This blog explains what HIPAA is and how organizations can become HIPAA compliant.
HIPAA stands for Health Insurance Portability and Accountability Act. HIPAA is a U.S. law that was enacted in 1996 to protect sensitive patient health information from being disclosed without the patient's consent or knowledge and is enforced by the Department of Health and Human Services (HHS). The purpose of HIPAA is to protect the privacy of patients’ medical information and secure the handling of health information in the age of electronic health records. HIPAA also helps to prevent the misuse of patient information, making it a critical law for healthcare providers, insurers, and other entities that handle patient data. It has two main components:
Understanding how each rule should be approached within an organization is determined by the type of healthcare data that is being exchanged or stored.
PHI (Protected Health Information) and ePHI (Electronic Protected Health Information) are terms used in the context of healthcare data in the United States. To understand how each differ, here's a breakdown of the two:
PHI: PHI refers to any information that can identify an individual and relates to their past, present, or future physical or mental health or condition, healthcare provision, or payment for healthcare services. PHI can exist in any format, including paper records, oral communication, and electronic records. Examples of PHI are:
ePHI (Electronic Protected Health Information): ePHI is a subset of PHI that is created, stored, transmitted, or received electronically. ePHI includes:
While PHI can exist in any format (paper, oral, electronic), ePHI is limited to electronic formats. Both PHI and ePHI have security requirements, but ePHI is subject to additional safeguards under the HIPAA Security Rule, which specifically addresses the protection of electronic data. In summary, all ePHI is PHI, but not all PHI is ePHI, with the main distinction being the electronic format.
HIPAA compliance requires physical, network, and process security measures to be in place. This means having secure facilities, networks, and systems; ensuring that only authorized individuals have access to PHI; and having policies and procedures in place to prevent unauthorized access, use, or disclosure of PHI. To be HIPAA compliant, companies must follow three key requirements:
Additionally, companies must ensure that the following are in place:
Meeting and maintaining HIPAA compliance requires an ongoing and deliberate effort; organizations that break compliance may be subject to hefty fines. To make sure efforts can be maintained, using a HIPAA checklist is highly suggested.
Any entity that handles PHI must be HIPAA compliant. This includes healthcare providers, health plans, healthcare clearinghouses, and their business associates who process or access PHI.
TLDR; a third-party certification company like HITRUST needs to audit your organization to see if your practices meet HIPAA requirements, and if they do, you’ll get approved.
Any entity managing healthcare data must comply with HIPAA, but what they need to have in place will differ based on the specificities of their environment. HIPAA compliance is not a one-size-fits-all standard. In fact, the Security Rule has a section called "Flexibility of Approach" that encourages organizations to decide which security measures to implement based on the following factors:
Here’s a list of 7 suggested tips to become and stay compliant:
To follow the above listed tips, an organization needs to be able to:
What would happen if an entity violated HIPAA? There are categories of repercussions depending on what causes the violation and why it happens. First, it’s important to understand how violations occur. Violations happen when an entity fails to comply with the regulations and may be deliberate or unintentional. Some of the most common HIPAA violations include:
The repercussions of violating HIPAA requirements are dependent on the severity and cause. To maintain flexibility and standardization, there are 4 violation tiers:
While violations can be unintentional, they are avoidable and so are the fines. By implementing relevant guardrails, organizations can mitigate risks and costly penalties associated with violating HIPAA requirements. However, making sure the necessary steps are being completed all of the time can be an overwhelming responsibility. Luckily there are companies designed to ease the effort needed to maintain compliance.
Riscosity enables teams with the tools needed to centrally manage PII, ePHI, and any other sensitive data, as required by HIPAA. Entities can track all of the sensitive data that is being shared with any system and ensure that it never mistakenly goes to the wrong place. Here's how Riscosity helps maintain compliance: