HIPAA defines technical safeguards to control access, protect data integrity, and defend against unauthorized use. In a database, these rules live inside role-based access controls. Each role determines who can read, write, update, or delete protected health information (PHI). Without strict role configuration, compliance breaks before the audit even begins.