HIPAA does not just govern paperwork and patient privacy policies. It also sets specific technical requirements for how your IT infrastructure must be configured, maintained, and documented. Most dental practices focus on the administrative side of compliance and underestimate how much the technical side demands.
Here is what the HIPAA Security Rule requires from your IT setup, and what is changing under the proposed 2026 updates.
HIPAA technical requirements are not optional guidelines. They are enforceable federal standards. Missing them creates the same liability as missing paperwork.
The HIPAA Security Rule organizes its requirements into three categories. All three apply to dental practices regardless of size. Together, they define what a compliant IT environment looks like.
Encryption, access controls, audit logs, multi-factor authentication, and automatic logoff. These are the IT-level controls your systems must enforce.
Screen privacy, workstation use policies, device disposal procedures, and controlled access to areas where patient data is stored or displayed.
Risk analysis, staff training documentation, incident response plans, and vendor agreements. The documentation layer that proves your controls exist.
Every staff member must have their own login credentials. Shared passwords, like a single front desk login everyone uses, are a HIPAA violation. Individual accounts are required so the system can record who accessed patient data and when. Without unique logins, your audit trail is worthless.
MFA requires a second step beyond a password to log into systems that contain patient data. Under the proposed 2026 Security Rule updates, MFA becomes mandatory for all authenticated access to systems housing ePHI. If MFA is not yet enabled on your practice management software, imaging systems, and email, that gap needs attention now.
All ePHI must be encrypted both at rest and in transit. At rest means data sitting on your server, workstations, or backup drives. In transit means data moving across your network or the internet, including X-rays sent to specialists. Under the proposed 2026 rule, encryption moves from an addressable specification to a fully mandatory requirement.
Workstations must automatically log off after a period of inactivity. An unlocked workstation in a dental operatory or waiting area can expose patient records to anyone who walks by. The specific timeout period is not defined by HIPAA, but it must be documented in your policies and consistently enforced across all machines.
Your systems must record who accessed patient data, when they accessed it, and what they did. This applies to your practice management software, imaging software, and any other system that handles patient information. In practice, this means keeping system logs active, retaining them for at least six years, and reviewing them regularly for unusual activity.
Under the proposed 2026 updates, network segmentation becomes a required control. In a dental office, this means separating your clinical imaging network from your administrative network and your public Wi-Fi. A flat network, where all devices share the same segment, fails this requirement.
Under the current rule, practices could document why certain controls were not feasible and implement alternatives. The 2026 updates remove that flexibility. Encryption, MFA, network segmentation, and penetration testing all become non-negotiable.
The HHS Office for Civil Rights published proposed Security Rule updates in January 2025. The rule targets finalization in May 2026, with a 240-day compliance window afterward. That puts the compliance deadline in early 2027 if finalized as proposed. However, the direction is clear now, and practices that wait until finalization will face compressed timelines.
| IT Requirement | Current Rule | 2026 Update |
|---|---|---|
| Encryption | Addressable. Alternatives allowed with documentation. | Mandatory. No exceptions. |
| MFA | Addressable. Risk-based flexibility. | Mandatory for all ePHI system access. |
| Network segmentation | Not explicitly required. | Required to limit lateral threat movement. |
| Vulnerability scans | No defined frequency. | Required every 6 months. |
| Penetration testing | Not explicitly required. | Required annually. |
| SRA frequency | Periodic review. | Annual. Documented and formal. |
| BAA verification | Practice executes BAA with vendor. | Annual written verification from all vendors. |
Every workstation that accesses patient data must have a documented use policy. That policy defines who can use the machine, what they can do on it, and how it must be secured when not in use. In practice, this means no personal browsing on clinical workstations, no unauthorized software installations, and clear rules about screen visibility in patient-facing areas.
When a workstation, server, or external drive reaches end of life, HIPAA requires that patient data be securely wiped before disposal. Simply deleting files or reformatting a drive does not meet this standard. Certified data destruction, with documentation, is the required approach. Many dental practices skip this step entirely, which creates compliance exposure every time aging hardware is retired.
The SRA is the foundation of HIPAA administrative compliance. It requires a documented assessment of all risks to patient data across every system your practice uses. OCR enforcement data consistently shows the missing SRA as the top finding in investigations. It must be updated whenever your technology changes, not just completed once.
Your practice must have a written plan for what to do when a security incident occurs. That plan should cover who gets notified, how systems get isolated, how data gets restored, and how patients get informed if required. Without a plan, a ransomware attack forces your team to make high-stakes decisions under pressure with no guidance.
HIPAA requires documented proof that all staff members have received HIPAA training. That means signed acknowledgments, training completion records, and regular refreshers. Training records must be retained for at least six years. A practice that trains staff verbally with no documentation has nothing to show an auditor.
Ekim IT Solutions works exclusively with dental practices. We serve New England and New York with on-site support and dental practices nationwide with remote support. We handle encryption, MFA, network segmentation, and secure backups, and we provide the signed BAA and Security Risk Analysis documentation your practice needs from its IT provider.