Announcing Agent Commander - The First Integrated solution from Veeam + Securiti.ai enabling the scaling of safe AI agents

View

AI & HIPAA: What It Means and How to Automate Compliance

Contributors

Anas Baig

Product Marketing Manager at Securiti

Aswah Javed

Associate Data Privacy Analyst at Securiti

Published February 19, 2026

Listen to the content

Artificial Intelligence (AI) is impacting industries across the globe, transforming conventional ways in which organizations operate, provide services, and make decisions. This rapid transformation is felt across sectors, particularly the healthcare industry, where AI is accelerating clinical diagnosis, providing personalized treatment and medicine, improving patient engagement, unlocking operational efficiency, and much more.

As AI sweeps its way into the healthcare industry and workflow, ensuring the security of protected health information (PHI) becomes a non-negotiable requirement to demonstrate compliance with the Health Insurance Portability and Accountability Act (HIPAA), a law tasked with protecting sensitive PHI from unauthorized disclosure, providing patients’ rights over their healthcare records, and ensuring the secure exchange of patient data.

This guide explores the impact of AI in the healthcare industry, the rules AI developers and deployers must follow, and provides an AI HIPAA compliance checklist.

Why HIPAA is Critical for AI in Healthcare

HIPAA, enacted on August 21, 1996, is a US federal law that mandates strict privacy and security requirements for Protected Health Information (PHI). It forms the basis for securing sensitive patient health data by requiring covered entities, such as healthcare providers and their business associates, to implement administrative, physical, and technical safeguards that limit access to PHI, prevent unauthorized data disclosure, and ensure the confidentiality, integrity, and availability of patient healthdata across multiple systems and workflows.

A. AI Utilizes PHI

HIPAA is more than just critical for AI in healthcare, as AI systems thrive on massive volumes of patient data to provide improved patient healthcare services, generate valuable insights, automate workflows, and much more. During this accelerated performance and capability, AI systems end up processing PHI, and that’s where HIPAA begins to apply immediately in an effort to secure patients’ sensitive data from being mishandled or utilized without consent.

B. AI Intensifies Privacy Risks

Since AI is data-hungry by nature, if PHI ends up being processed by the AI model, it can escalate into a massive data exposure. This nightmare is highly likely when an individual ends up feeding PHI to an unregulated AI tool that processes that information, and it ends up outside the secure environment. HIPAA ensures individuals dealing with PHI are aware of its privacy and security requirements, despite the promising advantage of AI tools.

C. HIPAA Mandates Security Controls

To begin with, there’s no way around providing healthcare services without ensuring HIPAA compliance. With that in mind, healthcare providers and associates have to embed security measures as a core part of PHI processing, storing, and sharing. HIPAA’s Security Rule mandates these entities to implement role-based access controls, data encryption, regular audits and risk assessments, a robust incident response plan, and much more.

D. AI Providers are Subject to HIPAA

AI providers whose platform collects, processes, stores, and shares PHI are automatically subject to HIPAA regulations. Such providers must comply with all HIPAA-related security obligations and sign a Business Associate Agreement (BAA) certifying that they’ll ensure the privacy and security of PHI in compliance with HIPAA privacy and security rules.

E. HIPAA Minimizes Regulatory Noncompliance Risks

HIPAA isn’t just an act on paper. It’s a comprehensive regulation that demands covered entities to comply with each requirement to secure PHI. Noncompliance with HIPAA regulations can lead to hefty noncompliance penalties from the HIPAA regulatory authority, the U.S. Department of Health and Human Services (HHS) Office for Civil Rights (OCR).

HIPAA Rules AI Must Follow

AI developers and deployers must ensure that their AI tool ensures the following:

A. The Privacy Rule

AI providers must ensure sensitive PHI protection by minimizing its usage and disclosure. This ensures that PHI is not shared or exposed through AI tools unless it’s allowed under HIPAA.

B. The Security Rule

AI providers must develop AI systems keeping security as a first priority rather than an afterthought. AI systems must be designed with state-of-the-art security controls such as multi-factor authentication, role-based access controls, regular risk assessments and audits, and secure storage and transfer.

8 Steps to Keep AI HIPAA-Compliant

Here are the practical steps to keep AI-HIPAA compliant:

1. Data Minimization and Purpose Limitation

AI providers must ensure that they collect only the minimum personal data necessary for a specific, defined goal and use that data only for that purpose.

2. Data Retention and Deletion

AI providers must reduce liability and storage costs by defining how long and where PHI will be stored, along with how and when it will be deleted once it no longer serves its collected purpose.

3. Identify PHI in the AI Model

At its core, the AI model is running on data fed to the model. The key is to identify where PHI resides, whether it’s in the chat inputs, input documents, storage server, outputs, etc.

4. Opt for HIPAA Compliant AI Tools

There’s no need to reinvent the wheel, especially when a HIPAA-compliant AI tool is already available. Just ensure that the AI tool is certified by an accredited body and prioritizes data encryption, access controls, audits, etc.

5. Engage in a Business Associate Agreement (BAA)

Whether an AI model is developed internally or sourced externally, a BAA is crucial for demonstrating compliance. The BAA outlines permitted PHI usage, security, incident response, and subcontractor requirements, certifying the healthcare organization’s capability of honoring HIPAA requirements.

6. Conduct Risk Assessments

Under the HIPAA Security Rule, covered entities and business associates are required to conduct risk assessments to identify and mitigate evolving risks. For AI, this includes the evaluation of risks like data leaks and model inversion attacks. This ensures top-notch data confidentiality, integrity, and availability.

7. Data Encryption and Access

Data encryption is the first priority organizations should undertake, where PHI is encrypted at rest (in databases and logs) and in transit (between your application and AI’s API). Additionally, PHI access should be limited to authorized individuals, minimizing inadvertent data exposure.

8. Data Lineage

Data moves through on-premises, cloud, and multi-cloud environments at lightning speeds. Data lineage helps provide a traceable, well-documented history of PHI as it traverses across systems, borders, and continents.

Automate Compliance with Securiti DSPM

As regulatory pressure increases and data environments grow more complex, organizations can no longer rely on manual methods to ensure compliance. DSPM offers a proactive, automated, and scalable solution to maintaining a continuous data security and privacy posture, not just for HIPAA, but for any current or future regulation.

Securiti's Data Command Center (rated #1 DSPM by GigaOM) provides a built-in DSPM solution, enabling organizations to secure sensitive data across multiple public clouds, private clouds, data lakes and warehouses, and SaaS applications, protecting both data at rest and in motion.

With Securiti, organizations can leverage contextual data intelligence and controls to discover and classify data, minimize ROT (Redundant, Obsolete, and Trivial) data risk, reduce misconfiguration vulnerabilities, prevent unauthorized data access, understand data flow, and enforce consistent security controls across the data journey, including real-time streaming data, while also managing compliance and breach risk.

Schedule a demo to learn more.

Analyze this article with AI

Prompts open in third-party AI tools.
Join Our Newsletter

Get all the latest information, law updates and more delivered to your inbox



More Stories that May Interest You
Videos
View More
Rehan Jalil, Veeam on Agent Commander : theCUBE + NYSE Wired: Cyber Security Leaders
Following Veeam’s acquisition of Securiti, the launch of Agent Commander marks an important step toward helping enterprises adopt AI agents with greater confidence. In...
View More
Mitigating OWASP Top 10 for LLM Applications 2025
Generative AI (GenAI) has transformed how enterprises operate, scale, and grow. There’s an AI application for every purpose, from increasing employee productivity to streamlining...
View More
Top 6 DSPM Use Cases
With the advent of Generative AI (GenAI), data has become more dynamic. New data is generated faster than ever, transmitted to various systems, applications,...
View More
Colorado Privacy Act (CPA)
What is the Colorado Privacy Act? The CPA is a comprehensive privacy law signed on July 7, 2021. It established new standards for personal...
View More
Securiti for Copilot in SaaS
Accelerate Copilot Adoption Securely & Confidently Organizations are eager to adopt Microsoft 365 Copilot for increased productivity and efficiency. However, security concerns like data...
View More
Top 10 Considerations for Safely Using Unstructured Data with GenAI
A staggering 90% of an organization's data is unstructured. This data is rapidly being used to fuel GenAI applications like chatbots and AI search....
View More
Gencore AI: Building Safe, Enterprise-grade AI Systems in Minutes
As enterprises adopt generative AI, data and AI teams face numerous hurdles: securely connecting unstructured and structured data sources, maintaining proper controls and governance,...
View More
Navigating CPRA: Key Insights for Businesses
What is CPRA? The California Privacy Rights Act (CPRA) is California's state legislation aimed at protecting residents' digital privacy. It became effective on January...
View More
Navigating the Shift: Transitioning to PCI DSS v4.0
What is PCI DSS? PCI DSS (Payment Card Industry Data Security Standard) is a set of security standards to ensure safe processing, storage, and...
View More
Securing Data+AI : Playbook for Trust, Risk, and Security Management (TRiSM)
AI's growing security risks have 48% of global CISOs alarmed. Join this keynote to learn about a practical playbook for enabling AI Trust, Risk,...

Spotlight Talks

Spotlight
Future-Proofing for the Privacy Professional
Watch Now View
Spotlight 50:52
From Data to Deployment: Safeguarding Enterprise AI with Security and Governance
Watch Now View
Spotlight 11:29
Not Hype — Dye & Durham’s Analytics Head Shows What AI at Work Really Looks Like
Not Hype — Dye & Durham’s Analytics Head Shows What AI at Work Really Looks Like
Watch Now View
Spotlight 11:18
Rewiring Real Estate Finance — How Walker & Dunlop Is Giving Its $135B Portfolio a Data-First Refresh
Watch Now View
Spotlight 13:38
Accelerating Miracles — How Sanofi is Embedding AI to Significantly Reduce Drug Development Timelines
Sanofi Thumbnail
Watch Now View
Spotlight 10:35
There’s Been a Material Shift in the Data Center of Gravity
Watch Now View
Spotlight 14:21
AI Governance Is Much More than Technology Risk Mitigation
AI Governance Is Much More than Technology Risk Mitigation
Watch Now View
Spotlight 12:!3
You Can’t Build Pipelines, Warehouses, or AI Platforms Without Business Knowledge
Watch Now View
Spotlight 47:42
Cybersecurity – Where Leaders are Buying, Building, and Partnering
Rehan Jalil
Watch Now View
Spotlight 27:29
Building Safe AI with Databricks and Gencore
Rehan Jalil
Watch Now View
Latest
View More
Building Sovereign AI with HPE Private Cloud AI and Veeam Securiti Gencore AI
How HPE Private Cloud AI, NVIDIA acceleration, and Veeam Securiti Gencore AI support secure, governed enterprise AI with policy enforcement across RAG, assistant, and agentic workflows.
View More
Securiti.ai Names Accenture as 2025 Partner of the Year
In a continued celebration of impactful collaboration in DataAI Security, Securiti.ai, a Veeam company, has honored Accenture as its 2025 Partner of the Year....
Largest Fine In CCPA History_ What The Latest CCPA Enforcement Action Teaches Businesses View More
Largest Fine In CCPA History: What The Latest CCPA Enforcement Action Teaches Businesses
Businesses can take some vital lessons from the recent biggest enforcement action in CCPA history. Securiti’s blog covers all the important details to know.
View More
AI & HIPAA: What It Means and How to Automate Compliance
Explore how the Health Insurance Portability and Accountability Act (HIPAA) applies to Artificial Intelligence (AI) in securing Protected Health Information (PHI). Learn how to...
View More
Minimize What You Expose: Privacy Guardrails for AI Agents and Copilots
Minimize data exposure in AI agents and copilots. Apply privacy guardrails like data minimization, access controls, masking, and policy enforcement to prevent leakage and...
View More
From Data Visibility to AI Velocity
Access the whitepaper and discover how unified DataAI security turns data governance into a business enabler, boosting AI innovation with visibility, compliance, and risk...
View More
Agent Commander: Solution Brief
Learn how Agent Commander detects AI agents, protects enterprise data with runtime guardrails, and undoes AI errors - enabling secure, compliant AI adoption at...
Compliance with CCPA Amendments with Securiti View More
Compliance with CCPA Amendments with Securiti
Stay compliant with 2026 CCPA amendments using Securiti, covering updated consent requirements, expanded sensitive data definitions, enhanced consumer rights, and readiness assessments.
View More
Take the Data Risk Out of AI
Learn how to prepare enterprise data for safe Gemini Enterprise adoption with upstream governance, sensitive data discovery, and pre-index policy controls.
View More
Navigating HITRUST: A Guide to Certification
Securiti's eBook is a practical guide to HITRUST certification, covering everything from choosing i1 vs r2 and scope systems to managing CAPs & planning...
What's
New