Blog / Healthcare CCPA Audit

CCPA Cybersecurity Audits for Healthcare Companies: What HIPAA Doesn't Cover

If you run a healthcare business in California, you've probably spent years building your HIPAA compliance program. You've got your Security Rule controls in place, your Business Associate Agreements signed, your breach notification procedures documented. So when someone tells you there's another cybersecurity audit requirement coming, the natural reaction is: "Aren't we already covered?"

The short answer is no. HIPAA and the CCPA cybersecurity audit overlap in some areas, but they protect different data, enforce different standards, and answer to different regulators. If your business meets the CCPA audit thresholds, HIPAA compliance alone won't get you across the finish line.

The HIPAA Exemption Is Narrower Than You Think

The CCPA does include an exemption for certain health data -- but it's specifically limited to Protected Health Information (PHI) governed by HIPAA. That exemption covers the data itself, not your entire business.

Here's where healthcare companies get tripped up: you almost certainly handle personal information that falls outside HIPAA's definition of PHI. Employee records. Website visitor data. Marketing analytics. Patient portal account information that isn't tied to a treatment record. Billing data processed outside a covered entity relationship. Vendor and contractor personal data.

All of that non-PHI personal information is fully subject to the CCPA. And if your business meets the audit thresholds -- $26.6M+ in revenue processing 250,000+ consumers' data, or handling sensitive personal information of 50,000+ consumers -- you'll need a CCPA cybersecurity audit that covers how you protect that data.

Modern hospital corridor with clean white walls and medical equipment
Healthcare businesses face a dual compliance burden -- HIPAA for PHI, CCPA for everything else

Where HIPAA and CCPA Cybersecurity Requirements Overlap

The good news: if you've built a solid HIPAA Security Rule program, you've got a head start. Several of the 18 CCPA cybersecurity audit components map directly to HIPAA requirements:

  • Access controls -- HIPAA's minimum necessary standard and the CCPA's need-to-know access controls are conceptually identical. Your existing role-based access model likely covers both.
  • Encryption at rest and in transit -- HIPAA treats encryption as an "addressable" safeguard (not strictly mandatory), but most healthcare organizations encrypt anyway. If you do, you're ahead on CCPA components 3 and 4.
  • Security training -- HIPAA requires workforce security training. The CCPA requires it too. If your training program already covers phishing, data handling, and incident reporting, you may just need to expand the scope to include non-PHI data.
  • Incident response -- HIPAA's breach notification rule and the CCPA's incident response planning requirement share DNA. Your existing IR plan is a strong foundation.
  • Audit logging and monitoring -- HIPAA requires audit controls for systems containing PHI. The CCPA requires centralized logging and monitoring across all systems handling personal information.

For these overlapping areas, the work isn't rebuilding from scratch -- it's extending what you have to cover non-PHI personal data with the same rigor.

Where the Gaps Live

The real work for healthcare companies is in the areas where HIPAA either doesn't go far enough or doesn't go at all. These are the gaps that will show up in a CCPA audit:

Data Inventory Beyond PHI

HIPAA requires you to know where your PHI lives. The CCPA requires a complete inventory of all personal information -- including data that HIPAA never touches. Most healthcare organizations have never formally mapped their non-PHI data flows. Where does your website analytics data go? What personal information does your HR system collect? What data do your marketing tools store? If you can't answer those questions with documentation, you've got a gap.

Third-Party Risk Management for Non-Healthcare Vendors

HIPAA's Business Associate framework is robust for healthcare-specific vendors. But what about the dozens of other vendors that touch personal information? Your marketing automation platform. Your employee benefits administrator. Your website hosting provider. Your office management SaaS tools. These vendors may never touch PHI, so they fall outside your BAA framework -- but they're squarely within scope for a CCPA cybersecurity audit. You need formal security assessments, contractual obligations, and ongoing monitoring for these vendors too.

Consumer Data Rights Infrastructure

HIPAA gives patients the right to access their medical records. The CCPA gives California consumers the right to know, delete, and opt out of the sale of their personal information -- and that applies to non-PHI data your business collects. If someone visits your website, fills out a contact form, or interacts with your patient portal in ways that generate non-PHI data, they have CCPA rights over that information. Your systems need to support those rights, and the cybersecurity audit will examine whether the infrastructure supporting consumer requests is itself secure.

Not Sure What Falls Outside Your HIPAA Program?

Take our free 5-minute assessment to identify gaps between your existing compliance program and the CCPA cybersecurity audit requirements.

Take the Free Assessment

Data Retention for Non-Clinical Data

Healthcare organizations typically have well-defined retention schedules for medical records -- state law often dictates these. But what about your marketing data? Employee records after termination? Website logs? Customer service recordings? The CCPA cybersecurity audit requires documented retention schedules and secure disposal processes for all personal information, not just clinical records. Many healthcare companies have never formalized retention policies for their non-clinical data, and that's a finding waiting to happen.

Network Segmentation Between Clinical and Business Systems

Here's one that catches people off guard. Most healthcare organizations segment their clinical networks from their general corporate networks -- that's standard HIPAA practice. But the CCPA audit will look at segmentation across your entire environment, including between business systems. Is your marketing database on the same network segment as your HR system? Can your finance team's workstations reach the web application servers? Network segmentation for CCPA purposes goes beyond the clinical/non-clinical boundary that HIPAA focuses on.

Dashboard analytics screen showing data visualizations and charts
Non-PHI data like website analytics, marketing tools, and HR systems all fall under CCPA scope

Common Healthcare Business Types and Their CCPA Exposure

Not all healthcare businesses face the same level of CCPA risk. Here's a quick breakdown:

Health systems and large hospital networks: Almost certainly above the audit thresholds. Large volumes of non-PHI data from websites, patient portals, employee systems, and vendor relationships. Significant gap-filling work likely needed beyond HIPAA.

Health tech and digital health companies: High exposure. These companies often collect consumer data that doesn't qualify as PHI -- app usage data, device identifiers, behavioral analytics. If you're processing health-adjacent data that isn't covered by a HIPAA relationship, it's all CCPA territory.

Medical device companies: Depends on the data. If your devices collect personal information from consumers (usage data, biometrics, location), that data likely falls under CCPA even if the device itself is FDA-regulated.

Private practices and small clinics: Most won't meet the audit thresholds due to revenue and data volume. But if you're part of a larger network or management group, the parent entity's obligations may pull you in.

Health insurers and payers: Significant exposure. Large volumes of both PHI and non-PHI data. Marketing, employer relationships, website data, and broker information all fall outside HIPAA but within CCPA scope.

A Practical Approach for Healthcare Companies

If you're a healthcare organization facing a CCPA cybersecurity audit, here's how to approach it without duplicating your HIPAA work:

  1. Inventory your non-PHI personal data. This is step one. Map every system, database, and third-party service that collects or processes personal information outside the HIPAA umbrella. You'll probably find more than you expect.
  2. Map your HIPAA controls to the 18 CCPA components. Go through each of the 18 audit components and document where your existing HIPAA controls already satisfy the requirement. Be specific -- "we have a HIPAA security training program" only counts if it covers non-PHI data handling too.
  3. Identify the gaps. For each component where your HIPAA program falls short, document what's missing. The most common gaps are data inventory (non-PHI), third-party risk management (non-BAA vendors), data retention (non-clinical data), and network segmentation (business systems).
  4. Extend, don't rebuild. In most cases, you can extend your existing HIPAA policies and procedures to cover CCPA requirements. Your incident response plan doesn't need a complete rewrite -- it needs an addendum covering non-PHI data incidents and CCPA-specific notification requirements. Your access control framework doesn't need replacing -- it needs to be applied to non-clinical systems with the same discipline.
  5. Consolidate your documentation. Auditors don't want to see two completely separate compliance programs running in parallel. Where possible, create unified policies that address both HIPAA and CCPA requirements, with clear callouts for where the standards differ.

Built for Businesses That Already Have Security Controls in Place

The CCPA Audit Readiness Kit includes gap analysis templates, policy extensions, and implementation guides designed to build on your existing compliance program -- not replace it.

Get the Complete Kit - $497

The Timeline Factor

CCPA cybersecurity audit deadlines are staggered by revenue: April 2028 for businesses over $100M, April 2029 for $50-100M, and April 2030 for under $50M. For large health systems and insurers, that first deadline is just over two years away.

Two years sounds comfortable until you factor in the reality of healthcare IT. Budget cycles are annual. Vendor security assessments take time. Policy development requires legal review. System changes go through change management. If you need to stand up new controls for non-PHI data, the lead time is longer than you think.

The healthcare organizations that will be in the best position are the ones that start their gap assessment now, while there's time to address findings methodically instead of scrambling at the deadline.

Bottom Line

HIPAA gave healthcare organizations a strong security foundation. But the CCPA cybersecurity audit looks at a broader set of data, a wider range of systems, and a different set of expectations. The overlap is real and valuable -- but so are the gaps.

The organizations that approach this as an extension of their existing program, rather than a separate compliance silo, will spend less, move faster, and end up with a stronger overall security posture. That's the upside of being in an industry that already takes security seriously.

Start With a Clear Picture of Where You Stand

Our free CCPA readiness assessment takes 5 minutes and shows you exactly which of the 18 audit components your existing program covers -- and where the gaps are.

Take the Free Assessment