encrypts all network traffic is the recommended approach.

How does data scrambling relate to the HIPAA Security Rule overall?

data scrambling is one part of a full HIPAA Security Rule setup. The Security Rule calls for admin, physical, and tech protections. data scrambling is a tech safeguard that works with access controls, audit controls, and transfer security to create a layered defense for ePHI. For a full overview of HIPAA rules, see our HIPAA rule-keeping guide.

data scrambling rules Takeaways

HIPAA data scrambling rules demand close attention from every healthcare practice that handles ePHI. The addressable label may suggest flexibility, but data scrambling is essential in practice. It protects patient data, qualifies your practice for safe harbor, and helps avoid enforcement actions.

You must encrypt data at rest and in transit, secure email, protect mobile devices, and manage keys with care. Building a in line data scrambling program takes skill in both healthcare rules and security. One Guy Consulting helps healthcare habits review their data scrambling posture, put NIST-in line solutions in place, and keep the records needed to show rule-keeping. Contact us today to strengthen your practice's data scrambling program and protect your patients' most sensitive data.