{"ID":78160,"post_author":"2","post_date":"2016-06-15 15:27:44","post_date_gmt":"2016-06-15 19:27:44","post_content":"","post_title":"HIPAA Compliance: An Introduction","post_excerpt":"","post_status":"publish","comment_status":"closed","ping_status":"closed","post_password":"","post_name":"hipaa-compliance-lii-007","to_ping":"","pinged":"","post_modified":"2022-02-10 18:56:17","post_modified_gmt":"2022-02-10 23:56:17","post_content_filtered":"","post_parent":0,"guid":"https:\/\/www.limsforum.com\/?post_type=ebook&p=78160","menu_order":0,"post_type":"ebook","post_mime_type":"","comment_count":"0","filter":"","_ebook_metadata":{"enabled":"on","private":"0","guid":"F50565CA-87B9-45F8-8837-59EEC991E6E6","title":"HIPAA Compliance: An Introduction","subtitle":"","cover_theme":"nico_10","cover_image":"https:\/\/www.limsforum.com\/wp-content\/plugins\/rdp-ebook-builder\/pl\/cover.php?cover_style=nico_10&subtitle=&editor=Shawn+Douglas&title=HIPAA+Compliance%3A+An+Introduction&title_image=https%3A%2F%2Fupload.wikimedia.org%2Fwikipedia%2Fcommons%2F6%2F66%2FHIPAA_Screenshot.png&publisher=LabLynx+Press","editor":"Shawn Douglas","publisher":"LabLynx Press","author_id":"26","image_url":"https:\/\/www.limswiki.org\/images\/f\/f7\/Hipaa_compliance.png","items":{"50ca559740210c2f3863c08a17fef379_type":"article","50ca559740210c2f3863c08a17fef379_title":"10. Abbreviations, acronyms, and initialisms","50ca559740210c2f3863c08a17fef379_url":"https:\/\/www.limswiki.org\/index.php\/Book:HIPAA_Compliance:_An_Introduction\/Abbreviations,_acronyms,_and_initialisms","50ca559740210c2f3863c08a17fef379_plaintext":"\n\nBook:HIPAA Compliance: An Introduction\/Abbreviations, acronyms, and initialismsFrom LIMSWikiJump to navigationJump to search Abbreviations, acronyms, and initialisms \nASC X12N: Accredited Standards Committee X12, Insurance Subcommittee\nBAA: business associate agreement\nCDC: Centers for Disease Control and Prevention\nCLIA: Clinical Laboratory Improvement Amendments of 1988\nCPOE: computerized physician order entry\ne-PHI: electronic protected health information\nEDI: electronic data interchange\nEHR: electronic health record\nEIN: employer identification number\nEMR: electronic medical record\nFDA U.S. Food and Drug Administration \nHIPAA: Health Information Portability and Accountability Act of 1996\nHITECH: Health Information Technology for Economic and Clinical Health Act\nHHS: U.S. Department of Health and Human Services\nHL7: Health Level 7\nHMO: health maintenance organization\nIRS: Internal Revenue Service\nLIS: laboratory information system\nMHSA: Mine Safety and Health Administration\nMRN: medical record number\nNCPDP: National Council for Prescription Drug Programs\nNPI: National Provider Identifier\nOCR: Office for Civil Rights\nOHCS: organized healthcare arrangement\nOSHA: Occupational Safety and Health Administration\nPHI: protected health information\n\r\n\n\nCitation for this section \nTitle: HIPAA Compliance: An Introduction - Abbreviations, acronyms, and initialisms\nAuthor for citation: Alan Vaughan, with editorial modifications by Shawn Douglas\nLicense for content: Creative Commons Attribution-ShareAlike 4.0 International\nPublication date: Originally published June 2016; compiled and lightly edited February 2022\n\n\n\n\n\nSource: <a rel=\"external_link\" class=\"external\" href=\"https:\/\/www.limswiki.org\/index.php\/Book:HIPAA_Compliance:_An_Introduction\/Abbreviations,_acronyms,_and_initialisms\">https:\/\/www.limswiki.org\/index.php\/Book:HIPAA_Compliance:_An_Introduction\/Abbreviations,_acronyms,_and_initialisms<\/a>\nNavigation menuPage actionsBookDiscussionView sourceHistoryPage actionsBookDiscussionMoreToolsIn other languagesPersonal toolsLog inRequest accountNavigationMain pageRecent changesRandom pageHelp about MediaWikiSearch\u00a0 ToolsWhat links hereRelated changesSpecial pagesPermanent linkPage informationSponsors \r\n\n\t\r\n\n\t\r\n\n\t\r\n\n\t\r\n\n\t\n\t\n\t\r\n\n\t\r\n\n\t\n\t\r\n\n\t\r\n\n \n\t\n\t\n\t\r\n\n\t\r\n\n \n\t\n\t\r\n\n\t\r\n\n\t\n\t\n\t\r\n\n\t\n\t\n\t\r\n\n\t\r\n\n\t\n\t\n\t\r\n\n\t\r\n\n\t\r\n\n\t\r\nPrint\/exportCreate a bookDownload as PDFDownload as PDFDownload as Plain textPrintable version This page was last edited on 10 February 2022, at 23:47.Content is available under a Creative Commons Attribution-ShareAlike 4.0 International License unless otherwise noted.This page has been accessed 2 times.Privacy policyAbout LIMSWikiDisclaimers\n\n\n\n","50ca559740210c2f3863c08a17fef379_html":"<body class=\"mediawiki ltr sitedir-ltr mw-hide-empty-elt ns-208 ns-subject page-Book_HIPAA_Compliance_An_Introduction_Abbreviations_acronyms_and_initialisms rootpage-Book_HIPAA_Compliance_An_Introduction_Abbreviations_acronyms_and_initialisms skin-monobook action-view skin--responsive\"><div id=\"rdp-ebb-globalWrapper\"><div id=\"rdp-ebb-column-content\"><div id=\"rdp-ebb-content\" class=\"mw-body\" role=\"main\"><a id=\"rdp-ebb-top\"><\/a>\n<h1 id=\"rdp-ebb-firstHeading\" class=\"firstHeading\" lang=\"en\">Book:HIPAA Compliance: An Introduction\/Abbreviations, acronyms, and initialisms<\/h1><div id=\"rdp-ebb-bodyContent\" class=\"mw-body-content\"><!-- start content --><div id=\"rdp-ebb-mw-content-text\" lang=\"en\" dir=\"ltr\" class=\"mw-content-ltr\"><div class=\"mw-parser-output\"><h2><span id=\"rdp-ebb-Abbreviations,_acronyms,_and_initialisms\"><\/span><span class=\"mw-headline\" id=\"Abbreviations.2C_acronyms.2C_and_initialisms\">Abbreviations, acronyms, and initialisms<\/span><\/h2>\n<p><b>ASC X12N<\/b>: Accredited Standards Committee X12, Insurance Subcommittee\n<\/p><p><b>BAA<\/b>: business associate agreement\n<\/p><p><b>CDC<\/b>: Centers for Disease Control and Prevention\n<\/p><p><b>CLIA<\/b>: Clinical Laboratory Improvement Amendments of 1988\n<\/p><p><b>CPOE<\/b>: computerized physician order entry\n<\/p><p><b>e-PHI<\/b>: electronic protected health information\n<\/p><p><b>EDI<\/b>: electronic data interchange\n<\/p><p><b>EHR<\/b>: electronic health record\n<\/p><p><b>EIN<\/b>: employer identification number\n<\/p><p><b>EMR<\/b>: electronic medical record\n<\/p><p><b>FDA<\/b> U.S. Food and Drug Administration \n<\/p><p><b>HIPAA<\/b>: Health Information Portability and Accountability Act of 1996\n<\/p><p><b>HITECH<\/b>: Health Information Technology for Economic and Clinical Health Act\n<\/p><p><b>HHS<\/b>: U.S. Department of Health and Human Services\n<\/p><p><b>HL7<\/b>: Health Level 7\n<\/p><p><b>HMO<\/b>: health maintenance organization\n<\/p><p><b>IRS<\/b>: Internal Revenue Service\n<\/p><p><b>LIS<\/b>: laboratory information system\n<\/p><p><b>MHSA<\/b>: Mine Safety and Health Administration\n<\/p><p><b>MRN<\/b>: medical record number\n<\/p><p><b>NCPDP<\/b>: National Council for Prescription Drug Programs\n<\/p><p><b>NPI<\/b>: National Provider Identifier\n<\/p><p><b>OCR<\/b>: Office for Civil Rights\n<\/p><p><b>OHCS<\/b>: organized healthcare arrangement\n<\/p><p><b>OSHA<\/b>: Occupational Safety and Health Administration\n<\/p><p><b>PHI<\/b>: protected health information\n<\/p><p><br \/>\n<\/p>\n<h2><span class=\"mw-headline\" id=\"Citation_for_this_section\">Citation for this section<\/span><\/h2>\n<p><b>Title<\/b>: <i>HIPAA Compliance: An Introduction<\/i> - Abbreviations, acronyms, and initialisms\n<\/p><p><b>Author for citation<\/b>: Alan Vaughan, with editorial modifications by Shawn Douglas\n<\/p><p><b>License for content<\/b>: <a rel=\"external_link\" class=\"external text\" href=\"https:\/\/creativecommons.org\/licenses\/by-sa\/4.0\/\" target=\"_blank\">Creative Commons Attribution-ShareAlike 4.0 International<\/a>\n<\/p><p><b>Publication date<\/b>: Originally published June 2016; compiled and lightly edited February 2022\n<\/p>\n<!-- \nNewPP limit report\nCached time: 20220210234729\nCache expiry: 86400\nDynamic content: false\nComplications: []\nCPU time usage: 0.024 seconds\nReal time usage: 0.062 seconds\nPreprocessor visited node count: 8\/1000000\nPost\u2010expand include size: 1343\/2097152 bytes\nTemplate argument size: 0\/2097152 bytes\nHighest expansion depth: 3\/40\nExpensive parser function count: 0\/100\nUnstrip recursion depth: 0\/20\nUnstrip post\u2010expand size: 0\/5000000 bytes\n-->\n<!--\nTransclusion expansion time report (%,ms,calls,template)\n100.00% 12.151 1 Template:HIPAA_Compliance:_An_Introduction\/Abbreviations,_acronyms,_and_initialisms\n100.00% 12.151 1 -total\n-->\n\n<!-- Saved in parser cache with key limswiki:pcache:idhash:13009-0!canonical and timestamp 20220210234731 and revision id 46324. Serialized with JSON.\n -->\n<\/div><\/div><div class=\"printfooter\">Source: <a rel=\"external_link\" class=\"external\" href=\"https:\/\/www.limswiki.org\/index.php\/Book:HIPAA_Compliance:_An_Introduction\/Abbreviations,_acronyms,_and_initialisms\">https:\/\/www.limswiki.org\/index.php\/Book:HIPAA_Compliance:_An_Introduction\/Abbreviations,_acronyms,_and_initialisms<\/a><\/div>\n<!-- end content --><div class=\"visualClear\"><\/div><\/div><\/div><div class=\"visualClear\"><\/div><\/div><!-- end of the left (by default at least) column --><div class=\"visualClear\"><\/div><\/div>\n\n\n\n<\/body>","50ca559740210c2f3863c08a17fef379_images":[],"50ca559740210c2f3863c08a17fef379_timestamp":1644537388,"8e464c677297e6b3ef3316d144ff162d_type":"article","8e464c677297e6b3ef3316d144ff162d_title":"9. Additional resources","8e464c677297e6b3ef3316d144ff162d_url":"https:\/\/www.limswiki.org\/index.php\/Book:HIPAA_Compliance:_An_Introduction\/Additional_resources","8e464c677297e6b3ef3316d144ff162d_plaintext":"\n\nBook:HIPAA Compliance: An Introduction\/Additional resourcesFrom LIMSWikiJump to navigationJump to searchAdditional resources \nThe entire Privacy Rule, as well as guidance and additional materials, may be found on the HHS website. A combined (unofficial) version of all of the CFR elements that make up HIPAA is provided by the OCR (PDF). Other useful resources outside of the references include:\n\nHHS' HIPAA FAQs for Professionals\nHHS' Fast Facts for Covered Entities\nHHS' HIPAA Security Series 3 Security Standards: Physical Safeguards (PDF)\nNIST's NIST SP 800-88 Rev. 1, Guidelines for Media Sanitization\n\r\n\n\nCitation for this section \nTitle: HIPAA Compliance: An Introduction - Additional resources\nAuthor for citation: Alan Vaughan, with editorial modifications by Shawn Douglas\nLicense for content: Creative Commons Attribution-ShareAlike 4.0 International\nPublication date: Originally published June 2016; compiled and lightly edited February 2022\n\n\n\n\n\nSource: <a rel=\"external_link\" class=\"external\" href=\"https:\/\/www.limswiki.org\/index.php\/Book:HIPAA_Compliance:_An_Introduction\/Additional_resources\">https:\/\/www.limswiki.org\/index.php\/Book:HIPAA_Compliance:_An_Introduction\/Additional_resources<\/a>\nNavigation menuPage actionsBookDiscussionView sourceHistoryPage actionsBookDiscussionMoreToolsIn other languagesPersonal toolsLog inRequest accountNavigationMain pageRecent changesRandom pageHelp about MediaWikiSearch\u00a0 ToolsWhat links hereRelated changesSpecial pagesPermanent linkPage informationSponsors \r\n\n\t\r\n\n\t\r\n\n\t\r\n\n\t\r\n\n\t\n\t\n\t\r\n\n\t\r\n\n\t\n\t\r\n\n\t\r\n\n \n\t\n\t\n\t\r\n\n\t\r\n\n \n\t\n\t\r\n\n\t\r\n\n\t\n\t\n\t\r\n\n\t\n\t\n\t\r\n\n\t\r\n\n\t\n\t\n\t\r\n\n\t\r\n\n\t\r\n\n\t\r\nPrint\/exportCreate a bookDownload as PDFDownload as PDFDownload as Plain textPrintable version This page was last edited on 10 February 2022, at 23:46.Content is available under a Creative Commons Attribution-ShareAlike 4.0 International License unless otherwise noted.This page has been accessed 2 times.Privacy policyAbout LIMSWikiDisclaimers\n\n\n\n","8e464c677297e6b3ef3316d144ff162d_html":"<body class=\"mediawiki ltr sitedir-ltr mw-hide-empty-elt ns-208 ns-subject page-Book_HIPAA_Compliance_An_Introduction_Additional_resources rootpage-Book_HIPAA_Compliance_An_Introduction_Additional_resources skin-monobook action-view skin--responsive\"><div id=\"rdp-ebb-globalWrapper\"><div id=\"rdp-ebb-column-content\"><div id=\"rdp-ebb-content\" class=\"mw-body\" role=\"main\"><a id=\"rdp-ebb-top\"><\/a>\n<h1 id=\"rdp-ebb-firstHeading\" class=\"firstHeading\" lang=\"en\">Book:HIPAA Compliance: An Introduction\/Additional resources<\/h1><div id=\"rdp-ebb-bodyContent\" class=\"mw-body-content\"><!-- start content --><div id=\"rdp-ebb-mw-content-text\" lang=\"en\" dir=\"ltr\" class=\"mw-content-ltr\"><div class=\"mw-parser-output\"><h2><span class=\"mw-headline\" id=\"Additional_resources\">Additional resources<\/span><\/h2>\n<p>The entire Privacy Rule, as well as guidance and additional materials, may be found on <a rel=\"external_link\" class=\"external text\" href=\"https:\/\/www.hhs.gov\/hipaa\/index.html\" target=\"_blank\">the HHS website<\/a>. A combined (unofficial) version of all of the CFR elements that make up HIPAA is <a rel=\"external_link\" class=\"external text\" href=\"https:\/\/www.hhs.gov\/sites\/default\/files\/hipaa-simplification-201303.pdf\" target=\"_blank\">provided by the OCR<\/a> (PDF). Other useful resources outside of the references include:\n<\/p>\n<ul><li>HHS' <a rel=\"external_link\" class=\"external text\" href=\"https:\/\/www.hhs.gov\/hipaa\/for-professionals\/faq\/index.html\" target=\"_blank\">HIPAA FAQs for Professionals<\/a><\/li>\n<li>HHS' <a rel=\"external_link\" class=\"external text\" href=\"https:\/\/www.hhs.gov\/hipaa\/for-professionals\/covered-entities\/fast-facts\/index.html\" target=\"_blank\">Fast Facts for Covered Entities<\/a><\/li>\n<li>HHS' <a rel=\"external_link\" class=\"external text\" href=\"https:\/\/www.hhs.gov\/sites\/default\/files\/ocr\/privacy\/hipaa\/administrative\/securityrule\/physsafeguards.pdf\" target=\"_blank\">HIPAA Security Series 3 Security Standards: Physical Safeguards<\/a> (PDF)<\/li>\n<li>NIST's <a rel=\"external_link\" class=\"external text\" href=\"https:\/\/csrc.nist.gov\/publications\/detail\/sp\/800-88\/rev-1\/final\" target=\"_blank\">NIST SP 800-88 Rev. 1, Guidelines for Media Sanitization<\/a><\/li><\/ul>\n<p><br \/>\n<\/p>\n<h2><span class=\"mw-headline\" id=\"Citation_for_this_section\">Citation for this section<\/span><\/h2>\n<p><b>Title<\/b>: <i>HIPAA Compliance: An Introduction<\/i> - Additional resources\n<\/p><p><b>Author for citation<\/b>: Alan Vaughan, with editorial modifications by Shawn Douglas\n<\/p><p><b>License for content<\/b>: <a rel=\"external_link\" class=\"external text\" href=\"https:\/\/creativecommons.org\/licenses\/by-sa\/4.0\/\" target=\"_blank\">Creative Commons Attribution-ShareAlike 4.0 International<\/a>\n<\/p><p><b>Publication date<\/b>: Originally published June 2016; compiled and lightly edited February 2022\n<\/p>\n<!-- \nNewPP limit report\nCached time: 20220210234614\nCache expiry: 86400\nDynamic content: false\nComplications: []\nCPU time usage: 0.023 seconds\nReal time usage: 0.054 seconds\nPreprocessor visited node count: 8\/1000000\nPost\u2010expand include size: 968\/2097152 bytes\nTemplate argument size: 0\/2097152 bytes\nHighest expansion depth: 3\/40\nExpensive parser function count: 0\/100\nUnstrip recursion depth: 0\/20\nUnstrip post\u2010expand size: 0\/5000000 bytes\n-->\n<!--\nTransclusion expansion time report (%,ms,calls,template)\n100.00% 10.788 1 Template:HIPAA_Compliance:_An_Introduction\/Additional_resources\n100.00% 10.788 1 -total\n-->\n\n<!-- Saved in parser cache with key limswiki:pcache:idhash:13008-0!canonical and timestamp 20220210234616 and revision id 46323. Serialized with JSON.\n -->\n<\/div><\/div><div class=\"printfooter\">Source: <a rel=\"external_link\" class=\"external\" href=\"https:\/\/www.limswiki.org\/index.php\/Book:HIPAA_Compliance:_An_Introduction\/Additional_resources\">https:\/\/www.limswiki.org\/index.php\/Book:HIPAA_Compliance:_An_Introduction\/Additional_resources<\/a><\/div>\n<!-- end content --><div class=\"visualClear\"><\/div><\/div><\/div><div class=\"visualClear\"><\/div><\/div><!-- end of the left (by default at least) column --><div class=\"visualClear\"><\/div><\/div>\n\n\n\n<\/body>","8e464c677297e6b3ef3316d144ff162d_images":[],"8e464c677297e6b3ef3316d144ff162d_timestamp":1644537387,"9f18a253fb0391daf5dfb79f6acab5b2_type":"article","9f18a253fb0391daf5dfb79f6acab5b2_title":"8. Additional compliance guidance","9f18a253fb0391daf5dfb79f6acab5b2_url":"https:\/\/www.limswiki.org\/index.php\/Book:HIPAA_Compliance:_An_Introduction\/Additional_compliance_guidance","9f18a253fb0391daf5dfb79f6acab5b2_plaintext":"\n\nBook:HIPAA Compliance: An Introduction\/Additional compliance guidanceFrom LIMSWikiJump to navigationJump to searchContents \n\n1 Additional compliance guidance \n\n1.1 Disposal of PHI \n1.2 Enforcement and penalties \n\n1.2.1 Criminal penalties \n\n\n\n\n2 References \n3 Citation for this section \n\n\n\nAdditional compliance guidance \nDisposal of PHI \nIn the previous section, we learned that HIPAA requires covered entities to apply appropriate administrative, technical and physical safeguards to protect the privacy of PHI in any form. This means that covered entities must implement reasonable safeguards to limit incidental and avoid prohibited uses and disclosures of PHI, including in connection with its disposal.[1]\nIn addition, the HIPAA Security Rule requires that covered entities implement policies and procedures to[1]:\n\naddress the final disposition of electronic PHI and\/or the hardware or electronic media on which it is stored; and\nimplement procedures for removal of electronic PHI from electronic media before the media are made available for re-use, per 45 CFR 164.310(d)(2)(i) and (ii).\nFailing to implement reasonable safeguards to protect PHI in connection with disposal could result in impermissible disclosures of PHI, which exposes the risk of fines and other sanctions.\nAdditionally, workforce members must receive training on and follow those disposal policies and procedures, as necessary and appropriate for each workforce member, per 45 CFR 164.306(a)(4), 164.308(a)(5), and 164.530(b) and (i). Therefore, any workforce member involved in disposing of PHI, or who supervises others who dispose of PHI, must receive training on disposal. This includes any volunteers.[1]\nThese requirements are not met if covered entities simply abandon PHI or dispose of it in dumpsters or other containers that are accessible by the public or other unauthorized persons. However, the Privacy and Security Rules do not require a particular disposal method. Covered entities must review their own circumstances to determine what steps are reasonable to safeguard PHI through disposal, and develop and implement policies and procedures to carry out those steps. In determining what is reasonable, covered entities should assess potential risks to patient privacy, as well as consider such issues as the form, type and amount of PHI to be disposed. For instance, the disposal of certain types of PHI such as name, social security number, driver\u2019s license number, debit or credit card number, diagnosis, treatment information or other sensitive information may warrant more care due to the risk that inappropriate access to this information may result in identity theft, employment or other discrimination, or harm to an individual\u2019s reputation.[1]\nIn general, examples of proper disposal methods may include, but are not limited to[1]:\n\nshredding, burning, pulping or pulverizing PHI on paper records so that PHI is rendered essentially unreadable, indecipherable and otherwise cannot be reconstructed\nclearing (using software or hardware products to overwrite media with non-sensitive data), purging (degaussing or exposing the media to a strong magnetic field in order to disrupt the recorded magnetic domains), or destroying (disintegration, pulverization, melting, incinerating, or shredding) PHI on electronic media\nmaintaining labeled prescription bottles and other PHI in opaque bags in a secure area and using a disposal vendor as a business associate to pick up and shred or otherwise destroy the PHI\nFor more information on proper disposal of e-PHI, see the HHS HIPAA Security Series 3 Security Standards: Physical Safeguards. Additionally, for practical information on how to handle sanitization of PHI throughout the information lifecycle, you can consult NIST SP 800-88 Rev. 1, Guidelines for Media Sanitization.\nOther methods of disposal also may be appropriate, depending on the circumstances. Covered entities are encouraged to consider the steps that other prudent healthcare and health information professionals are taking to protect patient privacy in connection with record disposal. Resources like LIMSforum provide useful information and experience exchange. In addition, if a covered entity is closing a business, it may wish to consider giving patients the opportunity to pick up their records prior to any disposition (however, keep in mind that many states may impose requirements on covered entities to retain and make available for a limited time, as appropriate, medical records after dissolution of a business).[1]\n\nEnforcement and penalties \nAs discussed in the prior section, the OCR may impose a penalty on a covered entity for a failure to comply with a requirement of the Privacy or Security Rules. Penalties will vary significantly depending on factors such as the date of the violation, whether the covered entity knew or should have known of the failure to comply, or whether the covered entity\u2019s failure to comply was due to willful neglect. Penalties may not exceed a calendar year cap for multiple violations of the same requirement.[2]\nCurrent penalties and cap include[2]:\n\nPenalty amount: $100 to $50,000 or more per violation\nCalendar year cap: $1,500,000\nA penalty will not be imposed for violations in certain circumstances, such as if[2]:\n\nthe failure to comply was not due to willful neglect, and was corrected during a 30-day period after the entity knew or should have known the failure to comply had occurred (unless the period is extended at the discretion of OCR); or\nthe Department of Justice has imposed a criminal penalty for the failure to comply.\nAdditionally, OCR has the option to reduce a penalty if the failure to comply was due to reasonable cause and the penalty would be excessive given the nature and extent of the noncompliance. Before OCR imposes a penalty, it will notify the covered entity and provide the them with an opportunity to submit written evidence of those circumstances that would reduce or avoid a penalty. This evidence must be submitted to OCR within 30 days of receipt of the notice. In addition, if OCR states that it intends to impose a penalty, a covered entity has the right to request an administrative hearing to appeal the proposed penalty.[2]\n\nCriminal penalties \nA person who knowingly obtains or discloses individually identifiable health information in violation of the Privacy Rule may face a criminal penalty of up to $50,000 and up to one-year imprisonment. The criminal penalties increase to $100,000 and up to five years imprisonment if the wrongful conduct involves false pretenses, and to $250,000 and up to 10 years imprisonment if the wrongful conduct involves the intent to sell, transfer or use identifiable health information for commercial advantage, personal gain or malicious harm. The Department of Justice is responsible for criminal prosecutions under the Privacy Rule.[2][3]\n\nReferences \n\n\n\u2191 1.0 1.1 1.2 1.3 1.4 1.5 Office for Civil Rights (6 November 2015). \"What do the HIPAA Privacy and Security Rules require of covered entities when they dispose of protected health information?\". U.S. Department of Health & Human Services. https:\/\/www.hhs.gov\/hipaa\/for-professionals\/faq\/575\/what-does-hipaa-require-of-covered-entities-when-they-dispose-information\/index.html . Retrieved 10 February 2022 .   \n \n\n\u2191 2.0 2.1 2.2 2.3 2.4 Office for Civil Rights (26 July 2013). \"Summary of the HIPAA Privacy Rule\". United States Department of Health and Human Services. https:\/\/www.hhs.gov\/hipaa\/for-professionals\/privacy\/laws-regulations\/index.html . Retrieved 09 February 2022 .   \n \n\n\u2191 Office for Civil Rights (26 July 2013). \"Summary of the HIPAA Security Rule\". U.S. Department of Health and Human Services. https:\/\/www.hhs.gov\/hipaa\/for-professionals\/security\/laws-regulations\/index.html . Retrieved 10 February 2022 .   \n \n\n\n\r\n\n\nCitation for this section \nTitle: HIPAA Compliance: An Introduction - Additional compliance guidance\nAuthor for citation: Alan Vaughan, with editorial modifications by Shawn Douglas\nLicense for content: Creative Commons Attribution-ShareAlike 4.0 International\nPublication date: Originally published June 2016; compiled and lightly edited February 2022\n\n\n\n\n\nSource: <a rel=\"external_link\" class=\"external\" href=\"https:\/\/www.limswiki.org\/index.php\/Book:HIPAA_Compliance:_An_Introduction\/Additional_compliance_guidance\">https:\/\/www.limswiki.org\/index.php\/Book:HIPAA_Compliance:_An_Introduction\/Additional_compliance_guidance<\/a>\nNavigation menuPage actionsBookDiscussionView sourceHistoryPage actionsBookDiscussionMoreToolsIn other languagesPersonal toolsLog inRequest accountNavigationMain pageRecent changesRandom pageHelp about MediaWikiSearch\u00a0 ToolsWhat links hereRelated changesSpecial pagesPermanent linkPage informationSponsors \r\n\n\t\r\n\n\t\r\n\n\t\r\n\n\t\r\n\n\t\n\t\n\t\r\n\n\t\r\n\n\t\n\t\r\n\n\t\r\n\n \n\t\n\t\n\t\r\n\n\t\r\n\n \n\t\n\t\r\n\n\t\r\n\n\t\n\t\n\t\r\n\n\t\n\t\n\t\r\n\n\t\r\n\n\t\n\t\n\t\r\n\n\t\r\n\n\t\r\n\n\t\r\nPrint\/exportCreate a bookDownload as PDFDownload as PDFDownload as Plain textPrintable version This page was last edited on 10 February 2022, at 23:45.Content is available under a Creative Commons Attribution-ShareAlike 4.0 International License unless otherwise noted.This page has been accessed 2 times.Privacy policyAbout LIMSWikiDisclaimers\n\n\n\n","9f18a253fb0391daf5dfb79f6acab5b2_html":"<body class=\"mediawiki ltr sitedir-ltr mw-hide-empty-elt ns-208 ns-subject page-Book_HIPAA_Compliance_An_Introduction_Additional_compliance_guidance rootpage-Book_HIPAA_Compliance_An_Introduction_Additional_compliance_guidance skin-monobook action-view skin--responsive\"><div id=\"rdp-ebb-globalWrapper\"><div id=\"rdp-ebb-column-content\"><div id=\"rdp-ebb-content\" class=\"mw-body\" role=\"main\"><a id=\"rdp-ebb-top\"><\/a>\n<h1 id=\"rdp-ebb-firstHeading\" class=\"firstHeading\" lang=\"en\">Book:HIPAA Compliance: An Introduction\/Additional compliance guidance<\/h1><div id=\"rdp-ebb-bodyContent\" class=\"mw-body-content\"><!-- start content --><div id=\"rdp-ebb-mw-content-text\" lang=\"en\" dir=\"ltr\" class=\"mw-content-ltr\"><div class=\"mw-parser-output\">\n\n<h2><span class=\"mw-headline\" id=\"Additional_compliance_guidance\">Additional compliance guidance<\/span><\/h2>\n<h3><span class=\"mw-headline\" id=\"Disposal_of_PHI\">Disposal of PHI<\/span><\/h3>\n<div class=\"floatright\"><a href=\"https:\/\/www.limswiki.org\/index.php\/File:Paper_shredder_news.jpg\" class=\"image wiki-link\" data-key=\"31b626928c6069c62dd3a95ea53d54c6\"><img alt=\"Paper shredder news.jpg\" src=\"https:\/\/upload.wikimedia.org\/wikipedia\/commons\/a\/a3\/Paper_shredder_news.jpg\" decoding=\"async\" width=\"350\" height=\"271\" \/><\/a><\/div><p>In the previous section, we learned that HIPAA requires covered entities to apply appropriate administrative, technical and physical safeguards to protect the privacy of PHI in any form. This means that covered entities must implement reasonable safeguards to limit incidental and avoid prohibited uses and disclosures of PHI, including in connection with its disposal.<sup id=\"rdp-ebb-cite_ref-HHSWhatDo_1-0\" class=\"reference\"><a href=\"#cite_note-HHSWhatDo-1\">[1]<\/a><\/sup>\n<\/p><p>In addition, the HIPAA Security Rule requires that covered entities implement policies and procedures to<sup id=\"rdp-ebb-cite_ref-HHSWhatDo_1-1\" class=\"reference\"><a href=\"#cite_note-HHSWhatDo-1\">[1]<\/a><\/sup>:\n<\/p>\n<ul><li>address the final disposition of electronic PHI and\/or the hardware or electronic media on which it is stored; and<\/li>\n<li>implement procedures for removal of electronic PHI from electronic media before the media are made available for re-use, per 45 CFR 164.310(d)(2)(i) and (ii).<\/li><\/ul>\n<p>Failing to implement reasonable safeguards to protect PHI in connection with disposal could result in impermissible disclosures of PHI, which exposes the risk of fines and other sanctions.\n<\/p><p>Additionally, workforce members must receive training on and follow those disposal policies and procedures, as necessary and appropriate for each workforce member, per 45 CFR 164.306(a)(4), 164.308(a)(5), and 164.530(b) and (i). Therefore, any workforce member involved in disposing of PHI, or who supervises others who dispose of PHI, must receive training on disposal. This includes any volunteers.<sup id=\"rdp-ebb-cite_ref-HHSWhatDo_1-2\" class=\"reference\"><a href=\"#cite_note-HHSWhatDo-1\">[1]<\/a><\/sup>\n<\/p><p>These requirements are not met if covered entities simply abandon PHI or dispose of it in dumpsters or other containers that are accessible by the public or other unauthorized persons. However, the Privacy and Security Rules do not require a particular disposal method. Covered entities must review their own circumstances to determine what steps are reasonable to safeguard PHI through disposal, and develop and implement policies and procedures to carry out those steps. In determining what is reasonable, covered entities should assess potential risks to patient privacy, as well as consider such issues as the form, type and amount of PHI to be disposed. For instance, the disposal of certain types of PHI such as name, social security number, driver\u2019s license number, debit or credit card number, diagnosis, treatment information or other sensitive information may warrant more care due to the risk that inappropriate access to this information may result in identity theft, employment or other discrimination, or harm to an individual\u2019s reputation.<sup id=\"rdp-ebb-cite_ref-HHSWhatDo_1-3\" class=\"reference\"><a href=\"#cite_note-HHSWhatDo-1\">[1]<\/a><\/sup>\n<\/p><p>In general, examples of proper disposal methods may include, but are not limited to<sup id=\"rdp-ebb-cite_ref-HHSWhatDo_1-4\" class=\"reference\"><a href=\"#cite_note-HHSWhatDo-1\">[1]<\/a><\/sup>:\n<\/p>\n<ul><li>shredding, burning, pulping or pulverizing PHI on paper records so that PHI is rendered essentially unreadable, indecipherable and otherwise cannot be reconstructed<\/li>\n<li>clearing (using software or hardware products to overwrite media with non-sensitive data), purging (degaussing or exposing the media to a strong magnetic field in order to disrupt the recorded magnetic domains), or destroying (disintegration, pulverization, melting, incinerating, or shredding) PHI on electronic media<\/li>\n<li>maintaining labeled prescription bottles and other PHI in opaque bags in a secure area and using a disposal vendor as a business associate to pick up and shred or otherwise destroy the PHI<\/li><\/ul>\n<p>For more information on proper disposal of e-PHI, see the HHS <a rel=\"external_link\" class=\"external text\" href=\"https:\/\/www.hhs.gov\/sites\/default\/files\/ocr\/privacy\/hipaa\/administrative\/securityrule\/physsafeguards.pdf\" target=\"_blank\">HIPAA Security Series 3 Security Standards: Physical Safeguards<\/a>. Additionally, for practical information on how to handle sanitization of PHI throughout the information lifecycle, you can consult <a rel=\"external_link\" class=\"external text\" href=\"https:\/\/csrc.nist.gov\/publications\/detail\/sp\/800-88\/rev-1\/final\" target=\"_blank\">NIST SP 800-88 Rev. 1, Guidelines for Media Sanitization<\/a>.\n<\/p><p>Other methods of disposal also may be appropriate, depending on the circumstances. Covered entities are encouraged to consider the steps that other prudent healthcare and health information professionals are taking to protect patient privacy in connection with record disposal. Resources like <a rel=\"external_link\" class=\"external text\" href=\"https:\/\/www.limsforum.com\/\" target=\"_blank\">LIMSforum<\/a> provide useful information and experience exchange. In addition, if a covered entity is closing a business, it may wish to consider giving patients the opportunity to pick up their records prior to any disposition (however, keep in mind that many states may impose requirements on covered entities to retain and make available for a limited time, as appropriate, medical records after dissolution of a business).<sup id=\"rdp-ebb-cite_ref-HHSWhatDo_1-5\" class=\"reference\"><a href=\"#cite_note-HHSWhatDo-1\">[1]<\/a><\/sup>\n<\/p>\n<h3><span class=\"mw-headline\" id=\"Enforcement_and_penalties\">Enforcement and penalties<\/span><\/h3>\n<p>As discussed in the prior section, the OCR may impose a penalty on a covered entity for a failure to comply with a requirement of the Privacy or Security Rules. Penalties will vary significantly depending on factors such as the date of the violation, whether the covered entity knew or should have known of the failure to comply, or whether the covered entity\u2019s failure to comply was due to willful neglect. Penalties may not exceed a calendar year cap for multiple violations of the same requirement.<sup id=\"rdp-ebb-cite_ref-HHSSummaryHIPAA_2-0\" class=\"reference\"><a href=\"#cite_note-HHSSummaryHIPAA-2\">[2]<\/a><\/sup>\n<\/p><p>Current penalties and cap include<sup id=\"rdp-ebb-cite_ref-HHSSummaryHIPAA_2-1\" class=\"reference\"><a href=\"#cite_note-HHSSummaryHIPAA-2\">[2]<\/a><\/sup>:\n<\/p>\n<ul><li>Penalty amount: $100 to $50,000 or more per violation<\/li>\n<li>Calendar year cap: $1,500,000<\/li><\/ul>\n<p>A penalty will not be imposed for violations in certain circumstances, such as if<sup id=\"rdp-ebb-cite_ref-HHSSummaryHIPAA_2-2\" class=\"reference\"><a href=\"#cite_note-HHSSummaryHIPAA-2\">[2]<\/a><\/sup>:\n<\/p>\n<ol><li>the failure to comply was not due to willful neglect, and was corrected during a 30-day period after the entity knew or should have known the failure to comply had occurred (unless the period is extended at the discretion of OCR); or<\/li>\n<li>the Department of Justice has imposed a criminal penalty for the failure to comply.<\/li><\/ol>\n<p>Additionally, OCR has the option to reduce a penalty if the failure to comply was due to reasonable cause and the penalty would be excessive given the nature and extent of the noncompliance. Before OCR imposes a penalty, it will notify the covered entity and provide the them with an opportunity to submit written evidence of those circumstances that would reduce or avoid a penalty. This evidence must be submitted to OCR within 30 days of receipt of the notice. In addition, if OCR states that it intends to impose a penalty, a covered entity has the right to request an administrative hearing to appeal the proposed penalty.<sup id=\"rdp-ebb-cite_ref-HHSSummaryHIPAA_2-3\" class=\"reference\"><a href=\"#cite_note-HHSSummaryHIPAA-2\">[2]<\/a><\/sup>\n<\/p>\n<h4><span class=\"mw-headline\" id=\"Criminal_penalties\">Criminal penalties<\/span><\/h4>\n<p>A person who knowingly obtains or discloses individually identifiable health information in violation of the Privacy Rule may face a criminal penalty of up to $50,000 and up to one-year imprisonment. The criminal penalties increase to $100,000 and up to five years imprisonment if the wrongful conduct involves false pretenses, and to $250,000 and up to 10 years imprisonment if the wrongful conduct involves the intent to sell, transfer or use identifiable health information for commercial advantage, personal gain or malicious harm. The Department of Justice is responsible for criminal prosecutions under the Privacy Rule.<sup id=\"rdp-ebb-cite_ref-HHSSummaryHIPAA_2-4\" class=\"reference\"><a href=\"#cite_note-HHSSummaryHIPAA-2\">[2]<\/a><\/sup><sup id=\"rdp-ebb-cite_ref-HIPAASecurity_3-0\" class=\"reference\"><a href=\"#cite_note-HIPAASecurity-3\">[3]<\/a><\/sup>\n<\/p>\n<h2><span class=\"mw-headline\" id=\"References\">References<\/span><\/h2>\n<div class=\"reflist\" style=\"list-style-type: decimal;\">\n<div class=\"mw-references-wrap\"><ol class=\"references\">\n<li id=\"cite_note-HHSWhatDo-1\"><span class=\"mw-cite-backlink\">\u2191 <sup><a href=\"#cite_ref-HHSWhatDo_1-0\">1.0<\/a><\/sup> <sup><a href=\"#cite_ref-HHSWhatDo_1-1\">1.1<\/a><\/sup> <sup><a href=\"#cite_ref-HHSWhatDo_1-2\">1.2<\/a><\/sup> <sup><a href=\"#cite_ref-HHSWhatDo_1-3\">1.3<\/a><\/sup> <sup><a href=\"#cite_ref-HHSWhatDo_1-4\">1.4<\/a><\/sup> <sup><a href=\"#cite_ref-HHSWhatDo_1-5\">1.5<\/a><\/sup><\/span> <span class=\"reference-text\"><span class=\"citation web\">Office for Civil Rights (6 November 2015). <a rel=\"external_link\" class=\"external text\" href=\"https:\/\/www.hhs.gov\/hipaa\/for-professionals\/faq\/575\/what-does-hipaa-require-of-covered-entities-when-they-dispose-information\/index.html\" target=\"_blank\">\"What do the HIPAA Privacy and Security Rules require of covered entities when they dispose of protected health information?\"<\/a>. U.S. Department of Health & Human Services<span class=\"printonly\">. <a rel=\"external_link\" class=\"external free\" href=\"https:\/\/www.hhs.gov\/hipaa\/for-professionals\/faq\/575\/what-does-hipaa-require-of-covered-entities-when-they-dispose-information\/index.html\" target=\"_blank\">https:\/\/www.hhs.gov\/hipaa\/for-professionals\/faq\/575\/what-does-hipaa-require-of-covered-entities-when-they-dispose-information\/index.html<\/a><\/span><span class=\"reference-accessdate\">. Retrieved 10 February 2022<\/span>.<\/span><span class=\"Z3988\" title=\"ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=bookitem&rft.btitle=What+do+the+HIPAA+Privacy+and+Security+Rules+require+of+covered+entities+when+they+dispose+of+protected+health+information%3F&rft.atitle=&rft.aulast=Office+for+Civil+Rights&rft.au=Office+for+Civil+Rights&rft.date=6+November+2015&rft.pub=U.S.+Department+of+Health+%26+Human+Services&rft_id=https%3A%2F%2Fwww.hhs.gov%2Fhipaa%2Ffor-professionals%2Ffaq%2F575%2Fwhat-does-hipaa-require-of-covered-entities-when-they-dispose-information%2Findex.html&rfr_id=info:sid\/en.wikipedia.org:Book:HIPAA_Compliance:_An_Introduction\/Additional_compliance_guidance\"><span style=\"display: none;\"> <\/span><\/span>\n<\/span>\n<\/li>\n<li id=\"cite_note-HHSSummaryHIPAA-2\"><span class=\"mw-cite-backlink\">\u2191 <sup><a href=\"#cite_ref-HHSSummaryHIPAA_2-0\">2.0<\/a><\/sup> <sup><a href=\"#cite_ref-HHSSummaryHIPAA_2-1\">2.1<\/a><\/sup> <sup><a href=\"#cite_ref-HHSSummaryHIPAA_2-2\">2.2<\/a><\/sup> <sup><a href=\"#cite_ref-HHSSummaryHIPAA_2-3\">2.3<\/a><\/sup> <sup><a href=\"#cite_ref-HHSSummaryHIPAA_2-4\">2.4<\/a><\/sup><\/span> <span class=\"reference-text\"><span class=\"citation web\">Office for Civil Rights (26 July 2013). <a rel=\"external_link\" class=\"external text\" href=\"https:\/\/www.hhs.gov\/hipaa\/for-professionals\/privacy\/laws-regulations\/index.html\" target=\"_blank\">\"Summary of the HIPAA Privacy Rule\"<\/a>. United States Department of Health and Human Services<span class=\"printonly\">. <a rel=\"external_link\" class=\"external free\" href=\"https:\/\/www.hhs.gov\/hipaa\/for-professionals\/privacy\/laws-regulations\/index.html\" target=\"_blank\">https:\/\/www.hhs.gov\/hipaa\/for-professionals\/privacy\/laws-regulations\/index.html<\/a><\/span><span class=\"reference-accessdate\">. Retrieved 09 February 2022<\/span>.<\/span><span class=\"Z3988\" title=\"ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=bookitem&rft.btitle=Summary+of+the+HIPAA+Privacy+Rule&rft.atitle=&rft.aulast=Office+for+Civil+Rights&rft.au=Office+for+Civil+Rights&rft.date=26+July+2013&rft.pub=United+States+Department+of+Health+and+Human+Services&rft_id=https%3A%2F%2Fwww.hhs.gov%2Fhipaa%2Ffor-professionals%2Fprivacy%2Flaws-regulations%2Findex.html&rfr_id=info:sid\/en.wikipedia.org:Book:HIPAA_Compliance:_An_Introduction\/Additional_compliance_guidance\"><span style=\"display: none;\"> <\/span><\/span>\n<\/span>\n<\/li>\n<li id=\"cite_note-HIPAASecurity-3\"><span class=\"mw-cite-backlink\"><a href=\"#cite_ref-HIPAASecurity_3-0\">\u2191<\/a><\/span> <span class=\"reference-text\"><span class=\"citation web\">Office for Civil Rights (26 July 2013). <a rel=\"external_link\" class=\"external text\" href=\"https:\/\/www.hhs.gov\/hipaa\/for-professionals\/security\/laws-regulations\/index.html\" target=\"_blank\">\"Summary of the HIPAA Security Rule\"<\/a>. U.S. Department of Health and Human Services<span class=\"printonly\">. <a rel=\"external_link\" class=\"external free\" href=\"https:\/\/www.hhs.gov\/hipaa\/for-professionals\/security\/laws-regulations\/index.html\" target=\"_blank\">https:\/\/www.hhs.gov\/hipaa\/for-professionals\/security\/laws-regulations\/index.html<\/a><\/span><span class=\"reference-accessdate\">. Retrieved 10 February 2022<\/span>.<\/span><span class=\"Z3988\" title=\"ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=bookitem&rft.btitle=Summary+of+the+HIPAA+Security+Rule&rft.atitle=&rft.aulast=Office+for+Civil+Rights&rft.au=Office+for+Civil+Rights&rft.date=26+July+2013&rft.pub=U.S.+Department+of+Health+and+Human+Services&rft_id=https%3A%2F%2Fwww.hhs.gov%2Fhipaa%2Ffor-professionals%2Fsecurity%2Flaws-regulations%2Findex.html&rfr_id=info:sid\/en.wikipedia.org:Book:HIPAA_Compliance:_An_Introduction\/Additional_compliance_guidance\"><span style=\"display: none;\"> <\/span><\/span>\n<\/span>\n<\/li>\n<\/ol><\/div><\/div>\n<p><br \/>\n<\/p>\n<h2><span class=\"mw-headline\" id=\"Citation_for_this_section\">Citation for this section<\/span><\/h2>\n<p><b>Title<\/b>: <i>HIPAA Compliance: An Introduction<\/i> - Additional compliance guidance\n<\/p><p><b>Author for citation<\/b>: Alan Vaughan, with editorial modifications by Shawn Douglas\n<\/p><p><b>License for content<\/b>: <a rel=\"external_link\" class=\"external text\" href=\"https:\/\/creativecommons.org\/licenses\/by-sa\/4.0\/\" target=\"_blank\">Creative Commons Attribution-ShareAlike 4.0 International<\/a>\n<\/p><p><b>Publication date<\/b>: Originally published June 2016; compiled and lightly edited February 2022\n<\/p>\n<!-- \nNewPP limit report\nCached time: 20220210234532\nCache expiry: 86400\nDynamic content: false\nComplications: []\nCPU time usage: 0.119 seconds\nReal time usage: 0.261 seconds\nPreprocessor visited node count: 2189\/1000000\nPost\u2010expand include size: 22974\/2097152 bytes\nTemplate argument size: 6604\/2097152 bytes\nHighest expansion depth: 18\/40\nExpensive parser function count: 0\/100\nUnstrip recursion depth: 0\/20\nUnstrip post\u2010expand size: 6535\/5000000 bytes\n-->\n<!--\nTransclusion expansion time report (%,ms,calls,template)\n100.00% 67.264 1 -total\n 66.08% 44.446 1 Template:Reflist\n 53.62% 36.066 3 Template:Cite_web\n 44.73% 30.085 3 Template:Citation\/core\n 33.79% 22.731 1 Template:HIPAA_Compliance:_An_Introduction\/Additional_compliance_guidance\n 13.52% 9.094 3 Template:Date\n 4.89% 3.288 3 Template:Citation\/make_link\n-->\n\n<!-- Saved in parser cache with key limswiki:pcache:idhash:13007-0!canonical and timestamp 20220210234534 and revision id 46322. Serialized with JSON.\n -->\n<\/div><\/div><div class=\"printfooter\">Source: <a rel=\"external_link\" class=\"external\" href=\"https:\/\/www.limswiki.org\/index.php\/Book:HIPAA_Compliance:_An_Introduction\/Additional_compliance_guidance\">https:\/\/www.limswiki.org\/index.php\/Book:HIPAA_Compliance:_An_Introduction\/Additional_compliance_guidance<\/a><\/div>\n<!-- end content --><div class=\"visualClear\"><\/div><\/div><\/div><div class=\"visualClear\"><\/div><\/div><!-- end of the left (by default at least) column --><div class=\"visualClear\"><\/div><\/div>\n\n\n\n<\/body>","9f18a253fb0391daf5dfb79f6acab5b2_images":["https:\/\/upload.wikimedia.org\/wikipedia\/commons\/a\/a3\/Paper_shredder_news.jpg"],"9f18a253fb0391daf5dfb79f6acab5b2_timestamp":1644537386,"67501dd743f72dcd818a8dbb0f48d670_type":"article","67501dd743f72dcd818a8dbb0f48d670_title":"7. Security","67501dd743f72dcd818a8dbb0f48d670_url":"https:\/\/www.limswiki.org\/index.php\/Book:HIPAA_Compliance:_An_Introduction\/Security","67501dd743f72dcd818a8dbb0f48d670_plaintext":"\n\nBook:HIPAA Compliance: An Introduction\/SecurityFrom LIMSWikiJump to navigationJump to searchContents \n\n1 Security \n\n1.1 About the Security Rule \n1.2 Statutory and regulatory background \n1.3 Who is covered by the Security Rule \n\n1.3.1 Business associates \n\n\n1.4 What information is protected \n1.5 General rules \n1.6 Risk analysis and management \n1.7 Administrative safeguards \n1.8 Physical safeguards \n1.9 Technical safeguards \n1.10 Required and addressable implementation specifications \n\n1.10.1 Organizational requirements \n1.10.2 Documentation requirements \n1.10.3 State law \n1.10.4 Enforcement and penalties for noncompliance \n1.10.5 Compliance dates \n\n\n\n\n2 References \n3 Citation for this section \n\n\n\nSecurity \nIn the Health Insurance Portability and Accountability Act of 1996 and its subsequent amendments, collectively known as \"HIPAA,\" both the Privacy Rule and Security Rule were established. There is considerable overlap between the two, and many of the provisions relevant to covered entities have already been covered. However, it is worth examining the Security Rule separately, especially inasmuch as it specifically addresses electronic information and related security measures. \nAbout the Security Rule \nThe Security Standards for the Protection of Electronic Protected Health Information (the Security Rule) establish a national set of security standards for protecting certain health information that is held or transferred in electronic form. The Security Rule \"operationalizes\" the protections contained in the Privacy Rule by addressing the technical and non-technical safeguards that covered entities must put in place to secure individuals\u2019 \"electronic protected health information\" (e-PHI). The OCR, a division of HHS, has responsibility for enforcing the Privacy and Security Rules, using voluntary compliance measures and civil financial penalties.\nIt's interesting to note that prior to HIPAA, no generally accepted set of security standards or general requirements for PHI existed in the healthcare industry. Yet new technologies were evolving, and the healthcare industry began to move away from paper processes and rely more heavily on the use of electronic information systems to pay claims, answer eligibility questions, provide health information and conduct a host of other administrative and clinically-based functions. The need for those standards and security requirements became more apparent.[1]\nToday, providers are using clinical applications such as computerized physician order entry (CPOE) systems, electronic health records (EHR) or electronic medical records (EMR), as well as radiology, pharmacy, and laboratory information systems (LIS). Health plans are providing access to claims and care management, as well as member self-service applications. While this means that the medical workforce can be more mobile and efficient (i.e., physicians can check patient records and test results from wherever they are), the rise in the adoption rate of these technologies increases the potential security risks.\nA major goal of the Security Rule is to protect the privacy of individuals\u2019 health information while allowing covered entities to adopt new technologies to improve the quality and efficiency of patient care. Given that the healthcare marketplace is diverse, the Security Rule is designed to be flexible and scalable so a covered entity can implement policies, procedures and technologies that are appropriate for the entity\u2019s particular size, organizational structure and risks to consumers\u2019 e-PHI. \nThis is a summary of key elements of the Security Rule and not a complete or comprehensive guide to compliance. Entities regulated by the Privacy and Security Rules are obligated to comply with all of their applicable requirements and should not rely on this summary as a source of legal information or advice. Several portions of the Security Rule overlap with previous sections that discussed both privacy and security, in which case the following information serves to reinforce what you have already encountered. Examine the HHS Security Rule for links to the entire rule and for additional helpful information about how the rule applies. In the event of a conflict between this summary and the rule, the rule governs.\n\nStatutory and regulatory background \nIt was the Administrative Simplification provisions of HIPAA that required the Secretary of the HHS to publish national standards for the security of e-PHI, electronic exchange, and the privacy and security of health information.\nHIPAA called on the Secretary to issue security regulations regarding measures for protecting the integrity, confidentiality and availability of e-PHI that is held or transmitted by covered entities. HHS developed a proposed rule and released it for public comment on August 12, 1998. The Department received approximately 2,350 public comments. The final regulation, the Security Rule, was published February 20, 2003. The Rule specifies a series of administrative, technical and physical security procedures for covered entities to use to assure the confidentiality, integrity and availability of e-PHI.[1]\nThe text of the final regulation can be found at 45 CFR Part 160[2] and Part 164, Subparts A and C.[3]\n\nWho is covered by the Security Rule \nThe Security Rule, like all of the Administrative Simplification rules, applies to health plans, health care clearinghouses, and to any health care provider who transmits health information in electronic form in connection with a transaction for which the Secretary of HHS has adopted standards under HIPAA (the \"covered entities,\" discussed prior).\n\nBusiness associates \nHITECH expanded the responsibilities of business associates under the Privacy and Security Rules, as discussed earlier in this guide. HHS is developing regulations to implement and clarify these changes.\n\nWhat information is protected \nThe HIPAA Privacy Rule protects the privacy of individually identifiable health information, PHI, as explained in the Privacy Rule and here. The Security Rule protects a subset of information covered by the Privacy Rule, which is all individually identifiable health information a covered entity creates, receives, maintains or transmits in electronic form. The Security Rule refers to this information as e-PHI. The Security Rule does not apply to PHI transmitted orally or in writing.[1] \n\nGeneral rules \nThe Security Rule, at its foundation, requires covered entities to maintain reasonable and appropriate administrative, technical and physical safeguards for protecting e-PHI. Specifically, covered entities must[1]:\n\nensure the confidentiality, integrity and availability of all e-PHI they create, receive, maintain or transmit\nidentify and protect against reasonably anticipated threats to the security or integrity of the information\nprotect against reasonably anticipated, impermissible uses or disclosures\nensure compliance by their workforce.\nThe Security Rule defines \"confidentiality\" to mean that e-PHI is not available or disclosed to unauthorized persons. The Security Rule's confidentiality requirements support the Privacy Rule's prohibitions against improper uses and disclosures of PHI. The Security rule also promotes the two additional goals of maintaining the integrity and availability of e-PHI. Under the Security Rule, \"integrity\" means that e-PHI is not altered or destroyed in an unauthorized manner. \"Availability\" means that e-PHI is accessible and usable on demand by an authorized person.[1]\nHHS recognizes that covered entities range from the smallest provider to the largest, multi-state health plan. Therefore the Security Rule is flexible and scalable to allow covered entities to analyze their own needs and implement solutions appropriate for their specific environments. What is appropriate for a particular covered entity will depend on the nature of its particular business, as well as its size and resources. \nTherefore, when a covered entity is deciding which security measures to use, the Rule does not dictate those measures but requires it to consider[1]:\n\nits size, complexity, and capabilities\nits technical, hardware, and software infrastructure\nthe costs of security measures\nthe likelihood and possible impact of potential risks to e-PHI\nCovered entities must also review and modify their security measures to continue protecting e-PHI in a changing environment.\n\nRisk analysis and management \nThe Administrative Safeguards provisions in the Security Rule require covered entities to perform risk analysis as part of their security management processes. The risk analysis and management provisions of the Security Rule are addressed separately here because, by helping to determine which security measures are reasonable and appropriate for a particular covered entity, risk analysis affects the implementation of all of the safeguards contained in the Security Rule. \nA risk analysis process includes, but is not limited to, the following activities[1]:\n\nevaluating the likelihood and impact of potential risks to e-PHI\nimplementing appropriate security measures to address the risks identified in the risk analysis\ndocumenting the chosen security measures and, where required, the rationale for adopting those measures\nmaintaining continuous, reasonable, and appropriate security protections\nRisk analysis should be an ongoing process, in which a covered entity regularly reviews its records to track access to e-PHI and detect security incidents, periodically evaluates the effectiveness of security measures put in place, and regularly reevaluates potential risks to e-PHI.\n\nAdministrative safeguards \nThe first of the required areas of security has to do with safeguards that are implemented during administration. These take several forms[1]:\n\nSecurity management process\nAs explained in the previous section, a covered entity has to identify and analyze potential risks to e-PHI, and it must implement security measures that reduce risks and vulnerabilities to a \"reasonable and appropriate level.\"\nSecurity personnel\nA covered entity must designate a security official, who is responsible for developing and implementing its security policies and procedures. This is similar to the previously mentioned privacy official.\nInformation access management\nConsistent with the Privacy Rule standard limiting uses and disclosures of PHI to the \"minimum necessary,\" the Security Rule requires a covered entity to implement policies and procedures for authorizing access to e-PHI only when such access is appropriate based on the user or recipient's role (role-based access).\nWorkforce training and management\nA covered entity must provide for appropriate authorization and supervision of workforce members who work with e-PHI. All of those workforce members must be trained regarding its HIPAA-compliant security policies and procedures, and the covered entity must have and apply appropriate sanctions against workforce members who violate those policies and procedures.\nEvaluation\nA covered entity must perform a periodic assessment of how well its security policies and procedures meet the requirements of the Security Rule.\n\nPhysical safeguards \nThe second required area of compliance with the Security Rule is the introduction and maintenance of physical safeguards for PHI. These include[1]:\n\nFacility access and control\nA covered entity must limit physical access to its facilities, but also ensure authorized access.\nWorkstation and device security\nA covered entity must implement policies and procedures to specify proper use of and access to workstations and electronic media. A covered entity also must have in place policies and procedures regarding the transfer, removal, disposal and re-use of electronic media, to ensure appropriate protection of e-PHI.\nTechnical safeguards \nThe third area of security designated by the Security Rule is the technical aspect. Technical safeguards fall under the categories of[1]:\n\nAccess control\nA covered entity is required to implement technical policies and procedures that allow only authorized persons to access e-PHI.\nAudit controls\nA covered entity must implement hardware, software and\/or procedural mechanisms to record and examine access and other activity in any information systems that contain or use e-PHI.\nIntegrity controls\nA covered entity must implement policies and procedures, and electronic measures must be taken to ensure that e-PHI is not improperly altered or destroyed.\nTransmission security\nA covered entity must implement technical security measures that guard against unauthorized access to e-PHI that is being transmitted over an electronic network. There are standards that are approved and available, including Health Level 7 (HL7).\nRequired and addressable implementation specifications \nCovered entities are required to comply with every Security Rule \"standard.\" However, the Security Rule categorizes certain implementation specifications within those standards as \"addressable,\" while others are \"required.\" The required implementation specifications must be implemented. The \"addressable\" designation does not mean that an implementation specification is optional, but it permits covered entities to determine whether the addressable implementation specification is reasonable and appropriate for that covered entity. If it is not, the Security Rule allows the covered entity to adopt an alternative measure that achieves the purpose of the standard, if that alternative measure is reasonable and appropriate.[1]\n\nOrganizational requirements \nIn some cases, organization-wide action must be taken. Cases include[1]:\n\nCovered entity responsibility to act\nIf a covered entity knows of an activity or practice of a business associate that constitutes a material breach or violation of the business associate\u2019s obligation, the covered entity must take reasonable steps to cure the breach or end the violation. Violations include the failure to implement safeguards that reasonably and appropriately protect e-PHI.\nBusiness associate responsibility to act\nIn the case of a BAA, certain stipulations are required in most cases. HHS is developing regulations relating to business associate obligations and business associate contracts under the HITECH Act of 2009.\nDocumentation requirements \nA covered entity must adopt \"reasonable and appropriate\" policies and procedures (P&P) to comply with the provisions of the Security Rule. A covered entity must maintain, until six years after the date of their creation or last effective date (whichever is later), written security P&P and written records of required actions, activities or assessments. Additionally, a covered entity must periodically review and update its documentation in response to environmental or organizational changes that affect the security of e-PHI.[1]\n\nState law \nIn general, state laws that are contrary to the HIPAA regulations are preempted by the federal requirements, which means that the federal requirements will apply. \"Contrary\" means that it would be impossible for a covered entity to comply with both the state and federal requirements, or that the provision of state law is an obstacle to accomplishing the full purposes and objectives of the Administrative Simplification provisions of HIPAA.[1]\n\nEnforcement and penalties for noncompliance \nThe Security Rule establishes a set of national standards for confidentiality, integrity and availability of e-PHI. The OCR is responsible for administering and enforcing these standards, in concert with its enforcement of the Privacy Rule, and may conduct complaint investigations and compliance reviews.[1]\nThe Enforcement Rule's Final Rule is essentially HITECH provisions that strengthen HHS' ability to enforce the Privacy and Security Rules of HIPAA. Some enforcement measures and penalties are discussed in the next section and on the OCR's Enforcement Rule page.\n\nCompliance dates \nAll covered entities, except \"small health plans,\" must have been compliant with the Security Rule by April 20, 2005. Small health plans had until April 20, 2006 to comply.[1]\n\nReferences \n\n\n\u2191 1.00 1.01 1.02 1.03 1.04 1.05 1.06 1.07 1.08 1.09 1.10 1.11 1.12 1.13 1.14 1.15 Office for Civil Rights (26 July 2013). \"Summary of the HIPAA Security Rule\". U.S. Department of Health and Human Services. https:\/\/www.hhs.gov\/hipaa\/for-professionals\/security\/laws-regulations\/index.html . Retrieved 10 February 2022 .   \n \n\n\u2191 \"Code of Federal Regulations Title 45, Subtitle A, Subchapter C, Part 160, Subpart A, 160.103\". US Government Publishing Office. https:\/\/www.ecfr.gov\/current\/title-45\/subtitle-A\/subchapter-C\/part-160\/subpart-A\/section-160.103 . Retrieved 09 February 2022 .   \n \n\n\u2191 \"Code of Federal Regulations, Title 45, Subtitle A, Subchapter C, Part 164, Subpart E, 164.514\". U.S. Government Publishing Office. https:\/\/www.ecfr.gov\/current\/title-45\/subtitle-A\/subchapter-C\/part-164\/subpart-E\/section-164.514 . Retrieved 09 February 2022 .   \n \n\n\n\r\n\n\nCitation for this section \nTitle: HIPAA Compliance: An Introduction - Security\nAuthor for citation: Alan Vaughan, with editorial modifications by Shawn Douglas\nLicense for content: Creative Commons Attribution-ShareAlike 4.0 International\nPublication date: Originally published June 2016; compiled and lightly edited February 2022\n\n\n\n\n\nSource: <a rel=\"external_link\" class=\"external\" href=\"https:\/\/www.limswiki.org\/index.php\/Book:HIPAA_Compliance:_An_Introduction\/Security\">https:\/\/www.limswiki.org\/index.php\/Book:HIPAA_Compliance:_An_Introduction\/Security<\/a>\nNavigation menuPage actionsBookDiscussionView sourceHistoryPage actionsBookDiscussionMoreToolsIn other languagesPersonal toolsLog inRequest accountNavigationMain pageRecent changesRandom pageHelp about MediaWikiSearch\u00a0 ToolsWhat links hereRelated changesSpecial pagesPermanent linkPage informationSponsors \r\n\n\t\r\n\n\t\r\n\n\t\r\n\n\t\r\n\n\t\n\t\n\t\r\n\n\t\r\n\n\t\n\t\r\n\n\t\r\n\n \n\t\n\t\n\t\r\n\n\t\r\n\n \n\t\n\t\r\n\n\t\r\n\n\t\n\t\n\t\r\n\n\t\n\t\n\t\r\n\n\t\r\n\n\t\n\t\n\t\r\n\n\t\r\n\n\t\r\n\n\t\r\nPrint\/exportCreate a bookDownload as PDFDownload as PDFDownload as Plain textPrintable version This page was last edited on 10 February 2022, at 23:44.Content is available under a Creative Commons Attribution-ShareAlike 4.0 International License unless otherwise noted.This page has been accessed 2 times.Privacy policyAbout LIMSWikiDisclaimers\n\n\n\n","67501dd743f72dcd818a8dbb0f48d670_html":"<body class=\"mediawiki ltr sitedir-ltr mw-hide-empty-elt ns-208 ns-subject page-Book_HIPAA_Compliance_An_Introduction_Security rootpage-Book_HIPAA_Compliance_An_Introduction_Security skin-monobook action-view skin--responsive\"><div id=\"rdp-ebb-globalWrapper\"><div id=\"rdp-ebb-column-content\"><div id=\"rdp-ebb-content\" class=\"mw-body\" role=\"main\"><a id=\"rdp-ebb-top\"><\/a>\n<h1 id=\"rdp-ebb-firstHeading\" class=\"firstHeading\" lang=\"en\">Book:HIPAA Compliance: An Introduction\/Security<\/h1><div id=\"rdp-ebb-bodyContent\" class=\"mw-body-content\"><!-- start content --><div id=\"rdp-ebb-mw-content-text\" lang=\"en\" dir=\"ltr\" class=\"mw-content-ltr\"><div class=\"mw-parser-output\">\n\n<h2><span class=\"mw-headline\" id=\"Security\">Security<\/span><\/h2>\n<div class=\"floatright\"><a href=\"https:\/\/www.limswiki.org\/index.php\/File:Data_security_privacy_lock_password_(41237924492).jpg\" class=\"image wiki-link\" data-key=\"42a594ce39a67272189c1f1e7721a0b4\"><img alt=\"Data security privacy lock password (41237924492).jpg\" src=\"https:\/\/upload.wikimedia.org\/wikipedia\/commons\/f\/ff\/Data_security_privacy_lock_password_%2841237924492%29.jpg\" decoding=\"async\" style=\"width: 100%;max-width: 400px;height: auto;\" \/><\/a><\/div><p>In the Health Insurance Portability and Accountability Act of 1996 and its subsequent amendments, collectively known as \"HIPAA,\" both the Privacy Rule and Security Rule were established. There is considerable overlap between the two, and many of the provisions relevant to covered entities have already been covered. However, it is worth examining the Security Rule separately, especially inasmuch as it specifically addresses electronic information and related security measures. \n<\/p><h3><span class=\"mw-headline\" id=\"About_the_Security_Rule\">About the Security Rule<\/span><\/h3>\n<p>The Security Standards for the Protection of Electronic Protected Health Information (the Security Rule) establish a national set of security standards for protecting certain health information that is held or transferred in electronic form. The Security Rule \"operationalizes\" the protections contained in the Privacy Rule by addressing the technical and non-technical safeguards that covered entities must put in place to secure individuals\u2019 \"electronic protected health information\" (e-PHI). The OCR, a division of HHS, has responsibility for enforcing the Privacy and Security Rules, using voluntary compliance measures and civil financial penalties.\n<\/p><p>It's interesting to note that prior to HIPAA, no generally accepted set of security standards or general requirements for PHI existed in the healthcare industry. Yet new technologies were evolving, and the healthcare industry began to move away from paper processes and rely more heavily on the use of electronic information systems to pay claims, answer eligibility questions, provide health information and conduct a host of other administrative and clinically-based functions. The need for those standards and security requirements became more apparent.<sup id=\"rdp-ebb-cite_ref-HIPAASecurity_1-0\" class=\"reference\"><a href=\"#cite_note-HIPAASecurity-1\">[1]<\/a><\/sup>\n<\/p><p>Today, providers are using clinical applications such as <a href=\"https:\/\/www.limswiki.org\/index.php\/Computerized_physician_order_entry\" title=\"Computerized physician order entry\" class=\"wiki-link\" data-key=\"f9e67e685f2b29f79e9b0991330f2b10\">computerized physician order entry<\/a> (CPOE) systems, <a href=\"https:\/\/www.limswiki.org\/index.php\/Electronic_health_record\" title=\"Electronic health record\" class=\"wiki-link\" data-key=\"f2e31a73217185bb01389404c1fd5255\">electronic health records<\/a> (EHR) or <a href=\"https:\/\/www.limswiki.org\/index.php\/Electronic_medical_record\" title=\"Electronic medical record\" class=\"wiki-link\" data-key=\"99a695d2af23397807da0537d29d0be7\">electronic medical records<\/a> (EMR), as well as <a href=\"https:\/\/www.limswiki.org\/index.php\/Radiology_information_system\" title=\"Radiology information system\" class=\"wiki-link\" data-key=\"62d0a667f8b27309ea38a46507cfb500\">radiology<\/a>, <a href=\"https:\/\/www.limswiki.org\/index.php\/Pharmacy_automation\" title=\"Pharmacy automation\" class=\"wiki-link\" data-key=\"49c1a391f24ae60449aafabfecdd4a69\">pharmacy<\/a>, and <a href=\"https:\/\/www.limswiki.org\/index.php\/Laboratory_information_system\" title=\"Laboratory information system\" class=\"wiki-link\" data-key=\"37add65b4d1c678b382a7d4817a9cf64\">laboratory information systems<\/a> (LIS). Health plans are providing access to claims and care management, as well as member self-service applications. While this means that the medical workforce can be more mobile and efficient (i.e., physicians can check patient records and test results from wherever they are), the rise in the adoption rate of these technologies increases the potential security risks.\n<\/p><p>A major goal of the Security Rule is to protect the privacy of individuals\u2019 health information while allowing covered entities to adopt new technologies to improve the quality and efficiency of patient care. Given that the healthcare marketplace is diverse, the Security Rule is designed to be flexible and scalable so a covered entity can implement policies, procedures and technologies that are appropriate for the entity\u2019s particular size, organizational structure and risks to consumers\u2019 e-PHI. \n<\/p><p>This is a summary of key elements of the Security Rule and not a complete or comprehensive guide to compliance. Entities regulated by the Privacy and Security Rules are obligated to comply with all of their applicable requirements and should not rely on this summary as a source of legal information or advice. Several portions of the Security Rule overlap with previous sections that discussed both privacy and security, in which case the following information serves to reinforce what you have already encountered. Examine the <a rel=\"external_link\" class=\"external text\" href=\"https:\/\/www.hhs.gov\/hipaa\/for-professionals\/security\/index.html\" target=\"_blank\">HHS Security Rule<\/a> for links to the entire rule and for additional helpful information about how the rule applies. In the event of a conflict between this summary and the rule, the rule governs.\n<\/p>\n<h3><span class=\"mw-headline\" id=\"Statutory_and_regulatory_background\">Statutory and regulatory background<\/span><\/h3>\n<p>It was the Administrative Simplification provisions of HIPAA that required the Secretary of the HHS to publish national standards for the security of e-PHI, electronic exchange, and the privacy and security of health information.\n<\/p><p>HIPAA called on the Secretary to issue security regulations regarding measures for protecting the integrity, confidentiality and availability of e-PHI that is held or transmitted by covered entities. HHS developed a proposed rule and released it for public comment on August 12, 1998. The Department received approximately 2,350 public comments. The final regulation, the Security Rule, was published February 20, 2003. The Rule specifies a series of administrative, technical and physical security procedures for covered entities to use to assure the confidentiality, integrity and availability of e-PHI.<sup id=\"rdp-ebb-cite_ref-HIPAASecurity_1-1\" class=\"reference\"><a href=\"#cite_note-HIPAASecurity-1\">[1]<\/a><\/sup>\n<\/p><p>The text of the final regulation can be found at 45 CFR Part 160<sup id=\"rdp-ebb-cite_ref-45CFR160_2-0\" class=\"reference\"><a href=\"#cite_note-45CFR160-2\">[2]<\/a><\/sup> and Part 164, Subparts A and C.<sup id=\"rdp-ebb-cite_ref-45CFR164_3-0\" class=\"reference\"><a href=\"#cite_note-45CFR164-3\">[3]<\/a><\/sup>\n<\/p>\n<h3><span class=\"mw-headline\" id=\"Who_is_covered_by_the_Security_Rule\">Who is covered by the Security Rule<\/span><\/h3>\n<p>The Security Rule, like all of the Administrative Simplification rules, applies to health plans, health care clearinghouses, and to any health care provider who transmits health information in electronic form in connection with a transaction for which the Secretary of HHS has adopted standards under HIPAA (the \"covered entities,\" discussed prior).\n<\/p>\n<h4><span class=\"mw-headline\" id=\"Business_associates\">Business associates<\/span><\/h4>\n<p>HITECH expanded the responsibilities of business associates under the Privacy and Security Rules, as discussed earlier in this guide. HHS is developing regulations to implement and clarify these changes.\n<\/p>\n<h3><span class=\"mw-headline\" id=\"What_information_is_protected\">What information is protected<\/span><\/h3>\n<p>The HIPAA Privacy Rule protects the privacy of individually identifiable health information, PHI, as explained in the Privacy Rule and here. The Security Rule protects a subset of information covered by the Privacy Rule, which is all individually identifiable health information a covered entity creates, receives, maintains or transmits in electronic form. The Security Rule refers to this information as e-PHI. The Security Rule does not apply to PHI transmitted orally or in writing.<sup id=\"rdp-ebb-cite_ref-HIPAASecurity_1-2\" class=\"reference\"><a href=\"#cite_note-HIPAASecurity-1\">[1]<\/a><\/sup> \n<\/p>\n<h3><span class=\"mw-headline\" id=\"General_rules\">General rules<\/span><\/h3>\n<p>The Security Rule, at its foundation, requires covered entities to maintain reasonable and appropriate administrative, technical and physical safeguards for protecting e-PHI. Specifically, covered entities must<sup id=\"rdp-ebb-cite_ref-HIPAASecurity_1-3\" class=\"reference\"><a href=\"#cite_note-HIPAASecurity-1\">[1]<\/a><\/sup>:\n<\/p>\n<ol><li>ensure the confidentiality, integrity and availability of all e-PHI they create, receive, maintain or transmit<\/li>\n<li>identify and protect against reasonably anticipated threats to the security or integrity of the information<\/li>\n<li>protect against reasonably anticipated, impermissible uses or disclosures<\/li>\n<li>ensure compliance by their workforce.<\/li><\/ol>\n<p>The Security Rule defines \"confidentiality\" to mean that e-PHI is not available or disclosed to unauthorized persons. The Security Rule's confidentiality requirements support the Privacy Rule's prohibitions against improper uses and disclosures of PHI. The Security rule also promotes the two additional goals of maintaining the integrity and availability of e-PHI. Under the Security Rule, \"integrity\" means that e-PHI is not altered or destroyed in an unauthorized manner. \"Availability\" means that e-PHI is accessible and usable on demand by an authorized person.<sup id=\"rdp-ebb-cite_ref-HIPAASecurity_1-4\" class=\"reference\"><a href=\"#cite_note-HIPAASecurity-1\">[1]<\/a><\/sup>\n<\/p><p>HHS recognizes that covered entities range from the smallest provider to the largest, multi-state health plan. Therefore the Security Rule is flexible and scalable to allow covered entities to analyze their own needs and implement solutions appropriate for their specific environments. What is appropriate for a particular covered entity will depend on the nature of its particular business, as well as its size and resources. \n<\/p><p>Therefore, when a covered entity is deciding which security measures to use, the Rule does not dictate those measures but requires it to consider<sup id=\"rdp-ebb-cite_ref-HIPAASecurity_1-5\" class=\"reference\"><a href=\"#cite_note-HIPAASecurity-1\">[1]<\/a><\/sup>:\n<\/p>\n<ul><li>its size, complexity, and capabilities<\/li>\n<li>its technical, hardware, and software infrastructure<\/li>\n<li>the costs of security measures<\/li>\n<li>the likelihood and possible impact of potential risks to e-PHI<\/li><\/ul>\n<p>Covered entities must also review and modify their security measures to continue protecting e-PHI in a changing environment.\n<\/p>\n<h3><span class=\"mw-headline\" id=\"Risk_analysis_and_management\">Risk analysis and management<\/span><\/h3>\n<p>The Administrative Safeguards provisions in the Security Rule require covered entities to perform risk analysis as part of their security management processes. The risk analysis and management provisions of the Security Rule are addressed separately here because, by helping to determine which security measures are reasonable and appropriate for a particular covered entity, risk analysis affects the implementation of all of the safeguards contained in the Security Rule. \n<\/p><p>A risk analysis process includes, but is not limited to, the following activities<sup id=\"rdp-ebb-cite_ref-HIPAASecurity_1-6\" class=\"reference\"><a href=\"#cite_note-HIPAASecurity-1\">[1]<\/a><\/sup>:\n<\/p>\n<ol><li>evaluating the likelihood and impact of potential risks to e-PHI<\/li>\n<li>implementing appropriate security measures to address the risks identified in the risk analysis<\/li>\n<li>documenting the chosen security measures and, where required, the rationale for adopting those measures<\/li>\n<li>maintaining continuous, reasonable, and appropriate security protections<\/li><\/ol>\n<p>Risk analysis should be an ongoing process, in which a covered entity regularly reviews its records to track access to e-PHI and detect security incidents, periodically evaluates the effectiveness of security measures put in place, and regularly reevaluates potential risks to e-PHI.\n<\/p>\n<h3><span class=\"mw-headline\" id=\"Administrative_safeguards\">Administrative safeguards<\/span><\/h3>\n<p>The first of the required areas of security has to do with safeguards that are implemented during administration. These take several forms<sup id=\"rdp-ebb-cite_ref-HIPAASecurity_1-7\" class=\"reference\"><a href=\"#cite_note-HIPAASecurity-1\">[1]<\/a><\/sup>:\n<\/p>\n<dl><dt>Security management process<\/dt>\n<dd>As explained in the previous section, a covered entity has to identify and analyze potential risks to e-PHI, and it must implement security measures that reduce risks and vulnerabilities to a \"reasonable and appropriate level.\"<\/dd><\/dl>\n<dl><dt>Security personnel<\/dt>\n<dd>A covered entity must designate a security official, who is responsible for developing and implementing its security policies and procedures. This is similar to the previously mentioned privacy official.<\/dd><\/dl>\n<dl><dt>Information access management<\/dt>\n<dd>Consistent with the Privacy Rule standard limiting uses and disclosures of PHI to the \"minimum necessary,\" the Security Rule requires a covered entity to implement policies and procedures for authorizing access to e-PHI only when such access is appropriate based on the user or recipient's role (role-based access).<\/dd><\/dl>\n<dl><dt>Workforce training and management<\/dt>\n<dd>A covered entity must provide for appropriate authorization and supervision of workforce members who work with e-PHI. All of those workforce members must be trained regarding its HIPAA-compliant security policies and procedures, and the covered entity must have and apply appropriate sanctions against workforce members who violate those policies and procedures.<\/dd><\/dl>\n<dl><dt>Evaluation<\/dt>\n<dd>A covered entity must perform a periodic assessment of how well its security policies and procedures meet the requirements of the Security Rule.<\/dd><\/dl>\n<div class=\"floatleft\"><a href=\"https:\/\/www.limswiki.org\/index.php\/File:Physical_security_access_control_with_a_fingerprint_scanner.jpg\" class=\"image wiki-link\" data-key=\"f06edc4446b34e71c63e2e5cefd953b6\"><img alt=\"Physical security access control with a fingerprint scanner.jpg\" src=\"https:\/\/upload.wikimedia.org\/wikipedia\/commons\/8\/8b\/Physical_security_access_control_with_a_fingerprint_scanner.jpg\" decoding=\"async\" width=\"180\" height=\"272\" \/><\/a><\/div>\n<h3><span class=\"mw-headline\" id=\"Physical_safeguards\">Physical safeguards<\/span><\/h3>\n<p>The second required area of compliance with the Security Rule is the introduction and maintenance of physical safeguards for PHI. These include<sup id=\"rdp-ebb-cite_ref-HIPAASecurity_1-8\" class=\"reference\"><a href=\"#cite_note-HIPAASecurity-1\">[1]<\/a><\/sup>:\n<\/p>\n<dl><dt>Facility access and control<\/dt>\n<dd>A covered entity must limit physical access to its facilities, but also ensure authorized access.<\/dd><\/dl>\n<dl><dt>Workstation and device security<\/dt>\n<dd>A covered entity must implement policies and procedures to specify proper use of and access to workstations and electronic media. A covered entity also must have in place policies and procedures regarding the transfer, removal, disposal and re-use of electronic media, to ensure appropriate protection of e-PHI.<\/dd><\/dl>\n<h3><span class=\"mw-headline\" id=\"Technical_safeguards\">Technical safeguards<\/span><\/h3>\n<p>The third area of security designated by the Security Rule is the technical aspect. Technical safeguards fall under the categories of<sup id=\"rdp-ebb-cite_ref-HIPAASecurity_1-9\" class=\"reference\"><a href=\"#cite_note-HIPAASecurity-1\">[1]<\/a><\/sup>:\n<\/p>\n<dl><dt>Access control<\/dt>\n<dd>A covered entity is required to implement technical policies and procedures that allow only authorized persons to access e-PHI.<\/dd><\/dl>\n<dl><dt>Audit controls<\/dt>\n<dd>A covered entity must implement hardware, software and\/or procedural mechanisms to record and examine access and other activity in any information systems that contain or use e-PHI.<\/dd><\/dl>\n<dl><dt>Integrity controls<\/dt>\n<dd>A covered entity must implement policies and procedures, and electronic measures must be taken to ensure that e-PHI is not improperly altered or destroyed.<\/dd><\/dl>\n<dl><dt>Transmission security<\/dt>\n<dd>A covered entity must implement technical security measures that guard against unauthorized access to e-PHI that is being transmitted over an electronic network. There are standards that are approved and available, including <a href=\"https:\/\/www.limswiki.org\/index.php\/Health_Level_7\" title=\"Health Level 7\" class=\"wiki-link\" data-key=\"e0bf845fb58d2bae05a846b47629e86f\">Health Level 7<\/a> (HL7).<\/dd><\/dl>\n<h3><span class=\"mw-headline\" id=\"Required_and_addressable_implementation_specifications\">Required and addressable implementation specifications<\/span><\/h3>\n<p>Covered entities are required to comply with every Security Rule \"standard.\" However, the Security Rule categorizes certain implementation specifications within those standards as \"addressable,\" while others are \"required.\" The required implementation specifications must be implemented. The \"addressable\" designation does not mean that an implementation specification is optional, but it permits covered entities to determine whether the addressable implementation specification is reasonable and appropriate for that covered entity. If it is not, the Security Rule allows the covered entity to adopt an alternative measure that achieves the purpose of the standard, if that alternative measure is reasonable and appropriate.<sup id=\"rdp-ebb-cite_ref-HIPAASecurity_1-10\" class=\"reference\"><a href=\"#cite_note-HIPAASecurity-1\">[1]<\/a><\/sup>\n<\/p>\n<h4><span class=\"mw-headline\" id=\"Organizational_requirements\">Organizational requirements<\/span><\/h4>\n<p>In some cases, organization-wide action must be taken. Cases include<sup id=\"rdp-ebb-cite_ref-HIPAASecurity_1-11\" class=\"reference\"><a href=\"#cite_note-HIPAASecurity-1\">[1]<\/a><\/sup>:\n<\/p>\n<dl><dt>Covered entity responsibility to act<\/dt>\n<dd>If a covered entity knows of an activity or practice of a business associate that constitutes a material breach or violation of the business associate\u2019s obligation, the covered entity must take reasonable steps to cure the breach or end the violation. Violations include the failure to implement safeguards that reasonably and appropriately protect e-PHI.<\/dd><\/dl>\n<dl><dt>Business associate responsibility to act<\/dt>\n<dd>In the case of a BAA, certain stipulations are required in most cases. HHS is developing regulations relating to business associate obligations and business associate contracts under the HITECH Act of 2009.<\/dd><\/dl>\n<h4><span class=\"mw-headline\" id=\"Documentation_requirements\">Documentation requirements<\/span><\/h4>\n<p>A covered entity must adopt \"reasonable and appropriate\" policies and procedures (P&P) to comply with the provisions of the Security Rule. A covered entity must maintain, until six years after the date of their creation or last effective date (whichever is later), written security P&P and written records of required actions, activities or assessments. Additionally, a covered entity must periodically review and update its documentation in response to environmental or organizational changes that affect the security of e-PHI.<sup id=\"rdp-ebb-cite_ref-HIPAASecurity_1-12\" class=\"reference\"><a href=\"#cite_note-HIPAASecurity-1\">[1]<\/a><\/sup>\n<\/p>\n<h4><span class=\"mw-headline\" id=\"State_law\">State law<\/span><\/h4>\n<p>In general, state laws that are contrary to the HIPAA regulations are preempted by the federal requirements, which means that the federal requirements will apply. \"Contrary\" means that it would be impossible for a covered entity to comply with both the state and federal requirements, or that the provision of state law is an obstacle to accomplishing the full purposes and objectives of the Administrative Simplification provisions of HIPAA.<sup id=\"rdp-ebb-cite_ref-HIPAASecurity_1-13\" class=\"reference\"><a href=\"#cite_note-HIPAASecurity-1\">[1]<\/a><\/sup>\n<\/p>\n<h4><span class=\"mw-headline\" id=\"Enforcement_and_penalties_for_noncompliance\">Enforcement and penalties for noncompliance<\/span><\/h4>\n<p>The Security Rule establishes a set of national standards for confidentiality, integrity and availability of e-PHI. The OCR is responsible for administering and enforcing these standards, in concert with its enforcement of the Privacy Rule, and may conduct complaint investigations and compliance reviews.<sup id=\"rdp-ebb-cite_ref-HIPAASecurity_1-14\" class=\"reference\"><a href=\"#cite_note-HIPAASecurity-1\">[1]<\/a><\/sup>\n<\/p><p>The Enforcement Rule's Final Rule is essentially HITECH provisions that strengthen HHS' ability to enforce the Privacy and Security Rules of HIPAA. Some enforcement measures and penalties are discussed in the next section and on the OCR's <a rel=\"external_link\" class=\"external text\" href=\"https:\/\/www.hhs.gov\/hipaa\/for-professionals\/special-topics\/enforcement-rule\/index.html\" target=\"_blank\">Enforcement Rule page<\/a>.\n<\/p>\n<h4><span class=\"mw-headline\" id=\"Compliance_dates\">Compliance dates<\/span><\/h4>\n<p>All covered entities, except \"small health plans,\" must have been compliant with the Security Rule by April 20, 2005. Small health plans had until April 20, 2006 to comply.<sup id=\"rdp-ebb-cite_ref-HIPAASecurity_1-15\" class=\"reference\"><a href=\"#cite_note-HIPAASecurity-1\">[1]<\/a><\/sup>\n<\/p>\n<h2><span class=\"mw-headline\" id=\"References\">References<\/span><\/h2>\n<div class=\"reflist\" style=\"list-style-type: decimal;\">\n<div class=\"mw-references-wrap\"><ol class=\"references\">\n<li id=\"cite_note-HIPAASecurity-1\"><span class=\"mw-cite-backlink\">\u2191 <sup><a href=\"#cite_ref-HIPAASecurity_1-0\">1.00<\/a><\/sup> <sup><a href=\"#cite_ref-HIPAASecurity_1-1\">1.01<\/a><\/sup> <sup><a href=\"#cite_ref-HIPAASecurity_1-2\">1.02<\/a><\/sup> <sup><a href=\"#cite_ref-HIPAASecurity_1-3\">1.03<\/a><\/sup> <sup><a href=\"#cite_ref-HIPAASecurity_1-4\">1.04<\/a><\/sup> <sup><a href=\"#cite_ref-HIPAASecurity_1-5\">1.05<\/a><\/sup> <sup><a href=\"#cite_ref-HIPAASecurity_1-6\">1.06<\/a><\/sup> <sup><a href=\"#cite_ref-HIPAASecurity_1-7\">1.07<\/a><\/sup> <sup><a href=\"#cite_ref-HIPAASecurity_1-8\">1.08<\/a><\/sup> <sup><a href=\"#cite_ref-HIPAASecurity_1-9\">1.09<\/a><\/sup> <sup><a href=\"#cite_ref-HIPAASecurity_1-10\">1.10<\/a><\/sup> <sup><a href=\"#cite_ref-HIPAASecurity_1-11\">1.11<\/a><\/sup> <sup><a href=\"#cite_ref-HIPAASecurity_1-12\">1.12<\/a><\/sup> <sup><a href=\"#cite_ref-HIPAASecurity_1-13\">1.13<\/a><\/sup> <sup><a href=\"#cite_ref-HIPAASecurity_1-14\">1.14<\/a><\/sup> <sup><a href=\"#cite_ref-HIPAASecurity_1-15\">1.15<\/a><\/sup><\/span> <span class=\"reference-text\"><span class=\"citation web\">Office for Civil Rights (26 July 2013). <a rel=\"external_link\" class=\"external text\" href=\"https:\/\/www.hhs.gov\/hipaa\/for-professionals\/security\/laws-regulations\/index.html\" target=\"_blank\">\"Summary of the HIPAA Security Rule\"<\/a>. U.S. Department of Health and Human Services<span class=\"printonly\">. <a rel=\"external_link\" class=\"external free\" href=\"https:\/\/www.hhs.gov\/hipaa\/for-professionals\/security\/laws-regulations\/index.html\" target=\"_blank\">https:\/\/www.hhs.gov\/hipaa\/for-professionals\/security\/laws-regulations\/index.html<\/a><\/span><span class=\"reference-accessdate\">. Retrieved 10 February 2022<\/span>.<\/span><span class=\"Z3988\" title=\"ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=bookitem&rft.btitle=Summary+of+the+HIPAA+Security+Rule&rft.atitle=&rft.aulast=Office+for+Civil+Rights&rft.au=Office+for+Civil+Rights&rft.date=26+July+2013&rft.pub=U.S.+Department+of+Health+and+Human+Services&rft_id=https%3A%2F%2Fwww.hhs.gov%2Fhipaa%2Ffor-professionals%2Fsecurity%2Flaws-regulations%2Findex.html&rfr_id=info:sid\/en.wikipedia.org:Book:HIPAA_Compliance:_An_Introduction\/Security\"><span style=\"display: none;\"> <\/span><\/span>\n<\/span>\n<\/li>\n<li id=\"cite_note-45CFR160-2\"><span class=\"mw-cite-backlink\"><a href=\"#cite_ref-45CFR160_2-0\">\u2191<\/a><\/span> <span class=\"reference-text\"><span class=\"citation web\"><a rel=\"external_link\" class=\"external text\" href=\"https:\/\/www.ecfr.gov\/current\/title-45\/subtitle-A\/subchapter-C\/part-160\/subpart-A\/section-160.103\" target=\"_blank\">\"Code of Federal Regulations Title 45, Subtitle A, Subchapter C, Part 160, Subpart A, 160.103\"<\/a>. US Government Publishing Office<span class=\"printonly\">. <a rel=\"external_link\" class=\"external free\" href=\"https:\/\/www.ecfr.gov\/current\/title-45\/subtitle-A\/subchapter-C\/part-160\/subpart-A\/section-160.103\" target=\"_blank\">https:\/\/www.ecfr.gov\/current\/title-45\/subtitle-A\/subchapter-C\/part-160\/subpart-A\/section-160.103<\/a><\/span><span class=\"reference-accessdate\">. Retrieved 09 February 2022<\/span>.<\/span><span class=\"Z3988\" title=\"ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=bookitem&rft.btitle=Code+of+Federal+Regulations+Title+45%2C+Subtitle+A%2C+Subchapter+C%2C+Part+160%2C+Subpart+A%2C+160.103&rft.atitle=&rft.pub=US+Government+Publishing+Office&rft_id=https%3A%2F%2Fwww.ecfr.gov%2Fcurrent%2Ftitle-45%2Fsubtitle-A%2Fsubchapter-C%2Fpart-160%2Fsubpart-A%2Fsection-160.103&rfr_id=info:sid\/en.wikipedia.org:Book:HIPAA_Compliance:_An_Introduction\/Security\"><span style=\"display: none;\"> <\/span><\/span>\n<\/span>\n<\/li>\n<li id=\"cite_note-45CFR164-3\"><span class=\"mw-cite-backlink\"><a href=\"#cite_ref-45CFR164_3-0\">\u2191<\/a><\/span> <span class=\"reference-text\"><span class=\"citation web\"><a rel=\"external_link\" class=\"external text\" href=\"https:\/\/www.ecfr.gov\/current\/title-45\/subtitle-A\/subchapter-C\/part-164\/subpart-E\/section-164.514\" target=\"_blank\">\"Code of Federal Regulations, Title 45, Subtitle A, Subchapter C, Part 164, Subpart E, 164.514\"<\/a>. U.S. Government Publishing Office<span class=\"printonly\">. <a rel=\"external_link\" class=\"external free\" href=\"https:\/\/www.ecfr.gov\/current\/title-45\/subtitle-A\/subchapter-C\/part-164\/subpart-E\/section-164.514\" target=\"_blank\">https:\/\/www.ecfr.gov\/current\/title-45\/subtitle-A\/subchapter-C\/part-164\/subpart-E\/section-164.514<\/a><\/span><span class=\"reference-accessdate\">. Retrieved 09 February 2022<\/span>.<\/span><span class=\"Z3988\" title=\"ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=bookitem&rft.btitle=Code+of+Federal+Regulations%2C+Title+45%2C+Subtitle+A%2C+Subchapter+C%2C+Part+164%2C+Subpart+E%2C+164.514&rft.atitle=&rft.pub=U.S.+Government+Publishing+Office&rft_id=https%3A%2F%2Fwww.ecfr.gov%2Fcurrent%2Ftitle-45%2Fsubtitle-A%2Fsubchapter-C%2Fpart-164%2Fsubpart-E%2Fsection-164.514&rfr_id=info:sid\/en.wikipedia.org:Book:HIPAA_Compliance:_An_Introduction\/Security\"><span style=\"display: none;\"> <\/span><\/span>\n<\/span>\n<\/li>\n<\/ol><\/div><\/div>\n<p><br \/>\n<\/p>\n<h2><span class=\"mw-headline\" id=\"Citation_for_this_section\">Citation for this section<\/span><\/h2>\n<p><b>Title<\/b>: <i>HIPAA Compliance: An Introduction<\/i> - Security\n<\/p><p><b>Author for citation<\/b>: Alan Vaughan, with editorial modifications by Shawn Douglas\n<\/p><p><b>License for content<\/b>: <a rel=\"external_link\" class=\"external text\" href=\"https:\/\/creativecommons.org\/licenses\/by-sa\/4.0\/\" target=\"_blank\">Creative Commons Attribution-ShareAlike 4.0 International<\/a>\n<\/p><p><b>Publication date<\/b>: Originally published June 2016; compiled and lightly edited February 2022\n<\/p>\n<!-- \nNewPP limit report\nCached time: 20220210234443\nCache expiry: 86400\nDynamic content: false\nComplications: []\nCPU time usage: 0.135 seconds\nReal time usage: 0.281 seconds\nPreprocessor visited node count: 1946\/1000000\nPost\u2010expand include size: 30312\/2097152 bytes\nTemplate argument size: 5619\/2097152 bytes\nHighest expansion depth: 18\/40\nExpensive parser function count: 0\/100\nUnstrip recursion depth: 0\/20\nUnstrip post\u2010expand size: 7132\/5000000 bytes\n-->\n<!--\nTransclusion expansion time report (%,ms,calls,template)\n100.00% 69.829 1 -total\n 60.93% 42.550 1 Template:Reflist\n 49.15% 34.324 3 Template:Cite_web\n 42.08% 29.385 3 Template:Citation\/core\n 38.94% 27.190 1 Template:HIPAA_Compliance:_An_Introduction\/Security\n 10.92% 7.628 1 Template:Date\n 5.00% 3.492 3 Template:Citation\/make_link\n-->\n\n<!-- Saved in parser cache with key limswiki:pcache:idhash:13006-0!canonical and timestamp 20220210234444 and revision id 46321. Serialized with JSON.\n -->\n<\/div><\/div><div class=\"printfooter\">Source: <a rel=\"external_link\" class=\"external\" href=\"https:\/\/www.limswiki.org\/index.php\/Book:HIPAA_Compliance:_An_Introduction\/Security\">https:\/\/www.limswiki.org\/index.php\/Book:HIPAA_Compliance:_An_Introduction\/Security<\/a><\/div>\n<!-- end content --><div class=\"visualClear\"><\/div><\/div><\/div><div class=\"visualClear\"><\/div><\/div><!-- end of the left (by default at least) column --><div class=\"visualClear\"><\/div><\/div>\n\n\n\n<\/body>","67501dd743f72dcd818a8dbb0f48d670_images":["https:\/\/upload.wikimedia.org\/wikipedia\/commons\/f\/ff\/Data_security_privacy_lock_password_%2841237924492%29.jpg","https:\/\/upload.wikimedia.org\/wikipedia\/commons\/8\/8b\/Physical_security_access_control_with_a_fingerprint_scanner.jpg"],"67501dd743f72dcd818a8dbb0f48d670_timestamp":1644537386,"f152ac60160ac44246cd93438a50f862_type":"article","f152ac60160ac44246cd93438a50f862_title":"6. Administration","f152ac60160ac44246cd93438a50f862_url":"https:\/\/www.limswiki.org\/index.php\/Book:HIPAA_Compliance:_An_Introduction\/Administration","f152ac60160ac44246cd93438a50f862_plaintext":"\n\nBook:HIPAA Compliance: An Introduction\/AdministrationFrom LIMSWikiJump to navigationJump to searchContents \n\n1 Administration \n\n1.1 Administrative requirements and recommendations \n\n1.1.1 Privacy policies and procedures \n1.1.2 Privacy personnel \n1.1.3 Workforce training and management \n1.1.4 Mitigation \n1.1.5 Data safeguards \n1.1.6 Complaints \n1.1.7 Retaliation and waiver \n1.1.8 Documentation and record retention \n1.1.9 Fully-insured group health plan exception \n\n\n1.2 Organizational options \n\n1.2.1 Hybrid \n1.2.2 Affiliated \n1.2.3 Organized healthcare arrangement \n1.2.4 Covered entities with multiple covered functions \n1.2.5 Group health plan disclosures to plan sponsors \n\n\n1.3 Other administrative simplification rules \n\n1.3.1 Transactions and codes set standards \n1.3.2 Identifier standards for employers and providers \n\n\n\n\n2 References \n3 Citation for this section \n\n\n\nAdministration \nPrevious sections have dealt with explaining what HIPAA is, who it applies to, what data are protected and how the PHI of individuals must be handled, according to HIPAA generally and the Privacy Rule specifically. However, implications for administration of HIPAA and how it applies to and affects healthcare organizations and administrative departments are also important to understand.\nAdministrative requirements and recommendations \nAdministratively, there are a few things to keep in mind when seeking to comply with HIPAA, according to the HHS. They are detailed in subsections below.\n\nPrivacy policies and procedures \nA covered entity must develop and implement written privacy policies and procedures that are consistent with the Privacy Rule.[1] (This was discussed in detail in the prior section, under \"Patient notification and rights.\")\n\nPrivacy personnel \nCovered entities must designate a privacy official, who is responsible for developing and implementing its written privacy policies and procedures. It must also provide a contact person or contact office responsible for receiving complaints and providing individuals with information on the covered entity\u2019s privacy practices. There isn't anything preventing these being the same person\/office.[1]\n\nWorkforce training and management \nWorkforce requirements should address privacy and breach procedures. Workforce members include employees, volunteers and trainees, and may also include other persons whose conduct is under the direct control of the covered entity (whether or not they are paid by the covered entity). Covered entities must train all workforce members on privacy policies and procedures, but only as necessary and appropriate for them to carry out their functions. In addition, the covered entity must have and apply appropriate sanctions against workforce members who violate privacy policies and procedures or the HIPAA Privacy Rule. The information to do this is contained in this course and at the HHS website, as well as in the HIPAA law itself.[1]\n\nMitigation \nSometimes HIPAA regulations and\/or covered entity privacy policies are broken, either accidentally or intentionally. In such cases, a covered entity must mitigate (to the extent practicable) any harmful effect it learns was caused by that use or disclosure of PHI by its workforce or its business associates.[1]\n\nData safeguards \nPer the HIPAA Security Rule, a covered entity must maintain reasonable and appropriate administrative, technical and physical safeguards to prevent either intentional or unintentional use or disclosure of PHI in violation of the Privacy Rule, and to minimize its incidental use and disclosure in the process of providing otherwise allowed or required use or disclosure. For example, such safeguards could include shredding documents containing PHI before discarding them, securing medical records with lock and key or pass code, and limiting access to keys or pass codes.[1] More suggestions can be had at the HHS website.[2] \n\nComplaints \nTo comply with HIPAA, a covered entity must have procedures for individuals to complain about problems with its compliance with privacy policies and procedures and the Privacy Rule. As stated above, the covered entity must provide those procedures in its privacy practices notice. In the notice, among other things, the covered entity must let individuals know where they can submit complaints to, and let them know that complaints can also be submitted to the Secretary of HHS.[1]\n\nRetaliation and waiver \nUnder HIPAA, a covered entity may not retaliate against a person for[1]:\n\nexercising rights provided by the Privacy Rule\nassisting in an investigation by HHS or another appropriate authority\nopposing an act or practice that the person believes in good faith violates the Privacy Rule\nA covered entity may not require an individual to waive any right under the Privacy Rule as a condition for obtaining treatment, payment, and enrollment or benefits eligibility.\n\nDocumentation and record retention \nAs a HIPAA covered entity, all actions, activities and designations that the Privacy Rule requires to be documented must be maintained until six years after the later of the date of their creation or last effective date. This includes covered entity privacy policies and procedures, privacy practices notices and disposition of any complaints, along with any other required documentation as outlined in this course and at HHS or in the HIPAA law available from the U.S. Government Publishing Office.[1][3]\n\nFully-insured group health plan exception \nThe only administrative obligations with which a fully-insured group health plan that has no more than enrollment data and summary health information is required to comply are the[1]:\n\nban on retaliatory acts and waiver of individual rights, and\ndocumentation requirements with respect to plan documents if such documents are amended to provide for the disclosure of PHI to the plan sponsor by a health insurance issuer or HMO that services the group health plan.\nOrganizational options \nDespite the guidance on who is actually required to comply, there are subtle variations on the way entities are organized or departmentalized that require clarification on how HIPAA privacy and security rules apply. \n\nHybrid \nThe Privacy Rule permits a covered entity that is a single legal entity and that conducts both covered and non-covered functions to elect to be a \"hybrid entity.\" (The activities that make a person or organization a covered entity are its \"covered functions.\") To be a hybrid entity, the covered entity must designate in writing its operations that perform covered functions as one or more \"health care components.\" After making this designation, most of the requirements of the Privacy Rule will apply only to the health care components. A covered entity that does not make this designation is subject in its entirety to the Privacy Rule.[1] \n\nAffiliated \nLegally separate covered entities that are affiliated by common ownership or control may designate themselves (including their health care components) as a single covered entity for Privacy Rule compliance. The designation must be in writing. An affiliated covered entity that performs multiple covered functions must operate its different covered functions in compliance with the Privacy Rule provisions applicable to those covered functions.[1]\n\nOrganized healthcare arrangement \nThe Privacy Rule identifies relationships in which participating covered entities share PHI to manage and benefit their common enterprise as \"organized health care arrangements.\" Covered entities in an organized health care arrangement can share PHI with each other for the arrangement\u2019s joint health care operations.[1]\n\nCovered entities with multiple covered functions \nA covered entity that performs multiple covered functions must operate its different covered functions in compliance with the Privacy Rule provisions applicable to those covered functions. The covered entity may not use or disclose the PHI of an individual who receives services from one covered function (e.g., healthcare provider) for another covered function (e.g., health plan) if the individual is not involved with the other function.[1]\n\nGroup health plan disclosures to plan sponsors \nA group health plan and the health insurer or HMO offered by the plan may disclose the following PHI to the \"plan sponsor\" (i.e., the employer, union or other employee organization that sponsors and maintains the group health plan)[1]:\n\nenrollment or disenrollment information with respect to the group health plan or a health insurer or HMO offered by the plan - If requested by the plan sponsor, summary health information for the plan sponsor to use to obtain premium bids for providing health insurance coverage through the group health plan, or to modify, amend or terminate the group health plan. \"Summary health information\" is information that summarizes claims history, claims expenses or types of claims experience of the individuals for whom the plan sponsor has provided health benefits through the group health plan, and that is stripped of all individual identifiers other than five-digit zip code (though it need not qualify as de-identified PHI).\nPHI of the group health plan\u2019s enrollees for the plan sponsor to perform plan administration functions - The plan must receive certification from the plan sponsor that the group health plan document has been amended to impose restrictions on the plan sponsor\u2019s use and disclosure of the PHI. These restrictions must include the representation that the plan sponsor will not use or disclose the PHI for any employment-related action or decision or in connection with any other benefit plan.\nOther administrative simplification rules \nIn addition to the HIPAA Privacy, Security, and Enforcement Rules, the HIPAA Administrative Simplification Rule is also relevant.\n\nTransactions and codes set standards \nThese standards follow from the Security Rule, which is covered in the next section.\n\"Transactions\" are activities involving the transfer of healthcare information for specific purposes. Under HIPAA, if a health plan or healthcare provider engages in one of the identified transactions, they must comply with the standard for it, which includes using a standard code set to identify diagnoses and procedures. The Standards for Electronic Transactions and Code Sets, published August 17, 2000 and since modified, adopted standards for several transactions, including[4]:\n\nclaims and encounter information\npayment and remittance advice\nclaims status\nAny healthcare provider that conducts a standard transaction also must comply with the Privacy Rule. \nIf a covered entity conducts one of the adopted transactions electronically, they must use the adopted standard, either from the Accredited Standards Committee X12, Insurance Subcommittee (ASC X12N) or National Council for Prescription Drug Programs (NCPDP). Covered entities must adhere to the content and format requirements of each transaction. Under HIPAA, HHS also adopted specific code sets for diagnoses and procedures to be used in all transactions. The adopted code sets for procedures, diagnoses and drugs with which providers and health plan are familiar, include[4]:\n\nHCPCS (Ancillary Services\/Procedures)\nCPT-4 (Physicians Procedures)\nICD-9 (Diagnosis and Hospital Inpatient Procedures)\nICD-10 (As of October 1, 2015)\nCDT (Dental Terminology)\nNDC (National Drug Codes)\nHHS also adopted standards for unique identifiers for employers and providers, which must also be used in all transactions.\n\nIdentifier standards for employers and providers \nHIPAA requires that employers have standard national numbers that identify them on standard transactions. The employer identification number (EIN), issued by the Internal Revenue Service (IRS), was selected as the identifier for employers and was adopted effective July 30, 2002. \nHealthcare providers must also have standard national numbers that identify them on standard transactions. The National Provider Identifier (NPI) is a unique identification number for covered healthcare providers. Covered healthcare providers and all health plans and health care clearinghouses use the NPIs in the administrative transactions adopted under HIPAA. The NPI is a 10-position, intelligence-free numeric identifier (10-digit number). This means that the numbers do not carry other information about healthcare providers, such as the state in which they live or their medical specialty.[5]\n\nReferences \n\n\n\u2191 1.00 1.01 1.02 1.03 1.04 1.05 1.06 1.07 1.08 1.09 1.10 1.11 1.12 1.13 Office for Civil Rights (26 July 2013). \"Summary of the HIPAA Privacy Rule\". United States Department of Health and Human Services. https:\/\/www.hhs.gov\/hipaa\/for-professionals\/privacy\/laws-regulations\/index.html . Retrieved 09 February 2022 .   \n \n\n\u2191 Office for Civil Rights (26 July 2013). \"Incidental Uses and Disclosures\". U.S. Department of Health & Human Services. https:\/\/www.hhs.gov\/hipaa\/for-professionals\/privacy\/guidance\/incidental-uses-and-disclosures\/index.html . Retrieved 10 February 2022 .   \n \n\n\u2191 \"Public Law 104 - 191 - Health Insurance Portability And Accountability Act of 1996\". GovInfo. U.S. Government Publishing Office. 21 August 1996. https:\/\/www.govinfo.gov\/app\/details\/PLAW-104publ191 . Retrieved 09 February 2022 .   \n \n\n\u2191 4.0 4.1 \"What Are HIPAA Transaction and Code Sets Standards?\". Texas Medical Association. 29 October 2019. https:\/\/www.texmed.org\/Template.aspx?id=1599 . Retrieved 09 February 2022 .   \n \n\n\u2191 Office for Civil Rights. \"Other Administrative Simplification Rules\". U.S. Department of Health & Human Services. https:\/\/www.hhs.gov\/hipaa\/for-professionals\/other-administration-simplification-rules\/index.html . Retrieved 10 February 2022 .   \n \n\n\n\r\n\n\nCitation for this section \nTitle: HIPAA Compliance: An Introduction - Administration\nAuthor for citation: Alan Vaughan, with editorial modifications by Shawn Douglas\nLicense for content: Creative Commons Attribution-ShareAlike 4.0 International\nPublication date: Originally published June 2016; compiled and lightly edited February 2022\n\n\n\n\n\nSource: <a rel=\"external_link\" class=\"external\" href=\"https:\/\/www.limswiki.org\/index.php\/Book:HIPAA_Compliance:_An_Introduction\/Administration\">https:\/\/www.limswiki.org\/index.php\/Book:HIPAA_Compliance:_An_Introduction\/Administration<\/a>\nNavigation menuPage actionsBookDiscussionView sourceHistoryPage actionsBookDiscussionMoreToolsIn other languagesPersonal toolsLog inRequest accountNavigationMain pageRecent changesRandom pageHelp about MediaWikiSearch\u00a0 ToolsWhat links hereRelated changesSpecial pagesPermanent linkPage informationSponsors \r\n\n\t\r\n\n\t\r\n\n\t\r\n\n\t\r\n\n\t\n\t\n\t\r\n\n\t\r\n\n\t\n\t\r\n\n\t\r\n\n \n\t\n\t\n\t\r\n\n\t\r\n\n \n\t\n\t\r\n\n\t\r\n\n\t\n\t\n\t\r\n\n\t\n\t\n\t\r\n\n\t\r\n\n\t\n\t\n\t\r\n\n\t\r\n\n\t\r\n\n\t\r\nPrint\/exportCreate a bookDownload as PDFDownload as PDFDownload as Plain textPrintable version This page was last edited on 10 February 2022, at 23:43.Content is available under a Creative Commons Attribution-ShareAlike 4.0 International License unless otherwise noted.This page has been accessed 3 times.Privacy policyAbout LIMSWikiDisclaimers\n\n\n\n","f152ac60160ac44246cd93438a50f862_html":"<body class=\"mediawiki ltr sitedir-ltr mw-hide-empty-elt ns-208 ns-subject page-Book_HIPAA_Compliance_An_Introduction_Administration rootpage-Book_HIPAA_Compliance_An_Introduction_Administration skin-monobook action-view skin--responsive\"><div id=\"rdp-ebb-globalWrapper\"><div id=\"rdp-ebb-column-content\"><div id=\"rdp-ebb-content\" class=\"mw-body\" role=\"main\"><a id=\"rdp-ebb-top\"><\/a>\n<h1 id=\"rdp-ebb-firstHeading\" class=\"firstHeading\" lang=\"en\">Book:HIPAA Compliance: An Introduction\/Administration<\/h1><div id=\"rdp-ebb-bodyContent\" class=\"mw-body-content\"><!-- start content --><div id=\"rdp-ebb-mw-content-text\" lang=\"en\" dir=\"ltr\" class=\"mw-content-ltr\"><div class=\"mw-parser-output\">\n\n<h2><span class=\"mw-headline\" id=\"Administration\">Administration<\/span><\/h2>\n<div class=\"floatleft\"><a href=\"https:\/\/www.limswiki.org\/index.php\/File:Training_for_trainers_-_Wikimedia_UK_(14841183304).jpg\" class=\"image wiki-link\" data-key=\"8715894912e205070d0068f8e72b20c4\"><img alt=\"Training for trainers - Wikimedia UK (14841183304).jpg\" src=\"https:\/\/upload.wikimedia.org\/wikipedia\/commons\/b\/bb\/Training_for_trainers_-_Wikimedia_UK_%2814841183304%29.jpg\" decoding=\"async\" width=\"380\" height=\"253\" \/><\/a><\/div><p>Previous sections have dealt with explaining what HIPAA is, who it applies to, what data are protected and how the PHI of individuals must be handled, according to HIPAA generally and the Privacy Rule specifically. However, implications for administration of HIPAA and how it applies to and affects healthcare organizations and administrative departments are also important to understand.\n<\/p><h3><span class=\"mw-headline\" id=\"Administrative_requirements_and_recommendations\">Administrative requirements and recommendations<\/span><\/h3>\n<p>Administratively, there are a few things to keep in mind when seeking to comply with HIPAA, according to the HHS. They are detailed in subsections below.\n<\/p>\n<h4><span class=\"mw-headline\" id=\"Privacy_policies_and_procedures\">Privacy policies and procedures<\/span><\/h4>\n<p>A covered entity must develop and implement written privacy policies and procedures that are consistent with the Privacy Rule.<sup id=\"rdp-ebb-cite_ref-HHSSummaryHIPAA_1-0\" class=\"reference\"><a href=\"#cite_note-HHSSummaryHIPAA-1\">[1]<\/a><\/sup> (This was discussed in detail in the prior section, under \"Patient notification and rights.\")\n<\/p>\n<h4><span class=\"mw-headline\" id=\"Privacy_personnel\">Privacy personnel<\/span><\/h4>\n<p>Covered entities must designate a privacy official, who is responsible for developing and implementing its written privacy policies and procedures. It must also provide a contact person or contact office responsible for receiving complaints and providing individuals with information on the covered entity\u2019s privacy practices. There isn't anything preventing these being the same person\/office.<sup id=\"rdp-ebb-cite_ref-HHSSummaryHIPAA_1-1\" class=\"reference\"><a href=\"#cite_note-HHSSummaryHIPAA-1\">[1]<\/a><\/sup>\n<\/p>\n<h4><span class=\"mw-headline\" id=\"Workforce_training_and_management\">Workforce training and management<\/span><\/h4>\n<p>Workforce requirements should address privacy and breach procedures. Workforce members include employees, volunteers and trainees, and may also include other persons whose conduct is under the direct control of the covered entity (whether or not they are paid by the covered entity). Covered entities must train all workforce members on privacy policies and procedures, but only as necessary and appropriate for them to carry out their functions. In addition, the covered entity must have and apply appropriate sanctions against workforce members who violate privacy policies and procedures or the HIPAA Privacy Rule. The information to do this is contained in this course and at the HHS website, as well as in the HIPAA law itself.<sup id=\"rdp-ebb-cite_ref-HHSSummaryHIPAA_1-2\" class=\"reference\"><a href=\"#cite_note-HHSSummaryHIPAA-1\">[1]<\/a><\/sup>\n<\/p>\n<h4><span class=\"mw-headline\" id=\"Mitigation\">Mitigation<\/span><\/h4>\n<p>Sometimes HIPAA regulations and\/or covered entity privacy policies are broken, either accidentally or intentionally. In such cases, a covered entity must mitigate (to the extent practicable) any harmful effect it learns was caused by that use or disclosure of PHI by its workforce or its business associates.<sup id=\"rdp-ebb-cite_ref-HHSSummaryHIPAA_1-3\" class=\"reference\"><a href=\"#cite_note-HHSSummaryHIPAA-1\">[1]<\/a><\/sup>\n<\/p>\n<h4><span class=\"mw-headline\" id=\"Data_safeguards\">Data safeguards<\/span><\/h4>\n<p>Per the HIPAA Security Rule, a covered entity must maintain reasonable and appropriate administrative, technical and physical safeguards to prevent either intentional or unintentional use or disclosure of PHI in violation of the Privacy Rule, and to minimize its incidental use and disclosure in the process of providing otherwise allowed or required use or disclosure. For example, such safeguards could include shredding documents containing PHI before discarding them, securing medical records with lock and key or pass code, and limiting access to keys or pass codes.<sup id=\"rdp-ebb-cite_ref-HHSSummaryHIPAA_1-4\" class=\"reference\"><a href=\"#cite_note-HHSSummaryHIPAA-1\">[1]<\/a><\/sup> More suggestions can be had at the HHS website.<sup id=\"rdp-ebb-cite_ref-HHSIncidental_2-0\" class=\"reference\"><a href=\"#cite_note-HHSIncidental-2\">[2]<\/a><\/sup> \n<\/p>\n<h4><span class=\"mw-headline\" id=\"Complaints\">Complaints<\/span><\/h4>\n<p>To comply with HIPAA, a covered entity must have procedures for individuals to complain about problems with its compliance with privacy policies and procedures and the Privacy Rule. As stated above, the covered entity must provide those procedures in its privacy practices notice. In the notice, among other things, the covered entity must let individuals know where they can submit complaints to, and let them know that complaints can also be submitted to the Secretary of HHS.<sup id=\"rdp-ebb-cite_ref-HHSSummaryHIPAA_1-5\" class=\"reference\"><a href=\"#cite_note-HHSSummaryHIPAA-1\">[1]<\/a><\/sup>\n<\/p>\n<h4><span class=\"mw-headline\" id=\"Retaliation_and_waiver\">Retaliation and waiver<\/span><\/h4>\n<p>Under HIPAA, a covered entity may not retaliate against a person for<sup id=\"rdp-ebb-cite_ref-HHSSummaryHIPAA_1-6\" class=\"reference\"><a href=\"#cite_note-HHSSummaryHIPAA-1\">[1]<\/a><\/sup>:\n<\/p>\n<ul><li>exercising rights provided by the Privacy Rule<\/li>\n<li>assisting in an investigation by HHS or another appropriate authority<\/li>\n<li>opposing an act or practice that the person believes in good faith violates the Privacy Rule<\/li><\/ul>\n<p>A covered entity may not require an individual to waive any right under the Privacy Rule as a condition for obtaining treatment, payment, and enrollment or benefits eligibility.\n<\/p>\n<h4><span class=\"mw-headline\" id=\"Documentation_and_record_retention\">Documentation and record retention<\/span><\/h4>\n<p>As a HIPAA covered entity, all actions, activities and designations that the Privacy Rule requires to be documented must be maintained until six years after the later of the date of their creation or last effective date. This includes covered entity privacy policies and procedures, privacy practices notices and disposition of any complaints, along with any other required documentation as outlined in this course and at HHS or in the HIPAA law available from the U.S. Government Publishing Office.<sup id=\"rdp-ebb-cite_ref-HHSSummaryHIPAA_1-7\" class=\"reference\"><a href=\"#cite_note-HHSSummaryHIPAA-1\">[1]<\/a><\/sup><sup id=\"rdp-ebb-cite_ref-104-191_3-0\" class=\"reference\"><a href=\"#cite_note-104-191-3\">[3]<\/a><\/sup>\n<\/p>\n<h4><span class=\"mw-headline\" id=\"Fully-insured_group_health_plan_exception\">Fully-insured group health plan exception<\/span><\/h4>\n<p>The only administrative obligations with which a fully-insured group health plan that has no more than enrollment data and summary health information is required to comply are the<sup id=\"rdp-ebb-cite_ref-HHSSummaryHIPAA_1-8\" class=\"reference\"><a href=\"#cite_note-HHSSummaryHIPAA-1\">[1]<\/a><\/sup>:\n<\/p>\n<ol><li>ban on retaliatory acts and waiver of individual rights, and<\/li>\n<li>documentation requirements with respect to plan documents if such documents are amended to provide for the disclosure of PHI to the plan sponsor by a health insurance issuer or HMO that services the group health plan.<\/li><\/ol>\n<h3><span class=\"mw-headline\" id=\"Organizational_options\">Organizational options<\/span><\/h3>\n<p>Despite the guidance on who is actually required to comply, there are subtle variations on the way entities are organized or departmentalized that require clarification on how HIPAA privacy and security rules apply. \n<\/p>\n<h4><span class=\"mw-headline\" id=\"Hybrid\">Hybrid<\/span><\/h4>\n<p>The Privacy Rule permits a covered entity that is a single legal entity and that conducts both covered and non-covered functions to elect to be a \"hybrid entity.\" (The activities that make a person or organization a covered entity are its \"covered functions.\") To be a hybrid entity, the covered entity must designate in writing its operations that perform covered functions as one or more \"health care components.\" After making this designation, most of the requirements of the Privacy Rule will apply only to the health care components. A covered entity that does not make this designation is subject in its entirety to the Privacy Rule.<sup id=\"rdp-ebb-cite_ref-HHSSummaryHIPAA_1-9\" class=\"reference\"><a href=\"#cite_note-HHSSummaryHIPAA-1\">[1]<\/a><\/sup> \n<\/p>\n<h4><span class=\"mw-headline\" id=\"Affiliated\">Affiliated<\/span><\/h4>\n<p>Legally separate covered entities that are affiliated by common ownership or control may designate themselves (including their health care components) as a single covered entity for Privacy Rule compliance. The designation must be in writing. An affiliated covered entity that performs multiple covered functions must operate its different covered functions in compliance with the Privacy Rule provisions applicable to those covered functions.<sup id=\"rdp-ebb-cite_ref-HHSSummaryHIPAA_1-10\" class=\"reference\"><a href=\"#cite_note-HHSSummaryHIPAA-1\">[1]<\/a><\/sup>\n<\/p>\n<h4><span class=\"mw-headline\" id=\"Organized_healthcare_arrangement\">Organized healthcare arrangement<\/span><\/h4>\n<p>The Privacy Rule identifies relationships in which participating covered entities share PHI to manage and benefit their common enterprise as \"organized health care arrangements.\" Covered entities in an organized health care arrangement can share PHI with each other for the arrangement\u2019s joint health care operations.<sup id=\"rdp-ebb-cite_ref-HHSSummaryHIPAA_1-11\" class=\"reference\"><a href=\"#cite_note-HHSSummaryHIPAA-1\">[1]<\/a><\/sup>\n<\/p>\n<h4><span class=\"mw-headline\" id=\"Covered_entities_with_multiple_covered_functions\">Covered entities with multiple covered functions<\/span><\/h4>\n<p>A covered entity that performs multiple covered functions must operate its different covered functions in compliance with the Privacy Rule provisions applicable to those covered functions. The covered entity may not use or disclose the PHI of an individual who receives services from one covered function (e.g., healthcare provider) for another covered function (e.g., health plan) if the individual is not involved with the other function.<sup id=\"rdp-ebb-cite_ref-HHSSummaryHIPAA_1-12\" class=\"reference\"><a href=\"#cite_note-HHSSummaryHIPAA-1\">[1]<\/a><\/sup>\n<\/p>\n<h4><span class=\"mw-headline\" id=\"Group_health_plan_disclosures_to_plan_sponsors\">Group health plan disclosures to plan sponsors<\/span><\/h4>\n<p>A group health plan and the health insurer or HMO offered by the plan may disclose the following PHI to the \"plan sponsor\" (i.e., the employer, union or other employee organization that sponsors and maintains the group health plan)<sup id=\"rdp-ebb-cite_ref-HHSSummaryHIPAA_1-13\" class=\"reference\"><a href=\"#cite_note-HHSSummaryHIPAA-1\">[1]<\/a><\/sup>:\n<\/p>\n<ul><li>enrollment or disenrollment information with respect to the group health plan or a health insurer or HMO offered by the plan - If requested by the plan sponsor, summary health information for the plan sponsor to use to obtain premium bids for providing health insurance coverage through the group health plan, or to modify, amend or terminate the group health plan. \"Summary health information\" is information that summarizes claims history, claims expenses or types of claims experience of the individuals for whom the plan sponsor has provided health benefits through the group health plan, and that is stripped of all individual identifiers other than five-digit zip code (though it need not qualify as de-identified PHI).<\/li><\/ul>\n<ul><li>PHI of the group health plan\u2019s enrollees for the plan sponsor to perform plan administration functions - The plan must receive certification from the plan sponsor that the group health plan document has been amended to impose restrictions on the plan sponsor\u2019s use and disclosure of the PHI. These restrictions must include the representation that the plan sponsor will not use or disclose the PHI for any employment-related action or decision or in connection with any other benefit plan.<\/li><\/ul>\n<h3><span class=\"mw-headline\" id=\"Other_administrative_simplification_rules\">Other administrative simplification rules<\/span><\/h3>\n<p>In addition to the HIPAA Privacy, Security, and Enforcement Rules, the HIPAA Administrative Simplification Rule is also relevant.\n<\/p>\n<h4><span class=\"mw-headline\" id=\"Transactions_and_codes_set_standards\">Transactions and codes set standards<\/span><\/h4>\n<p>These standards follow from the Security Rule, which is covered in the next section.\n<\/p><p>\"Transactions\" are activities involving the transfer of healthcare information for specific purposes. Under HIPAA, if a health plan or healthcare provider engages in one of the identified transactions, they must comply with the standard for it, which includes using a standard code set to identify diagnoses and procedures. The <i>Standards for Electronic Transactions and Code Sets<\/i>, published August 17, 2000 and since modified, adopted standards for several transactions, including<sup id=\"rdp-ebb-cite_ref-TexMed_4-0\" class=\"reference\"><a href=\"#cite_note-TexMed-4\">[4]<\/a><\/sup>:\n<\/p>\n<ul><li>claims and encounter information<\/li>\n<li>payment and remittance advice<\/li>\n<li>claims status<\/li><\/ul>\n<p>Any healthcare provider that conducts a standard transaction also must comply with the Privacy Rule. \n<\/p><p>If a covered entity conducts one of the adopted transactions electronically, they must use the adopted standard, either from the Accredited Standards Committee X12, Insurance Subcommittee (ASC X12N) or National Council for Prescription Drug Programs (NCPDP). Covered entities must adhere to the content and format requirements of each transaction. Under HIPAA, HHS also adopted specific code sets for diagnoses and procedures to be used in all transactions. The adopted code sets for procedures, diagnoses and drugs with which providers and health plan are familiar, include<sup id=\"rdp-ebb-cite_ref-TexMed_4-1\" class=\"reference\"><a href=\"#cite_note-TexMed-4\">[4]<\/a><\/sup>:\n<\/p>\n<ul><li>HCPCS (Ancillary Services\/Procedures)<\/li>\n<li>CPT-4 (Physicians Procedures)<\/li>\n<li>ICD-9 (Diagnosis and Hospital Inpatient Procedures)<\/li>\n<li>ICD-10 (As of October 1, 2015)<\/li>\n<li>CDT (Dental Terminology)<\/li>\n<li>NDC (National Drug Codes)<\/li><\/ul>\n<p>HHS also adopted standards for unique identifiers for employers and providers, which must also be used in all transactions.\n<\/p>\n<h4><span class=\"mw-headline\" id=\"Identifier_standards_for_employers_and_providers\">Identifier standards for employers and providers<\/span><\/h4>\n<p>HIPAA requires that employers have standard national numbers that identify them on standard transactions. The employer identification number (EIN), issued by the Internal Revenue Service (IRS), was selected as the identifier for employers and was adopted effective July 30, 2002. \n<\/p><p>Healthcare providers must also have standard national numbers that identify them on standard transactions. The National Provider Identifier (NPI) is a unique identification number for covered healthcare providers. Covered healthcare providers and all health plans and health care clearinghouses use the NPIs in the administrative transactions adopted under HIPAA. The NPI is a 10-position, intelligence-free numeric identifier (10-digit number). This means that the numbers do not carry other information about healthcare providers, such as the state in which they live or their medical specialty.<sup id=\"rdp-ebb-cite_ref-HHSAdmin_5-0\" class=\"reference\"><a href=\"#cite_note-HHSAdmin-5\">[5]<\/a><\/sup>\n<\/p>\n<h2><span class=\"mw-headline\" id=\"References\">References<\/span><\/h2>\n<div class=\"reflist\" style=\"list-style-type: decimal;\">\n<div class=\"mw-references-wrap\"><ol class=\"references\">\n<li id=\"cite_note-HHSSummaryHIPAA-1\"><span class=\"mw-cite-backlink\">\u2191 <sup><a href=\"#cite_ref-HHSSummaryHIPAA_1-0\">1.00<\/a><\/sup> <sup><a href=\"#cite_ref-HHSSummaryHIPAA_1-1\">1.01<\/a><\/sup> <sup><a href=\"#cite_ref-HHSSummaryHIPAA_1-2\">1.02<\/a><\/sup> <sup><a href=\"#cite_ref-HHSSummaryHIPAA_1-3\">1.03<\/a><\/sup> <sup><a href=\"#cite_ref-HHSSummaryHIPAA_1-4\">1.04<\/a><\/sup> <sup><a href=\"#cite_ref-HHSSummaryHIPAA_1-5\">1.05<\/a><\/sup> <sup><a href=\"#cite_ref-HHSSummaryHIPAA_1-6\">1.06<\/a><\/sup> <sup><a href=\"#cite_ref-HHSSummaryHIPAA_1-7\">1.07<\/a><\/sup> <sup><a href=\"#cite_ref-HHSSummaryHIPAA_1-8\">1.08<\/a><\/sup> <sup><a href=\"#cite_ref-HHSSummaryHIPAA_1-9\">1.09<\/a><\/sup> <sup><a href=\"#cite_ref-HHSSummaryHIPAA_1-10\">1.10<\/a><\/sup> <sup><a href=\"#cite_ref-HHSSummaryHIPAA_1-11\">1.11<\/a><\/sup> <sup><a href=\"#cite_ref-HHSSummaryHIPAA_1-12\">1.12<\/a><\/sup> <sup><a href=\"#cite_ref-HHSSummaryHIPAA_1-13\">1.13<\/a><\/sup><\/span> <span class=\"reference-text\"><span class=\"citation web\">Office for Civil Rights (26 July 2013). <a rel=\"external_link\" class=\"external text\" href=\"https:\/\/www.hhs.gov\/hipaa\/for-professionals\/privacy\/laws-regulations\/index.html\" target=\"_blank\">\"Summary of the HIPAA Privacy Rule\"<\/a>. United States Department of Health and Human Services<span class=\"printonly\">. <a rel=\"external_link\" class=\"external free\" href=\"https:\/\/www.hhs.gov\/hipaa\/for-professionals\/privacy\/laws-regulations\/index.html\" target=\"_blank\">https:\/\/www.hhs.gov\/hipaa\/for-professionals\/privacy\/laws-regulations\/index.html<\/a><\/span><span class=\"reference-accessdate\">. Retrieved 09 February 2022<\/span>.<\/span><span class=\"Z3988\" title=\"ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=bookitem&rft.btitle=Summary+of+the+HIPAA+Privacy+Rule&rft.atitle=&rft.aulast=Office+for+Civil+Rights&rft.au=Office+for+Civil+Rights&rft.date=26+July+2013&rft.pub=United+States+Department+of+Health+and+Human+Services&rft_id=https%3A%2F%2Fwww.hhs.gov%2Fhipaa%2Ffor-professionals%2Fprivacy%2Flaws-regulations%2Findex.html&rfr_id=info:sid\/en.wikipedia.org:Book:HIPAA_Compliance:_An_Introduction\/Administration\"><span style=\"display: none;\"> <\/span><\/span>\n<\/span>\n<\/li>\n<li id=\"cite_note-HHSIncidental-2\"><span class=\"mw-cite-backlink\"><a href=\"#cite_ref-HHSIncidental_2-0\">\u2191<\/a><\/span> <span class=\"reference-text\"><span class=\"citation web\">Office for Civil Rights (26 July 2013). <a rel=\"external_link\" class=\"external text\" href=\"https:\/\/www.hhs.gov\/hipaa\/for-professionals\/privacy\/guidance\/incidental-uses-and-disclosures\/index.html\" target=\"_blank\">\"Incidental Uses and Disclosures\"<\/a>. U.S. Department of Health & Human Services<span class=\"printonly\">. <a rel=\"external_link\" class=\"external free\" href=\"https:\/\/www.hhs.gov\/hipaa\/for-professionals\/privacy\/guidance\/incidental-uses-and-disclosures\/index.html\" target=\"_blank\">https:\/\/www.hhs.gov\/hipaa\/for-professionals\/privacy\/guidance\/incidental-uses-and-disclosures\/index.html<\/a><\/span><span class=\"reference-accessdate\">. Retrieved 10 February 2022<\/span>.<\/span><span class=\"Z3988\" title=\"ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=bookitem&rft.btitle=Incidental+Uses+and+Disclosures&rft.atitle=&rft.aulast=Office+for+Civil+Rights&rft.au=Office+for+Civil+Rights&rft.date=26+July+2013&rft.pub=U.S.+Department+of+Health+%26+Human+Services&rft_id=https%3A%2F%2Fwww.hhs.gov%2Fhipaa%2Ffor-professionals%2Fprivacy%2Fguidance%2Fincidental-uses-and-disclosures%2Findex.html&rfr_id=info:sid\/en.wikipedia.org:Book:HIPAA_Compliance:_An_Introduction\/Administration\"><span style=\"display: none;\"> <\/span><\/span>\n<\/span>\n<\/li>\n<li id=\"cite_note-104-191-3\"><span class=\"mw-cite-backlink\"><a href=\"#cite_ref-104-191_3-0\">\u2191<\/a><\/span> <span class=\"reference-text\"><span class=\"citation web\"><a rel=\"external_link\" class=\"external text\" href=\"https:\/\/www.govinfo.gov\/app\/details\/PLAW-104publ191\" target=\"_blank\">\"Public Law 104 - 191 - Health Insurance Portability And Accountability Act of 1996\"<\/a>. <i>GovInfo<\/i>. U.S. Government Publishing Office. 21 August 1996<span class=\"printonly\">. <a rel=\"external_link\" class=\"external free\" href=\"https:\/\/www.govinfo.gov\/app\/details\/PLAW-104publ191\" target=\"_blank\">https:\/\/www.govinfo.gov\/app\/details\/PLAW-104publ191<\/a><\/span><span class=\"reference-accessdate\">. Retrieved 09 February 2022<\/span>.<\/span><span class=\"Z3988\" title=\"ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=bookitem&rft.btitle=Public+Law+104+-+191+-+Health+Insurance+Portability+And+Accountability+Act+of+1996&rft.atitle=GovInfo&rft.date=21+August+1996&rft.pub=U.S.+Government+Publishing+Office&rft_id=https%3A%2F%2Fwww.govinfo.gov%2Fapp%2Fdetails%2FPLAW-104publ191&rfr_id=info:sid\/en.wikipedia.org:Book:HIPAA_Compliance:_An_Introduction\/Administration\"><span style=\"display: none;\"> <\/span><\/span>\n<\/span>\n<\/li>\n<li id=\"cite_note-TexMed-4\"><span class=\"mw-cite-backlink\">\u2191 <sup><a href=\"#cite_ref-TexMed_4-0\">4.0<\/a><\/sup> <sup><a href=\"#cite_ref-TexMed_4-1\">4.1<\/a><\/sup><\/span> <span class=\"reference-text\"><span class=\"citation web\"><a rel=\"external_link\" class=\"external text\" href=\"https:\/\/www.texmed.org\/Template.aspx?id=1599\" target=\"_blank\">\"What Are HIPAA Transaction and Code Sets Standards?\"<\/a>. Texas Medical Association. 29 October 2019<span class=\"printonly\">. <a rel=\"external_link\" class=\"external free\" href=\"https:\/\/www.texmed.org\/Template.aspx?id=1599\" target=\"_blank\">https:\/\/www.texmed.org\/Template.aspx?id=1599<\/a><\/span><span class=\"reference-accessdate\">. Retrieved 09 February 2022<\/span>.<\/span><span class=\"Z3988\" title=\"ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=bookitem&rft.btitle=What+Are+HIPAA+Transaction+and+Code+Sets+Standards%3F&rft.atitle=&rft.date=29+October+2019&rft.pub=Texas+Medical+Association&rft_id=https%3A%2F%2Fwww.texmed.org%2FTemplate.aspx%3Fid%3D1599&rfr_id=info:sid\/en.wikipedia.org:Book:HIPAA_Compliance:_An_Introduction\/Administration\"><span style=\"display: none;\"> <\/span><\/span>\n<\/span>\n<\/li>\n<li id=\"cite_note-HHSAdmin-5\"><span class=\"mw-cite-backlink\"><a href=\"#cite_ref-HHSAdmin_5-0\">\u2191<\/a><\/span> <span class=\"reference-text\"><span class=\"citation web\">Office for Civil Rights. <a rel=\"external_link\" class=\"external text\" href=\"https:\/\/www.hhs.gov\/hipaa\/for-professionals\/other-administration-simplification-rules\/index.html\" target=\"_blank\">\"Other Administrative Simplification Rules\"<\/a>. U.S. Department of Health & Human Services<span class=\"printonly\">. <a rel=\"external_link\" class=\"external free\" href=\"https:\/\/www.hhs.gov\/hipaa\/for-professionals\/other-administration-simplification-rules\/index.html\" target=\"_blank\">https:\/\/www.hhs.gov\/hipaa\/for-professionals\/other-administration-simplification-rules\/index.html<\/a><\/span><span class=\"reference-accessdate\">. Retrieved 10 February 2022<\/span>.<\/span><span class=\"Z3988\" title=\"ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=bookitem&rft.btitle=Other+Administrative+Simplification+Rules&rft.atitle=&rft.aulast=Office+for+Civil+Rights&rft.au=Office+for+Civil+Rights&rft.pub=U.S.+Department+of+Health+%26+Human+Services&rft_id=https%3A%2F%2Fwww.hhs.gov%2Fhipaa%2Ffor-professionals%2Fother-administration-simplification-rules%2Findex.html&rfr_id=info:sid\/en.wikipedia.org:Book:HIPAA_Compliance:_An_Introduction\/Administration\"><span style=\"display: none;\"> <\/span><\/span>\n<\/span>\n<\/li>\n<\/ol><\/div><\/div>\n<p><br \/>\n<\/p>\n<h2><span class=\"mw-headline\" id=\"Citation_for_this_section\">Citation for this section<\/span><\/h2>\n<p><b>Title<\/b>: <i>HIPAA Compliance: An Introduction<\/i> - Administration\n<\/p><p><b>Author for citation<\/b>: Alan Vaughan, with editorial modifications by Shawn Douglas\n<\/p><p><b>License for content<\/b>: <a rel=\"external_link\" class=\"external text\" href=\"https:\/\/creativecommons.org\/licenses\/by-sa\/4.0\/\" target=\"_blank\">Creative Commons Attribution-ShareAlike 4.0 International<\/a>\n<\/p><p><b>Publication date<\/b>: Originally published June 2016; compiled and lightly edited February 2022\n<\/p>\n<!-- \nNewPP limit report\nCached time: 20220210234352\nCache expiry: 86400\nDynamic content: false\nComplications: []\nCPU time usage: 0.143 seconds\nReal time usage: 0.288 seconds\nPreprocessor visited node count: 3491\/1000000\nPost\u2010expand include size: 34565\/2097152 bytes\nTemplate argument size: 8725\/2097152 bytes\nHighest expansion depth: 18\/40\nExpensive parser function count: 0\/100\nUnstrip recursion depth: 0\/20\nUnstrip post\u2010expand size: 9790\/5000000 bytes\n-->\n<!--\nTransclusion expansion time report (%,ms,calls,template)\n100.00% 85.063 1 -total\n 66.62% 56.668 1 Template:Reflist\n 55.90% 47.553 5 Template:Cite_web\n 49.26% 41.903 5 Template:Citation\/core\n 33.27% 28.299 1 Template:HIPAA_Compliance:_An_Introduction\/Administration\n 12.85% 10.927 4 Template:Date\n 4.86% 4.134 6 Template:Citation\/make_link\n-->\n\n<!-- Saved in parser cache with key limswiki:pcache:idhash:13005-0!canonical and timestamp 20220210234355 and revision id 46320. Serialized with JSON.\n -->\n<\/div><\/div><div class=\"printfooter\">Source: <a rel=\"external_link\" class=\"external\" href=\"https:\/\/www.limswiki.org\/index.php\/Book:HIPAA_Compliance:_An_Introduction\/Administration\">https:\/\/www.limswiki.org\/index.php\/Book:HIPAA_Compliance:_An_Introduction\/Administration<\/a><\/div>\n<!-- end content --><div class=\"visualClear\"><\/div><\/div><\/div><div class=\"visualClear\"><\/div><\/div><!-- end of the left (by default at least) column --><div class=\"visualClear\"><\/div><\/div>\n\n\n\n<\/body>","f152ac60160ac44246cd93438a50f862_images":["https:\/\/upload.wikimedia.org\/wikipedia\/commons\/b\/bb\/Training_for_trainers_-_Wikimedia_UK_%2814841183304%29.jpg"],"f152ac60160ac44246cd93438a50f862_timestamp":1644537385,"5a2165db90474508ac92e2e7cce548ff_type":"article","5a2165db90474508ac92e2e7cce548ff_title":"5. Use and disclosure","5a2165db90474508ac92e2e7cce548ff_url":"https:\/\/www.limswiki.org\/index.php\/Book:HIPAA_Compliance:_An_Introduction\/Use_and_disclosure","5a2165db90474508ac92e2e7cce548ff_plaintext":"\n\nBook:HIPAA Compliance: An Introduction\/Use and disclosureFrom LIMSWikiJump to navigationJump to searchContents \n\n1 Use and disclosure \n\n1.1 Permitted uses and disclosures \n\n1.1.1 To the individual \n1.1.2 Treatment, payment and healthcare operations \n1.1.3 Uses and disclosures with opportunity to agree or object \n1.1.4 Incidental use and disclosure \n1.1.5 Public interest and benefit activities \n1.1.6 Limited data set \n\n\n1.2 Authorized use and disclosure \n1.3 Limiting \n\n1.3.1 Minimum necessary \n1.3.2 Restrict and control access and uses \n1.3.3 Disclosures and requests for disclosures \n1.3.4 Reasonable reliance on another covered entity's compliance \n\n\n1.4 Patient notification and rights \n\n1.4.1 Privacy practices notice \n1.4.2 Access \n1.4.3 Amendment \n1.4.4 Disclosure accounting \n1.4.5 Restriction request \n1.4.6 Confidential communications requirement \n\n\n1.5 Personal representatives and minors \n\n1.5.1 Standard recognized representatives \n\n\n\n\n2 References \n3 Citation for this section \n\n\n\nUse and disclosure \nNow that we understand what HIPAA is, who it applies to and what information is protected, it's time to look at exactly how PHI can and cannot be used.\nAccording to the HHS, a covered entity is permitted, but not required, to use and disclose PHI, without an individual\u2019s authorization, for any of the following purposes or situations[1]:\n\nto provide or reveal to the affected individual, unless required for access or accounting of disclosures\nfor treatment, payment, and health care operations\nas an opportunity to agree or object\nas incidental to an otherwise permitted use and disclosure\nin the case of public interest and benefit activities\nas a limited data set for the purposes of research, public health or health care operations\nCovered entities may rely on professional ethics and best judgments in deciding which of these permissive uses and disclosures to make. These permissive uses are detailed further below.\n\nPermitted uses and disclosures \nTo the individual \nThis use and disclosure is straightforward. A covered entity may disclose PHI to the individual who is the subject of the information.[1]\n\n Treatment, payment and healthcare operations \nA covered entity may use and disclose PHI for its own use in treatment, payment and healthcare operations activities. A covered entity may also disclose PHI for the treatment activities of any healthcare provider, the payment activities of another covered entity and of any healthcare provider, or the healthcare operations of another covered entity involving either quality or competency assurance activities or fraud and abuse detection and compliance activities, if both covered entities have or had a relationship with the individual and the PHI pertains to the relationship. The HHS defines treatment, payment and healthcare operations as follows[1]:\n\nTreatment\nThe provision, coordination, or management of healthcare and related services for an individual by one or more healthcare providers, including consultation between providers regarding a patient and referral of a patient by one provider to another\nPayment\nActivities of a health plan to obtain premiums, determine or fulfill responsibilities for coverage and provision of benefits, and furnish or obtain reimbursement for healthcare delivered to an individual and activities of a healthcare provider to obtain payment or be reimbursed for the provision of healthcare to an individual\nHealthcare operations\nAny of the following activities: (a) quality assessment and improvement activities, including case management and care coordination; (b) competency assurance activities, including provider or health plan performance evaluation, credentialing, and accreditation; (c) arrangement and use of medical reviews, audits, or legal services, including fraud and abuse detection and compliance programs; (d) specified insurance functions, such as underwriting, risk rating, and reinsuring risk; (e) business planning, development, management, and administration; and (f) business management and general administrative activities of the entity, including but not limited to de-identifying PHI, creating a limited data set, and certain fundraising for the benefit of the covered entity.\nMost uses and disclosures of psychotherapy notes for treatment, payment and healthcare operations purposes require an authorization as described below. Obtaining \u201cconsent\u201d (written permission from individuals to use and disclose their PHI for treatment, payment and healthcare operations) is optional under the Privacy Rule for all covered entities. The content of a consent form, and the process for obtaining consent, are at the discretion of the covered entity electing to seek consent.[1]\n\nUses and disclosures with opportunity to agree or object \nInformal permission may be obtained by asking the individual outright, or by circumstances that clearly give the individual the opportunity to agree, acquiesce or object. Where the individual is incapacitated, in an emergency situation, or not available, covered entities generally may make such uses and disclosures, if in the exercise of their professional judgment, the use or disclosure is determined to be in the best interests of the individual. A few common examples are given below[1]:\nFacility directories: It is a common practice in many healthcare facilities, such as hospitals, to maintain a directory of patient contact information. A covered healthcare provider may rely on an individual\u2019s informal permission to list in its facility directory the individual\u2019s name, general condition, religious affiliation and location in the provider\u2019s facility. The provider may then disclose the individual\u2019s condition and location in the facility to anyone asking for the individual by name, and also may disclose religious affiliation to clergy. Members of the clergy are not required to ask for the individual by name when inquiring about patient religious affiliation.\nFor notification and other purposes: A covered entity also may rely on an individual\u2019s informal permission to disclose to the individual\u2019s family, relatives or friends, or to other persons whom the individual identifies, PHI directly relevant to that person\u2019s involvement in the individual\u2019s care or payment for care. This provision, for example, allows a pharmacist to dispense filled prescriptions to a person acting on behalf of the patient. Similarly, a covered entity may rely on an individual\u2019s informal permission to use or disclose PHI for the purpose of notifying (including identifying or locating) family members, personal representatives or others responsible for the individual\u2019s care of the individual\u2019s location, general condition or death. In addition, PHI may be disclosed for notification purposes to public or private entities authorized by law or charter to assist in disaster relief efforts.\n\nIncidental use and disclosure \nThe Privacy Rule does not require that every risk of an incidental use or disclosure of PHI be eliminated. A use or disclosure of this information that occurs as a result of, or as \u201cincident to,\u201d an otherwise permitted use or disclosure is permitted as long as the covered entity has adopted reasonable safeguards as required by the Privacy Rule, and the information being shared was limited to the \u201cminimum necessary,\u201d as required by the Privacy Rule.[1]\n\nPublic interest and benefit activities \nThe Privacy Rule permits use and disclosure of PHI, without an individual\u2019s authorization or permission, for 12 national priority purposes. These disclosures are permitted, although not required, by the Privacy Rule in recognition of the important uses made of health information outside of the healthcare context. Specific conditions or limitations apply to each public interest purpose, striking the balance between the individual privacy interest and the public interest need for this information. Those 12 national priority purposes are detailed below[1]:\n1. When required by law: Covered entities may use and disclose PHI without individual authorization as required by law (including by statute, regulation or court orders).\n2. When conducting public health activities: Covered entities may disclose PHI to any of the following for public health purposes:\npublic health authorities authorized by law to collect or receive such information for preventing or controlling disease, injury or disability and to public health or other government authorities authorized to receive reports of child abuse and neglect\nentities subject to Food and Drug Administration (FDA) regulation regarding FDA-regulated products or activities for purposes such as adverse event reporting, tracking of products, product recalls and post-marketing surveillance\nindividuals who may have contracted or been exposed to a communicable disease when notification is authorized by law\nemployers, regarding employees, when requested by employers, for information concerning a work-related illness or injury or workplace-related medical surveillance, because such information is needed by the employer to comply with the Occupational Safety and Health Administration (OSHA), the Mine Safety and Health Administration (MHSA), or similar state law<\/dd>\n3. In cases of victims of abuse, neglect or domestic violence: In certain circumstances, covered entities may disclose PHI to appropriate government authorities regarding victims of abuse, neglect or domestic violence.\n4. For health oversight activities: Covered entities may disclose PHI to health oversight agencies (as defined in the Privacy Rule) for purposes of legally authorized health oversight activities, such as audits and investigations necessary for oversight of the healthcare system and government benefit programs.\n5. During judicial and administrative proceedings: Covered entities may disclose PHI in a judicial or administrative proceeding if the request for the information is through an order from a court or administrative tribunal. Such information may also be disclosed in response to a subpoena or other lawful process if certain assurances regarding notice to the individual or a protective order are provided.\n6. For law enforcement purposes: Covered entities may disclose PHI to law enforcement officials for law enforcement purposes under the following six circumstances, subject to specified conditions:\nas required by law (including court orders, court-ordered warrants, subpoenas) and administrative requests\nto identify or locate a suspect, fugitive, material witness or missing person\nin response to a law enforcement official\u2019s request for information about a victim or suspected victim of a crime\nto alert law enforcement of a person\u2019s death, if the covered entity suspects that criminal activity caused the death\nwhen a covered entity believes that PHI is evidence of a crime that occurred on its premises\nby a covered healthcare provider in a medical emergency not occurring on its premises, when necessary to inform law enforcement about the commission and nature of a crime, the location of the crime or crime victims, and the perpetrator of the crime<\/dd>\n7. To decedents: Covered entities may disclose PHI to funeral directors as needed, and to coroners or medical examiners to identify a deceased person, determine the cause of death and perform other functions authorized by law.\n8. For honoring cadaveric organ, eye or tissue donation: Covered entities may use or disclose PHI to facilitate the donation and transplantation of cadaveric organs, eyes and tissue.\n9. For research: \"Research\" is defined as any systematic investigation designed to develop or contribute to generalizable knowledge. The Privacy Rule permits a covered entity to use and disclose PHI for research purposes, without an individual\u2019s authorization, provided the covered entity obtains either:\ndocumentation that an alteration or waiver of individuals\u2019 authorization for the use or disclosure of PHI about them for research purposes has been approved by an Institutional Review Board or Privacy Board;\nrepresentations from the researcher that the use or disclosure of the PHI is solely to prepare a research protocol or for similar purpose preparatory to research, that the researcher will not remove any PHI from the covered entity, and the PHI for which access is sought is necessary for the research; or<\/dd>\nrepresentations from the researcher that the use or disclosure sought is solely for research on the PHI of decedents, that the PHI sought is necessary for the research, and, at the request of the covered entity, documentation of the death of the individuals about whom information is sought.\nA covered entity also may use or disclose, without an individuals\u2019 authorization, a limited data set of PHI for research purposes (see discussion below).\n10. In case of serious threat to health or safety: Covered entities may disclose PHI that they believe is necessary to prevent or lessen a serious and imminent threat to a person or the public, when such disclosure is made to someone they believe can prevent or lessen the threat (including the target of the threat). Covered entities may also disclose to law enforcement if the information is needed to identify or apprehend an escapee or violent criminal.\n11. For essential government functions: An authorization is not required to use or disclose PHI for certain essential government functions. Such functions include:\nassuring proper execution of a military mission\nconducting intelligence and national security activities that are authorized by law\nproviding protective services to the President\nmaking medical suitability determinations for U.S. State Department employees\nprotecting the health and safety of inmates or employees in a correctional institution\ndetermining eligibility for or conducting enrollment in certain government benefit programs<\/dd>\n12. For workers\u2019 compensation laws: Covered entities may disclose PHI as authorized by, and to comply with, workers\u2019 compensation laws and other similar programs providing benefits for work-related injuries or illnesses.\nLimited data set \nA limited data set is PHI from which certain specified direct identifiers of individuals and their relatives, household members and employers have been removed. A limited data set may be used and disclosed for research, healthcare operations and public health purposes, provided the recipient enters into a data use agreement promising specified safeguards for the PHI within the limited data set.[1]\nThe \"certain specified direct identifiers\" that must be removed are almost all of the 18 PHI identifiers previously discussed, but not exactly. Again, they are[2]:\n\nname\npostal address information, other than town or city, state and zip code (in other words, remove the street address)\nall elements of dates (except year) for dates directly related to an individual\nphone numbers\nfax numbers\nelectronic mail (email) addresses\nSocial Security numbers\nmedical record numbers (MRNs)\nhealth plan beneficiary numbers\naccount numbers\ncertificate\/license numbers\nvehicle identifiers and serial numbers, including license plate numbers\ndevice identifiers and serial numbers\nweb addresses or Uniform Resource Locators (URLs)\nInternet Protocol (IP) address numbers\nbiometric identifiers, including finger and voice prints\nfull face photographic images and any comparable images\nany other unique identifying number, characteristic or code (note this does not mean the unique code assigned by the investigator to code the data)\nAuthorized use and disclosure \nThere are three instances where use and disclosure of PHI is always authorized, with certain conditions.[1]\n1. Authorization by the individual: A covered entity must obtain the individual\u2019s written authorization for any use or disclosure of their PHI that is not for treatment, payment or healthcare operations or otherwise permitted or required by the Privacy Rule. It's also important to note that you cannot make authorization a condition of providing treatment, payment, enrollment or benefits eligibility (except in limited circumstances).\nAn authorization must be written in specific terms. It may allow use and disclosure of PHI by the covered entity, or by a third party. Examples of disclosures that would require an individual\u2019s authorization include[2]:\n\ndisclosures to a life insurer for coverage purposes\ndisclosures to an employer of the results of a pre-employment physical or lab test\ndisclosures to a pharmaceutical firm for their own marketing purposes\nAll authorizations must be in plain language and contain specific information regarding[2]:\n\nthe information to be disclosed or used\nthe person(s) disclosing and receiving the information\nexpiration\nright to revoke in writing, and other data\nThe Privacy Rule also contains transition provisions applicable to authorizations and other express legal permissions obtained prior to April 14, 2003.\n2. Psychotherapy Notes: Using or disclosing PHI is prohibited without the individual's authorization, except in the following cases[2]:\n\nwhen the covered entity who created the notes is uses them for treatment\nwhen the covered entity needs to use them for one or more of the following:\nfor its own training\nto defend itself in legal proceedings brought by the individual\nfor HHS to investigate or determine the covered entity\u2019s compliance with the Privacy Rules\nto avert a serious and imminent threat to public health or safety\nto provide to a health oversight agency for lawful oversight of the originator of the psychotherapy notes\nfor the lawful activities of a coroner or medical examiner or as required by law\n3. Marketing: HIPAA defines \"marketing\" as any communication about a product or service that encourages recipients to purchase or use the product or service. The Privacy Rule identifies some health-related activities based on this definition of marketing[2]:\n\ncommunications to describe health-related products or services, or payment for them, provided by or included in a benefit plan of the covered entity making the communication\ncommunications about participating providers in a provider or health plan network, replacement of or enhancements to a health plan, and health-related products or services available only to a health plan\u2019s enrollees that add value to, but are not part of, the benefits plan\ncommunications for treatment of the individual\ncommunications for case management or care coordination for the individual, or to direct or recommend alternative treatments, therapies, healthcare providers or care settings to the individual\nMarketing also is an arrangement between a covered entity and any other entity whereby the covered entity discloses PHI in exchange for direct or indirect remuneration, for the other entity to communicate about its own products or services encouraging the use or purchase of those products or services; in other words, for typical marketing purposes. A covered entity has to obtain an authorization to use or disclose PHI for marketing, except for face-to-face marketing communications between the covered entity and an individual, and for a covered entity\u2019s provision of promotional gifts of nominal value. \nNo authorization is needed, however, to make a communication that falls within one of the exceptions to the marketing definition. An authorization for marketing that involves the covered entity\u2019s receipt of direct or indirect remuneration from a third party must reveal that fact.\n\nLimiting \nIn use and disclosure, even when authorized, it's always important to keep certain conditions and principles in mind. One main concept to always consider is that of always releasing the minimum necessary information to as few parties as possible, in as few cases as possible. That principle and others are described below.\n\nMinimum necessary \nBasically, HIPAA says that in any case of authorized disclosure, the amount of PHI shared must be the minimum necessary. A covered entity must make reasonable efforts to use, disclose and request only the minimum amount of PHI needed to accomplish the intended purpose of the use, disclosure or request. They must also develop and implement policies and procedures to reasonably limit uses and disclosures to the minimum necessary. When the minimum necessary standard applies to a use or disclosure, a covered entity may not use, disclose, or request the entire medical record for a particular purpose, unless it can specifically justify the whole record as the amount reasonably needed for the purpose.[1]\nLike most rules, there are exceptions to this principle. They are[1]:\n\ndisclosure to or a request by a healthcare provider for treatment\ndisclosure to an individual who is the subject of the information, or the individual\u2019s personal representative\nuse or disclosure made pursuant to an authorization\ndisclosure to HHS for complaint investigation, compliance review or enforcement\nuse or disclosure that is required by law\nuse or disclosure required for compliance with the HIPAA Transactions Rule or other HIPAA Administrative Simplification Rules\nRestrict and control access and uses \nThe tenets of HIPAA, unlike what might be said of many laws, are almost without exception common sense and reasonable measures aimed at protecting people's personally identifiable information. Thus, the idea of restricting and controlling access to that information joins the Minimum Use principle as a sensible idea.\nFor internal uses, a covered entity must develop and implement policies and procedures that restrict access and uses of PHI based on the specific roles of the members of their workforce. These policies and procedures must identify the persons, or classes of persons, in the workforce who need access to PHI to carry out their duties, the categories of PHI to which access is needed, and any conditions under which they need the information to do their jobs.[1]\n\nDisclosures and requests for disclosures \nCovered entities are required to establish and implement policies and procedures for routine, recurring disclosures or requests for disclosures, so that PHI disclosure meets the \"minimum amount reasonably necessary\" measurement to achieve the purpose of the disclosure. It can be a policy, so individual review of each disclosure is not required. However, for non-routine, non-recurring disclosures or requests for disclosures that it makes, covered entities must develop criteria designed to do the same thing, but with a review of each request individually in accordance with the established criteria.[1]\n\n Reasonable reliance on another covered entity's compliance \nHIPAA allows you to make the reasonable assumption that a request from another covered entity is in compliance with disclosure rules and principles. The HHS explains it such that if another covered entity makes a request for PHI, a covered entity may rely, if reasonable under the circumstances, on the request as complying with this minimum necessary standard. Similarly, a covered entity may rely upon requests as being the minimum necessary PHI from: (a) a public official, (b) a professional (such as an attorney or accountant) who is the covered entity\u2019s business associate, seeking the information to provide services to or for the covered entity; or (c) a researcher who provides the documentation or representation required by the Privacy Rule for research.[1]\n\nPatient notification and rights \nCovered entities are required by HIPAA to provide information about how they handle a patient's PHI, and to allow access and the ability to update or amend it. The specifics are as follows.\nPrivacy practices notice \nEach covered entity, with certain exceptions, must provide a notice of its privacy practices. The Privacy Rule requires that the notice contain certain elements. The notice must[1]:\n\n\ndescribe the ways in which the covered entity may use and disclose PHI\nstate the covered entity\u2019s duties to protect privacy, provide a notice of privacy practices, and abide by the terms of the current notice\ndescribe individuals\u2019 rights, including the right to complain to HHS and to the covered entity if they believe their privacy rights have been violated\ninclude a point of contact for further information and for making complaints to the covered entity\n\nCovered entities must act in accordance with their notices. The rule also contains specific distribution requirements for direct treatment providers, all other healthcare providers and health plans. That information is available, along with many other resources and additional information, on the HHS site.\nNotice distribution\nA covered healthcare provider with a direct treatment relationship with individuals must have delivered a privacy practices notice to patients as follows[1]:\n\nnot later than the first service encounter by personal delivery (for patient visits)\nby automatic and contemporaneous electronic response (for electronic service delivery), and by prompt mailing (for telephonic service delivery)\nby posting the notice at each service delivery site in a clear and prominent place where people seeking service may reasonably be expected to be able to read the notice\nin emergency treatment situations, the provider must furnish its notice as soon as practicable after the emergency abates\nCovered entities, whether direct treatment providers or indirect treatment providers (such as laboratories) or health plans, also must supply notice to anyone upon request. A covered entity must also make its notice electronically available on any website it maintains for customer service or benefits information.\nThe covered entities in an OHCA may use a joint privacy practices notice, as long as each agrees to abide by the notice content with respect to the PHI created or received in connection with the arrangement. Distribution of a joint notice by any covered entity participating in the OHCA at the first point that an OHCA member has an obligation to provide notice satisfies the distribution obligation of the other participants in the OHCA.\nA health plan must distribute its privacy practices notice to each of its enrollees by its Privacy Rule compliance date. Thereafter, the health plan must give its notice to each new enrollee at enrollment, and send a reminder to every enrollee at least once every three years that the notice is available upon request. A health plan satisfies its distribution obligation by furnishing the notice to the \u201cnamed insured,\u201d that is, the subscriber for coverage that also applies to spouses and dependents.[1]\nAcknowledgement of notice receipt\nA covered healthcare provider with a direct treatment relationship with individuals must make a good faith effort to obtain written acknowledgement from patients of receipt of the privacy practices notice. The Privacy Rule does not prescribe any particular content for the acknowledgement. However, the provider must document the reason for any failure to obtain the patient\u2019s written acknowledgement. The provider is relieved of the need to request acknowledgement in an emergency treatment situation.[1]\n\nAccess \nPatients have the right to review and obtain a copy of their PHI in a covered entity\u2019s designated record set, with some exceptions. The \"designated record set\" is that group of records maintained by or for a covered entity that is used, in whole or part, to make decisions about individuals, or is a provider\u2019s medical and billing records about individuals or a health plan\u2019s enrollment, payment, claims adjudication and case or medical management record systems. The rule excepts from the right of access the following PHI[1]: \n\npsychotherapy notes\ninformation compiled for legal proceedings\nlaboratory results to which the CLIA prohibits access\ninformation held by certain research laboratories\nFor information included within the right of access, covered entities may deny an individual access in certain specified situations, such as when a healthcare professional believes access could cause harm to the individual or another. In such situations, the individual must be given the right to have such denials reviewed by a licensed healthcare professional for a second opinion. Covered entities may impose reasonable, cost-based fees for the cost of copying and postage.[1]\n\nAmendment \nThe rule gives individuals the right to have covered entities amend their PHI in a designated record set when that information is inaccurate or incomplete. \nIf a covered entity accepts an amendment request, it must make reasonable efforts to provide the amendment to persons that the individual has identified as needing it, as well as to persons that the covered entity knows might rely on the information to the individual\u2019s detriment. If the request is denied, covered entities must provide the individual with a written denial and allow the individual to submit a statement of disagreement for inclusion in the record. The Rule specifies processes for requesting and responding to a request for amendment. Additionally, if a covered entity receives notice to amend from another covered entity, it must amend PHI in its designated record set upon receipt.[1]\n\nDisclosure accounting \nUnder HIPAA, individuals have a right to an accounting of the disclosures of their PHI by a covered entity or the covered entity\u2019s business associates. The maximum disclosure accounting period is the six years immediately preceding the accounting request. However, a covered entity is not obligated to account for any disclosure made before its Privacy Rule compliance date.\nThere are, of course, exceptions. The Privacy Rule does not require accounting for disclosures[1]: \n\nfor treatment, payment or healthcare operations\nto the individual or the individual\u2019s personal representative\nfor notification of or to persons involved in an individual\u2019s healthcare or payment for healthcare, for disaster relief or for facility directories\npursuant to an authorization\nof a limited data set\nfor national security or intelligence purposes\nto correctional institutions or law enforcement officials for certain purposes regarding inmates or individuals in lawful custody\nincidental to otherwise permitted or required uses or disclosures\nAccounting for disclosures to health oversight agencies and law enforcement officials must be temporarily suspended upon if they provide written representation that an accounting would likely impede their activities.\n\nRestriction request \nIndividuals have the right to request that a covered entity restrict use or disclosure of PHI for[1]:\n\ntreatment, payment or healthcare operations\ndisclosure to persons involved in the individual\u2019s healthcare or payment for healthcare\ndisclosure to notify family members or others about the individual\u2019s general condition, location or death\nA covered entity is under no obligation to agree to requests for restrictions. If a covered entity agrees to the request, it must comply with the agreed restrictions, except for purposes of treating the individual in a medical emergency.\n\nConfidential communications requirement \nHealth plans, covered healthcare providers and their covered business associates must permit individuals to request an alternative means or location for receiving communications of PHI by means other than those that the covered entity typically employs. For example, an individual may request that the provider communicate with the individual through a designated address or phone number. Similarly, an individual may request that the provider send communications in a closed envelope rather than a postcard. \nHealth plans must accommodate reasonable requests if the individual indicates that the disclosure of all or part of the PHI could endanger the individual. The health plan may not question the individual\u2019s statement of endangerment. Any covered entity may condition compliance with a confidential communication request on the individual specifying an alternative address or method of contact and explaining how any payment will be handled.[1]\n\nPersonal representatives and minors \nThe HIPAA Privacy Rule recognizes that there may be times when individuals are legally or otherwise incapable of exercising their rights, or simply choose to designate another to act on their behalf with respect to these rights. Under the Privacy Rule, a person authorized (under state or other applicable law, e.g., tribal or military law) to act on behalf of the individual in making health care related decisions is the individual\u2019s \"personal representative.\" Section 164.502(g) provides when, and to what extent, the personal representative must be treated as the individual for purposes of the rule. In addition to these formal designations of a personal representative, the rule at 45 CFR 164.510(b) addresses situations in which family members or other persons who are involved in the individual\u2019s healthcare or payment for care may receive PHI about the individual even if they are not expressly authorized to act on the individual\u2019s behalf.[2]\nIn general, the individual's representative must be treated exactly as if they were the individual whose PHI is in question.\n\nStandard recognized representatives \nThe HHS lists the following in regards to who must be recognized as the individual\u2019s personal representative. If the individual is[3]:\t\n\nan adult or emancipated minor: The personal representative is a person with legal authority to make health care decisions on behalf of the individual. Examples include healthcare power of attorney, a court-appointed legal guardian, and a general power of attorney or durable power of attorney that includes the power to make healthcare decisions. Exceptions: See abuse, neglect and endangerment situations discussion below.\nan un-emancipated minor: The personal representative is a parent, guardian or other person acting in loco parentis with legal authority to make healthcare decisions on behalf of the minor child. Exceptions: See parents and un-emancipated minors, and abuse, neglect and endangerment situations discussion below.\ndeceased: The personal representative is a person with legal authority to act on behalf of the decedent or the estate (not restricted to persons with authority to make healthcare decisions).\nAs always, some exceptions and conditions or situational considerations apply, and these are taken into account under the HIPAA regulations.\nParents and un-emancipated minors\nIn most cases under the rule, a parent, guardian or other person acting in loco parentis (collectively, \"parent\") is the personal representative of the minor child and can exercise the minor\u2019s rights with respect to PHI, because the parent usually has the authority to make healthcare decisions about his or her minor child.\nHowever, the Privacy Rule specifies three circumstances in which the parent is not the \"personal representative\" with respect to certain health information about his or her minor child. These exceptions generally track the ability of certain minors to obtain specified healthcare without parental consent under state or other laws, or standards of professional practice. In these situations, the parent does not control the minor\u2019s healthcare decisions, and thus under the Privacy Rule, does not control the PHI related to that care. The three exceptional circumstances when a parent is not the minor\u2019s personal representative are[3]:\n\nwhen state or other law does not require the consent of a parent or other person before a minor can obtain a particular healthcare service, and the minor consents to the healthcare service; Example: A state law provides an adolescent the right to obtain mental health treatment without the consent of his or her parent, and the adolescent consents to such treatment without the parent\u2019s consent.\nwhen someone other than the parent is authorized by law to consent to the provision of a particular health service to a minor and provides such consent; Example: A court may grant authority to make healthcare decisions for the minor to an adult other than the parent, to the minor, or the court may make the decision(s) itself.\nwhen a parent agrees to a confidential relationship between the minor and a healthcare provider; Example: A physician asks the parent of a 16-year-old if the physician can talk with the child confidentially about a medical condition and the parent agrees.\nRegardless, however, of whether a parent is the personal representative of a minor child, the Privacy Rule defers to state or other applicable laws that expressly address the ability of the parent to obtain health information about the minor child. In doing so, the Privacy Rule permits a covered entity to disclose to a parent, or provide the parent with access to, a minor child\u2019s PHI when and to the extent it is permitted or required by state or other laws (including relevant case law). Likewise, the Privacy Rule prohibits a covered entity from disclosing a minor child\u2019s PHI to a parent, or providing a parent with access to such information, when and to the extent it is prohibited under state or other laws (including relevant case law).\nIn cases in which state or other applicable law is silent concerning parental access to the minor\u2019s PHI, and a parent is not the personal representative of a minor child based on one of the exceptional circumstances described above, a covered entity has discretion to provide or deny a parent with access under 45 CFR 164.524 to the minor\u2019s health information, if doing so is consistent with state or other applicable law, and provided the decision is made by a licensed health care professional in the exercise of professional judgment.[3]\nAbuse, neglect, and endangerment situations\nWhen a physician or other covered entity reasonably believes that an individual, including an un-emancipated minor, has been or may be subjected to domestic violence, abuse, or neglect by the personal representative, or that treating a person as an individual\u2019s personal representative could endanger the individual, the covered entity may choose not to treat that person as the individual\u2019s personal representative, if in the exercise of professional judgment, doing so would not be in the best interests of the individual. For example, if a physician reasonably believes that providing the personal representative of an incompetent elderly individual with access to the individual\u2019s health information would endanger that individual, the Privacy Rule permits the physician to decline to provide such access.[3]\n\nReferences \n\n\n\u2191 1.00 1.01 1.02 1.03 1.04 1.05 1.06 1.07 1.08 1.09 1.10 1.11 1.12 1.13 1.14 1.15 1.16 1.17 1.18 1.19 1.20 1.21 1.22 1.23 Office for Civil Rights (26 July 2013). \"Summary of the HIPAA Privacy Rule\". United States Department of Health and Human Services. https:\/\/www.hhs.gov\/hipaa\/for-professionals\/privacy\/laws-regulations\/index.html . Retrieved 09 February 2022 .   \n \n\n\u2191 2.0 2.1 2.2 2.3 2.4 2.5 \"Code of Federal Regulations, Title 45, Subtitle A, Subchapter C, Part 164, Subpart E, 164.514\". U.S. Government Publishing Office. https:\/\/www.ecfr.gov\/current\/title-45\/subtitle-A\/subchapter-C\/part-164\/subpart-E\/section-164.514 . Retrieved 09 February 2022 .   \n \n\n\u2191 3.0 3.1 3.2 3.3 Office for Civil Rights (19 September 2013). \"Personal Representatives\". U.S. Department of Health & Human Services. https:\/\/www.hhs.gov\/hipaa\/for-professionals\/privacy\/guidance\/personal-representatives\/index.html . Retrieved 10 February 2022 .   \n \n\n\n\r\n\n\nCitation for this section \nTitle: HIPAA Compliance: An Introduction - Use and disclosure\nAuthor for citation: Alan Vaughan, with editorial modifications by Shawn Douglas\nLicense for content: Creative Commons Attribution-ShareAlike 4.0 International\nPublication date: Originally published June 2016; compiled and lightly edited February 2022\n\n\n\n\n\nSource: <a rel=\"external_link\" class=\"external\" href=\"https:\/\/www.limswiki.org\/index.php\/Book:HIPAA_Compliance:_An_Introduction\/Use_and_disclosure\">https:\/\/www.limswiki.org\/index.php\/Book:HIPAA_Compliance:_An_Introduction\/Use_and_disclosure<\/a>\nNavigation menuPage actionsBookDiscussionView sourceHistoryPage actionsBookDiscussionMoreToolsIn other languagesPersonal toolsLog inRequest accountNavigationMain pageRecent changesRandom pageHelp about MediaWikiSearch\u00a0 ToolsWhat links hereRelated changesSpecial pagesPermanent linkPage informationSponsors \r\n\n\t\r\n\n\t\r\n\n\t\r\n\n\t\r\n\n\t\n\t\n\t\r\n\n\t\r\n\n\t\n\t\r\n\n\t\r\n\n \n\t\n\t\n\t\r\n\n\t\r\n\n \n\t\n\t\r\n\n\t\r\n\n\t\n\t\n\t\r\n\n\t\n\t\n\t\r\n\n\t\r\n\n\t\n\t\n\t\r\n\n\t\r\n\n\t\r\n\n\t\r\nPrint\/exportCreate a bookDownload as PDFDownload as PDFDownload as Plain textPrintable version This page was last edited on 10 February 2022, at 23:42.Content is available under a Creative Commons Attribution-ShareAlike 4.0 International License unless otherwise noted.This page has been accessed 3 times.Privacy policyAbout LIMSWikiDisclaimers\n\n\n\n","5a2165db90474508ac92e2e7cce548ff_html":"<body class=\"mediawiki ltr sitedir-ltr mw-hide-empty-elt ns-208 ns-subject page-Book_HIPAA_Compliance_An_Introduction_Use_and_disclosure rootpage-Book_HIPAA_Compliance_An_Introduction_Use_and_disclosure skin-monobook action-view skin--responsive\"><div id=\"rdp-ebb-globalWrapper\"><div id=\"rdp-ebb-column-content\"><div id=\"rdp-ebb-content\" class=\"mw-body\" role=\"main\"><a id=\"rdp-ebb-top\"><\/a>\n<h1 id=\"rdp-ebb-firstHeading\" class=\"firstHeading\" lang=\"en\">Book:HIPAA Compliance: An Introduction\/Use and disclosure<\/h1><div id=\"rdp-ebb-bodyContent\" class=\"mw-body-content\"><!-- start content --><div id=\"rdp-ebb-mw-content-text\" lang=\"en\" dir=\"ltr\" class=\"mw-content-ltr\"><div class=\"mw-parser-output\">\n\n<h2><span class=\"mw-headline\" id=\"Use_and_disclosure\">Use and disclosure<\/span><\/h2>\n<div class=\"floatright\"><a href=\"https:\/\/www.limswiki.org\/index.php\/File:Department_of_Health_%26_Human_Services_-_Sarah_Stierch.jpg\" class=\"image wiki-link\" data-key=\"928e54a02f8441bc7dcfe331b8c0cc55\"><img alt=\"Department of Health & Human Services - Sarah Stierch.jpg\" src=\"https:\/\/upload.wikimedia.org\/wikipedia\/commons\/0\/09\/Department_of_Health_%26_Human_Services_-_Sarah_Stierch.jpg\" decoding=\"async\" style=\"width: 100%;max-width: 400px;height: auto;\" \/><\/a><\/div><p>Now that we understand what HIPAA is, who it applies to and what information is protected, it's time to look at exactly how PHI can and cannot be used.\n<\/p><p>According to the HHS, a covered entity is permitted, but not required, to use and disclose PHI, without an individual\u2019s authorization, for any of the following purposes or situations<sup id=\"rdp-ebb-cite_ref-HHSSummaryHIPAA_1-0\" class=\"reference\"><a href=\"#cite_note-HHSSummaryHIPAA-1\">[1]<\/a><\/sup>:\n<\/p>\n<ol><li>to provide or reveal to the affected individual, unless required for access or accounting of disclosures<\/li>\n<li>for treatment, payment, and health care operations<\/li>\n<li>as an opportunity to agree or object<\/li>\n<li>as incidental to an otherwise permitted use and disclosure<\/li>\n<li>in the case of public interest and benefit activities<\/li>\n<li>as a limited data set for the purposes of research, public health or health care operations<\/li><\/ol>\n<p>Covered entities may rely on professional ethics and best judgments in deciding which of these permissive uses and disclosures to make. These permissive uses are detailed further below.\n<\/p>\n<h3><span class=\"mw-headline\" id=\"Permitted_uses_and_disclosures\">Permitted uses and disclosures<\/span><\/h3>\n<h4><span class=\"mw-headline\" id=\"To_the_individual\">To the individual<\/span><\/h4>\n<p>This use and disclosure is straightforward. A covered entity may disclose PHI to the individual who is the subject of the information.<sup id=\"rdp-ebb-cite_ref-HHSSummaryHIPAA_1-1\" class=\"reference\"><a href=\"#cite_note-HHSSummaryHIPAA-1\">[1]<\/a><\/sup>\n<\/p>\n<h4><span id=\"rdp-ebb-Treatment,_payment_and_healthcare_operations\"><\/span><span class=\"mw-headline\" id=\"Treatment.2C_payment_and_healthcare_operations\">Treatment, payment and healthcare operations<\/span><\/h4>\n<p>A covered entity may use and disclose PHI for its own use in treatment, payment and healthcare operations activities. A covered entity may also disclose PHI for the treatment activities of any healthcare provider, the payment activities of another covered entity and of any healthcare provider, or the healthcare operations of another covered entity involving either quality or competency assurance activities or fraud and abuse detection and compliance activities, if both covered entities have or had a relationship with the individual and the PHI pertains to the relationship. The HHS defines treatment, payment and healthcare operations as follows<sup id=\"rdp-ebb-cite_ref-HHSSummaryHIPAA_1-2\" class=\"reference\"><a href=\"#cite_note-HHSSummaryHIPAA-1\">[1]<\/a><\/sup>:\n<\/p>\n<dl><dt>Treatment<\/dt>\n<dd>The provision, coordination, or management of healthcare and related services for an individual by one or more healthcare providers, including consultation between providers regarding a patient and referral of a patient by one provider to another<\/dd><\/dl>\n<dl><dt>Payment<\/dt>\n<dd>Activities of a health plan to obtain premiums, determine or fulfill responsibilities for coverage and provision of benefits, and furnish or obtain reimbursement for healthcare delivered to an individual and activities of a healthcare provider to obtain payment or be reimbursed for the provision of healthcare to an individual<\/dd><\/dl>\n<dl><dt>Healthcare operations<\/dt>\n<dd>Any of the following activities: (a) and improvement activities, including case management and care coordination; (b) competency assurance activities, including provider or health plan performance evaluation, credentialing, and accreditation; (c) arrangement and use of medical reviews, audits, or legal services, including fraud and abuse detection and compliance programs; (d) specified insurance functions, such as underwriting, risk rating, and reinsuring risk; (e) business planning, development, management, and administration; and (f) business management and general administrative activities of the entity, including but not limited to de-identifying PHI, creating a limited data set, and certain fundraising for the benefit of the covered entity.<\/dd><\/dl>\n<p>Most uses and disclosures of psychotherapy notes for treatment, payment and healthcare operations purposes require an authorization as described below. Obtaining \u201cconsent\u201d (written permission from individuals to use and disclose their PHI for treatment, payment and healthcare operations) is optional under the Privacy Rule for all covered entities. The content of a consent form, and the process for obtaining consent, are at the discretion of the covered entity electing to seek consent.<sup id=\"rdp-ebb-cite_ref-HHSSummaryHIPAA_1-3\" class=\"reference\"><a href=\"#cite_note-HHSSummaryHIPAA-1\">[1]<\/a><\/sup>\n<\/p>\n<h4><span class=\"mw-headline\" id=\"Uses_and_disclosures_with_opportunity_to_agree_or_object\">Uses and disclosures with opportunity to agree or object<\/span><\/h4>\n<p>Informal permission may be obtained by asking the individual outright, or by circumstances that clearly give the individual the opportunity to agree, acquiesce or object. Where the individual is incapacitated, in an emergency situation, or not available, covered entities generally may make such uses and disclosures, if in the exercise of their professional judgment, the use or disclosure is determined to be in the best interests of the individual. A few common examples are given below<sup id=\"rdp-ebb-cite_ref-HHSSummaryHIPAA_1-4\" class=\"reference\"><a href=\"#cite_note-HHSSummaryHIPAA-1\">[1]<\/a><\/sup>:\n<\/p><p><b>Facility directories<\/b>: It is a common practice in many healthcare facilities, such as hospitals, to maintain a directory of patient contact information. A covered healthcare provider may rely on an individual\u2019s informal permission to list in its facility directory the individual\u2019s name, general condition, religious affiliation and location in the provider\u2019s facility. The provider may then disclose the individual\u2019s condition and location in the facility to anyone asking for the individual by name, and also may disclose religious affiliation to clergy. Members of the clergy are not required to ask for the individual by name when inquiring about patient religious affiliation.\n<\/p><p><b>For notification and other purposes<\/b>: A covered entity also may rely on an individual\u2019s informal permission to disclose to the individual\u2019s family, relatives or friends, or to other persons whom the individual identifies, PHI directly relevant to that person\u2019s involvement in the individual\u2019s care or payment for care. This provision, for example, allows a pharmacist to dispense filled prescriptions to a person acting on behalf of the patient. Similarly, a covered entity may rely on an individual\u2019s informal permission to use or disclose PHI for the purpose of notifying (including identifying or locating) family members, personal representatives or others responsible for the individual\u2019s care of the individual\u2019s location, general condition or death. In addition, PHI may be disclosed for notification purposes to public or private entities authorized by law or charter to assist in disaster relief efforts.\n<\/p>\n<h4><span class=\"mw-headline\" id=\"Incidental_use_and_disclosure\">Incidental use and disclosure<\/span><\/h4>\n<p>The Privacy Rule does not require that every risk of an incidental use or disclosure of PHI be eliminated. A use or disclosure of this information that occurs as a result of, or as \u201cincident to,\u201d an otherwise permitted use or disclosure is permitted as long as the covered entity has adopted reasonable safeguards as required by the Privacy Rule, and the information being shared was limited to the \u201cminimum necessary,\u201d as required by the Privacy Rule.<sup id=\"rdp-ebb-cite_ref-HHSSummaryHIPAA_1-5\" class=\"reference\"><a href=\"#cite_note-HHSSummaryHIPAA-1\">[1]<\/a><\/sup>\n<\/p>\n<h4><span class=\"mw-headline\" id=\"Public_interest_and_benefit_activities\">Public interest and benefit activities<\/span><\/h4>\n<div class=\"floatright\"><a href=\"https:\/\/www.limswiki.org\/index.php\/File:Paramedic_dispatch.jpg\" class=\"image wiki-link\" data-key=\"c10bda84350370c3b4fb03b03cdb6910\"><img alt=\"Paramedic dispatch.jpg\" src=\"https:\/\/upload.wikimedia.org\/wikipedia\/commons\/d\/d2\/Paramedic_dispatch.jpg\" decoding=\"async\" style=\"width: 100%;max-width: 400px;height: auto;\" \/><\/a><\/div><p>The Privacy Rule permits use and disclosure of PHI, without an individual\u2019s authorization or permission, for 12 national priority purposes. These disclosures are permitted, although not required, by the Privacy Rule in recognition of the important uses made of health information outside of the healthcare context. Specific conditions or limitations apply to each public interest purpose, striking the balance between the individual privacy interest and the public interest need for this information. Those 12 national priority purposes are detailed below<sup id=\"rdp-ebb-cite_ref-HHSSummaryHIPAA_1-6\" class=\"reference\"><a href=\"#cite_note-HHSSummaryHIPAA-1\">[1]<\/a><\/sup>:\n<\/p><dl><dd><b>1. When required by law<\/b>: Covered entities may use and disclose PHI without individual authorization as required by law (including by statute, regulation or court orders).<\/dd><\/dl>\n<dl><dd><b>2. When conducting public health activities<\/b>: Covered entities may disclose PHI to any of the following for public health purposes:\n<dl><dd><ul><li>public health authorities authorized by law to collect or receive such information for preventing or controlling disease, injury or disability and to public health or other government authorities authorized to receive reports of child abuse and neglect<\/li>\n<li>entities subject to <a href=\"https:\/\/www.limswiki.org\/index.php\/Food_and_Drug_Administration\" title=\"Food and Drug Administration\" class=\"wiki-link\" data-key=\"e2be8927071ac419c0929f7aa1ede7fe\">Food and Drug Administration<\/a> (FDA) regulation regarding FDA-regulated products or activities for purposes such as adverse event reporting, tracking of products, product recalls and post-marketing surveillance<\/li>\n<li>individuals who may have contracted or been exposed to a communicable disease when notification is authorized by law<\/li>\n<li>employers, regarding employees, when requested by employers, for information concerning a work-related illness or injury or workplace-related medical surveillance, because such information is needed by the employer to comply with the Occupational Safety and Health Administration (OSHA), the Mine Safety and Health Administration (MHSA), or similar state law<\/li><\/ul><\/dd><\/dl><\/dd><\/dl>\n<dl><dd><b>3. In cases of victims of abuse, neglect or domestic violence<\/b>: In certain circumstances, covered entities may disclose PHI to appropriate government authorities regarding victims of abuse, neglect or domestic violence.<\/dd><\/dl>\n<dl><dd><b>4. For health oversight activities<\/b>: Covered entities may disclose PHI to health oversight agencies (as defined in the Privacy Rule) for purposes of legally authorized health oversight activities, such as audits and investigations necessary for oversight of the healthcare system and government benefit programs.<\/dd><\/dl>\n<dl><dd><b>5. During judicial and administrative proceedings<\/b>: Covered entities may disclose PHI in a judicial or administrative proceeding if the request for the information is through an order from a court or administrative tribunal. Such information may also be disclosed in response to a subpoena or other lawful process if certain assurances regarding notice to the individual or a protective order are provided.<\/dd><\/dl>\n<dl><dd><b>6. For law enforcement purposes<\/b>: Covered entities may disclose PHI to law enforcement officials for law enforcement purposes under the following six circumstances, subject to specified conditions:\n<dl><dd><ul><li>as required by law (including court orders, court-ordered warrants, subpoenas) and administrative requests<\/li>\n<li>to identify or locate a suspect, fugitive, material witness or missing person<\/li>\n<li>in response to a law enforcement official\u2019s request for information about a victim or suspected victim of a crime<\/li>\n<li>to alert law enforcement of a person\u2019s death, if the covered entity suspects that criminal activity caused the death<\/li>\n<li>when a covered entity believes that PHI is evidence of a crime that occurred on its premises<\/li>\n<li>by a covered healthcare provider in a medical emergency not occurring on its premises, when necessary to inform law enforcement about the commission and nature of a crime, the location of the crime or crime victims, and the perpetrator of the crime<\/li><\/ul><\/dd><\/dl><\/dd><\/dl>\n<dl><dd><b>7. To decedents<\/b>: Covered entities may disclose PHI to funeral directors as needed, and to coroners or medical examiners to identify a deceased person, determine the cause of death and perform other functions authorized by law.<\/dd><\/dl>\n<dl><dd><b>8. For honoring cadaveric organ, eye or tissue donation<\/b>: Covered entities may use or disclose PHI to facilitate the donation and transplantation of cadaveric organs, eyes and tissue.<\/dd><\/dl>\n<dl><dd><b>9. For research<\/b>: \"Research\" is defined as any systematic investigation designed to develop or contribute to generalizable knowledge. The Privacy Rule permits a covered entity to use and disclose PHI for research purposes, without an individual\u2019s authorization, provided the covered entity obtains either:\n<dl><dd><ul><li>documentation that an alteration or waiver of individuals\u2019 authorization for the use or disclosure of PHI about them for research purposes has been approved by an Institutional Review Board or Privacy Board;<\/li>\n<li>representations from the researcher that the use or disclosure of the PHI is solely to prepare a research protocol or for similar purpose preparatory to research, that the researcher will not remove any PHI from the covered entity, and the PHI for which access is sought is necessary for the research; or<\/li><\/ul><\/dd><\/dl><\/dd><\/dl>\n<ul><li>representations from the researcher that the use or disclosure sought is solely for research on the PHI of decedents, that the PHI sought is necessary for the research, and, at the request of the covered entity, documentation of the death of the individuals about whom information is sought.<\/li><\/ul>\n<dl><dd>A covered entity also may use or disclose, without an individuals\u2019 authorization, a limited data set of PHI for research purposes (see discussion below).<\/dd><\/dl>\n<dl><dd><b>10. In case of serious threat to health or safety<\/b>: Covered entities may disclose PHI that they believe is necessary to prevent or lessen a serious and imminent threat to a person or the public, when such disclosure is made to someone they believe can prevent or lessen the threat (including the target of the threat). Covered entities may also disclose to law enforcement if the information is needed to identify or apprehend an escapee or violent criminal.<\/dd><\/dl>\n<dl><dd><b>11. For essential government functions<\/b>: An authorization is not required to use or disclose PHI for certain essential government functions. Such functions include:\n<dl><dd><ul><li>assuring proper execution of a military mission<\/li>\n<li>conducting intelligence and national security activities that are authorized by law<\/li>\n<li>providing protective services to the President<\/li>\n<li>making medical suitability determinations for U.S. State Department employees<\/li>\n<li>protecting the health and safety of inmates or employees in a correctional institution<\/li>\n<li>determining eligibility for or conducting enrollment in certain government benefit programs<\/li><\/ul><\/dd><\/dl><\/dd><\/dl>\n<dl><dd><b>12. For workers\u2019 compensation laws<\/b>: Covered entities may disclose PHI as authorized by, and to comply with, workers\u2019 compensation laws and other similar programs providing benefits for work-related injuries or illnesses.<\/dd><\/dl>\n<h4><span class=\"mw-headline\" id=\"Limited_data_set\">Limited data set<\/span><\/h4>\n<p>A limited data set is PHI from which certain specified direct identifiers of individuals and their relatives, household members and employers have been removed. A limited data set may be used and disclosed for research, healthcare operations and public health purposes, provided the recipient enters into a data use agreement promising specified safeguards for the PHI within the limited data set.<sup id=\"rdp-ebb-cite_ref-HHSSummaryHIPAA_1-7\" class=\"reference\"><a href=\"#cite_note-HHSSummaryHIPAA-1\">[1]<\/a><\/sup>\n<\/p><p>The \"certain specified direct identifiers\" that must be removed are almost all of the 18 PHI identifiers previously discussed, but not exactly. Again, they are<sup id=\"rdp-ebb-cite_ref-45CFR164_2-0\" class=\"reference\"><a href=\"#cite_note-45CFR164-2\">[2]<\/a><\/sup>:\n<\/p>\n<ol><li>name<\/li>\n<li>postal address information, other than town or city, state and zip code (in other words, remove the street address)<\/li>\n<li>all elements of dates (except year) for dates directly related to an individual<\/li>\n<li>phone numbers<\/li>\n<li>fax numbers<\/li>\n<li>electronic mail (email) addresses<\/li>\n<li>Social Security numbers<\/li>\n<li>medical record numbers (MRNs)<\/li>\n<li>health plan beneficiary numbers<\/li>\n<li>account numbers<\/li>\n<li>certificate\/license numbers<\/li>\n<li>vehicle identifiers and serial numbers, including license plate numbers<\/li>\n<li>device identifiers and serial numbers<\/li>\n<li>web addresses or Uniform Resource Locators (URLs)<\/li>\n<li>Internet Protocol (IP) address numbers<\/li>\n<li>biometric identifiers, including finger and voice prints<\/li>\n<li>full face photographic images and any comparable images<\/li>\n<li>any other unique identifying number, characteristic or code (note this does not mean the unique code assigned by the investigator to code the data)<\/li><\/ol>\n<h3><span class=\"mw-headline\" id=\"Authorized_use_and_disclosure\">Authorized use and disclosure<\/span><\/h3>\n<p>There are three instances where use and disclosure of PHI is always authorized, with certain conditions.<sup id=\"rdp-ebb-cite_ref-HHSSummaryHIPAA_1-8\" class=\"reference\"><a href=\"#cite_note-HHSSummaryHIPAA-1\">[1]<\/a><\/sup>\n<\/p><p><b>1. Authorization by the individual<\/b>: A covered entity must obtain the individual\u2019s written authorization for any use or disclosure of their PHI that is not for treatment, payment or healthcare operations or otherwise permitted or required by the Privacy Rule. It's also important to note that you cannot make authorization a condition of providing treatment, payment, enrollment or benefits eligibility (except in limited circumstances).\n<\/p><p>An authorization must be written in specific terms. It may allow use and disclosure of PHI by the covered entity, or by a third party. Examples of disclosures that would require an individual\u2019s authorization include<sup id=\"rdp-ebb-cite_ref-45CFR164_2-1\" class=\"reference\"><a href=\"#cite_note-45CFR164-2\">[2]<\/a><\/sup>:\n<\/p>\n<ul><li>disclosures to a life insurer for coverage purposes<\/li>\n<li>disclosures to an employer of the results of a pre-employment physical or lab test<\/li>\n<li>disclosures to a pharmaceutical firm for their own marketing purposes<\/li><\/ul>\n<p>All authorizations must be in plain language and contain specific information regarding<sup id=\"rdp-ebb-cite_ref-45CFR164_2-2\" class=\"reference\"><a href=\"#cite_note-45CFR164-2\">[2]<\/a><\/sup>:\n<\/p>\n<ul><li>the information to be disclosed or used<\/li>\n<li>the person(s) disclosing and receiving the information<\/li>\n<li>expiration<\/li>\n<li>right to revoke in writing, and other data<\/li><\/ul>\n<p>The Privacy Rule also contains transition provisions applicable to authorizations and other express legal permissions obtained prior to April 14, 2003.\n<\/p><p><b>2. Psychotherapy Notes<\/b>: Using or disclosing PHI is prohibited without the individual's authorization, except in the following cases<sup id=\"rdp-ebb-cite_ref-45CFR164_2-3\" class=\"reference\"><a href=\"#cite_note-45CFR164-2\">[2]<\/a><\/sup>:\n<\/p>\n<ul><li>when the covered entity who created the notes is uses them for treatment<\/li>\n<li>when the covered entity needs to use them for one or more of the following:\n<ul><li>for its own training<\/li>\n<li>to defend itself in legal proceedings brought by the individual<\/li>\n<li>for HHS to investigate or determine the covered entity\u2019s compliance with the Privacy Rules<\/li>\n<li>to avert a serious and imminent threat to public health or safety<\/li>\n<li>to provide to a health oversight agency for lawful oversight of the originator of the psychotherapy notes<\/li>\n<li>for the lawful activities of a coroner or medical examiner or as required by law<\/li><\/ul><\/li><\/ul>\n<p><b>3. Marketing<\/b>: HIPAA defines \"marketing\" as any communication about a product or service that encourages recipients to purchase or use the product or service. The Privacy Rule identifies some health-related activities based on this definition of marketing<sup id=\"rdp-ebb-cite_ref-45CFR164_2-4\" class=\"reference\"><a href=\"#cite_note-45CFR164-2\">[2]<\/a><\/sup>:\n<\/p>\n<ul><li>communications to describe health-related products or services, or payment for them, provided by or included in a benefit plan of the covered entity making the communication<\/li>\n<li>communications about participating providers in a provider or health plan network, replacement of or enhancements to a health plan, and health-related products or services available only to a health plan\u2019s enrollees that add value to, but are not part of, the benefits plan<\/li>\n<li>communications for treatment of the individual<\/li>\n<li>communications for case management or care coordination for the individual, or to direct or recommend alternative treatments, therapies, healthcare providers or care settings to the individual<\/li><\/ul>\n<p>Marketing also is an arrangement between a covered entity and any other entity whereby the covered entity discloses PHI in exchange for direct or indirect remuneration, for the other entity to communicate about its own products or services encouraging the use or purchase of those products or services; in other words, for typical marketing purposes. A covered entity has to obtain an authorization to use or disclose PHI for marketing, except for face-to-face marketing communications between the covered entity and an individual, and for a covered entity\u2019s provision of promotional gifts of nominal value. \n<\/p><p>No authorization is needed, however, to make a communication that falls within one of the exceptions to the marketing definition. An authorization for marketing that involves the covered entity\u2019s receipt of direct or indirect remuneration from a third party must reveal that fact.\n<\/p>\n<h3><span class=\"mw-headline\" id=\"Limiting\">Limiting<\/span><\/h3>\n<p>In use and disclosure, even when authorized, it's always important to keep certain conditions and principles in mind. One main concept to always consider is that of always releasing the minimum necessary information to as few parties as possible, in as few cases as possible. That principle and others are described below.\n<\/p>\n<h4><span class=\"mw-headline\" id=\"Minimum_necessary\">Minimum necessary<\/span><\/h4>\n<p>Basically, HIPAA says that in any case of authorized disclosure, the amount of PHI shared must be the minimum necessary. A covered entity must make reasonable efforts to use, disclose and request only the minimum amount of PHI needed to accomplish the intended purpose of the use, disclosure or request. They must also develop and implement policies and procedures to reasonably limit uses and disclosures to the minimum necessary. When the minimum necessary standard applies to a use or disclosure, a covered entity may not use, disclose, or request the entire medical record for a particular purpose, unless it can specifically justify the whole record as the amount reasonably needed for the purpose.<sup id=\"rdp-ebb-cite_ref-HHSSummaryHIPAA_1-9\" class=\"reference\"><a href=\"#cite_note-HHSSummaryHIPAA-1\">[1]<\/a><\/sup>\n<\/p><p>Like most rules, there are exceptions to this principle. They are<sup id=\"rdp-ebb-cite_ref-HHSSummaryHIPAA_1-10\" class=\"reference\"><a href=\"#cite_note-HHSSummaryHIPAA-1\">[1]<\/a><\/sup>:\n<\/p>\n<ul><li>disclosure to or a request by a healthcare provider for treatment<\/li>\n<li>disclosure to an individual who is the subject of the information, or the individual\u2019s personal representative<\/li>\n<li>use or disclosure made pursuant to an authorization<\/li>\n<li>disclosure to HHS for complaint investigation, compliance review or enforcement<\/li>\n<li>use or disclosure that is required by law<\/li>\n<li>use or disclosure required for compliance with the HIPAA Transactions Rule or other HIPAA Administrative Simplification Rules<\/li><\/ul>\n<h4><span class=\"mw-headline\" id=\"Restrict_and_control_access_and_uses\">Restrict and control access and uses<\/span><\/h4>\n<p>The tenets of HIPAA, unlike what might be said of many laws, are almost without exception common sense and reasonable measures aimed at protecting people's personally identifiable information. Thus, the idea of restricting and controlling access to that information joins the Minimum Use principle as a sensible idea.\n<\/p><p>For internal uses, a covered entity must develop and implement policies and procedures that restrict access and uses of PHI based on the specific roles of the members of their workforce. These policies and procedures must identify the persons, or classes of persons, in the workforce who need access to PHI to carry out their duties, the categories of PHI to which access is needed, and any conditions under which they need the information to do their jobs.<sup id=\"rdp-ebb-cite_ref-HHSSummaryHIPAA_1-11\" class=\"reference\"><a href=\"#cite_note-HHSSummaryHIPAA-1\">[1]<\/a><\/sup>\n<\/p>\n<h4><span class=\"mw-headline\" id=\"Disclosures_and_requests_for_disclosures\">Disclosures and requests for disclosures<\/span><\/h4>\n<p>Covered entities are required to establish and implement policies and procedures for routine, recurring disclosures or requests for disclosures, so that PHI disclosure meets the \"minimum amount reasonably necessary\" measurement to achieve the purpose of the disclosure. It can be a policy, so individual review of each disclosure is not required. However, for non-routine, non-recurring disclosures or requests for disclosures that it makes, covered entities must develop criteria designed to do the same thing, but with a review of each request individually in accordance with the established criteria.<sup id=\"rdp-ebb-cite_ref-HHSSummaryHIPAA_1-12\" class=\"reference\"><a href=\"#cite_note-HHSSummaryHIPAA-1\">[1]<\/a><\/sup>\n<\/p>\n<h4><span id=\"rdp-ebb-Reasonable_reliance_on_another_covered_entity's_compliance\"><\/span><span class=\"mw-headline\" id=\"Reasonable_reliance_on_another_covered_entity.27s_compliance\">Reasonable reliance on another covered entity's compliance<\/span><\/h4>\n<p>HIPAA allows you to make the reasonable assumption that a request from another covered entity is in compliance with disclosure rules and principles. The HHS explains it such that if another covered entity makes a request for PHI, a covered entity may rely, if reasonable under the circumstances, on the request as complying with this minimum necessary standard. Similarly, a covered entity may rely upon requests as being the minimum necessary PHI from: (a) a public official, (b) a professional (such as an attorney or accountant) who is the covered entity\u2019s business associate, seeking the information to provide services to or for the covered entity; or (c) a researcher who provides the documentation or representation required by the Privacy Rule for research.<sup id=\"rdp-ebb-cite_ref-HHSSummaryHIPAA_1-13\" class=\"reference\"><a href=\"#cite_note-HHSSummaryHIPAA-1\">[1]<\/a><\/sup>\n<\/p>\n<h3><span class=\"mw-headline\" id=\"Patient_notification_and_rights\">Patient notification and rights<\/span><\/h3>\n<div class=\"floatleft\"><a href=\"https:\/\/www.limswiki.org\/index.php\/File:Privacy.jpg\" class=\"image wiki-link\" data-key=\"4637d47bb531d36b440a23258c967f0d\"><img alt=\"Privacy.jpg\" src=\"https:\/\/upload.wikimedia.org\/wikipedia\/commons\/8\/85\/Privacy.jpg\" decoding=\"async\" width=\"200\" height=\"200\" \/><\/a><\/div><p>Covered entities are required by HIPAA to provide information about how they handle a patient's PHI, and to allow access and the ability to update or amend it. The specifics are as follows.\n<\/p><h4><span class=\"mw-headline\" id=\"Privacy_practices_notice\">Privacy practices notice<\/span><\/h4>\n<p>Each covered entity, with certain exceptions, must provide a notice of its privacy practices. The Privacy Rule requires that the notice contain certain elements. The notice must<sup id=\"rdp-ebb-cite_ref-HHSSummaryHIPAA_1-14\" class=\"reference\"><a href=\"#cite_note-HHSSummaryHIPAA-1\">[1]<\/a><\/sup>:\n<\/p>\n<div class=\"flowlist\">\n<ul><li>describe the ways in which the covered entity may use and disclose PHI<\/li>\n<li>state the covered entity\u2019s duties to protect privacy, provide a notice of privacy practices, and abide by the terms of the current notice<\/li>\n<li>describe individuals\u2019 rights, including the right to complain to HHS and to the covered entity if they believe their privacy rights have been violated<\/li>\n<li>include a point of contact for further information and for making complaints to the covered entity<\/li><\/ul>\n<\/div>\n<p>Covered entities must act in accordance with their notices. The rule also contains specific distribution requirements for direct treatment providers, all other healthcare providers and health plans. That information is available, along with many other resources and additional information, on the <a rel=\"external_link\" class=\"external text\" href=\"https:\/\/www.hhs.gov\/hipaa\/index.html\" target=\"_blank\">HHS site<\/a>.\n<\/p><p><b>Notice distribution<\/b>\n<\/p><p>A covered healthcare provider with a direct treatment relationship with individuals must have delivered a privacy practices notice to patients as follows<sup id=\"rdp-ebb-cite_ref-HHSSummaryHIPAA_1-15\" class=\"reference\"><a href=\"#cite_note-HHSSummaryHIPAA-1\">[1]<\/a><\/sup>:\n<\/p>\n<ul><li>not later than the first service encounter by personal delivery (for patient visits)<\/li>\n<li>by automatic and contemporaneous electronic response (for electronic service delivery), and by prompt mailing (for telephonic service delivery)<\/li>\n<li>by posting the notice at each service delivery site in a clear and prominent place where people seeking service may reasonably be expected to be able to read the notice<\/li>\n<li>in emergency treatment situations, the provider must furnish its notice as soon as practicable after the emergency abates<\/li><\/ul>\n<p>Covered entities, whether direct treatment providers or indirect treatment providers (such as laboratories) or health plans, also must supply notice to anyone upon request. A covered entity must also make its notice electronically available on any website it maintains for customer service or benefits information.\n<\/p><p>The covered entities in an OHCA may use a joint privacy practices notice, as long as each agrees to abide by the notice content with respect to the PHI created or received in connection with the arrangement. Distribution of a joint notice by any covered entity participating in the OHCA at the first point that an OHCA member has an obligation to provide notice satisfies the distribution obligation of the other participants in the OHCA.\n<\/p><p>A health plan must distribute its privacy practices notice to each of its enrollees by its Privacy Rule compliance date. Thereafter, the health plan must give its notice to each new enrollee at enrollment, and send a reminder to every enrollee at least once every three years that the notice is available upon request. A health plan satisfies its distribution obligation by furnishing the notice to the \u201cnamed insured,\u201d that is, the subscriber for coverage that also applies to spouses and dependents.<sup id=\"rdp-ebb-cite_ref-HHSSummaryHIPAA_1-16\" class=\"reference\"><a href=\"#cite_note-HHSSummaryHIPAA-1\">[1]<\/a><\/sup>\n<\/p><p><b>Acknowledgement of notice receipt<\/b>\n<\/p><p>A covered healthcare provider with a direct treatment relationship with individuals must make a good faith effort to obtain written acknowledgement from patients of receipt of the privacy practices notice. The Privacy Rule does not prescribe any particular content for the acknowledgement. However, the provider must document the reason for any failure to obtain the patient\u2019s written acknowledgement. The provider is relieved of the need to request acknowledgement in an emergency treatment situation.<sup id=\"rdp-ebb-cite_ref-HHSSummaryHIPAA_1-17\" class=\"reference\"><a href=\"#cite_note-HHSSummaryHIPAA-1\">[1]<\/a><\/sup>\n<\/p>\n<h4><span class=\"mw-headline\" id=\"Access\">Access<\/span><\/h4>\n<p>Patients have the right to review and obtain a copy of their PHI in a covered entity\u2019s designated record set, with some exceptions. The \"designated record set\" is that group of records maintained by or for a covered entity that is used, in whole or part, to make decisions about individuals, or is a provider\u2019s medical and billing records about individuals or a health plan\u2019s enrollment, payment, claims adjudication and case or medical management record systems. The rule excepts from the right of access the following PHI<sup id=\"rdp-ebb-cite_ref-HHSSummaryHIPAA_1-18\" class=\"reference\"><a href=\"#cite_note-HHSSummaryHIPAA-1\">[1]<\/a><\/sup>: \n<\/p>\n<ul><li>psychotherapy notes<\/li>\n<li>information compiled for legal proceedings<\/li>\n<li>laboratory results to which the CLIA prohibits access<\/li>\n<li>information held by certain research laboratories<\/li><\/ul>\n<p>For information included within the right of access, covered entities may deny an individual access in certain specified situations, such as when a healthcare professional believes access could cause harm to the individual or another. In such situations, the individual must be given the right to have such denials reviewed by a licensed healthcare professional for a second opinion. Covered entities may impose reasonable, cost-based fees for the cost of copying and postage.<sup id=\"rdp-ebb-cite_ref-HHSSummaryHIPAA_1-19\" class=\"reference\"><a href=\"#cite_note-HHSSummaryHIPAA-1\">[1]<\/a><\/sup>\n<\/p>\n<h4><span class=\"mw-headline\" id=\"Amendment\">Amendment<\/span><\/h4>\n<p>The rule gives individuals the right to have covered entities amend their PHI in a designated record set when that information is inaccurate or incomplete. \n<\/p><p>If a covered entity accepts an amendment request, it must make reasonable efforts to provide the amendment to persons that the individual has identified as needing it, as well as to persons that the covered entity knows might rely on the information to the individual\u2019s detriment. If the request is denied, covered entities must provide the individual with a written denial and allow the individual to submit a statement of disagreement for inclusion in the record. The Rule specifies processes for requesting and responding to a request for amendment. Additionally, if a covered entity receives notice to amend from another covered entity, it must amend PHI in its designated record set upon receipt.<sup id=\"rdp-ebb-cite_ref-HHSSummaryHIPAA_1-20\" class=\"reference\"><a href=\"#cite_note-HHSSummaryHIPAA-1\">[1]<\/a><\/sup>\n<\/p>\n<h4><span class=\"mw-headline\" id=\"Disclosure_accounting\">Disclosure accounting<\/span><\/h4>\n<p>Under HIPAA, individuals have a right to an accounting of the disclosures of their PHI by a covered entity or the covered entity\u2019s business associates. The maximum disclosure accounting period is the six years immediately preceding the accounting request. However, a covered entity is not obligated to account for any disclosure made before its Privacy Rule compliance date.\n<\/p><p>There are, of course, exceptions. The Privacy Rule does not require accounting for disclosures<sup id=\"rdp-ebb-cite_ref-HHSSummaryHIPAA_1-21\" class=\"reference\"><a href=\"#cite_note-HHSSummaryHIPAA-1\">[1]<\/a><\/sup>: \n<\/p>\n<ol><li>for treatment, payment or healthcare operations<\/li>\n<li>to the individual or the individual\u2019s personal representative<\/li>\n<li>for notification of or to persons involved in an individual\u2019s healthcare or payment for healthcare, for disaster relief or for facility directories<\/li>\n<li>pursuant to an authorization<\/li>\n<li>of a limited data set<\/li>\n<li>for national security or intelligence purposes<\/li>\n<li>to correctional institutions or law enforcement officials for certain purposes regarding inmates or individuals in lawful custody<\/li>\n<li>incidental to otherwise permitted or required uses or disclosures<\/li><\/ol>\n<p>Accounting for disclosures to health oversight agencies and law enforcement officials must be temporarily suspended upon if they provide written representation that an accounting would likely impede their activities.\n<\/p>\n<h4><span class=\"mw-headline\" id=\"Restriction_request\">Restriction request<\/span><\/h4>\n<p>Individuals have the right to request that a covered entity restrict use or disclosure of PHI for<sup id=\"rdp-ebb-cite_ref-HHSSummaryHIPAA_1-22\" class=\"reference\"><a href=\"#cite_note-HHSSummaryHIPAA-1\">[1]<\/a><\/sup>:\n<\/p>\n<ul><li>treatment, payment or healthcare operations<\/li>\n<li>disclosure to persons involved in the individual\u2019s healthcare or payment for healthcare<\/li>\n<li>disclosure to notify family members or others about the individual\u2019s general condition, location or death<\/li><\/ul>\n<p>A covered entity is under no obligation to agree to requests for restrictions. If a covered entity agrees to the request, it must comply with the agreed restrictions, except for purposes of treating the individual in a medical emergency.\n<\/p>\n<h4><span class=\"mw-headline\" id=\"Confidential_communications_requirement\">Confidential communications requirement<\/span><\/h4>\n<p>Health plans, covered healthcare providers and their covered business associates must permit individuals to request an alternative means or location for receiving communications of PHI by means other than those that the covered entity typically employs. For example, an individual may request that the provider communicate with the individual through a designated address or phone number. Similarly, an individual may request that the provider send communications in a closed envelope rather than a postcard. \n<\/p><p>Health plans must accommodate reasonable requests if the individual indicates that the disclosure of all or part of the PHI could endanger the individual. The health plan may not question the individual\u2019s statement of endangerment. Any covered entity may condition compliance with a confidential communication request on the individual specifying an alternative address or method of contact and explaining how any payment will be handled.<sup id=\"rdp-ebb-cite_ref-HHSSummaryHIPAA_1-23\" class=\"reference\"><a href=\"#cite_note-HHSSummaryHIPAA-1\">[1]<\/a><\/sup>\n<\/p>\n<h3><span class=\"mw-headline\" id=\"Personal_representatives_and_minors\">Personal representatives and minors<\/span><\/h3>\n<div class=\"floatright\"><a href=\"https:\/\/www.limswiki.org\/index.php\/File:A_doctor_interact_with_a_boy_with_an_injured_foot_in_a_wheelchair.jpg\" class=\"image wiki-link\" data-key=\"e1714c62b9fafdcdc76190e63d5fa96a\"><img alt=\"A doctor interact with a boy with an injured foot in a wheelchair.jpg\" src=\"https:\/\/upload.wikimedia.org\/wikipedia\/commons\/2\/20\/A_doctor_interact_with_a_boy_with_an_injured_foot_in_a_wheelchair.jpg\" decoding=\"async\" style=\"width: 100%;max-width: 400px;height: auto;\" \/><\/a><\/div><p>The HIPAA Privacy Rule recognizes that there may be times when individuals are legally or otherwise incapable of exercising their rights, or simply choose to designate another to act on their behalf with respect to these rights. Under the Privacy Rule, a person authorized (under state or other applicable law, e.g., tribal or military law) to act on behalf of the individual in making health care related decisions is the individual\u2019s \"personal representative.\" Section 164.502(g) provides when, and to what extent, the personal representative must be treated as the individual for purposes of the rule. In addition to these formal designations of a personal representative, the rule at 45 CFR 164.510(b) addresses situations in which family members or other persons who are involved in the individual\u2019s healthcare or payment for care may receive PHI about the individual even if they are not expressly authorized to act on the individual\u2019s behalf.<sup id=\"rdp-ebb-cite_ref-45CFR164_2-5\" class=\"reference\"><a href=\"#cite_note-45CFR164-2\">[2]<\/a><\/sup>\n<\/p><p>In general, the individual's representative must be treated exactly as if they were the individual whose PHI is in question.\n<\/p>\n<h4><span class=\"mw-headline\" id=\"Standard_recognized_representatives\">Standard recognized representatives<\/span><\/h4>\n<p>The HHS lists the following in regards to who must be recognized as the individual\u2019s personal representative. If the individual is<sup id=\"rdp-ebb-cite_ref-HHSPersRep_3-0\" class=\"reference\"><a href=\"#cite_note-HHSPersRep-3\">[3]<\/a><\/sup>:\t\n<\/p>\n<ol><li>an adult or emancipated minor: The personal representative is a person with legal authority to make health care decisions on behalf of the individual. Examples include healthcare power of attorney, a court-appointed legal guardian, and a general power of attorney or durable power of attorney that includes the power to make healthcare decisions. Exceptions: See abuse, neglect and endangerment situations discussion below.<\/li>\n<li>an un-emancipated minor: The personal representative is a parent, guardian or other person acting in <i>loco parentis<\/i> with legal authority to make healthcare decisions on behalf of the minor child. Exceptions: See parents and un-emancipated minors, and abuse, neglect and endangerment situations discussion below.<\/li>\n<li>deceased: The personal representative is a person with legal authority to act on behalf of the decedent or the estate (not restricted to persons with authority to make healthcare decisions).<\/li><\/ol>\n<p>As always, some exceptions and conditions or situational considerations apply, and these are taken into account under the HIPAA regulations.\n<\/p><p><b>Parents and un-emancipated minors<\/b>\n<\/p><p>In most cases under the rule, a parent, guardian or other person acting in <i>loco parentis<\/i> (collectively, \"parent\") is the personal representative of the minor child and can exercise the minor\u2019s rights with respect to PHI, because the parent usually has the authority to make healthcare decisions about his or her minor child.\n<\/p><p>However, the Privacy Rule specifies three circumstances in which the parent is not the \"personal representative\" with respect to certain health information about his or her minor child. These exceptions generally track the ability of certain minors to obtain specified healthcare without parental consent under state or other laws, or standards of professional practice. In these situations, the parent does not control the minor\u2019s healthcare decisions, and thus under the Privacy Rule, does not control the PHI related to that care. The three exceptional circumstances when a parent is not the minor\u2019s personal representative are<sup id=\"rdp-ebb-cite_ref-HHSPersRep_3-1\" class=\"reference\"><a href=\"#cite_note-HHSPersRep-3\">[3]<\/a><\/sup>:\n<\/p>\n<ol><li>when state or other law does not require the consent of a parent or other person before a minor can obtain a particular healthcare service, and the minor consents to the healthcare service; Example: A state law provides an adolescent the right to obtain mental health treatment without the consent of his or her parent, and the adolescent consents to such treatment without the parent\u2019s consent.<\/li>\n<li>when someone other than the parent is authorized by law to consent to the provision of a particular health service to a minor and provides such consent; Example: A court may grant authority to make healthcare decisions for the minor to an adult other than the parent, to the minor, or the court may make the decision(s) itself.<\/li>\n<li>when a parent agrees to a confidential relationship between the minor and a healthcare provider; Example: A physician asks the parent of a 16-year-old if the physician can talk with the child confidentially about a medical condition and the parent agrees.<\/li><\/ol>\n<p>Regardless, however, of whether a parent is the personal representative of a minor child, the Privacy Rule defers to state or other applicable laws that expressly address the ability of the parent to obtain health information about the minor child. In doing so, the Privacy Rule permits a covered entity to disclose to a parent, or provide the parent with access to, a minor child\u2019s PHI when and to the extent it is permitted or required by state or other laws (including relevant case law). Likewise, the Privacy Rule prohibits a covered entity from disclosing a minor child\u2019s PHI to a parent, or providing a parent with access to such information, when and to the extent it is prohibited under state or other laws (including relevant case law).\n<\/p><p>In cases in which state or other applicable law is silent concerning parental access to the minor\u2019s PHI, and a parent is not the personal representative of a minor child based on one of the exceptional circumstances described above, a covered entity has discretion to provide or deny a parent with access under 45 CFR 164.524 to the minor\u2019s health information, if doing so is consistent with state or other applicable law, and provided the decision is made by a licensed health care professional in the exercise of professional judgment.<sup id=\"rdp-ebb-cite_ref-HHSPersRep_3-2\" class=\"reference\"><a href=\"#cite_note-HHSPersRep-3\">[3]<\/a><\/sup>\n<\/p><p><b>Abuse, neglect, and endangerment situations<\/b>\nWhen a physician or other covered entity reasonably believes that an individual, including an un-emancipated minor, has been or may be subjected to domestic violence, abuse, or neglect by the personal representative, or that treating a person as an individual\u2019s personal representative could endanger the individual, the covered entity may choose not to treat that person as the individual\u2019s personal representative, if in the exercise of professional judgment, doing so would not be in the best interests of the individual. For example, if a physician reasonably believes that providing the personal representative of an incompetent elderly individual with access to the individual\u2019s health information would endanger that individual, the Privacy Rule permits the physician to decline to provide such access.<sup id=\"rdp-ebb-cite_ref-HHSPersRep_3-3\" class=\"reference\"><a href=\"#cite_note-HHSPersRep-3\">[3]<\/a><\/sup>\n<\/p>\n<h2><span class=\"mw-headline\" id=\"References\">References<\/span><\/h2>\n<div class=\"reflist\" style=\"list-style-type: decimal;\">\n<div class=\"mw-references-wrap\"><ol class=\"references\">\n<li id=\"cite_note-HHSSummaryHIPAA-1\"><span class=\"mw-cite-backlink\">\u2191 <sup><a href=\"#cite_ref-HHSSummaryHIPAA_1-0\">1.00<\/a><\/sup> <sup><a href=\"#cite_ref-HHSSummaryHIPAA_1-1\">1.01<\/a><\/sup> <sup><a href=\"#cite_ref-HHSSummaryHIPAA_1-2\">1.02<\/a><\/sup> <sup><a href=\"#cite_ref-HHSSummaryHIPAA_1-3\">1.03<\/a><\/sup> <sup><a href=\"#cite_ref-HHSSummaryHIPAA_1-4\">1.04<\/a><\/sup> <sup><a href=\"#cite_ref-HHSSummaryHIPAA_1-5\">1.05<\/a><\/sup> <sup><a href=\"#cite_ref-HHSSummaryHIPAA_1-6\">1.06<\/a><\/sup> <sup><a href=\"#cite_ref-HHSSummaryHIPAA_1-7\">1.07<\/a><\/sup> <sup><a href=\"#cite_ref-HHSSummaryHIPAA_1-8\">1.08<\/a><\/sup> <sup><a href=\"#cite_ref-HHSSummaryHIPAA_1-9\">1.09<\/a><\/sup> <sup><a href=\"#cite_ref-HHSSummaryHIPAA_1-10\">1.10<\/a><\/sup> <sup><a href=\"#cite_ref-HHSSummaryHIPAA_1-11\">1.11<\/a><\/sup> <sup><a href=\"#cite_ref-HHSSummaryHIPAA_1-12\">1.12<\/a><\/sup> <sup><a href=\"#cite_ref-HHSSummaryHIPAA_1-13\">1.13<\/a><\/sup> <sup><a href=\"#cite_ref-HHSSummaryHIPAA_1-14\">1.14<\/a><\/sup> <sup><a href=\"#cite_ref-HHSSummaryHIPAA_1-15\">1.15<\/a><\/sup> <sup><a href=\"#cite_ref-HHSSummaryHIPAA_1-16\">1.16<\/a><\/sup> <sup><a href=\"#cite_ref-HHSSummaryHIPAA_1-17\">1.17<\/a><\/sup> <sup><a href=\"#cite_ref-HHSSummaryHIPAA_1-18\">1.18<\/a><\/sup> <sup><a href=\"#cite_ref-HHSSummaryHIPAA_1-19\">1.19<\/a><\/sup> <sup><a href=\"#cite_ref-HHSSummaryHIPAA_1-20\">1.20<\/a><\/sup> <sup><a href=\"#cite_ref-HHSSummaryHIPAA_1-21\">1.21<\/a><\/sup> <sup><a href=\"#cite_ref-HHSSummaryHIPAA_1-22\">1.22<\/a><\/sup> <sup><a href=\"#cite_ref-HHSSummaryHIPAA_1-23\">1.23<\/a><\/sup><\/span> <span class=\"reference-text\"><span class=\"citation web\">Office for Civil Rights (26 July 2013). <a rel=\"external_link\" class=\"external text\" href=\"https:\/\/www.hhs.gov\/hipaa\/for-professionals\/privacy\/laws-regulations\/index.html\" target=\"_blank\">\"Summary of the HIPAA Privacy Rule\"<\/a>. United States Department of Health and Human Services<span class=\"printonly\">. <a rel=\"external_link\" class=\"external free\" href=\"https:\/\/www.hhs.gov\/hipaa\/for-professionals\/privacy\/laws-regulations\/index.html\" target=\"_blank\">https:\/\/www.hhs.gov\/hipaa\/for-professionals\/privacy\/laws-regulations\/index.html<\/a><\/span><span class=\"reference-accessdate\">. Retrieved 09 February 2022<\/span>.<\/span><span class=\"Z3988\" title=\"ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=bookitem&rft.btitle=Summary+of+the+HIPAA+Privacy+Rule&rft.atitle=&rft.aulast=Office+for+Civil+Rights&rft.au=Office+for+Civil+Rights&rft.date=26+July+2013&rft.pub=United+States+Department+of+Health+and+Human+Services&rft_id=https%3A%2F%2Fwww.hhs.gov%2Fhipaa%2Ffor-professionals%2Fprivacy%2Flaws-regulations%2Findex.html&rfr_id=info:sid\/en.wikipedia.org:Book:HIPAA_Compliance:_An_Introduction\/Use_and_disclosure\"><span style=\"display: none;\"> <\/span><\/span>\n<\/span>\n<\/li>\n<li id=\"cite_note-45CFR164-2\"><span class=\"mw-cite-backlink\">\u2191 <sup><a href=\"#cite_ref-45CFR164_2-0\">2.0<\/a><\/sup> <sup><a href=\"#cite_ref-45CFR164_2-1\">2.1<\/a><\/sup> <sup><a href=\"#cite_ref-45CFR164_2-2\">2.2<\/a><\/sup> <sup><a href=\"#cite_ref-45CFR164_2-3\">2.3<\/a><\/sup> <sup><a href=\"#cite_ref-45CFR164_2-4\">2.4<\/a><\/sup> <sup><a href=\"#cite_ref-45CFR164_2-5\">2.5<\/a><\/sup><\/span> <span class=\"reference-text\"><span class=\"citation web\"><a rel=\"external_link\" class=\"external text\" href=\"https:\/\/www.ecfr.gov\/current\/title-45\/subtitle-A\/subchapter-C\/part-164\/subpart-E\/section-164.514\" target=\"_blank\">\"Code of Federal Regulations, Title 45, Subtitle A, Subchapter C, Part 164, Subpart E, 164.514\"<\/a>. U.S. Government Publishing Office<span class=\"printonly\">. <a rel=\"external_link\" class=\"external free\" href=\"https:\/\/www.ecfr.gov\/current\/title-45\/subtitle-A\/subchapter-C\/part-164\/subpart-E\/section-164.514\" target=\"_blank\">https:\/\/www.ecfr.gov\/current\/title-45\/subtitle-A\/subchapter-C\/part-164\/subpart-E\/section-164.514<\/a><\/span><span class=\"reference-accessdate\">. Retrieved 09 February 2022<\/span>.<\/span><span class=\"Z3988\" title=\"ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=bookitem&rft.btitle=Code+of+Federal+Regulations%2C+Title+45%2C+Subtitle+A%2C+Subchapter+C%2C+Part+164%2C+Subpart+E%2C+164.514&rft.atitle=&rft.pub=U.S.+Government+Publishing+Office&rft_id=https%3A%2F%2Fwww.ecfr.gov%2Fcurrent%2Ftitle-45%2Fsubtitle-A%2Fsubchapter-C%2Fpart-164%2Fsubpart-E%2Fsection-164.514&rfr_id=info:sid\/en.wikipedia.org:Book:HIPAA_Compliance:_An_Introduction\/Use_and_disclosure\"><span style=\"display: none;\"> <\/span><\/span>\n<\/span>\n<\/li>\n<li id=\"cite_note-HHSPersRep-3\"><span class=\"mw-cite-backlink\">\u2191 <sup><a href=\"#cite_ref-HHSPersRep_3-0\">3.0<\/a><\/sup> <sup><a href=\"#cite_ref-HHSPersRep_3-1\">3.1<\/a><\/sup> <sup><a href=\"#cite_ref-HHSPersRep_3-2\">3.2<\/a><\/sup> <sup><a href=\"#cite_ref-HHSPersRep_3-3\">3.3<\/a><\/sup><\/span> <span class=\"reference-text\"><span class=\"citation web\">Office for Civil Rights (19 September 2013). <a rel=\"external_link\" class=\"external text\" href=\"https:\/\/www.hhs.gov\/hipaa\/for-professionals\/privacy\/guidance\/personal-representatives\/index.html\" target=\"_blank\">\"Personal Representatives\"<\/a>. U.S. Department of Health & Human Services<span class=\"printonly\">. <a rel=\"external_link\" class=\"external free\" href=\"https:\/\/www.hhs.gov\/hipaa\/for-professionals\/privacy\/guidance\/personal-representatives\/index.html\" target=\"_blank\">https:\/\/www.hhs.gov\/hipaa\/for-professionals\/privacy\/guidance\/personal-representatives\/index.html<\/a><\/span><span class=\"reference-accessdate\">. Retrieved 10 February 2022<\/span>.<\/span><span class=\"Z3988\" title=\"ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=bookitem&rft.btitle=Personal+Representatives&rft.atitle=&rft.aulast=Office+for+Civil+Rights&rft.au=Office+for+Civil+Rights&rft.date=19+September+2013&rft.pub=U.S.+Department+of+Health+%26+Human+Services&rft_id=https%3A%2F%2Fwww.hhs.gov%2Fhipaa%2Ffor-professionals%2Fprivacy%2Fguidance%2Fpersonal-representatives%2Findex.html&rfr_id=info:sid\/en.wikipedia.org:Book:HIPAA_Compliance:_An_Introduction\/Use_and_disclosure\"><span style=\"display: none;\"> <\/span><\/span>\n<\/span>\n<\/li>\n<\/ol><\/div><\/div>\n<p><br \/>\n<\/p>\n<h2><span class=\"mw-headline\" id=\"Citation_for_this_section\">Citation for this section<\/span><\/h2>\n<p><b>Title<\/b>: <i>HIPAA Compliance: An Introduction<\/i> - Use and disclosure\n<\/p><p><b>Author for citation<\/b>: Alan Vaughan, with editorial modifications by Shawn Douglas\n<\/p><p><b>License for content<\/b>: <a rel=\"external_link\" class=\"external text\" href=\"https:\/\/creativecommons.org\/licenses\/by-sa\/4.0\/\" target=\"_blank\">Creative Commons Attribution-ShareAlike 4.0 International<\/a>\n<\/p><p><b>Publication date<\/b>: Originally published June 2016; compiled and lightly edited February 2022\n<\/p>\n<!-- \nNewPP limit report\nCached time: 20220210234255\nCache expiry: 86400\nDynamic content: false\nComplications: []\nCPU time usage: 0.173 seconds\nReal time usage: 0.363 seconds\nPreprocessor visited node count: 2169\/1000000\nPost\u2010expand include size: 54819\/2097152 bytes\nTemplate argument size: 6562\/2097152 bytes\nHighest expansion depth: 18\/40\nExpensive parser function count: 0\/100\nUnstrip recursion depth: 0\/20\nUnstrip post\u2010expand size: 10348\/5000000 bytes\n-->\n<!--\nTransclusion expansion time report (%,ms,calls,template)\n100.00% 160.713 1 -total\n 71.63% 115.112 1 Template:HIPAA_Compliance:_An_Introduction\/Use_and_disclosure\n 48.81% 78.436 1 Template:Flowlist\n 28.31% 45.492 1 Template:Reflist\n 22.38% 35.961 3 Template:Cite_web\n 18.98% 30.499 3 Template:Citation\/core\n 5.34% 8.575 2 Template:Date\n 2.07% 3.320 3 Template:Citation\/make_link\n-->\n\n<!-- Saved in parser cache with key limswiki:pcache:idhash:13004-0!canonical and timestamp 20220210234303 and revision id 46319. Serialized with JSON.\n -->\n<\/div><\/div><div class=\"printfooter\">Source: <a rel=\"external_link\" class=\"external\" href=\"https:\/\/www.limswiki.org\/index.php\/Book:HIPAA_Compliance:_An_Introduction\/Use_and_disclosure\">https:\/\/www.limswiki.org\/index.php\/Book:HIPAA_Compliance:_An_Introduction\/Use_and_disclosure<\/a><\/div>\n<!-- end content --><div class=\"visualClear\"><\/div><\/div><\/div><div class=\"visualClear\"><\/div><\/div><!-- end of the left (by default at least) column --><div class=\"visualClear\"><\/div><\/div>\n\n\n\n<\/body>","5a2165db90474508ac92e2e7cce548ff_images":["https:\/\/upload.wikimedia.org\/wikipedia\/commons\/0\/09\/Department_of_Health_%26_Human_Services_-_Sarah_Stierch.jpg","https:\/\/upload.wikimedia.org\/wikipedia\/commons\/d\/d2\/Paramedic_dispatch.jpg","https:\/\/upload.wikimedia.org\/wikipedia\/commons\/8\/85\/Privacy.jpg","https:\/\/upload.wikimedia.org\/wikipedia\/commons\/2\/20\/A_doctor_interact_with_a_boy_with_an_injured_foot_in_a_wheelchair.jpg"],"5a2165db90474508ac92e2e7cce548ff_timestamp":1644537385,"6a96a2659c89aa3d9cf170daa6d9814d_type":"article","6a96a2659c89aa3d9cf170daa6d9814d_title":"4. Protected health information","6a96a2659c89aa3d9cf170daa6d9814d_url":"https:\/\/www.limswiki.org\/index.php\/Book:HIPAA_Compliance:_An_Introduction\/Protected_health_information","6a96a2659c89aa3d9cf170daa6d9814d_plaintext":"\n\nBook:HIPAA Compliance: An Introduction\/Protected health informationFrom LIMSWikiJump to navigationJump to searchContents \n\n1 Protected health information \n\n1.1 De-identified PHI \n1.2 Privacy Rule: General principle for use and disclosure \n\n\n2 References \n3 Citation for this section \n\n\n\nProtected health information \nAt the center of all of HIPAA and HITECH is a single term and its definition: protected health information or PHI. This is the information that can be linked to a patient and has been identified by the U.S. government as being private to a patient. As such, PH is protected by both the Privacy Rule and Security Rule of HIPAA, as well as HITECH (for electronic PHI). These protections exist so that unauthorized sharing is prevented or at least minimized, and access is controlled, with significant sanctions and measures available to be applied in the even of breaches.\nThe HHS and the Privacy Rule define PHI in the following way[1]:\n\nThe Privacy Rule protects all \"individually identifiable health information\" held or transmitted by a covered entity or its business associate, in any form or media, whether electronic, paper, or oral. The Privacy Rule calls this information \"protected health information (PHI).\"\n\u201cIndividually identifiable health information\u201d is information, including demographic data, that relates to:\n\n\u25aa the individual\u2019s past, present or future physical or mental health or condition,\n\u25aa the provision of health care to the individual, or\n\u25aa the past, present, or future payment for the provision of health care to the individual,\nand that identifies the individual or for which there is a reasonable basis to believe it can be used to identify the individual.\nAccording to the Privacy Rule, PHI does not include employment records that a covered entity maintains in its capacity as an employer, and education and certain other records subject to, or defined in, the Family Educational Rights and Privacy Act, 20 U.S.C. \u00a71232g.[1]\nHIPAA lists 18 identifiers that qualify as PHI, and as such they must be kept secure and private in the ways that are set down in HIPAA and HITECH. These identifiers are[2]:\n\nnames\nall geographical subdivisions smaller than a state, including street address, city, county, precinct, zip code, and their equivalent geocodes, except for the initial three digits of a zip code, if according to the current publicly available data from the Bureau of the Census: (1) The geographic unit formed by combining all zip codes with the same three initial digits contains more than 20,000 people; and (2) The initial three digits of a zip code for all such geographic units containing 20,000 or fewer people is changed to 000\nall elements of dates (except year) for dates directly related to an individual, including birth date, admission date, discharge date, date of death; and all ages over 89 and all elements of dates (including year) indicative of such age, except that such ages and elements may be aggregated into a single category of age 90 or older\nphone numbers\nfax numbers\nelectronic mail (email) addresses\nSocial Security numbers\nmedical record numbers (MRNs)\nhealth plan beneficiary numbers\naccount numbers\ncertificate\/license numbers\nvehicle identifiers and serial numbers, including license plate numbers\ndevice identifiers and serial numbers\nweb addresses or Uniform Resource Locators (URLs)\nInternet Protocol (IP) address numbers\nbiometric identifiers, including finger and voice prints\nfull face photographic images and any comparable images\nany other unique identifying number, characteristic, or code (note this does not mean the unique code assigned by the investigator to code the data)\nThere are also additional standards and criteria to protect individual's privacy from re-identification. Any code used to replace the identifiers in data sets cannot be derived from any information related to the individual and the master codes, nor can the method to derive the codes be disclosed. For example, a subject's initials cannot be used to code their data because the initials are derived from their name. Additionally, the researcher must not have actual knowledge that the research subject could be re-identified from the remaining identifiers in the PHI used in the research study. In other words, the information would still be considered identifiable if there were a way to identify the individual even though all of the 18 identifiers were removed.[1]\n\nDe-identified PHI \nThe government recognizes that there are instances where there is a need to use and\/or transmit PHI. Since the key here is whether it can be used to identify the individual, HIPAA provides for two approved \"de-identification\" methods.\nThe first is the \u201cSafe Harbor\u201d approach, which permits a covered entity to consider data to be de-identified if it removes the 18 types of identifiers and has no actual knowledge that the remaining information could be used to identify an individual either alone or in combination with other information.[3] \nThe second method is the \"Statistical\" approach, which allows disclosure of PHI in any form provided that a qualified statistical or scientific expert concludes, through the use of accepted analytic techniques, that the risk the information could be used alone or in combination with other reasonably available information to identify the subject is very small (statistically insignificant).[3]\n\nPrivacy Rule: General principle for use and disclosure \nIn general, to help in deciding when to disclose or not, it is useful to keep the Privacy Rule's purpose in mind: to define and limit the circumstances in which an individual\u2019s protected heath information may be used or disclosed by covered entities. \nA covered entity may not use or disclose protected health information, except either:\n\nas the Privacy Rule permits or requires; or\nas the individual who is the subject of the information (or the individual\u2019s personal representative) authorizes in writing.\nSimilarly, there are only two cases where a covered entity is actually required to disclose PHI[1]:\n\nwhen the individual to whom the PHI applies (or authorized representative) requests it in writing; or\nwhen the HHS is undertaking a compliance investigation, review or enforcement action and requests it.\nReferences \n\n\n\u2191 1.0 1.1 1.2 1.3 Office for Civil Rights (26 July 2013). \"Summary of the HIPAA Privacy Rule\". United States Department of Health and Human Services. https:\/\/www.hhs.gov\/hipaa\/for-professionals\/privacy\/laws-regulations\/index.html . Retrieved 09 February 2022 .   \n \n\n\u2191 \"Code of Federal Regulations, Title 45, Subtitle A, Subchapter C, Part 164, Subpart E, 164.514\". U.S. Government Publishing Office. https:\/\/www.ecfr.gov\/current\/title-45\/subtitle-A\/subchapter-C\/part-164\/subpart-E\/section-164.514 . Retrieved 09 February 2022 .   \n \n\n\u2191 3.0 3.1 Office of Civil Rights (28 March 2017). \"Workshop on the HIPAA Privacy Rule's De-Identification Standard\". U.S. Department of Health & Human Services. https:\/\/www.hhs.gov\/hipaa\/for-professionals\/privacy\/special-topics\/de-identification\/2010-de-identification-workshop\/index.html . Retrieved 09 February 2022 .   \n \n\n\n\r\n\n\nCitation for this section \nTitle: HIPAA Compliance: An Introduction - Protected health information\nAuthor for citation: Alan Vaughan, with editorial modifications by Shawn Douglas\nLicense for content: Creative Commons Attribution-ShareAlike 4.0 International\nPublication date: Originally published June 2016; compiled and lightly edited February 2022\n\n\n\n\n\nSource: <a rel=\"external_link\" class=\"external\" href=\"https:\/\/www.limswiki.org\/index.php\/Book:HIPAA_Compliance:_An_Introduction\/Protected_health_information\">https:\/\/www.limswiki.org\/index.php\/Book:HIPAA_Compliance:_An_Introduction\/Protected_health_information<\/a>\nNavigation menuPage actionsBookDiscussionView sourceHistoryPage actionsBookDiscussionMoreToolsIn other languagesPersonal toolsLog inRequest accountNavigationMain pageRecent changesRandom pageHelp about MediaWikiSearch\u00a0 ToolsWhat links hereRelated changesSpecial pagesPermanent linkPage informationSponsors \r\n\n\t\r\n\n\t\r\n\n\t\r\n\n\t\r\n\n\t\n\t\n\t\r\n\n\t\r\n\n\t\n\t\r\n\n\t\r\n\n \n\t\n\t\n\t\r\n\n\t\r\n\n \n\t\n\t\r\n\n\t\r\n\n\t\n\t\n\t\r\n\n\t\n\t\n\t\r\n\n\t\r\n\n\t\n\t\n\t\r\n\n\t\r\n\n\t\r\n\n\t\r\nPrint\/exportCreate a bookDownload as PDFDownload as PDFDownload as Plain textPrintable version This page was last edited on 10 February 2022, at 23:41.Content is available under a Creative Commons Attribution-ShareAlike 4.0 International License unless otherwise noted.This page has been accessed 3 times.Privacy policyAbout LIMSWikiDisclaimers\n\n\n\n","6a96a2659c89aa3d9cf170daa6d9814d_html":"<body class=\"mediawiki ltr sitedir-ltr mw-hide-empty-elt ns-208 ns-subject page-Book_HIPAA_Compliance_An_Introduction_Protected_health_information rootpage-Book_HIPAA_Compliance_An_Introduction_Protected_health_information skin-monobook action-view skin--responsive\"><div id=\"rdp-ebb-globalWrapper\"><div id=\"rdp-ebb-column-content\"><div id=\"rdp-ebb-content\" class=\"mw-body\" role=\"main\"><a id=\"rdp-ebb-top\"><\/a>\n<h1 id=\"rdp-ebb-firstHeading\" class=\"firstHeading\" lang=\"en\">Book:HIPAA Compliance: An Introduction\/Protected health information<\/h1><div id=\"rdp-ebb-bodyContent\" class=\"mw-body-content\"><!-- start content --><div id=\"rdp-ebb-mw-content-text\" lang=\"en\" dir=\"ltr\" class=\"mw-content-ltr\"><div class=\"mw-parser-output\">\n\n<h2><span class=\"mw-headline\" id=\"Protected_health_information\">Protected health information<\/span><\/h2>\n<div class=\"floatright\"><a href=\"https:\/\/www.limswiki.org\/index.php\/File:Locked_Desktop_Computer_Cartoon.svg\" class=\"image wiki-link\" data-key=\"18d921b71daa635a5409e2915cfe5e6d\"><img alt=\"Locked Desktop Computer Cartoon.svg\" src=\"https:\/\/upload.wikimedia.org\/wikipedia\/commons\/thumb\/9\/9d\/Locked_Desktop_Computer_Cartoon.svg\/300px-Locked_Desktop_Computer_Cartoon.svg.png\" decoding=\"async\" width=\"300\" height=\"194\" \/><\/a><\/div><p>At the center of all of HIPAA and HITECH is a single term and its definition: protected health information or PHI. This is the information that can be linked to a patient and has been identified by the U.S. government as being private to a patient. As such, PH is protected by both the Privacy Rule and Security Rule of HIPAA, as well as HITECH (for electronic PHI). These protections exist so that unauthorized sharing is prevented or at least minimized, and access is controlled, with significant sanctions and measures available to be applied in the even of breaches.\n<\/p><p>The HHS and the Privacy Rule define PHI in the following way<sup id=\"rdp-ebb-cite_ref-HHSSummaryHIPAA_1-0\" class=\"reference\"><a href=\"#cite_note-HHSSummaryHIPAA-1\">[1]<\/a><\/sup>:\n<\/p>\n<blockquote><p>The Privacy Rule protects all \"individually identifiable health information\" held or transmitted by a covered entity or its business associate, in any form or media, whether electronic, paper, or oral. The Privacy Rule calls this information \"protected health information (PHI).\"\n<\/p><p>\u201cIndividually identifiable health information\u201d is information, including demographic data, that relates to:\n<\/p>\n<dl><dd>\u25aa the individual\u2019s past, present or future physical or mental health or condition,<\/dd>\n<dd>\u25aa the provision of health care to the individual, or<\/dd>\n<dd>\u25aa the past, present, or future payment for the provision of health care to the individual,<\/dd><\/dl><p>\nand that identifies the individual or for which there is a reasonable basis to believe it can be used to identify the individual.<\/p><\/blockquote>\n<p>According to the Privacy Rule, PHI does not include employment records that a covered entity maintains in its capacity as an employer, and education and certain other records subject to, or defined in, the Family Educational Rights and Privacy Act, 20 U.S.C. \u00a71232g.<sup id=\"rdp-ebb-cite_ref-HHSSummaryHIPAA_1-1\" class=\"reference\"><a href=\"#cite_note-HHSSummaryHIPAA-1\">[1]<\/a><\/sup>\n<\/p><p>HIPAA lists 18 identifiers that qualify as PHI, and as such they must be kept secure and private in the ways that are set down in HIPAA and HITECH. These identifiers are<sup id=\"rdp-ebb-cite_ref-45CFR164_2-0\" class=\"reference\"><a href=\"#cite_note-45CFR164-2\">[2]<\/a><\/sup>:\n<\/p>\n<ol><li>names<\/li>\n<li>all geographical subdivisions smaller than a state, including street address, city, county, precinct, zip code, and their equivalent geocodes, except for the initial three digits of a zip code, if according to the current publicly available data from the Bureau of the Census: (1) The geographic unit formed by combining all zip codes with the same three initial digits contains more than 20,000 people; and (2) The initial three digits of a zip code for all such geographic units containing 20,000 or fewer people is changed to 000<\/li>\n<li>all elements of dates (except year) for dates directly related to an individual, including birth date, admission date, discharge date, date of death; and all ages over 89 and all elements of dates (including year) indicative of such age, except that such ages and elements may be aggregated into a single category of age 90 or older<\/li>\n<li>phone numbers<\/li>\n<li>fax numbers<\/li>\n<li>electronic mail (email) addresses<\/li>\n<li>Social Security numbers<\/li>\n<li>medical record numbers (MRNs)<\/li>\n<li>health plan beneficiary numbers<\/li>\n<li>account numbers<\/li>\n<li>certificate\/license numbers<\/li>\n<li>vehicle identifiers and serial numbers, including license plate numbers<\/li>\n<li>device identifiers and serial numbers<\/li>\n<li>web addresses or Uniform Resource Locators (URLs)<\/li>\n<li>Internet Protocol (IP) address numbers<\/li>\n<li>biometric identifiers, including finger and voice prints<\/li>\n<li>full face photographic images and any comparable images<\/li>\n<li>any other unique identifying number, characteristic, or code (note this does not mean the unique code assigned by the investigator to code the data)<\/li><\/ol>\n<p>There are also additional standards and criteria to protect individual's privacy from re-identification. Any code used to replace the identifiers in data sets cannot be derived from any information related to the individual and the master codes, nor can the method to derive the codes be disclosed. For example, a subject's initials cannot be used to code their data because the initials are derived from their name. Additionally, the researcher must not have actual knowledge that the research subject could be re-identified from the remaining identifiers in the PHI used in the research study. In other words, the information would still be considered identifiable if there were a way to identify the individual even though all of the 18 identifiers were removed.<sup id=\"rdp-ebb-cite_ref-HHSSummaryHIPAA_1-2\" class=\"reference\"><a href=\"#cite_note-HHSSummaryHIPAA-1\">[1]<\/a><\/sup>\n<\/p>\n<h3><span class=\"mw-headline\" id=\"De-identified_PHI\">De-identified PHI<\/span><\/h3>\n<p>The government recognizes that there are instances where there is a need to use and\/or transmit PHI. Since the key here is whether it can be used to identify the individual, HIPAA provides for two approved \"de-identification\" methods.\n<\/p><p>The first is the \u201cSafe Harbor\u201d approach, which permits a covered entity to consider data to be de-identified if it removes the 18 types of identifiers and has no actual knowledge that the remaining information could be used to identify an individual either alone or in combination with other information.<sup id=\"rdp-ebb-cite_ref-De-ID_3-0\" class=\"reference\"><a href=\"#cite_note-De-ID-3\">[3]<\/a><\/sup> \n<\/p><p>The second method is the \"Statistical\" approach, which allows disclosure of PHI in any form provided that a qualified statistical or scientific expert concludes, through the use of accepted analytic techniques, that the risk the information could be used alone or in combination with other reasonably available information to identify the subject is very small (statistically insignificant).<sup id=\"rdp-ebb-cite_ref-De-ID_3-1\" class=\"reference\"><a href=\"#cite_note-De-ID-3\">[3]<\/a><\/sup>\n<\/p>\n<h3><span class=\"mw-headline\" id=\"Privacy_Rule:_General_principle_for_use_and_disclosure\">Privacy Rule: General principle for use and disclosure<\/span><\/h3>\n<p>In general, to help in deciding when to disclose or not, it is useful to keep the Privacy Rule's purpose in mind: to define and limit the circumstances in which an individual\u2019s protected heath information may be used or disclosed by covered entities. \n<\/p><p>A covered entity may not use or disclose protected health information, except either:\n<\/p>\n<ol><li>as the Privacy Rule permits or requires; or<\/li>\n<li>as the individual who is the subject of the information (or the individual\u2019s personal representative) authorizes in writing.<\/li><\/ol>\n<p>Similarly, there are only two cases where a covered entity is actually required to disclose PHI<sup id=\"rdp-ebb-cite_ref-HHSSummaryHIPAA_1-3\" class=\"reference\"><a href=\"#cite_note-HHSSummaryHIPAA-1\">[1]<\/a><\/sup>:\n<\/p>\n<ol><li>when the individual to whom the PHI applies (or authorized representative) requests it in writing; or<\/li>\n<li>when the HHS is undertaking a compliance investigation, review or enforcement action and requests it.<\/li><\/ol>\n<h2><span class=\"mw-headline\" id=\"References\">References<\/span><\/h2>\n<div class=\"reflist\" style=\"list-style-type: decimal;\">\n<div class=\"mw-references-wrap\"><ol class=\"references\">\n<li id=\"cite_note-HHSSummaryHIPAA-1\"><span class=\"mw-cite-backlink\">\u2191 <sup><a href=\"#cite_ref-HHSSummaryHIPAA_1-0\">1.0<\/a><\/sup> <sup><a href=\"#cite_ref-HHSSummaryHIPAA_1-1\">1.1<\/a><\/sup> <sup><a href=\"#cite_ref-HHSSummaryHIPAA_1-2\">1.2<\/a><\/sup> <sup><a href=\"#cite_ref-HHSSummaryHIPAA_1-3\">1.3<\/a><\/sup><\/span> <span class=\"reference-text\"><span class=\"citation web\">Office for Civil Rights (26 July 2013). <a rel=\"external_link\" class=\"external text\" href=\"https:\/\/www.hhs.gov\/hipaa\/for-professionals\/privacy\/laws-regulations\/index.html\" target=\"_blank\">\"Summary of the HIPAA Privacy Rule\"<\/a>. United States Department of Health and Human Services<span class=\"printonly\">. <a rel=\"external_link\" class=\"external free\" href=\"https:\/\/www.hhs.gov\/hipaa\/for-professionals\/privacy\/laws-regulations\/index.html\" target=\"_blank\">https:\/\/www.hhs.gov\/hipaa\/for-professionals\/privacy\/laws-regulations\/index.html<\/a><\/span><span class=\"reference-accessdate\">. Retrieved 09 February 2022<\/span>.<\/span><span class=\"Z3988\" title=\"ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=bookitem&rft.btitle=Summary+of+the+HIPAA+Privacy+Rule&rft.atitle=&rft.aulast=Office+for+Civil+Rights&rft.au=Office+for+Civil+Rights&rft.date=26+July+2013&rft.pub=United+States+Department+of+Health+and+Human+Services&rft_id=https%3A%2F%2Fwww.hhs.gov%2Fhipaa%2Ffor-professionals%2Fprivacy%2Flaws-regulations%2Findex.html&rfr_id=info:sid\/en.wikipedia.org:Book:HIPAA_Compliance:_An_Introduction\/Protected_health_information\"><span style=\"display: none;\"> <\/span><\/span>\n<\/span>\n<\/li>\n<li id=\"cite_note-45CFR164-2\"><span class=\"mw-cite-backlink\"><a href=\"#cite_ref-45CFR164_2-0\">\u2191<\/a><\/span> <span class=\"reference-text\"><span class=\"citation web\"><a rel=\"external_link\" class=\"external text\" href=\"https:\/\/www.ecfr.gov\/current\/title-45\/subtitle-A\/subchapter-C\/part-164\/subpart-E\/section-164.514\" target=\"_blank\">\"Code of Federal Regulations, Title 45, Subtitle A, Subchapter C, Part 164, Subpart E, 164.514\"<\/a>. U.S. Government Publishing Office<span class=\"printonly\">. <a rel=\"external_link\" class=\"external free\" href=\"https:\/\/www.ecfr.gov\/current\/title-45\/subtitle-A\/subchapter-C\/part-164\/subpart-E\/section-164.514\" target=\"_blank\">https:\/\/www.ecfr.gov\/current\/title-45\/subtitle-A\/subchapter-C\/part-164\/subpart-E\/section-164.514<\/a><\/span><span class=\"reference-accessdate\">. Retrieved 09 February 2022<\/span>.<\/span><span class=\"Z3988\" title=\"ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=bookitem&rft.btitle=Code+of+Federal+Regulations%2C+Title+45%2C+Subtitle+A%2C+Subchapter+C%2C+Part+164%2C+Subpart+E%2C+164.514&rft.atitle=&rft.pub=U.S.+Government+Publishing+Office&rft_id=https%3A%2F%2Fwww.ecfr.gov%2Fcurrent%2Ftitle-45%2Fsubtitle-A%2Fsubchapter-C%2Fpart-164%2Fsubpart-E%2Fsection-164.514&rfr_id=info:sid\/en.wikipedia.org:Book:HIPAA_Compliance:_An_Introduction\/Protected_health_information\"><span style=\"display: none;\"> <\/span><\/span>\n<\/span>\n<\/li>\n<li id=\"cite_note-De-ID-3\"><span class=\"mw-cite-backlink\">\u2191 <sup><a href=\"#cite_ref-De-ID_3-0\">3.0<\/a><\/sup> <sup><a href=\"#cite_ref-De-ID_3-1\">3.1<\/a><\/sup><\/span> <span class=\"reference-text\"><span class=\"citation web\">Office of Civil Rights (28 March 2017). <a rel=\"external_link\" class=\"external text\" href=\"https:\/\/www.hhs.gov\/hipaa\/for-professionals\/privacy\/special-topics\/de-identification\/2010-de-identification-workshop\/index.html\" target=\"_blank\">\"Workshop on the HIPAA Privacy Rule's De-Identification Standard\"<\/a>. U.S. Department of Health & Human Services<span class=\"printonly\">. <a rel=\"external_link\" class=\"external free\" href=\"https:\/\/www.hhs.gov\/hipaa\/for-professionals\/privacy\/special-topics\/de-identification\/2010-de-identification-workshop\/index.html\" target=\"_blank\">https:\/\/www.hhs.gov\/hipaa\/for-professionals\/privacy\/special-topics\/de-identification\/2010-de-identification-workshop\/index.html<\/a><\/span><span class=\"reference-accessdate\">. Retrieved 09 February 2022<\/span>.<\/span><span class=\"Z3988\" title=\"ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=bookitem&rft.btitle=Workshop+on+the+HIPAA+Privacy+Rule%27s+De-Identification+Standard&rft.atitle=&rft.aulast=Office+of+Civil+Rights&rft.au=Office+of+Civil+Rights&rft.date=28+March+2017&rft.pub=U.S.+Department+of+Health+%26+Human+Services&rft_id=https%3A%2F%2Fwww.hhs.gov%2Fhipaa%2Ffor-professionals%2Fprivacy%2Fspecial-topics%2Fde-identification%2F2010-de-identification-workshop%2Findex.html&rfr_id=info:sid\/en.wikipedia.org:Book:HIPAA_Compliance:_An_Introduction\/Protected_health_information\"><span style=\"display: none;\"> <\/span><\/span>\n<\/span>\n<\/li>\n<\/ol><\/div><\/div>\n<p><br \/>\n<\/p>\n<h2><span class=\"mw-headline\" id=\"Citation_for_this_section\">Citation for this section<\/span><\/h2>\n<p><b>Title<\/b>: <i>HIPAA Compliance: An Introduction<\/i> - Protected health information\n<\/p><p><b>Author for citation<\/b>: Alan Vaughan, with editorial modifications by Shawn Douglas\n<\/p><p><b>License for content<\/b>: <a rel=\"external_link\" class=\"external text\" href=\"https:\/\/creativecommons.org\/licenses\/by-sa\/4.0\/\" target=\"_blank\">Creative Commons Attribution-ShareAlike 4.0 International<\/a>\n<\/p><p><b>Publication date<\/b>: Originally published June 2016; compiled and lightly edited February 2022\n<\/p>\n<!-- \nNewPP limit report\nCached time: 20220210234155\nCache expiry: 86400\nDynamic content: false\nComplications: []\nCPU time usage: 0.117 seconds\nReal time usage: 0.261 seconds\nPreprocessor visited node count: 2028\/1000000\nPost\u2010expand include size: 21169\/2097152 bytes\nTemplate argument size: 6173\/2097152 bytes\nHighest expansion depth: 18\/40\nExpensive parser function count: 0\/100\nUnstrip recursion depth: 0\/20\nUnstrip post\u2010expand size: 5540\/5000000 bytes\n-->\n<!--\nTransclusion expansion time report (%,ms,calls,template)\n100.00% 66.237 1 -total\n 62.59% 41.459 1 Template:Reflist\n 51.86% 34.351 3 Template:Cite_web\n 44.95% 29.774 3 Template:Citation\/core\n 37.29% 24.697 1 Template:HIPAA_Compliance:_An_Introduction\/Protected_health_information\n 12.35% 8.181 2 Template:Date\n 5.41% 3.582 3 Template:Citation\/make_link\n-->\n\n<!-- Saved in parser cache with key limswiki:pcache:idhash:13003-0!canonical and timestamp 20220210234156 and revision id 46318. Serialized with JSON.\n -->\n<\/div><\/div><div class=\"printfooter\">Source: <a rel=\"external_link\" class=\"external\" href=\"https:\/\/www.limswiki.org\/index.php\/Book:HIPAA_Compliance:_An_Introduction\/Protected_health_information\">https:\/\/www.limswiki.org\/index.php\/Book:HIPAA_Compliance:_An_Introduction\/Protected_health_information<\/a><\/div>\n<!-- end content --><div class=\"visualClear\"><\/div><\/div><\/div><div class=\"visualClear\"><\/div><\/div><!-- end of the left (by default at least) column --><div class=\"visualClear\"><\/div><\/div>\n\n\n\n<\/body>","6a96a2659c89aa3d9cf170daa6d9814d_images":["https:\/\/upload.wikimedia.org\/wikipedia\/commons\/thumb\/9\/9d\/Locked_Desktop_Computer_Cartoon.svg\/600px-Locked_Desktop_Computer_Cartoon.svg.png"],"6a96a2659c89aa3d9cf170daa6d9814d_timestamp":1644537384,"3ff14d6b62ae91be8d421f4af0c8c798_type":"article","3ff14d6b62ae91be8d421f4af0c8c798_title":"3. Who needs to comply?","3ff14d6b62ae91be8d421f4af0c8c798_url":"https:\/\/www.limswiki.org\/index.php\/Book:HIPAA_Compliance:_An_Introduction\/Who_needs_to_comply%3F","3ff14d6b62ae91be8d421f4af0c8c798_plaintext":"\n\nBook:HIPAA Compliance: An Introduction\/Who needs to comply?From LIMSWikiJump to navigationJump to searchContents \n\n1 Who needs to comply? \n\n1.1 Healthcare providers \n1.2 Business associates \n\n1.2.1 Business associate agreement (BAA) \n1.2.2 Exceptions to BAA requirement \n\n\n1.3 Others (plans, etc.) \n\n1.3.1 Health plans \n1.3.2 Healthcare clearinghouses \n\n\n\n\n2 References \n3 Citation for this section \n\n\n\n Who needs to comply? \nHIPAA compliance is highly important in the healthcare arena. Non-compliance can result in fines and other serious consequences. But who is actually bound by this law? HIPAA is comprised of two main segments: the Privacy Rule and the Security Rule. Those who must comply are called \"covered entities.\" According to the HHS, these include:\n\n\u25aa health plans;\n\u25aa healthcare clearinghouses; and\n\u25aa any healthcare provider who transmits health information in electronic form in connection with a transaction for which the Secretary of HHS has adopted standards under HIPAA.\nCovered entities include doctors, clinics, hospitals, dentists, nursing homes and pharmacies that transmit data electronically, as well as health plans, insurance plans and healthcare clearinghouses.[1]\n\nHealthcare providers \nEvery healthcare provider (regardless of size) who electronically transmits health information in connection with certain transactions is a covered entity. These transactions include[1]:\n\nclaims\nbenefit eligibility inquiries\nreferral authorization requests\nother transactions for which HHS has established standards under the HIPAA Transactions Rule\nIt's important to note that using electronic technology (e.g., email) does not mean a healthcare provider is a covered entity. The transmission must be in connection with a \"standard transaction.\" \nTransactions are electronic exchanges involving the transfer of information between two parties for specific purposes. For example, a healthcare provider will send a claim to a health plan to request payment for medical services.[2]\nIn the HIPAA regulations, the Secretary of Health and Human Services adopted certain standard transactions for electronic data interchange (EDI) of healthcare data. These transactions include[2]: \n\nclaims and encounter information\npayment and remittance advice\nclaims status\neligibility, enrollment and disenrollment\nreferrals and authorizations\ncoordination of benefits and premium payment\nThe standard does not encompass telephone voice response and fax-back systems.[3]\nThe Privacy Rule covers a healthcare provider whether it electronically transmits these transactions directly or uses a billing service or other third party to do so on its behalf. Healthcare providers include all \u201cproviders of services\u201d (e.g., institutional providers such as hospitals) and \u201cproviders of medical or health services\u201d (e.g., non-institutional providers such as physicians, dentists and other practitioners) as defined by Medicare, and any other person or organization that furnishes, bills, or is paid for healthcare.[1]\n\nBusiness associates \nHealthcare providers don't always do everything that involves patient information themselves. There are very often other entities contracted for a variety of services. As a result of the Health Information Technology for Economic and Clinical Health Act (HITECH) that was passed in 2009, HIPAA has also been expanded to include business associates. Business associates are those persons or organizations that function on behalf of a covered entity, such as a doctor, and who either use or receive identifiable health information.[4]\nAccording to 45 CFR 160 Part 103, business associate functions or activities on behalf of a covered entity include[5]:\n\nclaims processing\ndata analysis\nutilization review\nbilling\nlegal services\nactuarial services\naccounting\nconsulting\ndata aggregation\nmanagement\nadministrative services\naccreditation\nfinancial services\nA business associate is also anyone\u2014not just those in the workforce of the covered entity\u2014who performs any activities for a covered entity that are covered by HIPAA. Consider that an \"...and all other related\" kind of clause. Subcontractors of business associates who fit these criteria are also subject to HIPAA.[5]\nHowever, persons or organizations are not considered business associates if their functions or services do not involve the use or disclosure of protected health information, and where any access to protected health information by such persons would be incidental, if at all. A covered entity can also be the business associate of another covered entity.[1]\nHere are some examples of business associates, as described by the HHS[6] :\n\nthird party administrator who assists a health plan with claims processing\nCPA firm whose accounting services to a healthcare provider involve access to protected health information\nattorney whose legal services to a health plan involve access to protected health information\nconsultant who performs utilization reviews for a hospital\nhealthcare clearinghouse that translates a claim from a non-standard format into a standard transaction on behalf of a healthcare provider and forwards the processed transaction to a payer\nindependent medical transcriptionist who provides transcription services to a physician\npharmacy benefits manager who manages a health plan\u2019s pharmacist network\n Business associate agreement (BAA) \nAccording to the HHS, \"A covered entity\u2019s contract or other written arrangement with its business associate must contain the elements specified at 45 CFR 164.504(e).\" Provisions need to[6]: \n\ndescribe the permitted and required uses of protected health information by the business associate;\nprovide that the business associate will not use or further disclose the protected health information (PHI) other than as permitted or required by the contract or as required by law; and\nrequire the business associate to use appropriate safeguards to prevent a use or disclosure of the protected health information other than as provided for by the contract.\nWhere a covered entity (the party who has contracted the BA) knows of a material breach or violation by the business associate of the contract or agreement, the covered entity is required to take reasonable steps to cure the breach or end the violation, and if such steps are unsuccessful, to terminate the contract or arrangement. If termination of the contract or agreement is not feasible, a covered entity is required to report the problem to the OCR. \nHHS provides a useful sample BAA on its website for reference.\n\nExceptions to BAA requirement \nThere are exceptions to the requirement for a covered entity to have a BAA with a business associate before protected health information may be disclosed to the person or entity. Per 45 CFR 164.502(e), the Privacy Rule includes the following exceptions to the business associate standard[6]: \n\ndisclosures by a covered entity to a healthcare provider for treatment of the individual. For example:\nA hospital is not required to have a business associate contract with the specialist to whom it refers a patient and transmits the patient\u2019s medical chart for treatment purposes.\nA physician is not required to have a business associate contract with a laboratory as a condition of disclosing protected health information for the treatment of an individual.\nA hospital laboratory is not required to have a business associate contract to disclose protected health information to a reference laboratory for treatment of the individual.\ndisclosures to a health plan sponsor, such as an employer, by a group health plan, or by the health insurance issuer or health maintenance organization (HMO) that provides the health insurance benefits or coverage for the group health plan, provided that the group health plan\u2019s documents have been amended to limit the disclosures or one of the exceptions at 45 CFR 164.504(f) have been met.\nthe collection and sharing of protected health information by a health plan that is a public benefits program, such as Medicare, and an agency other than the agency administering the health plan, such as the Social Security Administration, that collects protected health information to determine eligibility or enrollment, or determines eligibility or enrollment, for the government program, where the joint activities are authorized by law.\nOther situations in which a business associate contract is NOT required\nSome additional scenarios where a BAA is not necessary include[6]:\n\nwhen a healthcare provider discloses protected health information to a health plan for payment purposes, or when the healthcare provider simply accepts a discounted rate to participate in the health plan\u2019s network. A provider that submits a claim to a health plan and a health plan that assesses and pays the claim are each acting on its own behalf as a covered entity, and not as the \u201cbusiness associate\u201d of the other.\nwith persons or organizations (e.g., janitorial service or electrician) whose functions or services do not involve the use or disclosure of protected health information, and where any access to protected health information by such persons would be incidental, if at all.\nwhere a person or organization acts merely as a conduit for protected health information, for example the U.S. Postal Service, certain private couriers and their electronic equivalents.\ncovered entities who participate in an organized healthcare arrangement (OHCA) to make disclosures that relate to the joint healthcare activities of the OHCA.\nwhen a group health plan purchases insurance from a health insurance issuer or HMO. The relationship between the group health plan and the health insurance issuer or HMO is defined by the Privacy Rule as an OHCA, with respect to the individuals they jointly serve or have served. Thus, these covered entities are permitted to share protected health information that relates to the joint healthcare activities of the OHCA.\nwhere one covered entity purchases a health plan product or other insurance, for example, reinsurance, from an insurer. Each entity is acting on its own behalf when the covered entity purchases the insurance benefits, and when the covered entity submits a claim to the insurer and the insurer pays the claim.\nthe disclosure of protected health information to a researcher for research purposes, either with patient authorization, pursuant to a waiver under 45 CFR 164.512(i), or as a limited data set pursuant to 45 CFR 164.514(e). Because the researcher is not conducting a function or activity regulated by the Administrative Simplification Rules, such as payment or healthcare operations, or providing one of the services listed in the definition of \u201cbusiness associate\u201d at 45 CFR 160.103, the researcher is not a business associate of the covered entity, and no business associate agreement is required.\nwhen a financial institution processes consumer-conducted financial transactions by debit, credit, or other payment card, clears checks, initiates or processes electronic funds transfers, or conducts any other activity that directly facilitates or effects the transfer of funds for payment for healthcare or health plan premiums. When it conducts these activities, the financial institution is providing its normal banking or other financial transaction services to its customers; it is not performing a function or activity for, or on behalf of, the covered entity.\n Others (plans, etc.) \nThe other categories of \"covered entities\" who are subject to the requirements of HIPAA include health plans and healthcare clearinghouses.\n\nHealth plans \nWhether individual or group, health plans that provide or pay the cost of healthcare, dental care, vision care, and prescription drug costs are covered entities under HIPAA. This includes HMOs; Medicare, Medicaid, Medicare+Choice and Medicare supplement insurers; and long-term care insurers (excluding nursing home fixed-indemnity policies).\nCovered entity health plans can be employer-sponsored group health plans, government- and church-sponsored health plans or multi-employer health plans.[1]\nHealth plan exceptions\nThe exceptions where certain health plans do not constitute covered entities include[1]:\n\n\ngroup health plans with less than 50 participants, administered solely by the employer that established and maintains the plan.\ntwo types of government-funded programs:\nthose whose principal purpose is not providing or paying the cost of healthcare, such as the food stamps program (SNAP).\nthose programs whose principal activity is directly providing healthcare, such as a community health center, or the making of grants to fund the direct provision of healthcare.\ncertain types of insurance entities, particularly those who only provide:\nworkers\u2019 compensation.\nautomobile insurance.\nproperty and casualty insurance.\n\nHowever, if an insurance entity has more than one line of business, one of which may be identified separately as a health plan, then HIPAA regulations do apply to the health plan line of business.\n\nHealthcare clearinghouses \nHealth care clearinghouses are entities that process nonstandard information they receive from another entity into a standard (i.e., standard format or data content), or vice versa.\nIn most instances, healthcare clearinghouses will receive individually-identifiable health information only when they are providing these processing services to a health plan or healthcare provider as a Business Associate. In those cases, only certain provisions of the Privacy Rule are applicable to uses and disclosures of protected health information.[1]\nHealthcare clearinghouses include[1]:\n\nbilling services\nrepricing companies\ncommunity health management information systems\nvalue-added networks and switches (if they perform clearinghouse functions)\nReferences \n\n\n\u2191 1.0 1.1 1.2 1.3 1.4 1.5 1.6 1.7 Office for Civil Rights (26 July 2013). \"Summary of the HIPAA Privacy Rule\". United States Department of Health and Human Services. https:\/\/www.hhs.gov\/hipaa\/for-professionals\/privacy\/laws-regulations\/index.html . Retrieved 09 February 2022 .   \n \n\n\u2191 2.0 2.1 \"Adopted Standards and Operating Rules\". U.S. Centers for Medicare and Medicaid Services. 1 December 2021. https:\/\/www.cms.gov\/Regulations-and-Guidance\/Administrative-Simplification\/HIPAA-ACA\/AdoptedStandardsandOperatingRules . Retrieved 09 February 2022 .   \n \n\n\u2191 \"What Are HIPAA Transaction and Code Sets Standards?\". Texas Medical Association. 29 October 2019. https:\/\/www.texmed.org\/Template.aspx?id=1599 . Retrieved 09 February 2022 .   \n \n\n\u2191 Centers for Medicare & Medicaid Services. \"Patient Privacy: A Guide for Providers\". Medscape. Archived from the original on 04 October 2017. https:\/\/web.archive.org\/web\/20171004095823\/http:\/\/www.medscape.org\/viewarticle\/781892_2 . Retrieved 09 February 2022 .   \n \n\n\u2191 5.0 5.1 \"Code of Federal Regulations Title 45, Subtitle A, Subchapter C, Part 160, Subpart A, 160.103\". US Government Publishing Office. https:\/\/www.ecfr.gov\/current\/title-45\/subtitle-A\/subchapter-C\/part-160\/subpart-A\/section-160.103 . Retrieved 09 February 2022 .   \n \n\n\u2191 6.0 6.1 6.2 6.3 Office of Civil Rights (24 May 2019). \"Business Associates\". U.S. Department of Health & Human Services. https:\/\/www.hhs.gov\/hipaa\/for-professionals\/privacy\/guidance\/business-associates\/index.html . Retrieved 09 February 2022 .   \n \n\n\n\r\n\n\nCitation for this section \nTitle: HIPAA Compliance: An Introduction - Who needs to comply?\nAuthor for citation: Alan Vaughan, with editorial modifications by Shawn Douglas\nLicense for content: Creative Commons Attribution-ShareAlike 4.0 International\nPublication date: Originally published June 2016; compiled and lightly edited February 2022\n\n\n\n\n\nSource: <a rel=\"external_link\" class=\"external\" href=\"https:\/\/www.limswiki.org\/index.php\/Book:HIPAA_Compliance:_An_Introduction\/Who_needs_to_comply%3F\">https:\/\/www.limswiki.org\/index.php\/Book:HIPAA_Compliance:_An_Introduction\/Who_needs_to_comply%3F<\/a>\nNavigation menuPage actionsBookDiscussionView sourceHistoryPage actionsBookDiscussionMoreToolsIn other languagesPersonal toolsLog inRequest accountNavigationMain pageRecent changesRandom pageHelp about MediaWikiSearch\u00a0 ToolsWhat links hereRelated changesSpecial pagesPermanent linkPage informationSponsors \r\n\n\t\r\n\n\t\r\n\n\t\r\n\n\t\r\n\n\t\n\t\n\t\r\n\n\t\r\n\n\t\n\t\r\n\n\t\r\n\n \n\t\n\t\n\t\r\n\n\t\r\n\n \n\t\n\t\r\n\n\t\r\n\n\t\n\t\n\t\r\n\n\t\n\t\n\t\r\n\n\t\r\n\n\t\n\t\n\t\r\n\n\t\r\n\n\t\r\n\n\t\r\nPrint\/exportCreate a bookDownload as PDFDownload as PDFDownload as Plain textPrintable version This page was last edited on 10 February 2022, at 23:40.Content is available under a Creative Commons Attribution-ShareAlike 4.0 International License unless otherwise noted.This page has been accessed 2 times.Privacy policyAbout LIMSWikiDisclaimers\n\n\n\n","3ff14d6b62ae91be8d421f4af0c8c798_html":"<body class=\"mediawiki ltr sitedir-ltr mw-hide-empty-elt ns-208 ns-subject page-Book_HIPAA_Compliance_An_Introduction_Who_needs_to_comply rootpage-Book_HIPAA_Compliance_An_Introduction_Who_needs_to_comply skin-monobook action-view skin--responsive\"><div id=\"rdp-ebb-globalWrapper\"><div id=\"rdp-ebb-column-content\"><div id=\"rdp-ebb-content\" class=\"mw-body\" role=\"main\"><a id=\"rdp-ebb-top\"><\/a>\n<h1 id=\"rdp-ebb-firstHeading\" class=\"firstHeading\" lang=\"en\">Book:HIPAA Compliance: An Introduction\/Who needs to comply?<\/h1><div id=\"rdp-ebb-bodyContent\" class=\"mw-body-content\"><!-- start content --><div id=\"rdp-ebb-mw-content-text\" lang=\"en\" dir=\"ltr\" class=\"mw-content-ltr\"><div class=\"mw-parser-output\">\n\n<h2><span id=\"rdp-ebb-Who_needs_to_comply?\"><\/span><span class=\"mw-headline\" id=\"Who_needs_to_comply.3F\">Who needs to comply?<\/span><\/h2>\n<p>HIPAA compliance is highly important in the healthcare arena. Non-compliance can result in fines and other serious consequences. But who is actually bound by this law? HIPAA is comprised of two main segments: the Privacy Rule and the Security Rule. Those who must comply are called \"covered entities.\" According to the HHS, these include:\n<\/p>\n<dl><dd>\u25aa health plans;<\/dd>\n<dd>\u25aa healthcare clearinghouses; and<\/dd>\n<dd>\u25aa any healthcare provider who transmits health information in electronic form in connection with a transaction for which the Secretary of HHS has adopted standards under HIPAA.<\/dd><\/dl>\n<p>Covered entities include doctors, clinics, <a href=\"https:\/\/www.limswiki.org\/index.php\/Hospital\" title=\"Hospital\" class=\"wiki-link\" data-key=\"b8f070c66d8123fe91063594befebdff\">hospitals<\/a>, dentists, nursing homes and pharmacies that transmit data electronically, as well as health plans, insurance plans and healthcare clearinghouses.<sup id=\"rdp-ebb-cite_ref-HHSSummaryHIPAA_1-0\" class=\"reference\"><a href=\"#cite_note-HHSSummaryHIPAA-1\">[1]<\/a><\/sup>\n<\/p>\n<h3><span class=\"mw-headline\" id=\"Healthcare_providers\">Healthcare providers<\/span><\/h3>\n<p>Every healthcare provider (regardless of size) who electronically transmits health <a href=\"https:\/\/www.limswiki.org\/index.php\/Information\" title=\"Information\" class=\"wiki-link\" data-key=\"6300a14d9c2776dcca0999b5ed940e7d\">information<\/a> in connection with certain transactions is a covered entity. These transactions include<sup id=\"rdp-ebb-cite_ref-HHSSummaryHIPAA_1-1\" class=\"reference\"><a href=\"#cite_note-HHSSummaryHIPAA-1\">[1]<\/a><\/sup>:\n<\/p>\n<ul><li>claims<\/li>\n<li>benefit eligibility inquiries<\/li>\n<li>referral authorization requests<\/li>\n<li>other transactions for which HHS has established standards under the HIPAA Transactions Rule<\/li><\/ul>\n<p>It's important to note that using electronic technology (e.g., email) does not mean a healthcare provider is a covered entity. The transmission must be in connection with a \"standard transaction.\" \n<\/p><p>Transactions are electronic exchanges involving the transfer of information between two parties for specific purposes. For example, a healthcare provider will send a claim to a health plan to request payment for medical services.<sup id=\"rdp-ebb-cite_ref-StandardTrans_2-0\" class=\"reference\"><a href=\"#cite_note-StandardTrans-2\">[2]<\/a><\/sup>\n<\/p><p>In the HIPAA regulations, the Secretary of Health and Human Services adopted certain standard transactions for <a href=\"https:\/\/www.limswiki.org\/index.php\/Electronic_data_interchange\" title=\"Electronic data interchange\" class=\"wiki-link\" data-key=\"1e47a7470dc769193f808a2dbcb133b7\">electronic data interchange<\/a> (EDI) of healthcare data. These transactions include<sup id=\"rdp-ebb-cite_ref-StandardTrans_2-1\" class=\"reference\"><a href=\"#cite_note-StandardTrans-2\">[2]<\/a><\/sup>: \n<\/p>\n<ul><li>claims and encounter information<\/li>\n<li>payment and remittance advice<\/li>\n<li>claims status<\/li>\n<li>eligibility, enrollment and disenrollment<\/li>\n<li>referrals and authorizations<\/li>\n<li>coordination of benefits and premium payment<\/li><\/ul>\n<p>The standard does not encompass telephone voice response and fax-back systems.<sup id=\"rdp-ebb-cite_ref-TexMed_3-0\" class=\"reference\"><a href=\"#cite_note-TexMed-3\">[3]<\/a><\/sup>\n<\/p><p>The Privacy Rule covers a healthcare provider whether it electronically transmits these transactions directly or uses a billing service or other third party to do so on its behalf. Healthcare providers include all \u201cproviders of services\u201d (e.g., institutional providers such as hospitals) and \u201cproviders of medical or health services\u201d (e.g., non-institutional providers such as physicians, dentists and other practitioners) as defined by Medicare, and any other person or organization that furnishes, bills, or is paid for healthcare.<sup id=\"rdp-ebb-cite_ref-HHSSummaryHIPAA_1-2\" class=\"reference\"><a href=\"#cite_note-HHSSummaryHIPAA-1\">[1]<\/a><\/sup>\n<\/p>\n<h3><span class=\"mw-headline\" id=\"Business_associates\">Business associates<\/span><\/h3>\n<div class=\"floatright\"><a href=\"https:\/\/www.limswiki.org\/index.php\/File:Corporate_Woman_Shaking_Hands_With_a_Corporate_Man.svg\" class=\"image wiki-link\" data-key=\"7a523b5af0e4bce59d2bef8d3a6f9b4f\"><img alt=\"Corporate Woman Shaking Hands With a Corporate Man.svg\" src=\"https:\/\/upload.wikimedia.org\/wikipedia\/commons\/thumb\/c\/c8\/Corporate_Woman_Shaking_Hands_With_a_Corporate_Man.svg\/500px-Corporate_Woman_Shaking_Hands_With_a_Corporate_Man.svg.png\" decoding=\"async\" style=\"width: 100%;max-width: 400px;height: auto;\" \/><\/a><\/div><p>Healthcare providers don't always do everything that involves patient information themselves. There are very often other entities contracted for a variety of services. As a result of the <a href=\"https:\/\/www.limswiki.org\/index.php\/Health_Information_Technology_for_Economic_and_Clinical_Health_Act\" title=\"Health Information Technology for Economic and Clinical Health Act\" class=\"wiki-link\" data-key=\"89c9e20984bbda2e628b6d1d28ec3ad5\">Health Information Technology for Economic and Clinical Health Act<\/a> (HITECH) that was passed in 2009, HIPAA has also been expanded to include business associates. Business associates are those persons or organizations that function on behalf of a covered entity, such as a doctor, and who either use or receive identifiable health information.<sup id=\"rdp-ebb-cite_ref-PrivacyGuide_4-0\" class=\"reference\"><a href=\"#cite_note-PrivacyGuide-4\">[4]<\/a><\/sup>\n<\/p><p>According to 45 CFR 160 Part 103, business associate functions or activities on behalf of a covered entity include<sup id=\"rdp-ebb-cite_ref-45CFR160_5-0\" class=\"reference\"><a href=\"#cite_note-45CFR160-5\">[5]<\/a><\/sup>:\n<\/p>\n<ul><li>claims processing<\/li>\n<li>data analysis<\/li>\n<li>utilization review<\/li>\n<li>billing<\/li>\n<li>legal services<\/li>\n<li>actuarial services<\/li>\n<li>accounting<\/li>\n<li>consulting<\/li>\n<li>data aggregation<\/li>\n<li>management<\/li>\n<li>administrative services<\/li>\n<li>accreditation<\/li>\n<li>financial services<\/li><\/ul>\n<p>A business associate is also anyone\u2014not just those in the workforce of the covered entity\u2014who performs any activities for a covered entity that are covered by HIPAA. Consider that an \"...and all other related\" kind of clause. Subcontractors of business associates who fit these criteria are also subject to HIPAA.<sup id=\"rdp-ebb-cite_ref-45CFR160_5-1\" class=\"reference\"><a href=\"#cite_note-45CFR160-5\">[5]<\/a><\/sup>\n<\/p><p>However, persons or organizations are not considered business associates if their functions or services do not involve the use or disclosure of protected health information, and where any access to protected health information by such persons would be incidental, if at all. A covered entity can also be the business associate of another covered entity.<sup id=\"rdp-ebb-cite_ref-HHSSummaryHIPAA_1-3\" class=\"reference\"><a href=\"#cite_note-HHSSummaryHIPAA-1\">[1]<\/a><\/sup>\n<\/p><p>Here are some examples of business associates, as described by the HHS<sup id=\"rdp-ebb-cite_ref-BusinessAssociates_6-0\" class=\"reference\"><a href=\"#cite_note-BusinessAssociates-6\">[6]<\/a><\/sup> :\n<\/p>\n<ul><li>third party administrator who assists a health plan with claims processing<\/li>\n<li>CPA firm whose accounting services to a healthcare provider involve access to protected health information<\/li>\n<li>attorney whose legal services to a health plan involve access to protected health information<\/li>\n<li>consultant who performs utilization reviews for a hospital<\/li>\n<li>healthcare clearinghouse that translates a claim from a non-standard format into a standard transaction on behalf of a healthcare provider and forwards the processed transaction to a payer<\/li>\n<li>independent medical transcriptionist who provides transcription services to a physician<\/li>\n<li>pharmacy benefits manager who manages a health plan\u2019s pharmacist network<\/li><\/ul>\n<h4><span id=\"rdp-ebb-Business_associate_agreement_(BAA)\"><\/span><span class=\"mw-headline\" id=\"Business_associate_agreement_.28BAA.29\">Business associate agreement (BAA)<\/span><\/h4>\n<p>According to the HHS, \"A covered entity\u2019s contract or other written arrangement with its business associate must contain the elements specified at 45 CFR 164.504(e).\" Provisions need to<sup id=\"rdp-ebb-cite_ref-BusinessAssociates_6-1\" class=\"reference\"><a href=\"#cite_note-BusinessAssociates-6\">[6]<\/a><\/sup>: \n<\/p>\n<ul><li>describe the permitted and required uses of protected health information by the business associate;<\/li>\n<li>provide that the business associate will not use or further disclose the protected health information (PHI) other than as permitted or required by the contract or as required by law; and<\/li>\n<li>require the business associate to use appropriate safeguards to prevent a use or disclosure of the protected health information other than as provided for by the contract.<\/li><\/ul>\n<p>Where a covered entity (the party who has contracted the BA) knows of a material breach or violation by the business associate of the contract or agreement, the covered entity is required to take reasonable steps to cure the breach or end the violation, and if such steps are unsuccessful, to terminate the contract or arrangement. If termination of the contract or agreement is not feasible, a covered entity is required to report the problem to the OCR. \n<\/p><p>HHS provides a useful <a rel=\"external_link\" class=\"external text\" href=\"https:\/\/www.hhs.gov\/hipaa\/for-professionals\/covered-entities\/sample-business-associate-agreement-provisions\/index.html\" target=\"_blank\">sample BAA<\/a> on its website for reference.\n<\/p>\n<h4><span class=\"mw-headline\" id=\"Exceptions_to_BAA_requirement\">Exceptions to BAA requirement<\/span><\/h4>\n<p>There are exceptions to the requirement for a covered entity to have a BAA with a business associate before protected health information may be disclosed to the person or entity. Per 45 CFR 164.502(e), the Privacy Rule includes the following exceptions to the business associate standard<sup id=\"rdp-ebb-cite_ref-BusinessAssociates_6-2\" class=\"reference\"><a href=\"#cite_note-BusinessAssociates-6\">[6]<\/a><\/sup>: \n<\/p>\n<ol><li>disclosures by a covered entity to a healthcare provider for treatment of the individual. For example:\n<ol><li>A hospital is not required to have a business associate contract with the specialist to whom it refers a patient and transmits the patient\u2019s medical chart for treatment purposes.<\/li>\n<li>A physician is not required to have a business associate contract with a <a href=\"https:\/\/www.limswiki.org\/index.php\/Laboratory\" title=\"Laboratory\" class=\"wiki-link\" data-key=\"c57fc5aac9e4abf31dccae81df664c33\">laboratory<\/a> as a condition of disclosing protected health information for the treatment of an individual.<\/li>\n<li>A hospital laboratory is not required to have a business associate contract to disclose protected health information to a reference laboratory for treatment of the individual.<\/li><\/ol><\/li>\n<li>disclosures to a health plan sponsor, such as an employer, by a group health plan, or by the health insurance issuer or health maintenance organization (HMO) that provides the health insurance benefits or coverage for the group health plan, provided that the group health plan\u2019s documents have been amended to limit the disclosures or one of the exceptions at 45 CFR 164.504(f) have been met.<\/li>\n<li>the collection and sharing of protected health information by a health plan that is a public benefits program, such as Medicare, and an agency other than the agency administering the health plan, such as the Social Security Administration, that collects protected health information to determine eligibility or enrollment, or determines eligibility or enrollment, for the government program, where the joint activities are authorized by law.<\/li><\/ol>\n<p><b>Other situations in which a business associate contract is NOT required<\/b>\n<\/p><p>Some additional scenarios where a BAA is not necessary include<sup id=\"rdp-ebb-cite_ref-BusinessAssociates_6-3\" class=\"reference\"><a href=\"#cite_note-BusinessAssociates-6\">[6]<\/a><\/sup>:\n<\/p>\n<ul><li>when a healthcare provider discloses protected health information to a health plan for payment purposes, or when the healthcare provider simply accepts a discounted rate to participate in the health plan\u2019s network. A provider that submits a claim to a health plan and a health plan that assesses and pays the claim are each acting on its own behalf as a covered entity, and not as the \u201cbusiness associate\u201d of the other.<\/li>\n<li>with persons or organizations (e.g., janitorial service or electrician) whose functions or services do not involve the use or disclosure of protected health information, and where any access to protected health information by such persons would be incidental, if at all.<\/li>\n<li>where a person or organization acts merely as a conduit for protected health information, for example the U.S. Postal Service, certain private couriers and their electronic equivalents.<\/li>\n<li>covered entities who participate in an organized healthcare arrangement (OHCA) to make disclosures that relate to the joint healthcare activities of the OHCA.<\/li>\n<li>when a group health plan purchases insurance from a health insurance issuer or HMO. The relationship between the group health plan and the health insurance issuer or HMO is defined by the Privacy Rule as an OHCA, with respect to the individuals they jointly serve or have served. Thus, these covered entities are permitted to share protected health information that relates to the joint healthcare activities of the OHCA.<\/li>\n<li>where one covered entity purchases a health plan product or other insurance, for example, reinsurance, from an insurer. Each entity is acting on its own behalf when the covered entity purchases the insurance benefits, and when the covered entity submits a claim to the insurer and the insurer pays the claim.<\/li>\n<li>the disclosure of protected health information to a researcher for research purposes, either with patient authorization, pursuant to a waiver under 45 CFR 164.512(i), or as a limited data set pursuant to 45 CFR 164.514(e). Because the researcher is not conducting a function or activity regulated by the Administrative Simplification Rules, such as payment or healthcare operations, or providing one of the services listed in the definition of \u201cbusiness associate\u201d at 45 CFR 160.103, the researcher is not a business associate of the covered entity, and no business associate agreement is required.<\/li>\n<li>when a financial institution processes consumer-conducted financial transactions by debit, credit, or other payment card, clears checks, initiates or processes electronic funds transfers, or conducts any other activity that directly facilitates or effects the transfer of funds for payment for healthcare or health plan premiums. When it conducts these activities, the financial institution is providing its normal banking or other financial transaction services to its customers; it is not performing a function or activity for, or on behalf of, the covered entity.<\/li><\/ul>\n<h3><span id=\"rdp-ebb-Others_(plans,_etc.)\"><\/span><span class=\"mw-headline\" id=\"Others_.28plans.2C_etc..29\">Others (plans, etc.)<\/span><\/h3>\n<p>The other categories of \"covered entities\" who are subject to the requirements of HIPAA include health plans and healthcare clearinghouses.\n<\/p>\n<h4><span class=\"mw-headline\" id=\"Health_plans\">Health plans<\/span><\/h4>\n<div class=\"floatleft\"><a href=\"https:\/\/www.limswiki.org\/index.php\/File:001feknerLeichtINSURANCE.jpg\" class=\"image wiki-link\" data-key=\"f4356d0b6a84cff8cf4e15bcb711797c\"><img alt=\"001feknerLeichtINSURANCE.jpg\" src=\"https:\/\/upload.wikimedia.org\/wikipedia\/commons\/6\/6b\/001feknerLeichtINSURANCE.jpg\" decoding=\"async\" width=\"220\" height=\"288\" \/><\/a><\/div><p>Whether individual or group, health plans that provide or pay the cost of healthcare, dental care, vision care, and prescription drug costs are covered entities under HIPAA. This includes HMOs; Medicare, Medicaid, Medicare+Choice and Medicare supplement insurers; and long-term care insurers (excluding nursing home fixed-indemnity policies).\n<\/p><p>Covered entity health plans can be employer-sponsored group health plans, government- and church-sponsored health plans or multi-employer health plans.<sup id=\"rdp-ebb-cite_ref-HHSSummaryHIPAA_1-4\" class=\"reference\"><a href=\"#cite_note-HHSSummaryHIPAA-1\">[1]<\/a><\/sup>\n<\/p><p><b>Health plan exceptions<\/b>\n<\/p><p>The exceptions where certain health plans do not constitute covered entities include<sup id=\"rdp-ebb-cite_ref-HHSSummaryHIPAA_1-5\" class=\"reference\"><a href=\"#cite_note-HHSSummaryHIPAA-1\">[1]<\/a><\/sup>:\n<\/p>\n<div class=\"flowlist\">\n<ol><li>group health plans with less than 50 participants, administered solely by the employer that established and maintains the plan.<\/li>\n<li>two types of government-funded programs:\n<ol><li>those whose principal purpose is not providing or paying the cost of healthcare, such as the food stamps program (SNAP).<\/li>\n<li>those programs whose principal activity is directly providing healthcare, such as a community health center, or the making of grants to fund the direct provision of healthcare.<\/li><\/ol><\/li>\n<li>certain types of insurance entities, particularly those who only provide:\n<ol><li>workers\u2019 compensation.<\/li>\n<li>automobile insurance.<\/li>\n<li>property and casualty insurance.<\/li><\/ol><\/li><\/ol>\n<\/div>\n<p>However, if an insurance entity has more than one line of business, one of which may be identified separately as a health plan, then HIPAA regulations do apply to the health plan line of business.\n<\/p>\n<h4><span class=\"mw-headline\" id=\"Healthcare_clearinghouses\">Healthcare clearinghouses<\/span><\/h4>\n<p>Health care clearinghouses are entities that process nonstandard information they receive from another entity into a standard (i.e., standard format or data content), or vice versa.\n<\/p><p>In most instances, healthcare clearinghouses will receive individually-identifiable health information only when they are providing these processing services to a health plan or healthcare provider as a <a href=\"#Business_Associate\">Business Associate<\/a>. In those cases, only certain provisions of the Privacy Rule are applicable to uses and disclosures of protected health information.<sup id=\"rdp-ebb-cite_ref-HHSSummaryHIPAA_1-6\" class=\"reference\"><a href=\"#cite_note-HHSSummaryHIPAA-1\">[1]<\/a><\/sup>\n<\/p><p>Healthcare clearinghouses include<sup id=\"rdp-ebb-cite_ref-HHSSummaryHIPAA_1-7\" class=\"reference\"><a href=\"#cite_note-HHSSummaryHIPAA-1\">[1]<\/a><\/sup>:\n<\/p>\n<ul><li>billing services<\/li>\n<li>repricing companies<\/li>\n<li>community health management information systems<\/li>\n<li>value-added networks and switches (if they perform clearinghouse functions)<\/li><\/ul>\n<h2><span class=\"mw-headline\" id=\"References\">References<\/span><\/h2>\n<div class=\"reflist\" style=\"list-style-type: decimal;\">\n<div class=\"mw-references-wrap\"><ol class=\"references\">\n<li id=\"cite_note-HHSSummaryHIPAA-1\"><span class=\"mw-cite-backlink\">\u2191 <sup><a href=\"#cite_ref-HHSSummaryHIPAA_1-0\">1.0<\/a><\/sup> <sup><a href=\"#cite_ref-HHSSummaryHIPAA_1-1\">1.1<\/a><\/sup> <sup><a href=\"#cite_ref-HHSSummaryHIPAA_1-2\">1.2<\/a><\/sup> <sup><a href=\"#cite_ref-HHSSummaryHIPAA_1-3\">1.3<\/a><\/sup> <sup><a href=\"#cite_ref-HHSSummaryHIPAA_1-4\">1.4<\/a><\/sup> <sup><a href=\"#cite_ref-HHSSummaryHIPAA_1-5\">1.5<\/a><\/sup> <sup><a href=\"#cite_ref-HHSSummaryHIPAA_1-6\">1.6<\/a><\/sup> <sup><a href=\"#cite_ref-HHSSummaryHIPAA_1-7\">1.7<\/a><\/sup><\/span> <span class=\"reference-text\"><span class=\"citation web\">Office for Civil Rights (26 July 2013). <a rel=\"external_link\" class=\"external text\" href=\"https:\/\/www.hhs.gov\/hipaa\/for-professionals\/privacy\/laws-regulations\/index.html\" target=\"_blank\">\"Summary of the HIPAA Privacy Rule\"<\/a>. United States Department of Health and Human Services<span class=\"printonly\">. <a rel=\"external_link\" class=\"external free\" href=\"https:\/\/www.hhs.gov\/hipaa\/for-professionals\/privacy\/laws-regulations\/index.html\" target=\"_blank\">https:\/\/www.hhs.gov\/hipaa\/for-professionals\/privacy\/laws-regulations\/index.html<\/a><\/span><span class=\"reference-accessdate\">. Retrieved 09 February 2022<\/span>.<\/span><span class=\"Z3988\" title=\"ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=bookitem&rft.btitle=Summary+of+the+HIPAA+Privacy+Rule&rft.atitle=&rft.aulast=Office+for+Civil+Rights&rft.au=Office+for+Civil+Rights&rft.date=26+July+2013&rft.pub=United+States+Department+of+Health+and+Human+Services&rft_id=https%3A%2F%2Fwww.hhs.gov%2Fhipaa%2Ffor-professionals%2Fprivacy%2Flaws-regulations%2Findex.html&rfr_id=info:sid\/en.wikipedia.org:Book:HIPAA_Compliance:_An_Introduction\/Who_needs_to_comply%3F\"><span style=\"display: none;\"> <\/span><\/span>\n<\/span>\n<\/li>\n<li id=\"cite_note-StandardTrans-2\"><span class=\"mw-cite-backlink\">\u2191 <sup><a href=\"#cite_ref-StandardTrans_2-0\">2.0<\/a><\/sup> <sup><a href=\"#cite_ref-StandardTrans_2-1\">2.1<\/a><\/sup><\/span> <span class=\"reference-text\"><span class=\"citation web\"><a rel=\"external_link\" class=\"external text\" href=\"https:\/\/www.cms.gov\/Regulations-and-Guidance\/Administrative-Simplification\/HIPAA-ACA\/AdoptedStandardsandOperatingRules\" target=\"_blank\">\"Adopted Standards and Operating Rules\"<\/a>. U.S. Centers for Medicare and Medicaid Services. 1 December 2021<span class=\"printonly\">. <a rel=\"external_link\" class=\"external free\" href=\"https:\/\/www.cms.gov\/Regulations-and-Guidance\/Administrative-Simplification\/HIPAA-ACA\/AdoptedStandardsandOperatingRules\" target=\"_blank\">https:\/\/www.cms.gov\/Regulations-and-Guidance\/Administrative-Simplification\/HIPAA-ACA\/AdoptedStandardsandOperatingRules<\/a><\/span><span class=\"reference-accessdate\">. Retrieved 09 February 2022<\/span>.<\/span><span class=\"Z3988\" title=\"ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=bookitem&rft.btitle=Adopted+Standards+and+Operating+Rules&rft.atitle=&rft.date=1+December+2021&rft.pub=U.S.+Centers+for+Medicare+and+Medicaid+Services&rft_id=https%3A%2F%2Fwww.cms.gov%2FRegulations-and-Guidance%2FAdministrative-Simplification%2FHIPAA-ACA%2FAdoptedStandardsandOperatingRules&rfr_id=info:sid\/en.wikipedia.org:Book:HIPAA_Compliance:_An_Introduction\/Who_needs_to_comply%3F\"><span style=\"display: none;\"> <\/span><\/span>\n<\/span>\n<\/li>\n<li id=\"cite_note-TexMed-3\"><span class=\"mw-cite-backlink\"><a href=\"#cite_ref-TexMed_3-0\">\u2191<\/a><\/span> <span class=\"reference-text\"><span class=\"citation web\"><a rel=\"external_link\" class=\"external text\" href=\"https:\/\/www.texmed.org\/Template.aspx?id=1599\" target=\"_blank\">\"What Are HIPAA Transaction and Code Sets Standards?\"<\/a>. Texas Medical Association. 29 October 2019<span class=\"printonly\">. <a rel=\"external_link\" class=\"external free\" href=\"https:\/\/www.texmed.org\/Template.aspx?id=1599\" target=\"_blank\">https:\/\/www.texmed.org\/Template.aspx?id=1599<\/a><\/span><span class=\"reference-accessdate\">. Retrieved 09 February 2022<\/span>.<\/span><span class=\"Z3988\" title=\"ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=bookitem&rft.btitle=What+Are+HIPAA+Transaction+and+Code+Sets+Standards%3F&rft.atitle=&rft.date=29+October+2019&rft.pub=Texas+Medical+Association&rft_id=https%3A%2F%2Fwww.texmed.org%2FTemplate.aspx%3Fid%3D1599&rfr_id=info:sid\/en.wikipedia.org:Book:HIPAA_Compliance:_An_Introduction\/Who_needs_to_comply%3F\"><span style=\"display: none;\"> <\/span><\/span>\n<\/span>\n<\/li>\n<li id=\"cite_note-PrivacyGuide-4\"><span class=\"mw-cite-backlink\"><a href=\"#cite_ref-PrivacyGuide_4-0\">\u2191<\/a><\/span> <span class=\"reference-text\"><span class=\"citation web\">Centers for Medicare & Medicaid Services. <a rel=\"external_link\" class=\"external text\" href=\"https:\/\/web.archive.org\/web\/20171004095823\/http:\/\/www.medscape.org\/viewarticle\/781892_2\" target=\"_blank\">\"Patient Privacy: A Guide for Providers\"<\/a>. <i>Medscape<\/i>. Archived from <a rel=\"external_link\" class=\"external text\" href=\"https:\/\/www.medscape.org\/viewarticle\/781892_2\" target=\"_blank\">the original<\/a> on 04 October 2017<span class=\"printonly\">. <a rel=\"external_link\" class=\"external free\" href=\"https:\/\/web.archive.org\/web\/20171004095823\/http:\/\/www.medscape.org\/viewarticle\/781892_2\" target=\"_blank\">https:\/\/web.archive.org\/web\/20171004095823\/http:\/\/www.medscape.org\/viewarticle\/781892_2<\/a><\/span><span class=\"reference-accessdate\">. Retrieved 09 February 2022<\/span>.<\/span><span class=\"Z3988\" title=\"ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=bookitem&rft.btitle=Patient+Privacy%3A+A+Guide+for+Providers&rft.atitle=Medscape&rft.aulast=Centers+for+Medicare+%26+Medicaid+Services&rft.au=Centers+for+Medicare+%26+Medicaid+Services&rft_id=https%3A%2F%2Fweb.archive.org%2Fweb%2F20171004095823%2Fhttp%3A%2F%2Fwww.medscape.org%2Fviewarticle%2F781892_2&rfr_id=info:sid\/en.wikipedia.org:Book:HIPAA_Compliance:_An_Introduction\/Who_needs_to_comply%3F\"><span style=\"display: none;\"> <\/span><\/span>\n<\/span>\n<\/li>\n<li id=\"cite_note-45CFR160-5\"><span class=\"mw-cite-backlink\">\u2191 <sup><a href=\"#cite_ref-45CFR160_5-0\">5.0<\/a><\/sup> <sup><a href=\"#cite_ref-45CFR160_5-1\">5.1<\/a><\/sup><\/span> <span class=\"reference-text\"><span class=\"citation web\"><a rel=\"external_link\" class=\"external text\" href=\"https:\/\/www.ecfr.gov\/current\/title-45\/subtitle-A\/subchapter-C\/part-160\/subpart-A\/section-160.103\" target=\"_blank\">\"Code of Federal Regulations Title 45, Subtitle A, Subchapter C, Part 160, Subpart A, 160.103\"<\/a>. US Government Publishing Office<span class=\"printonly\">. <a rel=\"external_link\" class=\"external free\" href=\"https:\/\/www.ecfr.gov\/current\/title-45\/subtitle-A\/subchapter-C\/part-160\/subpart-A\/section-160.103\" target=\"_blank\">https:\/\/www.ecfr.gov\/current\/title-45\/subtitle-A\/subchapter-C\/part-160\/subpart-A\/section-160.103<\/a><\/span><span class=\"reference-accessdate\">. Retrieved 09 February 2022<\/span>.<\/span><span class=\"Z3988\" title=\"ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=bookitem&rft.btitle=Code+of+Federal+Regulations+Title+45%2C+Subtitle+A%2C+Subchapter+C%2C+Part+160%2C+Subpart+A%2C+160.103&rft.atitle=&rft.pub=US+Government+Publishing+Office&rft_id=https%3A%2F%2Fwww.ecfr.gov%2Fcurrent%2Ftitle-45%2Fsubtitle-A%2Fsubchapter-C%2Fpart-160%2Fsubpart-A%2Fsection-160.103&rfr_id=info:sid\/en.wikipedia.org:Book:HIPAA_Compliance:_An_Introduction\/Who_needs_to_comply%3F\"><span style=\"display: none;\"> <\/span><\/span>\n<\/span>\n<\/li>\n<li id=\"cite_note-BusinessAssociates-6\"><span class=\"mw-cite-backlink\">\u2191 <sup><a href=\"#cite_ref-BusinessAssociates_6-0\">6.0<\/a><\/sup> <sup><a href=\"#cite_ref-BusinessAssociates_6-1\">6.1<\/a><\/sup> <sup><a href=\"#cite_ref-BusinessAssociates_6-2\">6.2<\/a><\/sup> <sup><a href=\"#cite_ref-BusinessAssociates_6-3\">6.3<\/a><\/sup><\/span> <span class=\"reference-text\"><span class=\"citation web\">Office of Civil Rights (24 May 2019). <a rel=\"external_link\" class=\"external text\" href=\"https:\/\/www.hhs.gov\/hipaa\/for-professionals\/privacy\/guidance\/business-associates\/index.html\" target=\"_blank\">\"Business Associates\"<\/a>. U.S. Department of Health & Human Services<span class=\"printonly\">. <a rel=\"external_link\" class=\"external free\" href=\"https:\/\/www.hhs.gov\/hipaa\/for-professionals\/privacy\/guidance\/business-associates\/index.html\" target=\"_blank\">https:\/\/www.hhs.gov\/hipaa\/for-professionals\/privacy\/guidance\/business-associates\/index.html<\/a><\/span><span class=\"reference-accessdate\">. Retrieved 09 February 2022<\/span>.<\/span><span class=\"Z3988\" title=\"ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=bookitem&rft.btitle=Business+Associates&rft.atitle=&rft.aulast=Office+of+Civil+Rights&rft.au=Office+of+Civil+Rights&rft.date=24+May+2019&rft.pub=U.S.+Department+of+Health+%26+Human+Services&rft_id=https%3A%2F%2Fwww.hhs.gov%2Fhipaa%2Ffor-professionals%2Fprivacy%2Fguidance%2Fbusiness-associates%2Findex.html&rfr_id=info:sid\/en.wikipedia.org:Book:HIPAA_Compliance:_An_Introduction\/Who_needs_to_comply%3F\"><span style=\"display: none;\"> <\/span><\/span>\n<\/span>\n<\/li>\n<\/ol><\/div><\/div>\n<p><br \/>\n<\/p>\n<h2><span class=\"mw-headline\" id=\"Citation_for_this_section\">Citation for this section<\/span><\/h2>\n<p><b>Title<\/b>: <i>HIPAA Compliance: An Introduction<\/i> - Who needs to comply?\n<\/p><p><b>Author for citation<\/b>: Alan Vaughan, with editorial modifications by Shawn Douglas\n<\/p><p><b>License for content<\/b>: <a rel=\"external_link\" class=\"external text\" href=\"https:\/\/creativecommons.org\/licenses\/by-sa\/4.0\/\" target=\"_blank\">Creative Commons Attribution-ShareAlike 4.0 International<\/a>\n<\/p><p><b>Publication date<\/b>: Originally published June 2016; compiled and lightly edited February 2022\n<\/p>\n<!-- \nNewPP limit report\nCached time: 20220210234048\nCache expiry: 86400\nDynamic content: false\nComplications: []\nCPU time usage: 0.182 seconds\nReal time usage: 0.318 seconds\nPreprocessor visited node count: 4083\/1000000\nPost\u2010expand include size: 43180\/2097152 bytes\nTemplate argument size: 12891\/2097152 bytes\nHighest expansion depth: 18\/40\nExpensive parser function count: 0\/100\nUnstrip recursion depth: 0\/20\nUnstrip post\u2010expand size: 11598\/5000000 bytes\n-->\n<!--\nTransclusion expansion time report (%,ms,calls,template)\n100.00% 156.280 1 -total\n 57.30% 89.552 1 Template:HIPAA_Compliance:_An_Introduction\/Who_needs_to_comply?\n 42.63% 66.629 1 Template:Reflist\n 40.72% 63.635 1 Template:Flowlist\n 36.30% 56.728 6 Template:Cite_web\n 32.68% 51.071 6 Template:Citation\/core\n 8.23% 12.862 4 Template:Date\n 2.88% 4.494 8 Template:Citation\/make_link\n-->\n\n<!-- Saved in parser cache with key limswiki:pcache:idhash:13002-0!canonical and timestamp 20220210234049 and revision id 46317. Serialized with JSON.\n -->\n<\/div><\/div><div class=\"printfooter\">Source: <a rel=\"external_link\" class=\"external\" href=\"https:\/\/www.limswiki.org\/index.php\/Book:HIPAA_Compliance:_An_Introduction\/Who_needs_to_comply%3F\">https:\/\/www.limswiki.org\/index.php\/Book:HIPAA_Compliance:_An_Introduction\/Who_needs_to_comply%3F<\/a><\/div>\n<!-- end content --><div class=\"visualClear\"><\/div><\/div><\/div><div class=\"visualClear\"><\/div><\/div><!-- end of the left (by default at least) column --><div class=\"visualClear\"><\/div><\/div>\n\n\n\n<\/body>","3ff14d6b62ae91be8d421f4af0c8c798_images":["https:\/\/upload.wikimedia.org\/wikipedia\/commons\/thumb\/c\/c8\/Corporate_Woman_Shaking_Hands_With_a_Corporate_Man.svg\/1000px-Corporate_Woman_Shaking_Hands_With_a_Corporate_Man.svg.png","https:\/\/upload.wikimedia.org\/wikipedia\/commons\/6\/6b\/001feknerLeichtINSURANCE.jpg"],"3ff14d6b62ae91be8d421f4af0c8c798_timestamp":1644537383,"cecbc5585f3f9ea1201a67341d936093_type":"article","cecbc5585f3f9ea1201a67341d936093_title":"2. What is HIPAA?","cecbc5585f3f9ea1201a67341d936093_url":"https:\/\/www.limswiki.org\/index.php\/Book:HIPAA_Compliance:_An_Introduction\/What_is_HIPAA%3F","cecbc5585f3f9ea1201a67341d936093_plaintext":"\n\nBook:HIPAA Compliance: An Introduction\/What is HIPAA?From LIMSWikiJump to navigationJump to searchContents \n\n1 What is HIPAA? \n\n1.1 Privacy and security \n1.2 Government oversight \n\n\n2 References \n3 Citation for this section \n\n\n\n What is HIPAA? \nThe healthcare industry must comply with both CLIA and HIPAA. CLIA regulatory standards apply to all clinical laboratory testing performed on humans in the United States, except clinical trials and basic research.[1] While important, this guide focuses on HIPAA, which was enacted by the United States Congress and signed into law in 1996.[2]\nWhereas CLIA involves standards in clinical testing, HIPAA is concerned with rigorously and effectively protecting patients\u2019 personal information. It applies to most any entity that handles a patient's personal information, including contractors and other business associates.\n\nPrivacy and security \nThere are two main areas of HIPAA regulations and standards: privacy and security. Both apply to all covered entities and are related, but have slightly different emphases.\n\n\nHIPAA privacy (the Privacy Rule): This concentrates on the patient's right to privacy regarding their personal information and health records, and what covered entities must do to support that. It also includes their right to access those data.\nHIPAA security (the Security Rule): This portion of HIPAA focuses on the requirements for covered entities to protect patient data, including administrative, physical and technical ways and means.\n\nGovernment oversight \nWhen laws are made, the responsibility to make affected parties aware of their obligations and how to meet them\u2014and to monitor, enforce and punish offenders\u2014is often allocated to a particular body. In the case of HIPAA, the HHS is that body. Within the HHS, the Office for Civil Rights (OCR) ensures equal access to certain health and human services and protects the privacy and security of health information. Additionally, the Centers for Disease Control and Prevention (CDC) and other HHS agencies provide additional guidance and materials.\nFurther information about HIPAA and its history, etc. can be found on the LIMSwiki Health Insurance Portability and Accountability Act page.\n\nReferences \n\n\n\u2191 \"Code of Federal Regulations Title 42, Chapter IV, Subchapter G, Part 493\". U.S. Government Publishing Office. https:\/\/www.ecfr.gov\/current\/title-42\/chapter-IV\/subchapter-G\/part-493 . Retrieved 09 February 2022 .   \n \n\n\u2191 \"Public Law 104 - 191 - Health Insurance Portability And Accountability Act of 1996\". GovInfo. U.S. Government Publishing Office. 21 August 1996. https:\/\/www.govinfo.gov\/app\/details\/PLAW-104publ191 . Retrieved 09 February 2022 .   \n \n\n\n\r\n\n\nCitation for this section \nTitle: HIPAA Compliance: An Introduction - What is HIPAA?\nAuthor for citation: Alan Vaughan, with editorial modifications by Shawn Douglas\nLicense for content: Creative Commons Attribution-ShareAlike 4.0 International\nPublication date: Originally published June 2016; compiled and lightly edited February 2022\n\n\n\n\n\nSource: <a rel=\"external_link\" class=\"external\" href=\"https:\/\/www.limswiki.org\/index.php\/Book:HIPAA_Compliance:_An_Introduction\/What_is_HIPAA%3F\">https:\/\/www.limswiki.org\/index.php\/Book:HIPAA_Compliance:_An_Introduction\/What_is_HIPAA%3F<\/a>\nNavigation menuPage actionsBookDiscussionView sourceHistoryPage actionsBookDiscussionMoreToolsIn other languagesPersonal toolsLog inRequest accountNavigationMain pageRecent changesRandom pageHelp about MediaWikiSearch\u00a0 ToolsWhat links hereRelated changesSpecial pagesPermanent linkPage informationSponsors \r\n\n\t\r\n\n\t\r\n\n\t\r\n\n\t\r\n\n\t\n\t\n\t\r\n\n\t\r\n\n\t\n\t\r\n\n\t\r\n\n \n\t\n\t\n\t\r\n\n\t\r\n\n \n\t\n\t\r\n\n\t\r\n\n\t\n\t\n\t\r\n\n\t\n\t\n\t\r\n\n\t\r\n\n\t\n\t\n\t\r\n\n\t\r\n\n\t\r\n\n\t\r\nPrint\/exportCreate a bookDownload as PDFDownload as PDFDownload as Plain textPrintable version This page was last edited on 10 February 2022, at 23:39.Content is available under a Creative Commons Attribution-ShareAlike 4.0 International License unless otherwise noted.This page has been accessed 2 times.Privacy policyAbout LIMSWikiDisclaimers\n\n\n\n","cecbc5585f3f9ea1201a67341d936093_html":"<body class=\"mediawiki ltr sitedir-ltr mw-hide-empty-elt ns-208 ns-subject page-Book_HIPAA_Compliance_An_Introduction_What_is_HIPAA rootpage-Book_HIPAA_Compliance_An_Introduction_What_is_HIPAA skin-monobook action-view skin--responsive\"><div id=\"rdp-ebb-globalWrapper\"><div id=\"rdp-ebb-column-content\"><div id=\"rdp-ebb-content\" class=\"mw-body\" role=\"main\"><a id=\"rdp-ebb-top\"><\/a>\n<h1 id=\"rdp-ebb-firstHeading\" class=\"firstHeading\" lang=\"en\">Book:HIPAA Compliance: An Introduction\/What is HIPAA?<\/h1><div id=\"rdp-ebb-bodyContent\" class=\"mw-body-content\"><!-- start content --><div id=\"rdp-ebb-mw-content-text\" lang=\"en\" dir=\"ltr\" class=\"mw-content-ltr\"><div class=\"mw-parser-output\">\n\n<h2><span id=\"rdp-ebb-What_is_HIPAA?\"><\/span><span class=\"mw-headline\" id=\"What_is_HIPAA.3F\">What is HIPAA?<\/span><\/h2>\n<div class=\"floatleft\"><a href=\"https:\/\/www.limswiki.org\/index.php\/File:HIPAA_Screenshot.png\" class=\"image wiki-link\" data-key=\"f43d76e7dcca207ca031bdff3314d856\"><img alt=\"HIPAA Screenshot.png\" src=\"https:\/\/upload.wikimedia.org\/wikipedia\/commons\/6\/66\/HIPAA_Screenshot.png\" decoding=\"async\" style=\"width: 100%;max-width: 400px;height: auto;\" \/><\/a><\/div><p>The healthcare industry must comply with both CLIA and HIPAA. CLIA regulatory standards apply to all clinical laboratory testing performed on humans in the United States, except clinical trials and basic research.<sup id=\"rdp-ebb-cite_ref-42.5.495_1-0\" class=\"reference\"><a href=\"#cite_note-42.5.495-1\">[1]<\/a><\/sup> While important, this guide focuses on HIPAA, which was enacted by the United States Congress and signed into law in 1996.<sup id=\"rdp-ebb-cite_ref-104-191_2-0\" class=\"reference\"><a href=\"#cite_note-104-191-2\">[2]<\/a><\/sup>\n<\/p><p>Whereas CLIA involves standards in clinical testing, HIPAA is concerned with rigorously and effectively protecting patients\u2019 personal information. It applies to most any entity that handles a patient's personal information, including contractors and other business associates.\n<\/p>\n<h3><span class=\"mw-headline\" id=\"Privacy_and_security\">Privacy and security<\/span><\/h3>\n<p>There are two main areas of HIPAA regulations and standards: privacy and security. Both apply to all covered entities and are related, but have slightly different emphases.\n<\/p>\n<div class=\"flowlist\">\n<ul><li>HIPAA privacy (the Privacy Rule): This concentrates on the patient's right to privacy regarding their personal information and health records, and what covered entities must do to support that. It also includes their right to access those data.<\/li><\/ul>\n<ul><li>HIPAA security (the Security Rule): This portion of HIPAA focuses on the requirements for covered entities to protect patient data, including administrative, physical and technical ways and means.<\/li><\/ul>\n<\/div>\n<h3><span class=\"mw-headline\" id=\"Government_oversight\">Government oversight<\/span><\/h3>\n<p>When laws are made, the responsibility to make affected parties aware of their obligations and how to meet them\u2014and to monitor, enforce and punish offenders\u2014is often allocated to a particular body. In the case of HIPAA, the HHS is that body. Within the HHS, the Office for Civil Rights (OCR) ensures equal access to certain health and human services and protects the privacy and security of health information. Additionally, the <a href=\"https:\/\/www.limswiki.org\/index.php\/Centers_for_Disease_Control_and_Prevention\" title=\"Centers for Disease Control and Prevention\" class=\"wiki-link\" data-key=\"176aa9c9513251c328d864d1e724e814\">Centers for Disease Control and Prevention<\/a> (CDC) and other HHS agencies provide additional guidance and materials.\n<\/p><p>Further information about HIPAA and its history, etc. can be found on the LIMSwiki <a href=\"https:\/\/www.limswiki.org\/index.php\/Health_Insurance_Portability_and_Accountability_Act\" title=\"Health Insurance Portability and Accountability Act\" class=\"wiki-link\" data-key=\"b70673a0117c21576016cb7498867153\">Health Insurance Portability and Accountability Act<\/a> page.\n<\/p>\n<h2><span class=\"mw-headline\" id=\"References\">References<\/span><\/h2>\n<div class=\"reflist\" style=\"list-style-type: decimal;\">\n<div class=\"mw-references-wrap\"><ol class=\"references\">\n<li id=\"cite_note-42.5.495-1\"><span class=\"mw-cite-backlink\"><a href=\"#cite_ref-42.5.495_1-0\">\u2191<\/a><\/span> <span class=\"reference-text\"><span class=\"citation web\"><a rel=\"external_link\" class=\"external text\" href=\"https:\/\/www.ecfr.gov\/current\/title-42\/chapter-IV\/subchapter-G\/part-493\" target=\"_blank\">\"Code of Federal Regulations Title 42, Chapter IV, Subchapter G, Part 493\"<\/a>. U.S. Government Publishing Office<span class=\"printonly\">. <a rel=\"external_link\" class=\"external free\" href=\"https:\/\/www.ecfr.gov\/current\/title-42\/chapter-IV\/subchapter-G\/part-493\" target=\"_blank\">https:\/\/www.ecfr.gov\/current\/title-42\/chapter-IV\/subchapter-G\/part-493<\/a><\/span><span class=\"reference-accessdate\">. Retrieved 09 February 2022<\/span>.<\/span><span class=\"Z3988\" title=\"ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=bookitem&rft.btitle=Code+of+Federal+Regulations+Title+42%2C+Chapter+IV%2C+Subchapter+G%2C+Part+493&rft.atitle=&rft.pub=U.S.+Government+Publishing+Office&rft_id=https%3A%2F%2Fwww.ecfr.gov%2Fcurrent%2Ftitle-42%2Fchapter-IV%2Fsubchapter-G%2Fpart-493&rfr_id=info:sid\/en.wikipedia.org:Book:HIPAA_Compliance:_An_Introduction\/What_is_HIPAA%3F\"><span style=\"display: none;\"> <\/span><\/span>\n<\/span>\n<\/li>\n<li id=\"cite_note-104-191-2\"><span class=\"mw-cite-backlink\"><a href=\"#cite_ref-104-191_2-0\">\u2191<\/a><\/span> <span class=\"reference-text\"><span class=\"citation web\"><a rel=\"external_link\" class=\"external text\" href=\"https:\/\/www.govinfo.gov\/app\/details\/PLAW-104publ191\" target=\"_blank\">\"Public Law 104 - 191 - Health Insurance Portability And Accountability Act of 1996\"<\/a>. <i>GovInfo<\/i>. U.S. Government Publishing Office. 21 August 1996<span class=\"printonly\">. <a rel=\"external_link\" class=\"external free\" href=\"https:\/\/www.govinfo.gov\/app\/details\/PLAW-104publ191\" target=\"_blank\">https:\/\/www.govinfo.gov\/app\/details\/PLAW-104publ191<\/a><\/span><span class=\"reference-accessdate\">. Retrieved 09 February 2022<\/span>.<\/span><span class=\"Z3988\" title=\"ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=bookitem&rft.btitle=Public+Law+104+-+191+-+Health+Insurance+Portability+And+Accountability+Act+of+1996&rft.atitle=GovInfo&rft.date=21+August+1996&rft.pub=U.S.+Government+Publishing+Office&rft_id=https%3A%2F%2Fwww.govinfo.gov%2Fapp%2Fdetails%2FPLAW-104publ191&rfr_id=info:sid\/en.wikipedia.org:Book:HIPAA_Compliance:_An_Introduction\/What_is_HIPAA%3F\"><span style=\"display: none;\"> <\/span><\/span>\n<\/span>\n<\/li>\n<\/ol><\/div><\/div>\n<p><br \/>\n<\/p>\n<h2><span class=\"mw-headline\" id=\"Citation_for_this_section\">Citation for this section<\/span><\/h2>\n<p><b>Title<\/b>: <i>HIPAA Compliance: An Introduction<\/i> - What is HIPAA?\n<\/p><p><b>Author for citation<\/b>: Alan Vaughan, with editorial modifications by Shawn Douglas\n<\/p><p><b>License for content<\/b>: <a rel=\"external_link\" class=\"external text\" href=\"https:\/\/creativecommons.org\/licenses\/by-sa\/4.0\/\" target=\"_blank\">Creative Commons Attribution-ShareAlike 4.0 International<\/a>\n<\/p><p><b>Publication date<\/b>: Originally published June 2016; compiled and lightly edited February 2022\n<\/p>\n<!-- \nNewPP limit report\nCached time: 20220210233958\nCache expiry: 86400\nDynamic content: false\nComplications: []\nCPU time usage: 0.129 seconds\nReal time usage: 0.277 seconds\nPreprocessor visited node count: 1324\/1000000\nPost\u2010expand include size: 11701\/2097152 bytes\nTemplate argument size: 4353\/2097152 bytes\nHighest expansion depth: 18\/40\nExpensive parser function count: 0\/100\nUnstrip recursion depth: 0\/20\nUnstrip post\u2010expand size: 3150\/5000000 bytes\n-->\n<!--\nTransclusion expansion time report (%,ms,calls,template)\n100.00% 104.079 1 -total\n 70.72% 73.600 1 Template:HIPAA_Compliance:_An_Introduction\/What_is_HIPAA?\n 53.40% 55.577 1 Template:Flowlist\n 29.22% 30.408 1 Template:Reflist\n 24.92% 25.941 2 Template:Cite_web\n 21.02% 21.876 2 Template:Citation\/core\n 5.77% 6.006 1 Template:Date\n 2.83% 2.943 3 Template:Citation\/make_link\n-->\n\n<!-- Saved in parser cache with key limswiki:pcache:idhash:13001-0!canonical and timestamp 20220210234009 and revision id 46316. Serialized with JSON.\n -->\n<\/div><\/div><div class=\"printfooter\">Source: <a rel=\"external_link\" class=\"external\" href=\"https:\/\/www.limswiki.org\/index.php\/Book:HIPAA_Compliance:_An_Introduction\/What_is_HIPAA%3F\">https:\/\/www.limswiki.org\/index.php\/Book:HIPAA_Compliance:_An_Introduction\/What_is_HIPAA%3F<\/a><\/div>\n<!-- end content --><div class=\"visualClear\"><\/div><\/div><\/div><div class=\"visualClear\"><\/div><\/div><!-- end of the left (by default at least) column --><div class=\"visualClear\"><\/div><\/div>\n\n\n\n<\/body>","cecbc5585f3f9ea1201a67341d936093_images":["https:\/\/upload.wikimedia.org\/wikipedia\/commons\/6\/66\/HIPAA_Screenshot.png"],"cecbc5585f3f9ea1201a67341d936093_timestamp":1644537382,"9dcd6b5784dfa6392ebb24ebd7167997_type":"article","9dcd6b5784dfa6392ebb24ebd7167997_title":"1. Introduction","9dcd6b5784dfa6392ebb24ebd7167997_url":"https:\/\/www.limswiki.org\/index.php\/Book:HIPAA_Compliance:_An_Introduction\/Introduction","9dcd6b5784dfa6392ebb24ebd7167997_plaintext":"\n\nBook:HIPAA Compliance: An Introduction\/IntroductionFrom LIMSWikiJump to navigationJump to searchContents \n\n1 Introduction \n\n1.1 Reason and scope \n1.2 Goals of this guide \n\n\n2 References \n3 Citation for this section \n\n\n\nIntroduction \nReason and scope \nIn the U.S. healthcare industry, there are two main regulatory laws: the Clinical Laboratory Improvement Amendments of 1988 (CLIA) and the Health Insurance Portability and Accountability Act of 1996 (HIPAA). The first is aimed at clinical laboratories and the second applies to the vast majority of healthcare settings. This training guide is aimed at providing some accurate and useful training to those required to comply with HIPAA. Indeed, HIPAA training is mandated in the law itself, particularly by the United States Department of Health and Human Services (HHS), which summarizes that responsibility as such:\nWorkforce members include employees, volunteers, trainees, and may also include other persons whose conduct is under the direct control of the [covered] entity (whether or not they are paid by the entity). A covered entity must train all workforce members on its privacy policies and procedures, as necessary and appropriate for them to carry out their functions. A covered entity must have and apply appropriate sanctions against workforce members who violate its privacy policies and procedures or the Privacy Rule.[1]\nAnyone involved in healthcare has probably already realized that while their own entity's policies and procedures may well be in compliance, there is still a great deal of misunderstanding out there regarding HIPAA, as well as a general lack of knowledge of it beyond those measures that are in place where they happen to work. And it is also a matter of concern that industry professionals have encountered an alarming number of courses and guides purporting to provide an acceptable level of training, yet they prove to be significantly lacking in scope, clarity and in some cases accuracy.\nThis training guide is designed to provide a substantive, reasonably comprehensive understanding of all of the aspects of HIPAA that have bearing on most healthcare industry professionals. It is based almost completely on first-hand materials from the HHS (which the law charges with administration of HIPAA) and the actual Health Insurance and Portability Act of 1996 (HIPAA) law itself, rather than relying on secondary and tertiary interpretations and paraphrasing. However, these resources do not and cannot provide every detail for all scenarios. As such, several third-party sources were taken into account to gather and present the fullest comprehension of the materials and their relevance for the covered entities HIPAA affects.\n\nGoals of this guide \nThe primary aim of this training guide is to supplement the requirement for HIPAA training as described above. Whether used to fulfill that directive, or as source for your own research, it is designed to provide the most comprehensive, clear and accurate general familiarity with HIPAA possible as it relates to those attempting to be compliant.\n\nReferences \n\n\n\u2191 Office for Civil Rights (26 July 2013). \"Summary of the HIPAA Privacy Rule\". United States Department of Health and Human Services. https:\/\/www.hhs.gov\/hipaa\/for-professionals\/privacy\/laws-regulations\/index.html . Retrieved 09 February 2022 .   \n \n\n\n\r\n\n\nCitation for this section \nTitle: HIPAA Compliance: An Introduction - Introduction\nAuthor for citation: Alan Vaughan, with editorial modifications by Shawn Douglas\nLicense for content: Creative Commons Attribution-ShareAlike 4.0 International\nPublication date: Originally published June 2016; compiled and lightly edited February 2022\n\n\n\n\n\nSource: <a rel=\"external_link\" class=\"external\" href=\"https:\/\/www.limswiki.org\/index.php\/Book:HIPAA_Compliance:_An_Introduction\/Introduction\">https:\/\/www.limswiki.org\/index.php\/Book:HIPAA_Compliance:_An_Introduction\/Introduction<\/a>\nNavigation menuPage actionsBookDiscussionView sourceHistoryPage actionsBookDiscussionMoreToolsIn other languagesPersonal toolsLog inRequest accountNavigationMain pageRecent changesRandom pageHelp about MediaWikiSearch\u00a0 ToolsWhat links hereRelated changesSpecial pagesPermanent linkPage informationSponsors \r\n\n\t\r\n\n\t\r\n\n\t\r\n\n\t\r\n\n\t\n\t\n\t\r\n\n\t\r\n\n\t\n\t\r\n\n\t\r\n\n \n\t\n\t\n\t\r\n\n\t\r\n\n \n\t\n\t\r\n\n\t\r\n\n\t\n\t\n\t\r\n\n\t\n\t\n\t\r\n\n\t\r\n\n\t\n\t\n\t\r\n\n\t\r\n\n\t\r\n\n\t\r\nPrint\/exportCreate a bookDownload as PDFDownload as PDFDownload as Plain textPrintable version This page was last edited on 10 February 2022, at 23:33.Content is available under a Creative Commons Attribution-ShareAlike 4.0 International License unless otherwise noted.This page has been accessed 4 times.Privacy policyAbout LIMSWikiDisclaimers\n\n\n\n","9dcd6b5784dfa6392ebb24ebd7167997_html":"<body class=\"mediawiki ltr sitedir-ltr mw-hide-empty-elt ns-208 ns-subject page-Book_HIPAA_Compliance_An_Introduction_Introduction rootpage-Book_HIPAA_Compliance_An_Introduction_Introduction skin-monobook action-view skin--responsive\"><div id=\"rdp-ebb-globalWrapper\"><div id=\"rdp-ebb-column-content\"><div id=\"rdp-ebb-content\" class=\"mw-body\" role=\"main\"><a id=\"rdp-ebb-top\"><\/a>\n<h1 id=\"rdp-ebb-firstHeading\" class=\"firstHeading\" lang=\"en\">Book:HIPAA Compliance: An Introduction\/Introduction<\/h1><div id=\"rdp-ebb-bodyContent\" class=\"mw-body-content\"><!-- start content --><div id=\"rdp-ebb-mw-content-text\" lang=\"en\" dir=\"ltr\" class=\"mw-content-ltr\"><div class=\"mw-parser-output\">\n\n<h2><span class=\"mw-headline\" id=\"Introduction\">Introduction<\/span><\/h2>\n<h3><span class=\"mw-headline\" id=\"Reason_and_scope\">Reason and scope<\/span><\/h3>\n<div class=\"floatright\"><a href=\"https:\/\/www.limswiki.org\/index.php\/File:Leiden_University_Library,_Group_Study_Room.jpg\" class=\"image wiki-link\" data-key=\"44aa1ab82e1f1efc93c0f8108b315bc7\"><img alt=\"Leiden University Library, Group Study Room.jpg\" src=\"https:\/\/upload.wikimedia.org\/wikipedia\/commons\/a\/a9\/Leiden_University_Library%2C_Group_Study_Room.jpg\" decoding=\"async\" width=\"360\" height=\"240\" \/><\/a><\/div><p>In the U.S. healthcare industry, there are two main regulatory laws: the <a href=\"https:\/\/www.limswiki.org\/index.php\/Clinical_Laboratory_Improvement_Amendments\" title=\"Clinical Laboratory Improvement Amendments\" class=\"wiki-link\" data-key=\"64bdae1dc17c40c28e0c560396a6ae35\">Clinical Laboratory Improvement Amendments of 1988<\/a> (CLIA) and the <a href=\"https:\/\/www.limswiki.org\/index.php\/Health_Insurance_Portability_and_Accountability_Act\" title=\"Health Insurance Portability and Accountability Act\" class=\"wiki-link\" data-key=\"b70673a0117c21576016cb7498867153\">Health Insurance Portability and Accountability Act of 1996<\/a> (HIPAA). The first is aimed at <a href=\"https:\/\/www.limswiki.org\/index.php\/Clinical_laboratory\" title=\"Clinical laboratory\" class=\"wiki-link\" data-key=\"307bcdf1bdbcd1bb167cee435b7a5463\">clinical laboratories<\/a> and the second applies to the vast majority of healthcare settings. This training guide is aimed at providing some accurate and useful training to those required to comply with HIPAA. Indeed, HIPAA training is mandated in the law itself, particularly by the <a href=\"https:\/\/www.limswiki.org\/index.php\/United_States_Department_of_Health_and_Human_Services\" title=\"United States Department of Health and Human Services\" class=\"wiki-link\" data-key=\"efa106bcbb93039b1a6c3c596daedec3\">United States Department of Health and Human Services<\/a> (HHS), which summarizes that responsibility as such:\n<\/p><blockquote><p>Workforce members include employees, volunteers, trainees, and may also include other persons whose conduct is under the direct control of the [covered] entity (whether or not they are paid by the entity). A covered entity must train all workforce members on its privacy policies and procedures, as necessary and appropriate for them to carry out their functions. A covered entity must have and apply appropriate sanctions against workforce members who violate its privacy policies and procedures or the Privacy Rule.<sup id=\"rdp-ebb-cite_ref-HHSSummaryHIPAA_1-0\" class=\"reference\"><a href=\"#cite_note-HHSSummaryHIPAA-1\">[1]<\/a><\/sup><\/p><\/blockquote>\n<p>Anyone involved in healthcare has probably already realized that while their own entity's policies and procedures may well be in compliance, there is still a great deal of misunderstanding out there regarding HIPAA, as well as a general lack of knowledge of it beyond those measures that are in place where they happen to work. And it is also a matter of concern that industry professionals have encountered an alarming number of courses and guides purporting to provide an acceptable level of training, yet they prove to be significantly lacking in scope, clarity and in some cases accuracy.\n<\/p><p>This training guide is designed to provide a substantive, reasonably comprehensive understanding of all of the aspects of HIPAA that have bearing on most healthcare industry professionals. It is based almost completely on first-hand materials from the HHS (which the law charges with administration of HIPAA) and the actual Health Insurance and Portability Act of 1996 (HIPAA) law itself, rather than relying on secondary and tertiary interpretations and paraphrasing. However, these resources do not and cannot provide every detail for all scenarios. As such, several third-party sources were taken into account to gather and present the fullest comprehension of the materials and their relevance for the covered entities HIPAA affects.\n<\/p>\n<h3><span class=\"mw-headline\" id=\"Goals_of_this_guide\">Goals of this guide<\/span><\/h3>\n<p>The primary aim of this training guide is to supplement the requirement for HIPAA training as described above. Whether used to fulfill that directive, or as source for your own research, it is designed to provide the most comprehensive, clear and accurate general familiarity with HIPAA possible as it relates to those attempting to be compliant.\n<\/p>\n<h2><span class=\"mw-headline\" id=\"References\">References<\/span><\/h2>\n<div class=\"reflist\" style=\"list-style-type: decimal;\">\n<div class=\"mw-references-wrap\"><ol class=\"references\">\n<li id=\"cite_note-HHSSummaryHIPAA-1\"><span class=\"mw-cite-backlink\"><a href=\"#cite_ref-HHSSummaryHIPAA_1-0\">\u2191<\/a><\/span> <span class=\"reference-text\"><span class=\"citation web\">Office for Civil Rights (26 July 2013). <a rel=\"external_link\" class=\"external text\" href=\"https:\/\/www.hhs.gov\/hipaa\/for-professionals\/privacy\/laws-regulations\/index.html\" target=\"_blank\">\"Summary of the HIPAA Privacy Rule\"<\/a>. United States Department of Health and Human Services<span class=\"printonly\">. <a rel=\"external_link\" class=\"external free\" href=\"https:\/\/www.hhs.gov\/hipaa\/for-professionals\/privacy\/laws-regulations\/index.html\" target=\"_blank\">https:\/\/www.hhs.gov\/hipaa\/for-professionals\/privacy\/laws-regulations\/index.html<\/a><\/span><span class=\"reference-accessdate\">. Retrieved 09 February 2022<\/span>.<\/span><span class=\"Z3988\" title=\"ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=bookitem&rft.btitle=Summary+of+the+HIPAA+Privacy+Rule&rft.atitle=&rft.aulast=Office+for+Civil+Rights&rft.au=Office+for+Civil+Rights&rft.date=26+July+2013&rft.pub=United+States+Department+of+Health+and+Human+Services&rft_id=https%3A%2F%2Fwww.hhs.gov%2Fhipaa%2Ffor-professionals%2Fprivacy%2Flaws-regulations%2Findex.html&rfr_id=info:sid\/en.wikipedia.org:Book:HIPAA_Compliance:_An_Introduction\/Introduction\"><span style=\"display: none;\"> <\/span><\/span>\n<\/span>\n<\/li>\n<\/ol><\/div><\/div>\n<p><br \/>\n<\/p>\n<h2><span class=\"mw-headline\" id=\"Citation_for_this_section\">Citation for this section<\/span><\/h2>\n<p><b>Title<\/b>: <i>HIPAA Compliance: An Introduction<\/i> - Introduction\n<\/p><p><b>Author for citation<\/b>: Alan Vaughan, with editorial modifications by Shawn Douglas\n<\/p><p><b>License for content<\/b>: <a rel=\"external_link\" class=\"external text\" href=\"https:\/\/creativecommons.org\/licenses\/by-sa\/4.0\/\" target=\"_blank\">Creative Commons Attribution-ShareAlike 4.0 International<\/a>\n<\/p><p><b>Publication date<\/b>: Originally published June 2016; compiled and lightly edited February 2022\n<\/p>\n<!-- \nNewPP limit report\nCached time: 20220210233352\nCache expiry: 86400\nDynamic content: false\nComplications: []\nCPU time usage: 0.104 seconds\nReal time usage: 0.241 seconds\nPreprocessor visited node count: 748\/1000000\nPost\u2010expand include size: 7820\/2097152 bytes\nTemplate argument size: 1780\/2097152 bytes\nHighest expansion depth: 18\/40\nExpensive parser function count: 0\/100\nUnstrip recursion depth: 0\/20\nUnstrip post\u2010expand size: 1579\/5000000 bytes\n-->\n<!--\nTransclusion expansion time report (%,ms,calls,template)\n100.00% 44.574 1 -total\n 69.90% 31.158 1 Template:Reflist\n 60.30% 26.879 1 Template:Cite_web\n 49.33% 21.988 1 Template:Citation\/core\n 29.89% 13.323 1 Template:HIPAA_Compliance:_An_Introduction\/Introduction\n 16.29% 7.263 1 Template:Date\n 6.26% 2.792 1 Template:Citation\/make_link\n-->\n\n<!-- Saved in parser cache with key limswiki:pcache:idhash:13000-0!canonical and timestamp 20220210233423 and revision id 46315. Serialized with JSON.\n -->\n<\/div><\/div><div class=\"printfooter\">Source: <a rel=\"external_link\" class=\"external\" href=\"https:\/\/www.limswiki.org\/index.php\/Book:HIPAA_Compliance:_An_Introduction\/Introduction\">https:\/\/www.limswiki.org\/index.php\/Book:HIPAA_Compliance:_An_Introduction\/Introduction<\/a><\/div>\n<!-- end content --><div class=\"visualClear\"><\/div><\/div><\/div><div class=\"visualClear\"><\/div><\/div><!-- end of the left (by default at least) column --><div class=\"visualClear\"><\/div><\/div>\n\n\n\n<\/body>","9dcd6b5784dfa6392ebb24ebd7167997_images":["https:\/\/upload.wikimedia.org\/wikipedia\/commons\/a\/a9\/Leiden_University_Library%2C_Group_Study_Room.jpg"],"9dcd6b5784dfa6392ebb24ebd7167997_timestamp":1644537381},"link":"https:\/\/www.limswiki.org\/index.php\/Book:HIPAA_Compliance:_An_Introduction","price_currency":"","price_amount":"","book_size":"","download_url":"https:\/\/www.limsforum.com?ebb_action=book_download&book_id=78160","language":"","cta_button_content":"","toc":[{"type":"article","name":"1. Introduction","id":"9dcd6b5784dfa6392ebb24ebd7167997","pageUrl":"https:\/\/www.limswiki.org\/index.php\/Book:HIPAA_Compliance:_An_Introduction\/Introduction"},{"type":"article","name":"2. What is HIPAA?","id":"cecbc5585f3f9ea1201a67341d936093","pageUrl":"https:\/\/www.limswiki.org\/index.php\/Book:HIPAA_Compliance:_An_Introduction\/What_is_HIPAA%3F"},{"type":"article","name":"3. Who needs to comply?","id":"3ff14d6b62ae91be8d421f4af0c8c798","pageUrl":"https:\/\/www.limswiki.org\/index.php\/Book:HIPAA_Compliance:_An_Introduction\/Who_needs_to_comply%3F"},{"type":"article","name":"4. Protected health information","id":"6a96a2659c89aa3d9cf170daa6d9814d","pageUrl":"https:\/\/www.limswiki.org\/index.php\/Book:HIPAA_Compliance:_An_Introduction\/Protected_health_information"},{"type":"article","name":"5. Use and disclosure","id":"5a2165db90474508ac92e2e7cce548ff","pageUrl":"https:\/\/www.limswiki.org\/index.php\/Book:HIPAA_Compliance:_An_Introduction\/Use_and_disclosure"},{"type":"article","name":"6. Administration","id":"f152ac60160ac44246cd93438a50f862","pageUrl":"https:\/\/www.limswiki.org\/index.php\/Book:HIPAA_Compliance:_An_Introduction\/Administration"},{"type":"article","name":"7. Security","id":"67501dd743f72dcd818a8dbb0f48d670","pageUrl":"https:\/\/www.limswiki.org\/index.php\/Book:HIPAA_Compliance:_An_Introduction\/Security"},{"type":"article","name":"8. Additional compliance guidance","id":"9f18a253fb0391daf5dfb79f6acab5b2","pageUrl":"https:\/\/www.limswiki.org\/index.php\/Book:HIPAA_Compliance:_An_Introduction\/Additional_compliance_guidance"},{"type":"article","name":"9. Additional resources","id":"8e464c677297e6b3ef3316d144ff162d","pageUrl":"https:\/\/www.limswiki.org\/index.php\/Book:HIPAA_Compliance:_An_Introduction\/Additional_resources"},{"type":"article","name":"10. Abbreviations, acronyms, and initialisms","id":"50ca559740210c2f3863c08a17fef379","pageUrl":"https:\/\/www.limswiki.org\/index.php\/Book:HIPAA_Compliance:_An_Introduction\/Abbreviations,_acronyms,_and_initialisms"}],"settings":{"show_cover":1,"show_title":1,"show_subtitle":0,"show_full_title":1,"show_editor":1,"show_editor_pic":1,"show_publisher":1,"show_language":1,"show_size":1,"show_toc":1,"show_content_beneath_cover":1,"toc_links":"logged-in","cta_button":"1","content_location":"1","log_in_msg":"","cover_size":"medium"},"title_image":"https:\/\/upload.wikimedia.org\/wikipedia\/commons\/6\/66\/HIPAA_Screenshot.png"}}
HIPAA Compliance: An Introduction
Editor: Shawn Douglas
Publisher: LabLynx Press
Copyright LabLynx Inc. All rights reserved.