Top HIPAA Training Questions Explained — Learn and Remember with Ease
HIPAA (pronounced “hip-uh”) stands for Health Insurance Portability and Accountability Act — a U.S. federal law passed in 1996.
It’s the law that:
- Protects the privacy of people’s health information.
- Secures electronic health data (ePHI) through safeguards.
- Gives patients the right to see, correct, and control their medical records.
Who must follow HIPAA:
- Covered Entities: hospitals, clinics, doctors, and insurers.
- Business Associates: vendors or IT companies that handle PHI for them.
PHI — Protected Health Information, meaning any data that links a person to their health (name + diagnosis, email + lab results, etc.).
Why Do Organizations Require HIPAA Certification and HIPAA Training?
Organizations require HIPAA certification or formal HIPAA training not because it’s mandated by law, but because it’s the most effective way to ensure that employees, vendors, and partners understand and comply with HIPAA rules — especially when handling Protected Health Information (PHI).
HIPAA training and certification:
- Demonstrate compliance — prove that staff are trained and aware of privacy and security standards.
- Reduce risk — prevent breaches and human errors that expose patient data.
- Support audits — provide documented proof of compliance for regulators or clients.
- Build trust — often required by healthcare partners and vendors.
- Boost reputation — show commitment to data protection and privacy.
In short, HIPAA training protects organizations from fines, enhances credibility, and ensures everyone knows how to handle sensitive health data properly.
Preparing for the HIPAA Certification Exam
Passing a HIPAA certification exam (like Certified HIPAA Professional, Administrator, or Privacy Associate) requires studying both the law and real-world compliance practices.
- Official Government Resources
- HHS.gov HIPAA Guidance Portal – official rules, FAQs, and enforcement updates.
- 45 CFR Parts 160, 162, and 164 – complete HIPAA regulations.
- HIPAA Enforcement Highlights – real enforcement cases.
- HIPAA Training & Study Guides
- HIPAA Academy – CHA™, CHP™, and CHPC™ study materials.
- HIPAATraining.net – CHPA and CHPC courses with exams.
- Compliancy Group HIPAA Training – includes self-audit templates and checklists.
- Supplemental Learning Materials
- NIST SP 800-66 – connects HIPAA Security Rule to technical safeguards.
- OCR Training Videos – official short lessons for staff.
- HIPAA Journal – daily updates and compliance news.
Core Tips for Mastering HIPAA Training and Exams
The Core Purpose of HIPAA
HIPAA exists to protect the privacy, integrity, and availability of health information.
Every rule, safeguard, or fine is built around this simple goal: “Keep patient information confidential, correct, and accessible only to the right people.”
The Three Main HIPAA Rules
Everything in HIPAA falls under one of these three pillars:
| Rule | Purpose | Focus |
| Privacy Rule | Controls who can access PHI and when. | Patients’ rights, disclosures, and authorizations. |
| Security Rule | Protects how PHI is stored, shared, and transmitted (especially electronic data). | Administrative, technical, and physical safeguards. |
| Breach Notification Rule | Requires action if PHI is lost, stolen, or exposed. | Reporting, documentation, notification deadlines. |
If you can identify which rule applies to a question, you’re already halfway there.
The Key Concept: PHI (Protected Health Information)
Understand what counts as PHI, because every other question depends on it. PHI = any individually identifiable health information (past, present, or future) that’s linked to a person.
Examples: name + diagnosis, phone + lab results, email + insurance ID. If it can identify a person and relates to health — it’s PHI.
The 3 Types of Safeguards (Security Rule)
To protect ePHI (electronic PHI), HIPAA requires three layers of protection:
| Type | Examples | Key Idea |
| Administrative | Training, risk assessments, and access policies | Human & procedural controls |
| Technical | Encryption, passwords, audit logs | System-level protection |
| Physical | Locked rooms, screen shields, device security | Real-world access control |
The “Minimum Necessary” Principle
One of the most tested ideas: use or share only the minimum necessary PHI to do your job; even if disclosure is allowed, only the essential data should be shared.
Patient Rights
Every patient has fundamental rights under the Privacy Rule: access their records; request corrections; get a copy or accounting of disclosures; file a complaint. If a question mentions “patient request,” it’s testing this section.
Breach Logic
If data is lost or exposed → ask yourself: was it PHI? Was it secured (encrypted, password-protected)? If not → breach notification applies within 60 days to individuals, HHS, and sometimes the media.
Business Associate (BA) Relationships
A Business Associate is anyone handling PHI on behalf of a Covered Entity (like a SaaS vendor, billing company, or cloud service). They must sign a Business Associate Agreement (BAA), which ensures they also comply with HIPAA. In questions: if it’s about a vendor or partner → think BAA = required.
Compliance Mindset
HIPAA is risk-based, not “zero-risk.” You must demonstrate reasonable and appropriate safeguards, rather than perfection. Auditors look for policies, documentation, and training, not just technology.
Golden Rule
When you’re unsure in an exam: “If the choice protects the patient’s privacy, follows written policy, and documents the action — it’s probably correct.”
…supplement those of the Common Rule and FDA.
Think of it as three concentric circles of protection around a patient’s data:
- Common Rule – Protects research participants as human subjects
- FDA Regulations – Protects subjects in clinical investigations of drugs/devices
- HIPAA – Protects health information (PHI) used or disclosed in research
Imagine a university hospital running a diabetes drug trial:
The IRB (under the Common Rule) ensures informed consent.
The FDA oversees drug safety and reporting.
HIPAA governs how the hospital uses patient records — requiring either authorization from the patient or a waiver by the IRB.
So HIPAA comes in addition — it doesn’t replace the other two.
identifiable health information that is created or held by covered entities and their business associates.
HIPAA protects a special type of information called “Protected Health Information” (PHI).
That means any personal health data that can identify someone and is handled by healthcare organizations or their partners.
So, PHI = personal + medical + handled by covered entities (or their business associates)
Easy examples:
PHI (Protected Health Information):
“John Smith – diabetes test results”
“Patient #10245 – MRI images” (if linked to name)
“jane.doe@email.com – COVID-19 vaccination record”
“Employee health record stored in hospital database”
❌ Not PHI:
“Anonymous diabetes statistics”
“MRI image with no identifiers”
“Number of vaccines given in 2024”
“Fitness tracker data shared privately (not by a covered entity)”
must be more detailed for disclosures that involve fewer than 50 subject records.
When someone (the data subject, meaning the patient) asks for an accounting of disclosures, the organization must tell them when and why their health information was shared with others.
Now — if the disclosure involved fewer than 50 people (records), HIPAA requires the organization to give more detailed, individual-level information about those disclosures.
If the disclosure involved 50 or more people, the organization can give a summary instead.
Example 1 – Small disclosure (fewer than 50 people):
A clinic mistakenly emails lab results for 20 patients to a researcher before getting authorization.
When one of those patients asks for an “accounting of disclosures,” the clinic must list each disclosure individually —
Date of disclosure
Who received it
What information was shared
Why it was shared
Example 2 – Large disclosure (more than 50 people):
A hospital participates in a state public health report and shares records for 5,000 patients.
The hospital can give a summary like:
“Between January–March 2025, we disclosed records of approximately 5,000 patients to the State Department of Health for public health surveillance purposes.”
development of generalizable knowledge.
Under HIPAA, “research” is not just any use of medical data — it specifically refers to systematic studies designed to produce knowledge that applies to people in general, not just to one patient or one organization.
So HIPAA says:
Research = organized effort to learn something new that can be generalized (applied broadly).
“Generalizable” = knowledge that can be applied to other cases, people, or settings — not just the specific situation studied.
It’s the opposite of a one-time internal review or a patient care improvement.
Example 1:
A hospital tests a new medication to see if it lowers blood pressure and plans to publish the results. This is considered research under HIPAA because it aims to generate generalizable knowledge that can apply to others beyond the hospital’s own patients.
Example 2:
A clinic reviews its own patients’ records to check whether they followed appointment reminders. This is not considered research under HIPAA because it’s a quality improvement activity intended for internal use only, not to produce generalizable findings.
for all human subjects research that uses PHI without authorization from the data subject, except for limited data sets.
If a researcher uses someone’s medical information without getting their written permission, the organization must keep a record (an accounting) of that disclosure — unless the data shared has been partially de-identified (a “limited data set”).
Example 1 – Disclosure accounting required:
A university hospital researcher studies the effects of a new asthma medication using patient medical records.
The IRB approves a waiver of authorization (patients didn’t sign forms). The hospital must keep a disclosure accounting showing which research project used which PHI and when.
Example 2 – Disclosure accounting NOT required:
The same researcher uses a limited data set (records contain only age, diagnosis, and city — no names or contact info). No disclosure accounting is required because the data isn’t fully identifiable.
Uses “plain language” that the data subject can understand, similar to the requirement for an informed consent document.
A HIPAA authorization is a written permission from a patient (called the data subject) that allows their Protected Health Information (PHI) to be used or disclosed for a specific purpose — such as research, marketing, or sharing with a third party.
HIPAA requires that this authorization be written in plain language — meaning:
The wording must be clear, simple, and understandable to the average person — not full of legal or medical jargon.
It’s the same principle used for informed consent forms in research:
patients should know exactly what information is being shared, why, with whom, and for how long — and they must understand it easily.
Bad example (not plain language):
“I authorize the release of my PHI to facilitate investigational pharmaceutical studies as determined by the Institutional Review Board.”
— This sounds legalistic and hard to understand.
Good example (plain language):
“I give permission for my medical records to be shared with researchers studying new medicines. I understand I can cancel this permission at any time.”
— Clear, simple, and understandable to any adult.
…is research, and so requires either an authorization or meeting one of the criteria for a waiver of authorization.
Under HIPAA, “retrospective research” — also called data mining — that uses PHI (Protected Health Information) is considered research.
Therefore, it requires either:
- a patient’s authorization, or
- a waiver of authorization approved by an IRB (Institutional Review Board) or Privacy Board.
Example 1 – Authorization required:
A researcher reviews 10 years of hospital records to study how smoking habits affect heart disease.
Because they’re using identifiable PHI (names, dates, diagnoses), this counts as research, so the hospital must either:
- Obtain each patient’s authorization, or
- Obtain an IRB waiver of authorization.
Example 2 – Waiver granted:
The researcher applies to the IRB and shows that contacting thousands of patients is impossible, and that all data will be securely stored and de-identified after analysis.
The IRB grants a waiver, allowing the study to proceed without individual authorizations.
…can qualify as an activity “preparatory to research,” at least for the initial contact, but data should not leave the covered entity.
When researchers are looking for potential participants (recruiting) using medical records, that early stage — where they’re just reviewing data to identify who might qualify — can be treated as “preparatory to research” under HIPAA.
This means:
They don’t need patient authorization yet, as long as they don’t remove any identifiable data from the covered entity (like a hospital or clinic).
Example 1 – Allowed (preparatory to research):
A hospital researcher wants to study diabetes patients over age 60.
They review patient charts inside the hospital system to estimate how many people fit the criteria.
This is preparatory to research — no authorization needed, because data stays within the covered entity.
Example 2 – Not allowed (goes beyond preparatory):
The same researcher exports names and phone numbers of those patients to start calling them about the study before IRB approval or authorization.
Not allowed. Data left the covered entity → violates HIPAA.
Recruiting or contacting patients requires authorization or an IRB waiver.
an organizational IRB or Privacy Board, privacy official (“Privacy Officer”), or security official (“Security Officer”), depending on the issue.
If you’re not sure how HIPAA applies to a research situation — for example, whether you need authorization, a waiver, or what counts as PHI — you should ask the people in your organization who are responsible for HIPAA compliance:
- The IRB or Privacy Board,
- The Privacy Officer, or
- The Security Officer,depending on your question.
You don’t have to guess — there are designated experts in every HIPAA-covered organization who handle these issues.
…to all human subjects research that uses PHI without authorization from the data subject.
If a researcher is allowed to use Protected Health Information (PHI) — for example, under a waiver of authorization from an IRB or Privacy Board — they must still limit the PHI they access, use, or share to the minimum amount necessary to achieve the research purpose.
In other words:
Even when HIPAA allows you to use PHI, you can’t take everything — only what you truly need.
Example 1 – Minimum necessary applied:
A university researcher is studying diabetes trends and gets an IRB waiver to use PHI.
They only need patient age, gender, and blood glucose readings.
They should not request full medical records with names, addresses, or unrelated data.
That’s following the minimum necessary rule.
Example 2 – Violation:
A researcher with a waiver downloads complete hospital records (including contact info and unrelated lab results) “just in case” they might need them later.
That’s a HIPAA violation — the researcher accessed more PHI than necessary.
…development of generalizable knowledge.
Under HIPAA, research doesn’t just mean doing experiments or clinical trials — it also includes any systematic activity designed to learn something new that can be applied beyond one person, clinic, or case.
So if the purpose of using PHI (Protected Health Information) is to create knowledge that could apply to other people or situations, HIPAA considers that activity research.
Example 1:
A hospital looks at 10 years of heart attack cases to publish a report about which treatments work best.
This is research under HIPAA because it’s meant to create generalizable knowledge that others can use.
Example 2:
A clinic reviews its own patient records to see if reminder calls help patients come to appointments on time.
This is not research under HIPAA because it’s only for internal quality improvement, not to share or publish broadly.
Example 3:
A researcher studies de-identified health data from several hospitals to find patterns in cancer risk.
This is research because it helps develop knowledge that applies to many people, not just one group.
Example 4:
A doctor checks one patient’s blood test results to decide on medication.
This is not research — it’s part of normal patient care, not a study.
Data that does not cross state lines when disclosed by the covered entity.
HIPAA allows some uses or disclosures of PHI without patient permission — but not all.
Your job is to identify the one situation that still requires authorization (the “EXCEPT”).
You can use or disclose PHI without authorization for:
-
Treatment – sharing info among healthcare providers to care for a patient.
→ Example: A surgeon sends lab results to an anesthesiologist before surgery. -
Payment – sharing info with insurance companies for billing or claims.
→ Example: A clinic sends diagnostic codes to an insurer for reimbursement. -
Healthcare operations – internal activities like audits, training, quality improvement.
→ Example: A hospital reviews charts to evaluate staff performance. -
Public health activities – reporting diseases, injuries, or vital events.
→ Example: A lab reports positive COVID-19 results to a state health department. -
Law enforcement or legal requirements – responding to subpoenas, court orders, or certain crimes.
→ Example: A hospital provides records under a valid court order. -
Research with IRB/Privacy Board approval – if there’s a waiver or limited data set.
→ Example: A researcher with an IRB waiver studies anonymized patient data. -
Organ donation, coroners, or funeral directors – for identifying deceased persons or determining the cause of death.
-
Serious threats to health or safety – warning authorities about imminent danger.
Example 1 – Allowed without authorization:
A hospital reports a case of measles to the local health department.
Allowed (public health exception).
Example 2 – Allowed without authorization:
A clinic sends PHI to an insurance company to get paid for a procedure.
Allowed (payment).
Example 3 – NOT allowed without authorization:
A hospital gives patient email addresses to a pharmaceutical company for a new drug promotion.
Not allowed — this is marketing and requires patient authorization.
PHI transmitted electronically.
In fact, it also applies to PHI in any form — electronic, paper, or even spoken — as long as it’s handled by a covered entity or business associate.
But the rule was originally designed to protect electronic transmission of health data (like emails, faxes, electronic health records), which are especially vulnerable to privacy breaches.
Example 1 – Electronic (covered):
A hospital sends a patient’s MRI results to a specialist via secure email.
Covered by the HIPAA Privacy Rule — it’s PHI transmitted electronically.
Example 2 – Electronic (covered):
A billing company uploads patient data to a secure cloud system for insurance claims.
Covered — it’s electronic PHI (ePHI) handled by a business associate.
Example 3 – Paper (also covered):
A nurse prints a discharge summary with patient identifiers.
Still covered under the Privacy Rule — PHI in any form is protected.
Example 4 – Verbal (also covered):
A doctor discusses a patient’s diagnosis with another provider over the phone.
Still covered — verbal disclosures are included.
Example 5 – Not covered:
A researcher uses a fully de-identified dataset (no names, dates, or identifiers).
Not covered by HIPAA, because it’s no longer “PHI.”
…a health plan, a health care clearinghouse, or a health care provider engaged in standard electronic transactions covered by HIPAA.
Under HIPAA, a Covered Entity (CE) is:
- a health plan,
- a health care clearinghouse, or
- a health care provider who conducts standard electronic transactions (like billing or insurance claims) that HIPAA covers.
HIPAA doesn’t apply to every person or company that touches health data.
It applies specifically to these three types of organizations that handle Protected Health Information (PHI) in the healthcare system.
If a provider never transmits data electronically (for example, a small rural clinic that does everything on paper), HIPAA does not apply to them as a “covered entity.”
But in practice, almost all modern providers use electronic billing — so they are covered.
Example 1 – Health plan:
Blue Cross Blue Shield processes insurance claims for patients.
It’s a covered entity (health plan).
Example 2 – Provider using electronic billing:
A dentist submits insurance claims online for patient cleanings.
It’s a covered entity (health care provider engaged in electronic transactions).
Example 3 – Clearinghouse:
A billing company that converts hospital claim data into a standard format before sending it to insurers.
It’s a covered entity (clearinghouse).
Example 4 – Not a covered entity:
A fitness app that tracks heart rate but doesn’t bill insurance or work for a healthcare provider.
Not a covered entity — HIPAA doesn’t apply (unless it partners with one).
limits uses, disclosures, and requests for PHI to the minimum necessary amount of PHI needed to carry out the intended purposes of the use or disclosure. The minimum necessary standard does not apply to disclosures to, or requests by, a health care provider for treatment purposes. It also does not apply to uses or disclosures made to the individual or pursuant to the individual’s authorization.
HIPAA says that when someone uses, discloses, or requests Protected Health Information (PHI), they should share only the smallest amount of information necessary to do the job.
This rule helps protect patient privacy by limiting unnecessary exposure of health data.
Example 1 – Minimum necessary applies:
A hospital billing office requests patient info to send an insurance claim.
They should only receive what’s needed for billing — not full medical records.
Example 2 – Minimum necessary applies:
A researcher uses PHI under an IRB waiver.
They must request only the data necessary for the research (e.g., age and diagnosis, not full identifiers).
Example 3 – Exception (does NOT apply):
A doctor emails another doctor the patient’s full chart to coordinate treatment.
Minimum necessary rule does not apply because this is for treatment.
Example 4 – Exception (does NOT apply):
A patient requests a full copy of their medical record.
Minimum necessary rule does not apply because it’s their own data.
Example 5 – Exception (does NOT apply):
A patient signs a written authorization allowing their data to be shared for a legal case.
The rule does not apply — the patient gave explicit permission.
An individual’s first and last name and the medical diagnosis in a physician’s progress report.
PHI (Protected Health Information) = any information that:
-
Identifies an individual (like name, address, phone number, etc.), and
-
Relates to their health, healthcare, or payment for healthcare.
So, it’s not just about health data — it’s health data linked to a person’s identity.
If both conditions are true → it’s PHI and protected under HIPAA.
Example 1 – PHI:
“John Smith – Type 2 Diabetes”
Contains a name (identifier) + health info (diagnosis) → PHI.
Example 2 – PHI:
“Patient with phone number (555) 123-4567 treated for anxiety.”
The phone number identifies the patient → PHI.
Example 3 – Not PHI:
“20% of patients in our clinic have diabetes.”
No identifying info → not PHI (it’s statistical data).
Example 4 – Not PHI:
“Anonymous patient data showing blood pressure trends.”
No names, no identifiers → de-identified → not PHI.
PHI that is transmitted or maintained by a covered entity or a business associate in any form or medium.
The HIPAA Privacy Rule protects Protected Health Information (PHI) — whether it’s:
-
Sent (transmitted electronically, by fax, or verbally), or
-
Stored (maintained in files, databases, paper charts, or backups),
as long as it’s handled by a covered entity (like a hospital or insurer) or a business associate (like a billing or cloud storage company).
And “in any form or medium” means — it doesn’t matter how it exists: electronic, paper, or spoken.
HIPAA protects it all.
Example 1 – Electronic PHI (ePHI):
A hospital emails lab results to a specialist.
Protected — PHI transmitted electronically.
Example 2 – Paper PHI:
A nurse prints a patient’s discharge summary with name and diagnosis.
Protected — PHI maintained on paper.
Example 3 – Verbal PHI:
A doctor discusses a patient’s treatment plan with another doctor by phone.
Protected — PHI disclosed verbally.
Example 4 – PHI stored by a vendor:
A cloud storage company hosts a hospital’s patient database.
Protected — business associate maintaining PHI electronically.
Example 5 – Not PHI:
A fitness tracker app that collects heart rate but doesn’t work for a covered entity.
Not covered by HIPAA — it’s not transmitted or maintained by a CE or BA.
The HIPAA Security Rule established a national set of standards for the protection of PHI that is created, received, maintained, or transmitted in electronic media by a HIPAA CE or BA; protects ePHI; and addresses three types of safeguards – administrative, technical, and physical – that must be in place to secure individuals’ ePHI.
The HIPAA Security Rule created national standards to protect electronic Protected Health Information (ePHI) — that is, any health information created, received, stored, or transmitted electronically by a Covered Entity (CE) or Business Associate (BA).
It focuses on how to secure that information through three types of safeguards: administrative, technical, and physical.
So, the Security Rule is about keeping electronic health information safe from unauthorized access, theft, or damage.
Example 1 – Administrative safeguard:
A hospital performs an annual risk analysis to identify vulnerabilities in its systems and trains staff on security procedures.
That’s part of administrative protection.
Example 2 – Technical safeguard:
A clinic uses encryption when emailing lab results to ensure only the intended recipient can read them.
That’s a technical safeguard.
Example 3 – Physical safeguard:
A healthcare organization locks its server room and uses security cameras to prevent unauthorized physical access.
That’s a physical safeguard.
Example 4 – Not covered by Security Rule:
A paper medical record stored in a file cabinet.
This is PHI, but not ePHI, so the Privacy Rule, not the Security Rule, applies.
True.
HIPAA does not apply to education records that are already protected under FERPA (the Family Educational Rights and Privacy Act).
FERPA is another federal law that protects the privacy of student education records — including certain health records maintained by schools.
Both HIPAA and FERPA are privacy laws, but they cover different settings:
-
HIPAA protects medical information held by healthcare providers and insurers.
-
FERPA protects student education and health information held by schools.
Example 1 – Education record (covered by FERPA, not HIPAA):
A school nurse keeps a student’s vaccination record or visits to the nurse’s office.
That’s an education record under FERPA, so HIPAA does not apply.
Example 2 – College health clinic:
A university health center keeps records of a student’s medical visit.
Still FERPA, not HIPAA, because the clinic is part of the school system and maintains the record as part of education records.
Example 3 – Outside healthcare provider:
A hospital (not part of a school) treats a high school student for a broken arm and stores their medical record.
That’s PHI under HIPAA, not FERPA — because it’s not an education record.
Related Posts
Get Updates and Insights Straight to Your Inbox
Stay up to date with the latest news, announcements, and articles.


