HIPAA Overview for Developers

A plain language guide to what HIPAA means for engineering teams that handle patient data.

What Is HIPAA?

The Health Insurance Portability and Accountability Act (HIPAA) is a US federal law that sets standards for protecting sensitive patient health information. The part that matters most for engineering teams is the HIPAA Security Rule (45 CFR Part 164), which defines administrative, physical, and technical safeguards for electronic Protected Health Information (ePHI).

What Is ePHI?

Electronic Protected Health Information (ePHI) is any individually identifiable health information that is created, stored, transmitted, or received electronically. This includes:

  • Patient names, addresses, dates of birth, Social Security numbers
  • Medical record numbers, health plan IDs, account numbers
  • Diagnoses, medications, lab results, treatment notes
  • Biometric identifiers (fingerprints, voice prints)
  • Any other data that can identify a patient when combined with health information

If your application stores, processes, or transmits any of this data, HIPAA applies to your code.

What the Security Rule Requires

The Security Rule defines 14 categories of safeguards. Here are the ones most relevant to software engineering:

164.502

Uses and Disclosures of PHI

Defines when and how protected health information may be used or disclosed. Covered entities must limit use of PHI to the minimum necessary for the intended purpose. Code that exposes patient identifiers (names, SSNs, medical records) in API responses, logs, or error messages violates this standard.

164.312(a)(1)

Access Control

View official text →

Only authorized users should access ePHI. Implement role-based access, unique user IDs, automatic session timeouts, and emergency access procedures.

164.312(a)(2)(iv)

Encryption and Decryption

View official text →

Encrypt ePHI at rest and in transit using industry-standard algorithms (AES-256, RSA). Never hardcode encryption keys in source code.

164.312(b)

Audit Controls

View official text →

Record and examine activity in systems that contain ePHI. Log who accessed what, when, and what actions they took. Logs must be tamper-resistant.

164.312(c)(1)

Integrity Controls

View official text →

Protect ePHI from improper alteration or destruction. Validate data at rest and implement checksums or digital signatures where appropriate.

164.312(d)

Person or Entity Authentication

View official text →

Verify the identity of anyone seeking access to ePHI. Use strong authentication: passwords plus multi-factor authentication, biometrics, or hardware tokens.

164.312(e)(1)

Transmission Security

View official text →

Protect ePHI in transit over electronic networks. Use TLS/HTTPS for all transmissions. Never send ePHI in URL parameters, unencrypted emails, or plaintext logs.

164.310(d)(2)(i)

Disposal

View official text →

Implement policies and procedures for the final disposition of ePHI and the hardware or media on which it is stored. Code that stores ePHI must include expiration policies, cleanup routines, and proper disposal mechanisms.

164.308(a)(3)

Workforce Security

View official text →

Ensure that only authorized workforce members have access to ePHI based on their role. Implement least-privilege access patterns.

164.308(a)(6)

Security Incident Procedures

View official text →

Identify, respond to, and mitigate security incidents. Implement monitoring, alerting, and incident response workflows.

Why Code Review Matters

Most HIPAA violations in code are not malicious. They're oversights. A developer logs patient data to the console for debugging and forgets to remove it. An API endpoint returns the full patient record when the client only needs the name. A database migration adds a column for SSN without encryption.

These mistakes are easy to make and hard to catch in manual code review, because reviewers are focused on logic and functionality, not regulatory compliance. Automated HIPAA-aware code review catches them at the PR stage, before the code reaches production, before patients are affected, and before the audit.

Common Violations Complint Catches

  • Logging ePHI to console, stdout, or unencrypted log files
  • Sending ePHI in URL parameters or query strings
  • Hardcoded encryption keys or secrets in source code
  • Missing access control on endpoints that return patient data
  • Unencrypted ePHI at rest (database columns without encryption)
  • Missing audit logging on ePHI access or modification
  • API responses that over-expose patient fields (returning SSN when only name is needed)
  • Infrastructure-as-code without encryption or logging configuration

Who Needs to Comply?

Any organization that handles ePHI is a covered entity or a business associate. If your company has signed a Business Associate Agreement (BAA) with a healthcare provider, health plan, or clearinghouse, HIPAA applies to your engineering team. This includes SaaS companies, infrastructure providers, analytics platforms, and any vendor that touches patient data.

Complint automates HIPAA-aware code review on every pull request. It reads the diff, retrieves relevant regulatory context, and flags violations with specific CFR citations and suggested fixes. Install the GitHub App and the next PR gets reviewed automatically.

Get Started