- HIPAA Insider
- Posts
- Your stack is compliant... right?
Your stack is compliant... right?
One misconfigured tool can change that fast
Your tech stack might be your biggest compliance risk by HIPAA Vault
Running a healthcare practice in 2026? Your tech stack isn’t just about speed—it’s about survival.
In this week’s podcast, HIPAA Vault CEO Gil Vidals makes one thing clear: buying “HIPAA-compliant” tools won’t save you. Compliance comes down to how those tools are configured, who has access, and whether your team actually uses them correctly.
Catch the full episode: ▶️ Watch on YouTube or 🎧 listen on Spotify
Start with the basics
Instead of overbuilding, smart practices are stacking their tech:
Email: Still the communication backbone—but only compliant with the right setup (and a signed BAA)
Collaboration tools: Powerful, but risky without tight permissions and access controls
Website hosting: Your “digital front door” becomes a liability the moment it touches patient data
Then level up
Once the foundation is solid, practices add:
The big takeaway: Tools don’t create compliance—systems do.
And even then, there’s a catch: your team.
Quote of the week
“Technology is the enabler for sure. But your people are truly the firewall.”
HIPAA in 2026 isn’t a checklist—it’s a strategy. Build it right from day one, or pay for it later.
→ Don’t wait for a compliance scare. Review your stack with a free HIPAA risk assessment today.
Industry News Roundup
Alabama eye care practice breach settles—patients may get ~$60
A cyberattack on Alabama Ophthalmology Associates is turning into a modest payday—for patients, at least.
Hackers accessed the practice’s network for about a week in January 2025, exposing sensitive data from 131,000+ individuals, including Social Security numbers, medical records, and insurance details.
Multiple lawsuits followed, alleging the practice failed to implement reasonable safeguards and didn’t provide adequate breach notifications, leading to the exposure of patient data. The company denies wrongdoing—but agreed to settle anyway to avoid a long (and expensive) legal fight.
What patients get
The settlement offers:
2 years of credit monitoring + identity protection
Up to $5,000 for documented losses
Or a ~$60 cash payout (depending on claims)
Deadlines are already on the clock, with final approval expected this summer.
This is becoming a familiar pattern—breach happens, data is exposed, lawsuits follow, and settlements land somewhere between “helpful” and “underwhelming.”
The real cost? Not the $60—it’s the long-term trust hit and regulatory exposure.
👉 Think $60 is worth your data? See what this breach could mean for your practice
Your intake forms might be leaking more than you think
Patients love digital forms. Regulators? Not so much—at least not when they’re set up wrong.
Most practices assume their website forms are “secure enough.” But here’s the catch: encryption during submission isn’t the whole story. What happens after someone hits submit is where risk creeps in.
Where things go wrong
Data stored in unsecured databases
Forms sending PHI via plain email
Weak access controls behind the scenes
Sound familiar? That’s exactly how small gaps turn into big breaches.
A better way to collect patient data
HIPAA-compliant forms are built to:
Encrypt data in transit and at rest
Restrict access based on roles
Provide audit trails and visibility
Support proper retention and deletion policies
Translation: safer workflows, fewer headaches.
→ Still using basic web forms? It might be time to upgrade before it becomes a problem.
