HIPAA and Medical Billing: Why Every Claim Is a Compliance Event
Every time patient health information (PHI) is used for billing purposes, HIPAA applies — and billing is one of the most PHI-intensive activities in healthcare. A single claim submission transmits the patient's full name, date of birth, address, Social Security number (in some legacy systems), insurance member ID, diagnosis codes that reveal their medical conditions, procedure codes that reveal the treatments they received, and payment amounts. Multiply that by hundreds or thousands of claims per month and the volume of PHI flowing through your billing operation is enormous. When you outsource billing, your billing partner becomes a Business Associate under HIPAA, triggering specific legal requirements under the HIPAA Privacy Rule, Security Rule, and Breach Notification Rule. But even if you handle billing in-house, every element of the billing process — claim submission, eligibility verification, remittance processing, patient statements, denial appeals, and collections — involves PHI and must comply with HIPAA's minimum-necessary standard, access controls, encryption requirements, and audit-logging obligations. OCR (the Office for Civil Rights within HHS) imposed $6.7 million in HIPAA penalties in 2025 across 15 enforcement actions, and billing-related violations were a factor in several of those cases.
Business Associate Agreements: Non-Negotiable Before Any PHI Sharing
Before sharing any PHI with a billing company, clearinghouse, EHR vendor, IT service provider, cloud storage provider, or even a shredding company, you must have a signed Business Associate Agreement (BAA) in place. This is not a best practice — it is a federal legal requirement under 45 CFR 164.502(e). The BAA must define what PHI the business associate can access and for what purposes (billing companies access PHI for treatment, payment, and healthcare operations), the specific safeguards the business associate will implement to protect PHI (encryption standards, access controls, audit logging), the business associate's obligation to report any breach of unsecured PHI to the covered entity within a specified timeframe (typically 24 to 72 hours of discovery), the business associate's obligation to return or destroy PHI at contract termination, and the covered entity's right to terminate the agreement if the business associate violates HIPAA. Sharing PHI without a signed BAA is itself a HIPAA violation, regardless of whether a breach occurs. OCR imposed a $1.55 million penalty on North Memorial Health Care specifically for sharing PHI with a business associate without a BAA. Never work with a billing company that does not proactively provide a BAA. If they do not offer one before you ask, it signals a fundamental compliance gap in their operation. Go Medical Billing executes a comprehensive BAA with every client before accessing any patient data, and our BAA exceeds minimum HHS requirements.
Required Technical Safeguards for Billing Operations
The HIPAA Security Rule (45 CFR Part 164, Subpart C) requires specific technical safeguards for any system that stores, processes, or transmits electronic PHI (ePHI). For billing operations, the required safeguards include: encryption for data in transit (TLS 1.2 or higher for all network transmissions — this covers claim submissions, eligibility checks, remittance downloads, and email containing PHI) and data at rest (AES-256 for stored data on servers, workstations, laptops, and portable devices). Access controls: unique user identification for every person who accesses billing systems (no shared logins), role-based access that limits each user to the minimum necessary data for their job function, and automatic session timeout after a defined period of inactivity (15 minutes is the standard benchmark). Audit logging: every access to ePHI must be logged with the user ID, timestamp, and action taken (view, edit, print, export, delete). Logs must be retained for a minimum of six years under HIPAA, though some states require longer retention. Integrity controls: mechanisms to verify that ePHI has not been altered or destroyed improperly, including checksums and backup verification. Go Medical Billing implements 256-bit AES encryption for all data at rest, TLS 1.3 for all data in transit, role-based access controls with quarterly access reviews, comprehensive audit logging with seven-year retention, and documented security policies reviewed annually.
Want Help With This?
Our team handles everything discussed in this article. Get a free billing assessment.
98%+ clean claim rate
2.49% starting rate
Results in 30 days
The Annual Security Risk Assessment: The Most Important Compliance Step
HIPAA requires every covered entity and business associate to conduct a Security Risk Assessment (SRA) at least annually. The SRA is not a checkbox exercise — it is the most important HIPAA compliance requirement, and failing to conduct one is the single most common finding in OCR enforcement actions, appearing in over 80% of resolution agreements and civil monetary penalty cases. The SRA must evaluate: where ePHI is created, received, maintained, or transmitted across all systems in your organization (EHR, practice management system, billing software, email, fax machines, portable devices, paper records), the current security measures protecting ePHI in each location, the threats and vulnerabilities to ePHI in each location (external threats like hackers and ransomware, internal threats like unauthorized access and human error), the likelihood and potential impact of each identified threat, and the risk level for each identified vulnerability. Based on the SRA findings, the practice must develop and implement a risk-management plan that addresses identified gaps within a reasonable timeframe. HHS provides a free SRA Tool at healthit.gov for small and medium practices. Larger organizations typically use specialized GRC platforms like Compliancy Group, HIPAA One, or SecurityMetrics. If you are audited by OCR, the first document they request is your SRA. Not having one triggers automatic Tier 1 or Tier 2 penalties.
HIPAA Penalty Tiers and Real Enforcement Examples
HIPAA penalties follow a four-tier structure based on the level of culpability, and the fines are significant enough to threaten the financial viability of a small practice. Tier 1 — Did Not Know: the covered entity was unaware and could not reasonably have known of the violation. Penalty: $100 to $50,000 per violation, annual cap $25,000 per identical provision. Tier 2 — Reasonable Cause: the violation was due to reasonable cause, not willful neglect. Penalty: $1,000 to $50,000 per violation, annual cap $100,000. Tier 3 — Willful Neglect, Corrected: the violation resulted from willful neglect but was corrected within 30 days. Penalty: $10,000 to $50,000 per violation, annual cap $250,000. Tier 4 — Willful Neglect, Not Corrected: willful neglect not corrected within 30 days. Penalty: $50,000 per violation, annual cap $1.5 million per identical provision. Real enforcement examples: Premera Blue Cross paid $6.85 million for a breach affecting 10.4 million individuals where the SRA was inadequate. Cottage Health paid $3 million for a breach caused by a misconfigured server. Presence Health paid $475,000 for failing to notify affected individuals of a breach within the required 60-day window. Criminal penalties also exist: knowingly obtaining or disclosing PHI carries fines up to $250,000 and imprisonment up to 10 years.
Breach Notification: The 60-Day Rule
When a breach of unsecured PHI occurs, the Breach Notification Rule establishes strict timelines. Individual notification: every affected patient must be notified in writing within 60 calendar days of discovering the breach. The notice must describe what happened, the types of PHI involved, steps individuals should take to protect themselves (credit monitoring, identity-theft precautions), what your practice is doing to investigate and mitigate, and contact information for questions. HHS notification: breaches affecting 500 or more individuals must be reported to HHS within 60 days, and HHS publishes these on its public breach portal (the Wall of Shame at ocrportal.hhs.gov). Breaches affecting fewer than 500 individuals must be reported to HHS annually by March 1 of the following year. Media notification: breaches affecting 500 or more individuals in a single state or jurisdiction require notification to prominent media outlets in that state. The 60-day clock starts from the date the breach is discovered, not from the date it occurred. Many breaches go undetected for months — which is why audit logging and regular log review are critical. If you discover a breach 90 days after it happened, you still have 60 days from discovery to notify. But if you should have discovered it earlier and did not because you lacked adequate monitoring, OCR may consider that willful neglect.
HIPAA Compliance When Working with Go Medical Billing
When you outsource billing to Go Medical Billing, HIPAA compliance is built into every layer of our operation. Before accessing any patient data, we execute a comprehensive BAA that exceeds minimum HHS requirements and includes specific security commitments, breach-response timelines, and annual compliance attestation. Our technical environment implements every required HIPAA safeguard: 256-bit AES encryption at rest, TLS 1.3 in transit, role-based access controls with quarterly reviews, comprehensive audit logging with seven-year retention, multi-factor authentication on all systems, endpoint detection and response on all workstations, and documented incident-response procedures with a 24-hour initial-assessment protocol. Our workforce receives HIPAA training at hire and annually thereafter, with documented competency verification. Every employee signs a confidentiality agreement and undergoes a background check. We conduct a comprehensive Security Risk Assessment annually using a third-party auditor and maintain a risk-management plan that addresses all identified vulnerabilities. Our Privacy Officer and Security Officer oversee compliance operations and serve as the point of contact for any HIPAA-related inquiries from clients or regulatory authorities. When you work with Go Medical Billing, your HIPAA exposure decreases rather than increases — because we bring a level of security infrastructure that most small and mid-size practices cannot justify building internally.