RSI Security

What Does Protected Health Information Include?

Incident Response Tabletop

The Health Insurance Portability and Accountability Act of 1996 (HIPAA) designates forms of patient-related records that need to be protected. These records are “protected health information” (PHI). Guarding these documents is critical to the safety of patients and providers alike. Read on for several examples of protected health information, the US Department of Health and Human Services’ (HHS) strict regulations surrounding them, and how to safeguard your company.

 

What Does Protected Health Information Include?

Given how critical safeguarding PHI is, all businesses in and adjacent to the healthcare industry need to understand its importance, why it’s so essential, and how to protect it per HIPAA standards. This blog will break down:

 

Personal Health Information Examples and Definition

The best way to understand what protected health information involves understanding what protected health information includes. The primary examples of PHI are all patients’ medical and payment documents that contain personally identifiable information, such as records of doctor visits, prescriptions, bills, and privileged communications with providers. This includes nearly all patient-related documents stored or processed by covered entities.

HIPAA applies unilaterally to all businesses in the healthcare field and many other businesses adjacent to it. Covered entities comprise healthcare providers, health plans, and health clearinghouses. Furthermore, the business associates of these parties are also required to be compliant.

 

Request a Free Consultation

 

Identifiable Characteristics for Protected Health Information

PHI is health information with personally identifiable information about a patient. If all 18 kinds of personally identifiable data are removed or redacted from a PHI document, it may no longer qualify as PHI under the “safe harbor” provision. The identifying categories include:

The process of removing all these identifiers is called the de-identification of PHI. Companies can also achieve de-identification via expert determination that the document is not identifiable.

The HIPAA Privacy Rule: Uses and Disclosures of PHI

The Privacy Rule within the HIPAA framework applies to all PHI, both physical and digital, and delineates the specific use cases under which parties other than PHI subjects can access PHI. It also guarantees that PHI is accessible by its subjects or representatives, along with select other parties, such as law enforcement.

Protections under the Privacy Rule may be considered a “whitelist” approach, wherein use cases are disallowed unless otherwise specified. To that effect, the rule’s “basic principles” include that a covered entity may not disclose or use PHI in any way except those defined as permitted or required or as formally requested in writing by the PHI’s subject or representative.

 

Rules and Requirements for Privacy Rule Protection of PHI

The HHS’s Privacy Rule Summary breaks down the following permitted use cases for PHI:

All permitted uses and disclosures except select required cases, such as to the subject of law enforcement, must also be limited to the minimum necessary extent to avoid breach conditions.

 

The HIPAA Privacy Rule: Safeguards for Electronic PHI

The second prescriptive rule applicable to PHI in the HIPAA framework is the Security Rule. The Security Rule applies to electronic PHI (ePHI) only, unlike the Privacy Rule, which applies to PHI in all formats. The Security Rule resulted from the HITECH Act of 2009, which increased HIPAA’s oversight on electronically generated and processed PHI, along with increases to enforcement penalties.

In particular, the Security Rule exists to ensure the confidentiality, integrity, and availability of ePHI. It also specifies risk analysis or assessment methods to identify and address credible threats to the Security and Privacy of ePHI and prevent them before they turn into total breaches. It does this by detailing specific safeguards all covered entities must implement.

 

Rules and Requirements for the Security of Electronic PHI

The HHS’s Security Rule Summary breaks down three kinds of safeguards for ePHI security:

These protections ultimately build on the Privacy Rule’s guidance to define parameters for PHI’s safekeeping. If any statute is broken, the PHI will be considered breached.

Breach Notification for Compromises to PHI or ePHI

Finally, the last HIPAA rule pertaining to PHI is not a prescription for its protection but a failsafe if compromised. The Breach Notification Rule applies to all PHI and ePHI; it requires covered entities to notify three distinct parties if any element of the Security or Privacy Rule is breached:

Failure to meet these requirements does more than compromise PHI. It can also result in civil money penalties or criminal charges, per the Enforcement Rule.

 

Safeguard Protected Health Information Professionally

To avoid non-compliance penalties and other potentially dangerous cybercrime threats, working with a qualified HIPAA compliance advisor can offer an optimal return on investment. There are countless examples of protected health information-related crimes and HIPAA violations that involve well-meaning companies with inadequate staffing or resources. If compliance is a concern for you, contact RSI Security today to see how easy it can be.

 

 


Download Our Complete Guide to Navigating Healthcare Compliance Whitepaper

Not sure if your HIPAA or healthcare compliance efforts are up to snuff? Unsure about where to even start? Download RSI Security’s comprehensive guide to navigating the HIPAA and healthcare compliance labyrinth. Upon filling out this brief form you will receive the whitepaper via email.

Exit mobile version