Your security and compliance glossary

All the terms you need to know when you’re trying to get compliance audit ready, fast.

Show filters

What is a HIPAA breach?

A HIPAA breach is defined as the acquisition, access, use, or disclosure of protected health information (PHI) in a manner not permitted by HIPAA regulations, which compromises the security or privacy of the PHI. Impermissible use or disclosure of protected health information is presumed to be a breach unless it can be shown that the probability of protected health information having been compromised is low, based on a multifactor risk assessment. The risk assessment should review the nature and extent of the PHI involved; to whom the disclosure of PHI was made; whether the PHI was in fact acquired or viewed; and the extent to which the risk to the PHI was mitigated, among other elements.


In the event of a breach of unsecured PHI, the HIPAA Breach Notification Rule requires that covered entities communicate notification of the breach to any affected individuals, the U.S. Department of Health & Human Services, and in some cases, the media.


HIPAA compliance is required of organizations and employees who work in or with the healthcare industry, or who have access to protected health information. A covered entity or business associate that fails to adhere to one or more of the HIPAA Rules is in violation of HIPAA; organizations that violate the provisions of the HIPAA Rules may be penalized. Penalties for HIPAA breaches are strict and can significantly impact an organization’s finances and reputation.

Additional resources you might like:

Compliance
Blog
Government contracting compliance 101: Everything you should know

Understand the regulations and standards government contractors must meet—and the challenges involved.

Compliance
Events
Beyond Compliance: Building a Scalable Trust Program with Vanta

Join us to see how high-growth companies use Vanta to build trust, stay audit-ready, and scale with confidence.

Compliance
Blog
How to choose the best access review software: A buyer’s guide

Learn why access review software is essential and how to choose and implement the right solution.

Additional resources you might like:

Compliance
Blog
Government contracting compliance 101: Everything you should know

Understand the regulations and standards government contractors must meet—and the challenges involved.

Compliance
Events
Beyond Compliance: Building a Scalable Trust Program with Vanta

Join us to see how high-growth companies use Vanta to build trust, stay audit-ready, and scale with confidence.

Compliance
Blog
How to choose the best access review software: A buyer’s guide

Learn why access review software is essential and how to choose and implement the right solution.

GDPR
Blog
GDPR basics: Everything you need to know to keep your business compliant

Learn the basics of GDPR, what GDPR compliance means for your organization, and how the GDPR rights granted to those in the EU may impact your business.

Security
Events
The CISO Playbook: How Security Leaders at Calm, Perforce, Xactus, and Vanta Drive Outcomes

Hear from CISOs at Calm, Perforce, Xactus, and Vanta for The CISO Playbook - a panel on how enterprise security leaders demonstrate value to boards, manage risk at scale, and align security programs with growth and executive expectations.

GDPR
Events
Learn How to Automate Compliance for ISO 27001, GDPR, and more

Watch this on-demand demo to learn how Vanta automates compliance for ISO 27001, DORA, the EU AI Act, and more, saving you time and money.

Product updates
Blog
New in Vanta | December 2025

Vanta launched AI-generated policies, multiple risk registers, and vendor intake forms.

Compliance
Events
Learn How to Automate Compliance for SOC 2, ISO 27001, and More

Watch our on-demand demo to learn how Vanta can help you accelerate compliance with deep automation and agentic workflows that handle evidence, policies, and remediation for you across frameworks like SOC 2, ISO 27001, HIPAA, and more.

Security
Blog
Beyond security theater: How automated trust closes the AI readiness gap

AI risks are accelerating, but manual compliance can’t keep up.