Do you think HIPAA laws only apply to hospitals, doctors, and nurses? Check out the HIPAA Is Not Just for Healthcare Part 1 video below.

It’s a common misconception — and a costly one. In reality, HIPAA is not just for healthcare. Any business that touches, stores, or transmits health-related information is responsible for protecting that data.

In a recent TNtv episode, Sarah Badahman, founder of HIPAAtrek, sat down with ThrottleNet to explain how HIPAA compliance extends far beyond the medical industry — and why businesses across St. Louis and the Midwest need to take notice.


HIPAA Impacts More Than You Think

HIPAA (the Health Insurance Portability and Accountability Act) was designed to protect protected health information (PHI) — but PHI exists in far more places than a hospital or doctor’s office.

If your business handles employee health benefits, insurance claims, medical billing, wellness programs, or any data that could reveal someone’s medical condition or diagnosis, you fall under HIPAA compliance regulations.

“HIPAA isn’t just for physicians or hospitals,” says Badahman. “If your company touches health-related data in any form — digital or paper — you’re expected to protect it.”

That includes law firms, HR departments, third-party administrators, IT vendors, insurance brokers, and even accounting firms. If your business interacts with PHI, you’re responsible for how that data is stored, shared, and secured.


HIPAA Breach vs. Typical Cyberattack: What’s the Difference?

One of the most eye-opening points in Badahman’s TNtv segment is that a HIPAA breach is not the same thing as a traditional cybersecurity breach.

While a typical cyberattack involves unauthorized access to electronic systems, a HIPAA breach covers a much broader range of data exposure.

A HIPAA breach occurs when there is:

  • Unauthorized acquisition, access, or disclosure of protected health information (PHI)
  • In violation of HIPAA’s Privacy Rule
  • Whether the data was stored electronically, on paper, or another medium

That means a misplaced file, an unsecured laptop, or even an email sent to the wrong person could trigger a reportable HIPAA incident.

And the consequences? They’re steep.


Why HIPAA Enforcement Is Tougher Than Ever

Badahman warns that the federal government is cracking down on HIPAA violators — especially small to mid-sized businesses that assume they’re exempt.

The 2013 Omnibus Rule made it much harder for companies to deny responsibility after an incident. Once a potential HIPAA breach is reported, the business is presumed guilty until it proves otherwise.

That’s why every organization — not just healthcare providers — needs to conduct a HIPAA risk assessment and implement strong security measures.

“The burden of proof now falls on the business,” Badahman explains in HIPAA Is Not Just for Healthcare Part 1. “If there’s a breach, you have to prove it didn’t violate HIPAA — not the other way around.”


The Four Factors in a HIPAA Risk Assessment

When a possible HIPAA breach occurs, regulators use four key factors to determine the level of risk and whether a violation has taken place:

  1. The nature and extent of the data involved – Was it just basic contact info, or did it include sensitive data like diagnosis codes or social security numbers?
  2. Who received the data – Was it accidentally sent to a trusted partner, or leaked publicly to unauthorized individuals?
  3. Whether the data was actually viewed or acquired – Intent and access matter. A misdirected file unopened by the wrong person is treated differently than a viewed record.
  4. The extent of mitigation – How quickly did the organization act to contain, report, and prevent future incidents?

These factors shape the response and potential penalties — but they also serve as a blueprint for prevention. A well-documented compliance plan, backed by secure IT systems, can drastically reduce your exposure.


The Danger of Public Wi-Fi

Badahman also highlighted one often-overlooked HIPAA risk: working on sensitive information over public Wi-Fi.

Physicians, administrators, and remote employees sometimes log into systems at coffee shops, airports, or hotels — unaware that these public networks make private information easy to intercept.

“Once a public network connection is established, private EMR data can be seen by others,” Badahman warns.

Her advice: never access or transmit PHI over an unsecured network. Work should be performed only on local, encrypted devices or through secure VPN connections.

This is one of the simplest and most effective ways to avoid accidental HIPAA violations — and it’s a reminder that compliance is as much about behavior as it is about technology.


HIPAA Compliance Requires IT Support

The takeaway from HIPAA Is Not Just for Healthcare Part 1? Even if you’re not in the healthcare field, you still need an IT infrastructure capable of maintaining HIPAA-level protection.

That means:

  • Encrypted networks and secure remote access
  • Regular employee training on data privacy
  • Routine risk assessments and documentation
  • 24/7 monitoring for suspicious activity

ThrottleNet’s Managed IT and Cybersecurity Services are built to help businesses across St. Louis and Kansas City achieve compliance peace of mind. With a 2-minute average response time, 93% same-day resolution rate, and a $500,000 cybersecurity protection guarantee, our team keeps your systems secure, monitored, and HIPAA-ready.


Why This Matters for Every Business

Small and mid-sized businesses often assume that compliance laws like HIPAA or PCI-DSS don’t apply to them. But cybercriminals — and regulators — don’t discriminate.

A single misplaced record or unsecured laptop could lead to fines, lawsuits, and loss of client trust. Even worse, you may not realize you’re required to comply until it’s too late.

By adopting modern IT solutions, such as managed security, encrypted cloud systems, and compliance-focused data management, your business can stay compliant and protected — without adding internal complexity.

As Badahman reminds viewers: “Compliance isn’t just about avoiding fines — it’s about protecting the people behind the data.”


HIPAA Is Not Just for Healthcare Part 1

About the Video: HIPAA Is Not Just for Healthcare Part 1

This article is based on TNtv’s “HIPAA Is Not Just for Healthcare Part 1” featuring Sarah Badahman, CEO and founder of HIPAAtrek. In this episode, Sarah discusses the misconceptions surrounding HIPAA, what truly counts as a breach, and the four key factors that define compliance.

She also explains in HIPAA Is Not Just for Healthcare Part 1 how HIPAA laws apply to all organizations that handle health-related data — not just medical providers — and shares practical steps for preventing costly violations.

Russia's Hybrid War: What to Know About Hackers and Ukraine

16 Ways to Protect Your St. Louis Business From Cyberattacks

Free Download
15 Ways to Protect Your Business from Cyberattacks