The Health Insurance Portability and Accountability Act (HIPAA) was first enacted in 1996 to establish a federal standard for safeguarding protected health information (PHI). Within a decade, the HIPAA Privacy and Security Rules were added to the law, mandating that organizations protect both physical and electronic protected health information (ePHI).
Since then, there haven’t been many major updates to HIPAA—but that’s likely to change in 2026.
Here’s the big picture:
Let’s break down the five most impactful potential changes to keep on your radar in 2026.
One of the most anticipated updates involves sweeping changes to the HIPAA Security Rule—its first major revision since 2013.
According to the HIPAA Journal, the proposal, first published in late 2024, introduced several new mandatory cybersecurity controls that align with modern best practices. These changes are intended to strengthen protections for ePHI as cyberattacks continue to increase across the healthcare sector.
Some of the most significant proposed requirements include:
For many organizations, these changes will simply formalize practices that are already considered industry standard. The changes could take effect as early as mid-2026.
Another major change likely to be finalized this year removes the long-standing distinction between “required” and “addressable” controls.
Historically, addressable controls gave organizations flexibility in how they implemented safeguards. However, this flexibility has led to inconsistent security practices across the industry.
“Some organizations are doing a great job and going above and beyond, while others are struggling to meet the bare minimum,” said Steve Ryan, who leads BARR Advisory’s healthcare services. “The updates would level the playing field and help improve trust between patients and their healthcare providers.”
If finalized, organizations would be expected to implement all required safeguards or adopt and document a reasonable alternative. This shift aims to reduce ambiguity and create a more consistent security baseline across regulated entities.
For healthcare organizations, this means less room for interpretation and greater emphasis on documentation and justification of security decisions.
In addition to Security Rule changes, updates to the HIPAA Privacy Rule are also on the horizon.
One of the most operationally significant proposals would shorten the timeframe for providing patients access to their records. Currently, organizations have 30 days to provide requested records. Under the proposed update, the deadline would be reduced to 15 days. The proposal would allow for a single 15-day extension, the HIPAA Journal reported.
The proposal would also expand patients’ rights to:
While these changes are designed to improve patient access and care coordination, they may also increase administrative workload.
As of April 2026, no final date has been set for when these changes may go into effect.
One major change that has already been etched into law involves Substance Use Disorder (SUD) records. As of February 16, compliance with these changes is now mandatory for organizations subject to the regulation.
These changes were designed to better align SUD privacy protections with HIPAA while improving care coordination and reducing administrative complexity.
Key updates include:
Organizations that handle behavioral health or addiction treatment data should ensure their policies, procedures, and workflows are fully aligned with these requirements.
Across both proposed Security Rule updates and ongoing audit initiatives, one theme stands out: risk analysis is becoming more important than ever.
Under proposed changes, organizations may soon be required to:
At the same time, federal regulators have restarted HIPAA audit programs, placing additional attention on risk management programs and documentation practices. Organizations that lack clear, well-documented risk management processes may face increased scrutiny.
HIPAA is not a voluntary framework or best practice—it is a federal law that applies to specific types of organizations and carries significant legal and financial consequences for noncompliance. Entities required to comply with HIPAA include:
Unlike frameworks such as SOC 2, which organizations may choose to adopt, HIPAA compliance is mandatory for organizations that meet these definitions. Failure to comply can result in substantial penalties enforced by the U.S. Department of Health and Human Services Office for Civil Rights (OCR), including civil fines ranging from hundreds to millions of dollars, mandatory corrective action plans and ongoing audits, and potential legal liability.
For organizations that handle PHI, HIPAA compliance is not optional—it is a legal obligation.
HIPAA compliance is entering a new phase—one defined by stronger cybersecurity expectations, faster patient access timelines, and more structured risk management practices.
While many of the proposed changes reflect cybersecurity best practices already recommended across the industry, formalizing them into regulatory requirements raises the stakes for healthcare organizations and their business associates.
While the new rules are finalized, now is a great time to evaluate your cybersecurity controls, your risk analysis procedures, and your vendor risk management processes. Organizations that begin preparing early will be better positioned to adapt once the final rules are released.
BARR Advisory can partner with you to future-proof your organization and ensure you’re ready to comply if and when these potential changes become law. Contact us today to find out how we can help.