RSI Security

Safe Harbor Provisions Under HIPAA Explained

Internal Pen

Businesses within and adjacent to the healthcare industry must follow strenuous controls to safeguard the class of data known as “protected health information” (PHI). Per the Health Insurance Portability and Accountability Act of 1996 (HIPAA), de-identification is one central protection element. An innovative option available to businesses that need HIPAA compliance is an approach called “safe harbor.”

Read on to learn the safe harbor provisions under HIPAA and how to implement them in your healthcare business.

 

Safe Harbor Provisions Under HIPAA Explained

Safe harbor in HIPAA offers a flexible approach to de-identification without relying entirely on an external expert’s evaluation. To fully understand the complexities of HIPAA’s safe harbor provisions, it’s essential to understand the immediate context of the HIPAA rule to which it pertains.

This guide will break down all you need to know on the HIPAA safe harbor provisions, including:

By the end of this blog, you will know everything you need to do to fully de-identify information per Privacy Rule standards and fully comply with HIPAA. But first, let’s define some basic terms.

 

Overview of HIPAA’s Purpose and Stakeholders

HIPAA’s purpose is to protect data related to patients’ medical and financial records, which could cause harm to the patients and the institutions harboring that data if it gets into the wrong hands. HIPAA exists to secure PHI across all medical, healthcare, and adjacent businesses. Therefore, all of its controls apply to doctors and hospitals, along with various other covered entities. These covered entities include:

HIPAA might still apply to you if your company is not directly involved in healthcare yet provides services to a healthcare entity. A significant impact of the “HITECH” update to HIPAA in 2009 was the extension of compliance responsibilities to the business associates of covered entities.

 

Request a Free Consultation

 

Context: Understanding HIPAA’s Privacy Rule

The HIPAA Privacy Rule is the first and most essential rule of the entire HIPAA framework. It was first proposed in 1999, and its first final form appeared in 2000. It sets up definitions of PHI and the covered entities detailed above. It also set the stage for, and still informs, subsequent HIPAA rules and regulations. The most recent update to the Privacy Rule in December 2020 adapts certain protections to the environment of COVID-19 and its long-term impacts.

The Privacy Rule is the basis of HIPAA. This rule and its definitions are referenced throughout the controls and protocols in all other rules. The Privacy Rule’s purpose is to define the specific conditions under which PHI may be used or disclosed, to whom, and why (or why not). Moreover, it also explains cases in which PHI must be disclosed and restrictions on permitted uses and disclosures. Let’s take a closer look at its controls.

Privacy Rule Controls for PHI Use and Disclosure

According to the US Department of Health and Human Services’s (HHS) summary of the Privacy Rule, its primary function is to define the conditions under which use or disclosure is permitted. These conditions include:

Uses and disclosures that fall outside the scope of these conditions are not permitted. But uses or disclosures to the subject of PHI are required, as are disclosures to government agencies like the HHS. And all uses, except these, must be limited to the minimum necessary requirement.


Download Our HIPAA Compliance Checklist

De-Identification of PHI Under the Privacy Rule

The purpose of safeguarding PHI is to ensure it does not fall into the hands of a hacker or other actor who could identify a patient and target them for cybercrimes or other crimes. Per the HHS’s guidance on de-identification, all medical records, lab reports, and hospital bills fall under the category of PHI because they include a combination of identifying factors, not limited to:

There are two possible methods for removing this information and verifying its removal for compliance with HIPAA: “expert determination” and “safe harbor.” Let’s take a look at each.

 

De-Identification Method #1: Expert Determination

The first method for de-identification of PHI depends upon the expertise available to a covered entity, whether internally or through a contracted third-party. According to the HHS’s de-identification guide, HIPAA provision 164.514(b)(1) specifies that de-identification can be verified if an individual with “appropriate knowledge” or experience with the statistical and scientific principles of de-identification applies appropriate procedures to the extent necessary.

This expert must determine that the PHI could not be used to identify its subject, both in its own right and in some combination with other documents that would be reasonably available to any party trying to identify the individual. Furthermore, the expert must document procedures used to make this determination. One possible procedure involves the other method, “safe harbor.”

 

De-Identification Method #2: “Safe Harbor” Method

The safe harbor method HIPAA prescribes is a more hands-on approach for de-identification. Per the HHS’s de-identification guide, it involves an adequate removal of 18 PHI identifiers. These are:

Following these steps and removing all this information, covered entities satisfy HIPAA provision 164.514(b)(2) and, by extension, 164.514(a). But full HIPAA compliance comprises much more.

Other HIPAA Considerations for Covered Entities

Adoption of the safe harbor or expert determination method is far from the only requirement for compliance. Failure to implement the Privacy Rule in its entirety, along with two other rules (see below), can result in two kinds of penalties, described within the HIPAA Enforcement Rule.

The first kind of punishment for relatively benign violations comprise civil money penalties:

The second kind of punishment, for the most severe violations, comprise criminal penalties:

To avoid these, companies must abide by the HIPAA Security and Breach Notification Rules.

 

The Security Safeguards of the HIPAA Security Rule

The Security Rule is another major constitutive rule for HIPAA compliance. It exists to ensure the confidentiality, integrity, and availability of PHI and electronic PHI (ePHI). According to the HHS’s summary of the Security Rule, these ends are achieved through three components:

The HIPAA Security Rule also requires all covered entities to establish a risk management program to monitor, analyze, and mitigate threats and vulnerabilities impacting PHI and ePHI.

 

The HIPAA Breach Notification Rule and Protocols 

The last considerations for compliance include the provisions laid out in the HIPAA Breach Notification Rule. These are less preventive measures than actions to be taken when an attack does occur. Per the HHS’s guide, there are three forms of notice covered entities must provide:

Across these and the other rules detailed above, HIPAA compliance can be a challenge. Fortunately, working with a qualified HIPAA advisor like RSI Security can facilitate compliance and security.

 

HIPAA Compliance and Cybersecurity, Simplified

To recap from above, the safe harbor provisions under HIPAA comprise one possible approach to de-identification, which is a critical element of the HIPAA Privacy Rule. Covered entities within and adjacent to the healthcare industry need to implement either safe harbor or expert determination to validate de-identification. They also need to implement all other provisions of the Security and Breach Notification Rules. Contact RSI Security today for custom-tailored solutions to HIPAA compliance for your company.

 

 


Download Our Complete Guide to Navigating Healthcare Compliance Whitepaper

Not sure if your HIPAA or healthcare compliance efforts are up to snuff? Unsure about where to even start? Download RSI Security’s comprehensive guide to navigating the HIPAA and healthcare compliance labyrinth. Upon filling out this brief form you will receive the whitepaper via email.

Exit mobile version