logo

What Is HIPAA Compliance: Guidelines for Becoming Compliant

The Health Insurance Portability and Accountability Act (HIPAA) is a U.S. law designed to protect individual privacy by establishing national standards for maintaining sensitive patient health information and medical records. HIPAA compliance rules incorporate requirements from several other legislative acts, including the Public Health Service Act and the Health Information Technology for Economic and Clinical Health (HITECH) Act.

In this article, we give an in-depth view of HIPAA requirements and provide all the details your organization needs to know from an IT security perspective to ensure HIPAA compliance. To learn more about compliance best practices, check out the HIPAA Compliance Checklist.

What Is HIPAA Compliance?

HIPAA compliance requirements set standards for protecting electronic patient health and medical data. Lawmakers established HIPAA to meet several core goals:

  • Improve healthcare
  • Protect patient privacy.
  • Require entities to provide medical records to patients upon request.
  • Improve health insurance portability.
  • Ensure patients are notified in the event of health data breaches.

The U.S. Department of Health and Human Services (HHS) oversees HIPAA, and the HHS Office for Civil Rights (OCR) periodically conducts HIPAA audits to assess compliance.

What Is Protected Health Information (PHI)?

To comply with HIPAA, an organization must have appropriate data security measures like HIPPA Compliance Software in place for protected health information.

Protected health information (PHI) is any personally identifiable health information that is transmitted or stored electronically, on paper or verbally. PHI includes any information about an individual that relates to their past, present or future health; details of health care treatments; and payment information that can identify the individual. Examples of PHI include:

  • Social Security number
  • Name
  • Dates of birth, death or treatment, and other dates relating to patient care
  • Photographs
  • Contact information
  • Medical record numbers

Who Must Comply with HIPAA?

HIPAA regulates information for two groups that handle patient healthcare data: covered entities and business associates.

What Is a Covered Entity?

A covered entity is a person or organization that processes and holds PHI for customers. Examples include doctors, pharmacies, nursing homes, clinics and health insurance companies.

However, not every organization that deals with health information is considered a covered entity. One example is research organizations that don’t provide healthcare services and don’t transmit healthcare information in connection to any transactions covered by a HIPAA regulation.

What Is a Business Associate?

A business associate is an organization that provides services to covered entities to assist with healthcare activities and functions. Covered entities may disclose PHI to business associates for assistance with healthcare functions but not for the business associate’s independent purposes or use.

In general, a business associate agreement or contract is necessary when establishing a relationship between a covered entity and a business associate. In some cases, however, an agreement is not needed, so it’s necessary for organizations to do their own research.

How HIPAA Protects Patient Privacy

HIPAA’s primary form of patient protection is its Privacy Rule. The HIPAA Privacy Rule provides standards for the use and disclosure of individuals’ health information. It also sets standards for patients’ privacy rights and controls over the use of their health information.

Patients’ Right to Access their PHI

Individual patients have the right to access their own health information under the Privacy Rule. Individuals can also designate who else can see their PHI with written and signed documentation.

When a patient requests PHI, information is typically delivered in a designated record set, which contains:

  • Billing and medical records like lab test results, treatment records and X-rays
  • Claims, enrollment and payment information for the patient’s health plan
  • Other records used for making decisions about the patient

Some information is excluded from the designated record set since the information wasn’t used to make decisions. This includes data regarding:

  • Patient safety records
  • Quality control information
  • Information gathered for legal proceedings

Fulfilling PHI Requests

A covered entity might require PHI requests in writing or through electronic communications like email or a web portal. Covered entities may not create unreasonable measures for requests or verification, nor can they reasonably delay a patient from obtaining access.

Requests can be fulfilled in paper or electronic format, depending on what information was requested. A covered entity must provide the requested information within 30 calendar days of the request.

A covered entity can charge fees to recoup costs incurred from:

  • Creating copies
  • Purchasing supplies for the request
  • Postage
  • Preparing summaries of PHI, if agreed to by the individual

In certain cases, a covered entity will deny a PHI request. These circumstances can include:

  • Psychotherapy notes
  • PHI that is part of an in-progress research study
  • Situations when access is reasonably likely to cause harm to someone

EHR Security and Privacy

In September 2013, legislators incorporated the HITECH Act into HIPAA with the Omnibus Rule. The HITECH Act was designed to encourage healthcare providers to use electronic health records (EHRs), also known as electronic protected health information (ePHI). The HITECH Act also stipulated that entities found to not be in HIPAA compliance could be subject to substantial fines.

HIPAA Standard Transactions

HITECH addresses standard transactions in the Transaction and Code Set Rule (TCS). The TCS rule adopts standards for the electronic transmission of healthcare data between providers, health insurers and health insurance customers.

Security Management for HIPAA

The HIPAA Security Rule

To ensure data security for EHRs, the HIPAA Security Rule established safety standards for covered entities and business associates. According to the rule, covered entities must:

  • Ensure the confidentiality, integrity and availability of all e-PHI they create, receive, maintain or transmit.
  • Identify and protect against reasonably anticipated threats to the security or integrity of the information.
  • Protect against reasonably anticipated, impermissible uses or disclosures.
  • Ensure compliance by their workforce.

To ensure compliance with the HIPAA Security Rule, an organization can follow guidelines established by the National Institute of Standards and Technology (NIST), which include controls and policy recommendations for organizations to implement for HIPAA compliance.

HIPAA Safeguards

NIST outlines three categories of EHR safeguards:

  • Administrative safeguards
  • Technical safeguards
  • Physical safeguards

These safeguards can be required (must be implemented) or addressable (should be implemented if reasonable and appropriate for the environment).

Administrative Safeguards

  • Security management process: Use systems to detect, prevent, contain and correct security violations.
  • Assigned security responsibility: Designate official responsible for implementation and development of policies and procedures.
  • Workforce security: Grant ePHI access only to employees who need it and prevent unauthorized users from gaining access.
  • Information access management: Use security systems for authorizing access to ePHI.
  • Security awareness and training: Train all employees on data security practices and awareness.
  • Security incident procedures: Establish protocols for security incidents.
  • Contingency plans: Develop emergency management plans for system damages.
  • Evaluation: Perform periodic system evaluations to gauge data security and reliability.

Technical Safeguards

  • Access control: Allow access only to individuals or software programs that have been granted access rights.
  • Audit controls: Use systems that record and examine activity regarding ePHI.
  • Integrity: Establish ways to prevent mishandling of
  • Person or entity authentication: Use security systems with robust verification measures.
  • Transmission security: Implement security measures to guard against unauthorized ePHI access during electronic transmission.

Physical Safeguards

  • Facility access control: Limit physical access to ePHI.
  • Workstation use: Establish workflows and configuration requirements for workstations where ePHI gets accessed.
  • Workstation security: Restrict workstation use to authorized users.
  • Device and media control: Govern receipt and removal of hardware and media containing ePHI.

Data Risk Analysis

Under the Security Management Process guidelines, the Security Rule requires risk analysis, or risk assessment and management.

NIST guidance on data risk analysis has multiple steps, which include:

  1. Identifying vulnerabilities and threats.
  2. Assessing current data security.
  3. Determining threat likelihood and potential impacts.

Cost of HIPAA Violations

Breach Notification

A breach is any unauthorized use or disclosure of PHI under the Privacy Rule. In some cases, an organization can demonstrate a low probability of compromised PHI based on a risk analysis.

If a data breach occurs, an organization must notify affected individuals by mail or email, alert the media, and file a report to the HHS Secretary through an online form — all within 60 days.

HIPAA Penalties and Fines

When breaches result in HIPAA violations, the HIPAA Enforcement Rule governs investigations, hearings and penalties. Common causes of HIPAA penalties include non-encrypted devices being lost or stolen, lack of employee training, database breaches, and office gossip about patient information.

The HITECH Act outlines four levels of fines for violations:

  • Tier A: Violation where a person or entity did not know they committed a violation.
  • Tier B: Violation of reasonable cause but not willful neglect.
  • Tier C: Violation due to willful neglect but the person or entity can amend the situation.
  • Tier D: Tier C violation where the situation is not amended within 30 days.

HHS OCR publishes violations on their “Wall of Shame” website. Other sites publish fines and links to settlements. Recent examples include:

  • In September 2020, Premera Blue Cross was fined $6,850,000 to settle a data breach affecting over 6 million individuals.
  • In July 2020, Lifespan Health System was fined over $1 million for a stolen laptop that was not encrypted.

In October 2019, Elite Dental Associates was fined $10,000 for disclosure of patient information over social media.

FAQ

What does HIPAA compliance mean?

The Health Insurance Portability and Accountability Act (HIPAA) is a U.S. law designed to protect individual privacy by establishing national standards for maintaining sensitive patient health information and medical records. HIPAA compliance involves establishing and maintaining security policies and controls that meet those standards, and demonstrating their efficacy to auditors on a regular basis.

Who needs to comply with HIPAA?

Entities required to comply with HIPAA include:

  • Healthcare providers
  • Health plans
  • Healthcare clearinghouses

Why is HIPAA compliance important?

External hackers and malicious insiders are constantly attempting to gain access to electronic protected health information (ePHI) for various purposes, such as financial gain, identity theft, or blackmail. HIPAA was designed to force healthcare organizations to improve their data security and protection.

Who enforces HIPAA compliance?

The Office for Civil Rights (OCR) at the U.S. Department of Health and Human Services (HHS) is responsible for enforcing the HIPAA Privacy and Security Rules.

What are the top obstacles to HIPAA compliance?

Here are the top requirements healthcare organizations need to meet to become HIPAA compliant:

  • Perform regular risk assessment
  • Conduct staff training
  • Implement and maintain strong data governance

How often should an organization review its policies for HIPAA compliance?

It’s critical to keep all HIPAA policies and procedures up to date; they should be reviewed at least annually.

How do small organizations handle HIPAA compliance?

Even though smaller healthcare facilities typically have limited resources, they still need to develop practical strategies for HIPAA compliance.

Here are the key steps in achieving HIPAA compliance:

  • Conduct all required audits and assessments.
  • Perform regular risk analysis.
  • Establish and enforce all required policies and procedures.

This checklist provides more steps for ensuring HIPAA compliance at your organization.

Elena has more than 8 years of experience in the IT industry. She started as a Public Relations Specialist at Netwrix, working on PR materials such as commentaries, articles and customer success stories. Then she transitioned to Content Marketing, where she is now responsible for delivering informative blogs and whitepapers. Elena also serves on the editorial teams for both the Netwrix Cyber Chief and SysAdmin magazines.