...

Ekim IT Solutions

Blog / HIPAA IT Requirements for Dental Practices
All Dental

HIPAA IT Requirements for Dental Practices

Featured header for a guide on HIPAA IT requirements for dental practices, featuring a medical security shield and a compliance checklist with a certification seal.

HIPAA does not just govern paperwork and patient privacy policies. It also sets specific technical requirements for how your IT infrastructure must be configured, maintained, and documented. Most dental practices focus on the administrative side of compliance and underestimate how much the technical side demands.

Here is what the HIPAA Security Rule requires from your IT setup, and what is changing under the proposed 2026 updates.

$6.6M OCR fines issued
in 2025 alone
In 2025, OCR issued more than $6.6 million in fines for HIPAA violations. Many involved basic technical safeguards that were missing or undocumented.

HIPAA technical requirements are not optional guidelines. They are enforceable federal standards. Missing them creates the same liability as missing paperwork.

The Framework

The Three Layers of HIPAA Safeguards

The HIPAA Security Rule organizes its requirements into three categories. All three apply to dental practices regardless of size. Together, they define what a compliant IT environment looks like.

1
Technical Safeguards

Encryption, access controls, audit logs, multi-factor authentication, and automatic logoff. These are the IT-level controls your systems must enforce.

2
Physical Safeguards

Screen privacy, workstation use policies, device disposal procedures, and controlled access to areas where patient data is stored or displayed.

3
Administrative Safeguards

Risk analysis, staff training documentation, incident response plans, and vendor agreements. The documentation layer that proves your controls exist.

Layer 1

Technical Safeguards: What Your IT Must Actually Do

1
Unique User Identification

Every staff member must have their own login credentials. Shared passwords, like a single front desk login everyone uses, are a HIPAA violation. Individual accounts are required so the system can record who accessed patient data and when. Without unique logins, your audit trail is worthless.

2
Multi-Factor Authentication Mandatory in 2026

MFA requires a second step beyond a password to log into systems that contain patient data. Under the proposed 2026 Security Rule updates, MFA becomes mandatory for all authenticated access to systems housing ePHI. If MFA is not yet enabled on your practice management software, imaging systems, and email, that gap needs attention now.

3
Encryption of Patient Data Mandatory in 2026

All ePHI must be encrypted both at rest and in transit. At rest means data sitting on your server, workstations, or backup drives. In transit means data moving across your network or the internet, including X-rays sent to specialists. Under the proposed 2026 rule, encryption moves from an addressable specification to a fully mandatory requirement.

4
Automatic Session Logoff

Workstations must automatically log off after a period of inactivity. An unlocked workstation in a dental operatory or waiting area can expose patient records to anyone who walks by. The specific timeout period is not defined by HIPAA, but it must be documented in your policies and consistently enforced across all machines.

5
Audit Controls and Access Logs

Your systems must record who accessed patient data, when they accessed it, and what they did. This applies to your practice management software, imaging software, and any other system that handles patient information. In practice, this means keeping system logs active, retaining them for at least six years, and reviewing them regularly for unusual activity.

6
Network Segmentation Mandatory in 2026

Under the proposed 2026 updates, network segmentation becomes a required control. In a dental office, this means separating your clinical imaging network from your administrative network and your public Wi-Fi. A flat network, where all devices share the same segment, fails this requirement.

Ekim IT Solutions provides a signed BAA as part of every managed service relationship. Find out in 15 minutes if we are the right fit for your practice.
Schedule a Fit Call →
The proposed 2026 HIPAA Security Rule eliminates “addressable” safeguards entirely. Everything becomes mandatory.

Under the current rule, practices could document why certain controls were not feasible and implement alternatives. The 2026 updates remove that flexibility. Encryption, MFA, network segmentation, and penetration testing all become non-negotiable.

Encryption
MFA
Network segmentation
Penetration testing
What Is Changing

What Is Changing Under the 2026 Security Rule Updates

The HHS Office for Civil Rights published proposed Security Rule updates in January 2025. The rule targets finalization in May 2026, with a 240-day compliance window afterward. That puts the compliance deadline in early 2027 if finalized as proposed. However, the direction is clear now, and practices that wait until finalization will face compressed timelines.

IT Requirement Current Rule 2026 Update
Encryption Addressable. Alternatives allowed with documentation. Mandatory. No exceptions.
MFA Addressable. Risk-based flexibility. Mandatory for all ePHI system access.
Network segmentation Not explicitly required. Required to limit lateral threat movement.
Vulnerability scans No defined frequency. Required every 6 months.
Penetration testing Not explicitly required. Required annually.
SRA frequency Periodic review. Annual. Documented and formal.
BAA verification Practice executes BAA with vendor. Annual written verification from all vendors.
Layer 2

Physical Safeguards: The IT Side

Workstation Use Policies

Every workstation that accesses patient data must have a documented use policy. That policy defines who can use the machine, what they can do on it, and how it must be secured when not in use. In practice, this means no personal browsing on clinical workstations, no unauthorized software installations, and clear rules about screen visibility in patient-facing areas.

Device Disposal

When a workstation, server, or external drive reaches end of life, HIPAA requires that patient data be securely wiped before disposal. Simply deleting files or reformatting a drive does not meet this standard. Certified data destruction, with documentation, is the required approach. Many dental practices skip this step entirely, which creates compliance exposure every time aging hardware is retired.

Layer 3

Administrative Safeguards: The Documentation Layer

1
Security Risk Analysis

The SRA is the foundation of HIPAA administrative compliance. It requires a documented assessment of all risks to patient data across every system your practice uses. OCR enforcement data consistently shows the missing SRA as the top finding in investigations. It must be updated whenever your technology changes, not just completed once.

2
Incident Response Plan

Your practice must have a written plan for what to do when a security incident occurs. That plan should cover who gets notified, how systems get isolated, how data gets restored, and how patients get informed if required. Without a plan, a ransomware attack forces your team to make high-stakes decisions under pressure with no guidance.

3
Staff Training Documentation

HIPAA requires documented proof that all staff members have received HIPAA training. That means signed acknowledgments, training completion records, and regular refreshers. Training records must be retained for at least six years. A practice that trains staff verbally with no documentation has nothing to show an auditor.

Frequently Asked Questions

Yes. Any dental practice that submits insurance claims electronically is a covered entity under HIPAA. That applies to virtually every dental practice in the United States, regardless of size. The technical, physical, and administrative safeguard requirements are the same for a solo practitioner as for a large group practice.
HHS targets May 2026 for finalization. After that, covered entities have 240 days to achieve compliance, putting the hard deadline in early 2027. However, the proposed changes reflect current cybersecurity best practices that OCR already expects. Waiting until the deadline creates unnecessary risk.
No, but they are responsible for a critical layer of it. Your managed IT provider handles the technical safeguards: encryption, MFA setup, network segmentation, patch management, and backup security. However, HIPAA compliance also requires administrative safeguards like documented policies, staff training, and an SRA that your practice must own. Both layers must be in place.
A standard cloud backup may not meet HIPAA requirements. A HIPAA-compliant backup requires a signed Business Associate Agreement with the backup provider, encryption of data at rest, and ideally immutable storage so backups cannot be altered or deleted by ransomware. Many dental practices use consumer-grade backup solutions that fail all three of these requirements.
Not confident your IT setup covers every HIPAA technical safeguard?

Ekim IT Solutions works exclusively with dental practices. We serve New England and New York with on-site support and dental practices nationwide with remote support. We handle encryption, MFA, network segmentation, and secure backups, and we provide the signed BAA and Security Risk Analysis documentation your practice needs from its IT provider.

One missing safeguard is enough to fail an audit. Find out if your practice has any gaps before an investigator does.
See if your practice is covered →