HIPAA and GDPR are leading frameworks that protect the privacy of individuals. Learn the difference between the two
Robb Taylor-Hiscock
Privacy Content Lead, CIPP/E, CIPM
September 21, 2022
While HIPAA and GDPR both oversee how personal information is used, they maintain entirely different scopes.
HIPAA is focused on healthcare organizations and how personal health information is used in the US. GDPR, on the other hand, is a broader legislation that supervises any organization handling personally identifiable information of an EU or UK citizen.
We compare the two frameworks in more detail below, including the similarities and differences that set HIPAA and GDPR apart.
The Health Insurance Portability and Accountability Act of 1996 (HIPAA) is a US law that limits the use of protected health information (PHI) by healthcare organizations, which it refers to as covered entities.
A covered entity can be any of the following:
HIPAA defines PHI as any information that qualifies as a personal identifier. For example, billing information, insurance accounts, medical histories, mental health conditions, or laboratory results.
While HIPAA doesn’t have a certifying body or official certification, it’s enforced by the US Department of Health and Human Services’ Office for Civil Rights (OCR).
Cases of non-compliance or violations can result in fines and penalties, as well as a damaged reputation.
Any covered entity or business associate of a covered entity is legally required to be HIPAA compliant. The process involves performing routine technical and nontechnical evaluations to ensure compliance against HIPAA’s three main rules:
The General Data Protection Regulation, or GDPR, became law on May 25, 2018, and exists as one of the most stringent data privacy and security laws around the world.
It applies to all organizations targeting or collecting personally identifiable information (PII) of people in the UK or the EU, regardless of whether they physically operate within those jurisdictions. The data is referred to as personally identifiable information (PII) and includes anything that can be used to clearly identify a person.
Under the GDPR, organizations are required to safeguard and provide documentation of the protocols used to protect PII. The documented steps should cover the following:
Regardless of size, an organization must appoint a DPO if:
If you handle PII of individuals in the UK and EU, you are legally required to comply with the GDPR. Failure to do so could result in hefty fines up to €20 million or 4% of your worldwide annual revenue.
Timelines for GDPR implementation vary between processors, controllers, and company structure, but typically take anywhere from six to 36 weeks.
Once implemented, an internal GDPR assessment must be completed periodically for organizations to demonstrate their continued compliance. An organization can also apply for an optional certification.
The most apparent difference between HIPAA vs. GDPR is the jurisdiction and industry in which each law applies. Here are three other differences between HIPAA and GDPR:
With the GDPR, breach size does not matter. Article 33 of the GDPR places a 72-hour breach reporting deadline and requires providers to report all breaches to supervisory authorities.
Organizations that are either HIPAA- or GDPR-compliant already have existing safeguards in place to protect data. While there are more differences than similarities between HIPAA and. GDPR, there is some framework overlap:
HIPAA and GDPR compliance are two legal requirements that benefit both the organization and the individuals they serve. While each one involves distinct rules and regulations, they do have some overlap in their aim and process to protect data subjects.
Learn more about gaining compliance by downloading our eBook about the ISO 27001 journey. You can also learn more about OneTrust Privacy Automation here.
Webinar
Join our live demonstration and see how Compliance Automaiton can help boost compliance efficiency with automated workflows, shared evidence, and 40+ frameworks.
Webinar
Join our Saudi Arabia PDPL webinar for an overview on the data protection law, its requirements, and how to prepare for full enforcement.
Webinar
Discover how to use OneTrust Compliance Automation to establish client baselines, improve efficiency, and drive scalability. Learn key strategies to enhance your compliance impact.
Webinar
This DataGuidance webinar explores the latest and expected developments in the implementation of the NIS 2 Directive, focusing on practical compliance strategies to ensure your organization is prepared.
Webinar
Discover strategies to embed compliance and risk management into business processes with minimal disruption, using technology-driven solutions for efficiency, scalability, and improvement.
Webinar
Join our webinar to learn how to optimize security posture, streamline compliance, and leverage automation to manage IT risk in today's complex digital landscape. Register now!
Webinar
Join our upcoming product release webinar to explore how these new capabilities can help your organization navigate complex frameworks, streamline third-party management, and accelerate AI and data innovation.
Webinar
Master the fundamentals of constructing robust compliance frameworks that can seamlessly integrate with organizational operations while aligning with regulatory and strategic mandates to deliver measurable insights on your progress and gaps.
Webinar
Unlock tech risk management & compliance excellence. Master risk management, build robust frameworks, and foster cross-functional collaboration for long-term resilience.
Webinar
Join us as we explore OneTrust Compliance Automation, a holistic and fully integrated solution that streamlines and optimizes workflows, compliance, and attestation.
Webinar
Join us as Ryan Karlin, Senior Director of Product Marketing highlights important updates from TrustWeek including an inside look into OneTrust's new platform features that make it easier for customers to activate data responsibly, surface and mitigate risk, and navigate the complex regulatory environment.
Report
Download the full OCEG research report for a snapshot of what organizations are doing to govern their AI efforts, assess and manage risks, and ensure compliance with external and internal requirements.
Infographic
Download our infographic to learn about the new DORA regulation, who needs to comply, and how OneTrust can help streamline the process.
Webinar
Join us for a deep dive into embedding privacy by design into the fabric of your business to promote the responsible use of data.
Infographic
Download our infographic to learn the main challenges faced during risk assessments, proven frameworks for assessing risks, and how to translate guidance into action.
Webinar
Join our PCI DSS webinar where we discuss how Certification Automation can help free up valuable InfoSec resources, streamline audits, and stay continuously compliant.
eBook
How can your business use third-party messaging apps while staying compliant? Dive into key usage considerations based on the DOJ’s 2023 guidance.
Webinar
Join our webinar for insights on transforming InfoSec program management. Navigate the complexities of modern security with a flexible, scalable, and cost-effective approach.
Infographic
What key challenges do CISOs face going into the new year? Download this infographic to hear what experts from industries across the board have to say.
eBook
Get your free guide to the NIST Cybersecurity Framework 2.0 and learn how its proposed changes will impact your InfoSec programs.
Resource Kit
Download our NIST CSF Essentials resource kit and master cybersecurity compliance with expert insights, strategies, and real-world case studies.
Webinar
Join our webinar to learn more about the European Data Protection Seal and to find out what the key advantages of getting certified.
Checklist
This SOC 2 checklist provides clear action steps that enable you to mature your security program and fast-track your way to compliance.
Data Sheet
Explore how OneTrust integrations can help you automate compliance with today’s most popular InfoSec frameworks.
Webinar
Join our risk assessments experts as we discuss best practices, program templates, and how provide an assessment that provides the best value for your organization.
Infographic
Learn the ins and outs of Europe’s top InfoSec and cybersec frameworks, including ISO 27001, UK Cyber Essentials, the NIS2 Directive, DORA, and more.
Infographic
Streamline and scale your organization’s InfoSec compliance program by focusing on these five key areas of automation.
eBook
In this free eBook, we explore the basics of three top InfoSec frameworks and how to decide which is the best fit for your organization.
Webinar
Join us for a live demo of OneTrust's third-party risk management solution and see how it can help automate and streamline your TPRM program.
eBook
Download this eBook and get the insights you need to safeguard customer privacy and ensure responsible data use in the information lifecycle.
Webinar
Join our live webinar and hear from security professionals on how to get ISO 27001 certified, streamline audit preparation, and demonstrate security assurance across any regulatory jurisdiction.
eBook
Download our eBook to learn practical advice on how to approach third-party risk management like an InfoSec expert.
Webinar
In this webinar, you will hear first-hand from information security experts experts what are the key pain-points and their strategies to be audit ready.
Webinar
In this webinar, learn how to right-size your compliance scope for different frameworks across various business dimensions and enable an agile audit process.
Webinar
Learn how to enable an agile audit process by breaking down complex InfoSec requirements into actionable tasks to help automate your compliance program.
eBook
Learn how to respond to the security landscape and build a proactive InfoSec program to help your customers and business.
eBook
Ensure your enterprise IT risk assessment is a success with a top-down approach that gets executive buy-in from the start
eBook
As a unified business function, DevSecOps combines rapid software development with top-notch security at scale.
Webinar
Learn how scaling your approach to managing IT assets & risk assessments can deliver a complete picture to better measure and inform program investments.
Webinar
Avoid these 5 critical mistakes when answering security questionnaires and streamline responses with this webinar.
Webinar
Watch this webinar to learn what makes a successful risk management program and how effective security teams build trust.
Webinar
Prepare for privacy and security incidents by building an incident management playbook.