Stay compliant with HIPAA

The Health Insurance Portability and Accountability Act of 1996 (HIPAA) establishes standards for the security and privacy of health data, including electronic protected health information (ePHI). Covered entities and business associates must implement safeguards to limit risk and protect patient data across mobile devices, laptops, and desktops.

Download HIPAA checklist (PDF)

What HIPAA protects

Patients have legal rights over their health information. When digitized, this information is called ePHI.

Key patient rights include:

  1. The right to authorize disclosure of their health information and records.
  2. The right to request and obtain a copy of their health records.
  3. The right to request corrections to their records.

The HIPAA Security Rule technical safeguards include:

Access control: Limit ePHI access to authorized users only, with unique IDs and session controls.

Audit controls: Use technical mechanisms to record and examine access and activity in systems containing ePHI.

Integrity: Protect ePHI from improper alteration or destruction and verify data integrity.

Transmission security: Protect ePHI in transit over networks with encryption and secure channels.

How Codeproof helps keep you HIPAA aligned

Note: Codeproof provides endpoint and app controls that support HIPAA safeguards. Your organization remains responsible for overall compliance, including policies, training, and processes.

  • Encryption and access controls: Enforce device encryption, strong passcodes, auto-lock, and idle timeout on iOS, Android, Windows, and macOS.
  • BYOD separation: Use Android Work Profile and Apple User Enrollment to keep work data separate from personal data, with selective wipe for offboarding or lost devices.
  • App governance: Approve required apps, block risky apps, and control data movement between apps with managed configurations and Open In restrictions.
  • Secure connectivity: Deploy email, Wi-Fi, certificates, and per app VPN for secure access to ePHI systems.
  • Threat and posture controls: Detect rooted or jailbroken devices, monitor compliance status, and restrict access for noncompliant endpoints.
  • Remote actions: Lock, locate where policy allows, selective wipe or full wipe lost or stolen devices.
  • Audit readiness: Maintain device and user inventory, configuration history, and exportable activity logs and reports.

Related: iOS MDM · macOS MDM · Windows MDM · Android MDM · BYOD

HIPAA FAQs

What is HIPAA?
HIPAA (Health Insurance Portability and Accountability Act) is a U.S. law that sets standards to protect the privacy and security of protected health information (PHI/ePHI) handled by covered entities and business associates.
Does using Codeproof make us HIPAA compliant?
No single tool guarantees compliance. Codeproof provides device and app controls that support HIPAA safeguards alongside your administrative and physical controls.
Can we remove ePHI from a BYOD device without touching personal data?
Yes. Use selective wipe to remove the work container, managed email, VPN, certificates, and managed apps while preserving personal data.
How should we handle a lost or stolen device?
Apply remote lock and wipe, revoke certificates, document the event with activity logs, and reissue a replacement device with the required profile.
Can we enforce app allowlists and block risky apps?
Yes. Use allow/block lists and managed configurations to restrict data access to approved apps only.
What evidence can we provide auditors?
Export device inventory, configuration histories, activity logs, and compliance reports showing applied safeguards and remediation timelines.

Maximize employee productivity through Codeproof