ARTICLE
16 February 2026

HIPAA Enforcement: A Look Ahead At 2026 Informed By 2025's Inflection Points

FH
Foley Hoag LLP

Contributor

Foley Hoag provides innovative, strategic legal services to public, private and government clients. We have premier capabilities in the life sciences, healthcare, technology, energy, professional services and private funds fields, and in cross-border disputes. The diverse experiences of our lawyers contribute to the exceptional senior-level service we deliver to clients.
The healthcare ecosystem has closed the book on a volatile 2025, and HIPAA enforcement has moved into 2026 with sharper edges, wider apertures, and higher stakes.
United States Food, Drugs, Healthcare, Life Sciences
Foley Hoag LLP are most popular:
  • within Antitrust/Competition Law and Immigration topic(s)

The healthcare ecosystem has closed the book on a volatile 2025, and HIPAA enforcement has moved into 2026 with sharper edges, wider apertures, and higher stakes. Regulators spent 2025 refining the tools they use, broadening the set of entities they scrutinize, and tightening expectations around cybersecurity hygiene, vendor oversight, and the responsible use of digital technologies. At the same time, parallel enforcement—from the Department of Justice, the Federal Trade Commission, and state attorneys general—has reinforced the reality that data protection failures are not just a compliance problem; they are an enterprise risk with civil, criminal, and reputational dimensions.

What 2025 Signaled—And Why It Matters

In 2025, the Office for Civil Rights maintained its steady cadence on HIPAA Right of Access cases, but increasingly linked access failures to broader issues—training, audit controls, and vendor performance—resulting in corrective action plans that are deeper, more prescriptive, and longer in duration. Ransomware, extortion, and third-party compromise incidents dominated the breach landscape, and OCR acted when it observed encryption "in name only," lagging patch management, and incomplete network segmentation. These deficiencies drew scrutiny not as isolated misses, but as indicators of a security program that had failed to keep pace with anticipated threats.

Regulators also signaled less tolerance for ambiguity around tracking technologies and analytics. OCR's focus on pixel and SDK deployments continued, with an emphasis on whether regulated entities know where data flows, what identifiers are transmitted, and whether disclosures fall within HIPAA's framework or require authorization and business associate agreements. The takeaway from 2025 was that undocumented assumptions, untested vendor claims, and incomplete data mapping are no longer defensible regarding pixels.

Finally, 2025 underscored an expansion in the enforcement perimeter. The FTC's Health Breach Notification Rule enforcement and state health privacy statutes operated in the space where HIPAA does not reach—consumer-facing health apps, digital tools, and non-covered intermediaries—creating a layered enforcement environment. Covered entities and business associates increasingly found themselves accountable not only for their own controls, but for the practical downstream realities of their digital ecosystem.

The 2026 Enforcement Outlook: Five Themes to Plan Around

1) Expect continued rigor on the basics.
Encryption at rest and in transit, privileged access management, multifactor authentication, vulnerability remediation timelines, and incident response playbooks remain fundamentals. For documentation, you need logs that prove controls are enabled and effective, metrics showing patching intervals and exception management, and board-level reporting that demonstrates oversight of security performance, not just policy adoption.

2) Vendor risk management will be judged, and the metric will be outcomes.
OCR and parallel enforcers will look past contract clauses to confirm that providers know which vendors touch protected health information, that security representations have been validated, and that terminations, substitutions, and subcontractor changes are traceable. A living, risk-based inventory, periodic testing of vendor controls, and clear escalation paths for vendor incidents will be essential.


3) Digital health and tracking technologies will remain enforcement priorities.
Can you prove your pixels do not disclose PHI without authorization? Anticipate diligence records on data elements captured, IP address treatment, unique identifiers, and any fingerprinting, with corresponding legal rationales and BAAs where appropriate. Where consent is implicated, regulators will assess whether the consent is specific, informed, and technically enforced.

4) The line between HIPAA enforcement and white-collar risk will continue to blur.
Expect increased coordination between OCR, DOJ, and state authorities when breach investigations uncover wire fraud, identity theft, kickbacks facilitated by data misuse, or false statements to regulators and patients. When cyber incidents intersect with claims data, utilization records, or patient enrollment information, healthcare organizations should assume that criminal exposure for individuals—not only corporate liability—will be assessed.

5) Artificial intelligence will move into everything.
As health systems implement AI for scheduling, documentation, triage, and revenue cycle, regulators will probe training data provenance, access to PHI within model workflows, and the adequacy of role-based controls and human oversight. Documentation of purpose limitations, output monitoring, and error handling will be necessary to demonstrate compliance with HIPAA's minimum necessary standard and safeguards.

Rulemaking and Guidance: What to Watch

On the policy front, organizations should watch for continued alignment of health privacy frameworks where HIPAA intersects with other federal and state regimes. Expect additional clarity around reproductive health-related disclosures, the ongoing harmonization of 42 C.F.R. Part 2 confidentiality rules with HIPAA's structure, and further articulation of cybersecurity expectations through HHS performance goals and sector-specific guidance.

Parallel Enforcement: FTC, State AGs, and Litigation Pressures

The FTC will continue to treat undisclosed data flows and misleading privacy claims as deceptive practices, particularly in the non-covered app and device ecosystem, while state attorneys general leverage state health privacy and general UDAP laws.

At the same time, class actions will track regulatory theories, with plaintiffs emphasizing allegedly inadequate security controls, misrepresentations in privacy notices, and harms tied to identity abuse and out-of-pocket mitigation costs.

The practical result is concurrent exposure: a single incident can trigger OCR inquiry, consumer litigation, FTC examination, and state AG scrutiny.

Practical Steps for 2026 Readiness

The organizations best positioned for 2026 will treat HIPAA not as a statutory minimum, but as a floor within a broader risk framework. This starts with disciplined governance: board-level dashboards that quantify security performance, regular briefings that tie threat intelligence to control health, and clear accountability for vendor oversight, data mapping, and product review.

This effort continues with operational excellence: tested incident response across ransomware and extortion scenarios, tabletop exercises that include legal, communications, clinical operations, and revenue cycle, and documented learning loops that convert findings into budgeted remediation.

Organizations also need principled product design: formal reviews for any new data-collecting technology—pixels, SDKs, AI tools, connected devices—before deployment, with monitoring to confirm that configurations remain compliant as vendors update code.

Finally, entities should prepare for investigations as though they are inevitable: preserve logs and artifacts, maintain chronologies and decision records contemporaneously, and ensure counsel can demonstrate why the chosen safeguards are reasonable and appropriate for the organization's risk profile.

To view Foley Hoag's Security, Privacy and The Law Blog please click here

The content of this article is intended to provide a general guide to the subject matter. Specialist advice should be sought about your specific circumstances.

[View Source]
See More Popular Content From

Mondaq uses cookies on this website. By using our website you agree to our use of cookies as set out in our Privacy Policy.

Learn More