RSI Security

What Is the Difference Between Protected Health Information and Consumer Health Information?

what is PHI

A new technological era is upon us. Over the last 25 years, the meteoric rise of computers, smartphones, and other electronic devices have infused our world with a new sense of possibility. With it comes the need for higher security measures and data protection. That holds double for the healthcare industry.

With the type of information stored away in electronic health records (EHRs), healthcare organizations have a responsibility to secure the sensitive information provided by their patients. And according to the Health Insurance Portability and Accountability Act (HIPAA), signed into law in 1996, they do. It’s called protected health information (PHI).

But what is protected health information? And how does it differ from consumer health information (CHI), another term thrown around the health-tech sector? For everything you need to know, read ahead.

 

Back to the Basics: Definitions

Before diving into the details of both PHI and CHI, let’s start by breaking each one down by definition.

 

 

Assess your HIPAA / HITECH compliance

 

HIPAA-Covered Entities

A key deciding factor whether information is considered protected health information or consumer health information is by the involvement of a HIPAA-covered entity. Thus, it’s best to define exactly what that entails before moving forward.

HIPAA-covered entities are health plans, healthcare clearinghouses, or healthcare providers that transmit information regarding the health or healthcare of a patient for which the Department of Health and Human Services have standards.

This could include, but is not limited to:

 

What is Consumer Health Information?

It’s time to take a deeper dive into exactly what CHI is and what some examples are. Two common ways consumer health information can be seen in today’s landscape are through:

 

Wearable Devices and Apps

Athletic wearables on the arm are as commonplace as headphones are in the ears. Start looking at people’s wrists, and you’ll notice these everywhere. Fitbits, Apple Watches, and other wearable devices are constantly computing health information from heart rate to glucose levels to blood pressure.

These values are tracked on an app where the consumer has access to days, weeks, or months of data on their health. This is consumer health information.

Unfortunately, the information available is not limited to just the consumer; the company that makes the product also has access to the CHI if stated in their “Terms of Service.”

 

Genetic Testing Companies

Another common form of consumer health information that has arisen in recent years is genetic information. Consumer genetic testing has gained popularity, with 2017 alone contributing over 12 million new tests. Again, the Terms of Service determine how this consumer health information is used and protected.

 

Terms of Service

At this point, a difference should be noted between PHI and CHI. While PHI has federal regulations about the distribution and use of personal data (through HIPAA’s Privacy and Security Rules noted below), CHI depends only on the specific company’s ToS.

This type of leniency doesn’t hold when it comes to government-protected data, as seen through PHI.

 

What is Protected Health Information?

Protected health information is more complex by nature because its definition is tangled in the healthcare system and healthcare laws. In essence, PHI consists of medical records, insurance information, and payment history. When looking at a medical record, for example, there are 18 different identifiers that will constitute the document as protected health information.

The full list of identifiers can be found in HIPAA under the Health and Human Services.

 

Where HIPAA Comes In

PHI is the currency that makes HIPAA’s economy work. Protecting sensitive patient information is part and parcel to why HIPAA was enacted in the first place. Although, in 1996, it was unclear about the technological challenges that healthcare organizations were going to face in the 2000s.

Since then, data security frameworks and information technologies have popped up to curb data breaches. To ensure that healthcare organizations were keeping up-to-date with the advancement of security protocol, another bill was brought into law in 2009: The Health Information Technology for Economic and Clinical Health Act (HITECH)

HITECH brought with it upgraded policies, stricter penalties, and legislative glue to seal open loopholes. It was a boost to HIPAA in four ways:

HIPAA Privacy Rule

The Privacy Rule is a measure to define what is protected health information and how it can be used and exchanged between healthcare organizations and business associates. What followed from this rule is the “Minimum Necessary Rule.” When exchanging information, the electronic health records must disclose the minimum necessary ePHI for the intended purpose.

This means that when insurance policies need to make a judgment on an individual’s policy, they can’t request all the information on that patient (which could reveal reasons why that person is a high-risk policy).

The Privacy Rule is also what provides patients the legal right to access their electronic health records and to obtain an electronic copy.

 

HIPAA Security Rule

While both the Privacy Rule and Security Rule both interplay on the disclosure of PHI, the Security Rule is what designates the boundaries and safeguards organizations must follow. To begin, the Security Rule is broken up into three categories of safeguards:

These work to restrict the access to PHI from physical and cyber-attacks; ensure PHI is not destroyed or altered without the proper regulations; track when and how PHI is accessed and by whom. Because technology is always changing, the idea behind these safeguards is to stay “technology-neutral” by focusing on the protection of PHI — instead of putting restrictions on specific devices that may go out of date.

For example: Cloud technology has benefited companies with large data expectations (companies like hospitals and healthcare organizations). It also provides an entry point for possible data breaches. For the HIPAA Security Rule to keep up-to-date, they must ensure that any and all technology that houses PHI — in this case, cloud storage — are protected or face penalties. Thus, hospitals are free to adapt to the market, but they must ensure that they do it safely.

 

HIPAA Breach Notification Rule

In the case of a data breach, HIPAA also provides strict guidelines for healthcare organizations following the breach. When there is unauthorized access to PHI by third-parties, malware and ransomware attacks, or employees, this constitutes a data breach.

The penalties of breaking the Breach Notification Rule (or the Privacy and Security Rules) are detailed and enforced by the HIPAA Enforcement Rule.

HIPAA Enforcement Rule

When HIPAA-covered entities and their business associates are noncompliant, the HIPAA Enforcement Rule is what determines the extent of the penalties accrued and who enforces them.

 

*Willful Neglect – Defined as when a healthcare entity knew about a given HIPAA regulation and ignored it; or when a healthcare entity should have known about a given HIPAA regulation with due diligence.

 

How Does HIPAA Affect Consumer Health Information?

In short, it doesn’t. Because consumer health information is defined by data not shared with or given to HIPAA-compliant entities, the rules don’t affect it. This comes with its benefits and downsides.

 

Privacy and Security: The Future of Healthcare Data

While consumer health information is only as protected as the “Terms of Service” allow, the same is not true for HIPAA-protected healthcare data. PHI is currently under heavy protection, although there are increasing threats. Each new technology and device that enters the healthcare space is another access point for hacking, phishing, and ransomware.

To keep your organization’s data secure, many are turning to HITRUST CSF — a security framework that ensures HIPAA and HITECH compliance. By using a framework that acts as personal audit insurance and allows new regulations to be implemented seamlessly, HIPAA-covered entities don’t have to worry about the increased penalties and fines.

If you want to ensure your organization and patients’ PHI is secured, talk to the experts at RSI Security today!

 

 

 


Download Our Complete Guide to Navigating Healthcare Compliance Whitepaper

Not sure if your HIPAA or healthcare compliance efforts are up to snuff? Unsure about where to even start? Download RSI Security’s comprehensive guide to navigating the HIPAA and healthcare compliance labyrinth. Upon filling out this brief form you will receive the whitepaper via email.

Sources:

NIH. To Whom Does the Privacy Rule Apply and Whom Will It Affect? https://privacyruleandresearch.nih.gov/pr_06.asp

MIT Technology Review. 2017 was the year consumer DNA testing blew up. https://www.technologyreview.com/s/610233/2017-was-the-year-consumer-dna-testing-blew-up/

HHS. Guidance Regarding Methods for De-identification of Protected Health Information in Accordance with the Health Insurance Portability and Accountability Act (HIPAA) Privacy Rule. https://www.hhs.gov/hipaa/for-professionals/privacy/special-topics/de-identification/index.html#coveredentities

Forbes. The Privacy Delusions Of Genetic Testing. https://www.forbes.com/sites/realspin/2017/02/15/the-privacy-delusions-of-genetic-testing/#33431b751bba

Exit mobile version