Your security and compliance glossary

All the terms you need to know when you’re trying to get compliance audit ready, fast.

Show filters

What is a HIPAA breach?

A HIPAA breach is defined as the acquisition, access, use, or disclosure of protected health information (PHI) in a manner not permitted by HIPAA regulations, which compromises the security or privacy of the PHI. Impermissible use or disclosure of protected health information is presumed to be a breach unless it can be shown that the probability of protected health information having been compromised is low, based on a multifactor risk assessment. The risk assessment should review the nature and extent of the PHI involved; to whom the disclosure of PHI was made; whether the PHI was in fact acquired or viewed; and the extent to which the risk to the PHI was mitigated, among other elements.


In the event of a breach of unsecured PHI, the HIPAA Breach Notification Rule requires that covered entities communicate notification of the breach to any affected individuals, the U.S. Department of Health & Human Services, and in some cases, the media.


HIPAA compliance is required of organizations and employees who work in or with the healthcare industry, or who have access to protected health information. A covered entity or business associate that fails to adhere to one or more of the HIPAA Rules is in violation of HIPAA; organizations that violate the provisions of the HIPAA Rules may be penalized. Penalties for HIPAA breaches are strict and can significantly impact an organization’s finances and reputation.

Additional resources you might like:

Compliance
Blog
How do you perform quarterly access reviews?

Without periodic access reviews, former employees may retain access to sensitive data after termination. Learn how to perform effective quarterly access reviews.

Product updates
Events
Turn Every Promise into Predictable Trust: Customer Commitments in Action

Join us for a live demo of Customer Commitments and see how Vanta turns contracts into structured, actionable intelligence.

Comparisons and reviews
Blog
The 4 best Trust Center products for 2026

Compare top platforms, key features, and buying criteria to find the right fit for compliance and sales teams.

Additional resources you might like:

Compliance
Blog
How do you perform quarterly access reviews?

Without periodic access reviews, former employees may retain access to sensitive data after termination. Learn how to perform effective quarterly access reviews.

Product updates
Events
Turn Every Promise into Predictable Trust: Customer Commitments in Action

Join us for a live demo of Customer Commitments and see how Vanta turns contracts into structured, actionable intelligence.

Comparisons and reviews
Blog
The 4 best Trust Center products for 2026

Compare top platforms, key features, and buying criteria to find the right fit for compliance and sales teams.

Security
Blog
How to request security budget from your CFO and exec teams

Bridge security and finance, show risk in dollars, and secure budgets.

Product updates
Blog
New in Vanta | March 2026

Vanta’s newest updates help you automate SSPs, unlock deeper integrations, and more.

Compliance
Blog
Government contracting compliance 101: Everything you should know

Understand the regulations and standards government contractors must meet—and the challenges involved.

Compliance
Events
Beyond the Checkbox: Scaling Compliance Across European Regulations

Watch to learn how to scale your compliance program across NIS2, DORA, and the EU AI Act — without duplicating controls or overwhelming your team.

Product updates
Events
Goodbye, Audit Chaos. Hello, Calm-pliance.

Watch this edition of Vanta Delivers to see how we’re putting audit chaos behind us and moving forward into Calm-pliance.

Product updates
Blog
New in Vanta | February 2026

Vanta’s latest releases give teams more control over audits, automated TPRM evidence collection, and more.