The Health Insurance Portability and Accountability Act, or HIPAA, is a federal law that protects the privacy of your health information. HIPAA was enacted in 1996.
The main goal of HIPAA is to ensure that healthcare providers and insurance companies handle your sensitive health information in a secure and confidential manner. This includes medical records, test results, and billing information.
HIPAA requires healthcare providers to have written policies and procedures in place to protect your health information. These policies must be followed by all employees who have access to your health information.
What Is HIPAA?
HIPAA is a United States regulation enacted in 1996 that addresses how Personal Identifying Information (PII) of patients should be managed by healthcare providers. The main goal of the regulation is to enhance the privacy of patients by preventing their data from being shared without their consent.
The regulation applies to both "covered entities", which are healthcare providers who retain or transmit PHI, and their "business associates", vendors or partners who interact with PHI on behalf of the providers.
HIPAA provides protections for patients who lose their healthcare coverage by creating options and enhancing the portability of Personal Health Information (PHI) for patients when they lose or change their jobs.
The regulation is broken down into several rules, including the Privacy Rule, the Security Rule, the Omnibus Rule, the Breach Notification Rule, and the Enforcement Rule.
Here's a summary of the main rules under HIPAA:
- The Privacy Rule sets standards for how PHI is used by providers, who can view this data, and guidelines for how it may be shared.
- The Security Rule sets standards for how PHI is secured by healthcare providers, including the protection of PHI within Electronic Health Records (EHR) and guidelines for the storage and maintenance of these records.
- The Omnibus Rule sets standards for the legal agreements that must exist between healthcare providers and "business associates" who interact with PHI.
- The Breach Notification Rule outlines how patients must be notified of a breach and how such breaches must be legally reported.
- The Enforcement Rule enables the US Department of Health & Human Services (HHS) to conduct compliance audits and enforce HIPAA regulations, with fines as large as $1.5M for HIPAA violations.
HIPAA Compliance
HIPAA Compliance is a serious matter. Failure to comply can result in heavy civil and criminal penalties, including fines up to $25,000 per calendar year and up to 10 years imprisonment.
To ensure compliance, health plans must notify covered individuals how to obtain the Notice of Privacy Practices (NPP) at least every three years. In the event of a breach, they must also notify individuals, HHS, and the media according to the deadlines set forth in the Breach Notification section.
Here are some key compliance deadlines to keep in mind:
Remember, HIPAA compliance is not just about following rules – it's about protecting sensitive patient information and maintaining trust in the healthcare system.
Purpose
The purpose of HIPAA is to make health insurance more available for individuals who change jobs. This was a major goal of the act, aimed at helping people transition between jobs without losing their health insurance coverage.
HIPAA aims to combat abuses in the health care system. By establishing clear rules for how personal medical information is used and disclosed, HIPAA helps prevent misuse of sensitive health data.
The act also simplifies the administration of health insurance. This means that health insurance companies must follow standardized procedures for managing health information, making it easier for individuals to navigate the system.
HIPAA protects privacy by creating requirements for how personal medical information may be used and disclosed. This includes rules for storing, transmitting, and accessing sensitive health data.
Achieving Compliance
Health plans must notify covered individuals how to obtain the Notice of Privacy Practices (NPP) at least every three years. This is a crucial step in maintaining compliance with HIPAA regulations.
The HIPAA compliance calendar is a tool that helps covered entities stay on track with their compliance obligations. In the case of a breach of Protected Health Information (PHI), a covered entity must notify individuals, HHS, and the media according to the deadlines set forth in the compliance calendar.
Title II of HIPAA, also known as the administrative simplification provisions, imposes requirements related to the privacy and security of protected health information. This includes requirements for how personal medical information may be used and disclosed.
Failure to comply with HIPAA regulations can result in heavy civil and criminal penalties. The US DHHS Office for Civil Rights can impose penalties of up to $25,000 per calendar year, while the US Department of Justice can impose penalties of up to 10 years imprisonment and a $250,000 fine.
To maintain compliance, it's essential to stay up-to-date with the latest guidance and regulations. The HIPAA website provides a wealth of resources, including contact information for the DSHS HIPAA Privacy Officer and guidance on NPI and other HIPAA-related topics.
Here are some key compliance milestones to keep in mind:
- Notify covered individuals how to obtain the NPP at least every three years
- Notify individuals, HHS, and the media in the event of a breach of PHI
- Comply with Title II of HIPAA, including requirements for the privacy and security of PHI
- Stay up-to-date with the latest guidance and regulations from the HIPAA website
Privacy and Security
The HIPAA privacy and security regulations are designed to protect individually identifiable health information. HIPAA privacy regulations were implemented on April 14, 2003, and define the rights of individuals to have more control over their health information.
The HIPAA security regulations, implemented on April 21, 2005, establish standards for the security of electronic protected health information (e-PHI). These regulations are organized into three high-level categories: administrative safeguards, physical safeguards, and technical safeguards.
Administrative safeguards include policies, procedures, and practices that guide security management and information access authorization/revocation, contingency planning, and training. Physical safeguards include protections that minimize physical access to information within buildings, floors, departments, offices, and desks. Technical safeguards include limiting electronic information access to particular users or user groups, including different levels of software access rights, and tracking access through audit controls.
Covered entities must implement certain security measures to maintain the safety of e-PHI and protect it against security threats and unauthorized disclosures. This includes implementing administrative, physical, and technical safeguards, as well as conducting a risk analysis and implementing a risk management plan.
Information Security
The HIPAA Security Rule was issued on February 20, 2003, and it's essential for covered entities to understand the three types of security safeguards required for compliance: administrative, physical, and technical.
Administrative safeguards include policies and procedures designed to clearly show how the entity will comply with the act. This includes guidelines for security management and information access authorization/revocation, contingency planning, and training.
Physical safeguards include protections that minimize physical access to information within buildings, floors, departments, offices, and desks. This includes doors, locks, badge access, location of workstations (obscured from public view), and media controls (e.g. location of back-up tapes).
Technical safeguards include limiting electronic information access to particular users or user groups, including different levels of software access rights, and tracking access through audit controls.
Covered entities must implement certain security measures to maintain the safety of electronic protected health information (PHI) and protect it against security threats and unauthorized disclosures. This includes a requirement to comply with the security rules in any business associate agreements.
PHI is any health information created or received by a covered entity that identifies (or reasonably could identify) an individual. This includes demographic information, information regarding an individual's past, present, or future physical or mental health condition, information about health care provided to the individual, and information about health care payments.
Here is a summary of the three types of security safeguards:
- Administrative Safeguards: policies and procedures for security management and information access authorization/revocation, contingency planning, and training.
- Physical Safeguards: protections that minimize physical access to information within buildings, floors, departments, offices, and desks.
- Technical Safeguards: limiting electronic information access to particular users or user groups, including different levels of software access rights, and tracking access through audit controls.
Privacy Rule
The Privacy Rule is a crucial aspect of HIPAA regulations, established on April 14, 2003. It sets standards for protecting individually identifiable health information and guarantees the rights of individuals to control their data.
Privacy rules define the rights of individuals and security rules define the process and technology required to ensure privacy. This means that covered entities must implement measures to safeguard PHI.
A covered entity may use or disclose PHI for treatment or payment purposes, or with proper authorization from a patient. This authorization must include specific elements, such as the description of the information to be disclosed, the names of those authorizing and receiving the disclosure, and the purpose of the disclosure.
Here are the required elements of a valid patient authorization:
- A description of the information to be disclosed;
- The name(s) of the people authorizing the disclosure and to whom the information may be disclosed;
- The purpose of the disclosure;
- An expiration date/event on the authorized disclosure;
- The signature of the individual or their representative and date;
- Notice that the individual may revoke the authorization in writing;
- Notice that the information disclosed may potentially be re-disclosed by the recipient, and
- A statement describing if the covered entity may condition treatment, payment, enrollment, or benefit eligibility on whether the individual signs the authorization and the consequences of not signing.
Some disclosures of PHI don't require written authorization, including those required by law, public health activities, and reports of child abuse or neglect.
Breach Notification
A breach is defined as the acquisition, access, use, or disclosure of PHI in a way that violates the Privacy Rule, and which compromises the security or privacy of the PHI. This can happen in many ways, but it's essential to know what constitutes a breach.
To determine if a breach has occurred, a four-factored risk assessment must be performed to demonstrate that it's improbable that PHI has been compromised. This assessment helps to determine the likelihood of a breach.
Breach notifications must be made to individuals affected without unreasonable delay and within sixty calendar days of the breach's discovery. This means that covered entities and business associates must act quickly to inform those who may have been affected.
The notification must include a description of what happened, the date of the breach, the date it was discovered, and a description of the type of information that was compromised. This helps individuals understand the situation and take necessary steps to protect themselves.
Individuals should also be informed of what they can do to protect themselves, as well as what the covered entity is doing to investigate, mitigate harm, and prevent future breaches. This transparency is crucial for maintaining trust.
In addition to notifying individuals, breaches involving more than 500 people must be reported to HHS contemporaneously with the notification to individuals and to prominent media outlets in the state within sixty days. This ensures that the breach is reported and addressed promptly.
Here is a list of required information to be included in a breach notification:
- A description of what happened;
- The date of the breach;
- The date the breach was discovered;
- A description of the type of information that was compromised;
- What the individual should do to protect himself or herself;
- What the covered entity is doing to investigate, mitigate harm, and prevent future breaches;
- Contact information for individuals to ask questions about the breach.
In some cases, breach notifications may be delayed if a law enforcement official states that the breach would interfere with a criminal investigation or damage national security. This delay can be a maximum of thirty days if the statement is made orally, or longer if a written statement is provided.
Administrative Simplification
Administrative Simplification is a key aspect of HIPAA, aiming to increase the efficiency of the healthcare system by creating standards for the use and dissemination of health care information. The Department of Health and Human Services (HHS) is responsible for implementing these standards.
Covered entities, which include health plans, healthcare clearinghouses, and healthcare providers that transmit health care data, must comply with the Administrative Simplification rules. These rules include the Privacy Rule, the Transactions and Code Sets Rule, the Security Rule, the Unique Identifiers Rule, and the Enforcement Rule.
The Transactions and Code Sets Rule standardizes the electronic exchange of information between trading partners, mandating the use of the ANSI ASC X12 version 4010 format for certain transactions. These transactions include eligibility inquiries, claim status inquiries, and authorization requests.
Here are some examples of the standardized transactions:
- 270 = Eligibility Inquiry
- 271 = Inquiry and Response
- 276 = Claim Status Inquiry
- 277 = Claim Status Inquiry and Response
- 278 = Authorization Request and Authorization Response
- 820 = Health Insurance Premium Payment
- 834 = Beneficiary Enrollment
- 835 = Remittance / Payment
- 837 = Claim or Encounter
Applicability to BYU–Hawaii
HIPAA applies to Brigham Young University because its Health Services is a provider of medical or health services, and transmits health information electronically to carry out financial or administrative activities related to health care.
The BYU–Hawaii Student Medical Benefit is also covered by HIPAA.
A covered entity is defined as a health plan, a health care clearinghouse, or a health care provider that transmits health information electronically to carry out financial or administrative activities related to health care.
In hybrid entities, only the parts of the entity that would be considered covered entities or business associates by themselves are subject to HIPAA requirements.
Electronic Data Exchange
Electronic Data Exchange is a crucial aspect of Administrative Simplification under HIPAA. HIPAA establishes uniform standards for transmitting health care information electronically.
Covered entities must use data code sets, which are codes for encoding data elements like medical diagnoses and procedures, when conducting certain transactions. These transactions include health claims, attachments to health claims, and the status of health claims.
The HIPAA Code Set Regulations specify the use of uniform standards for data elements, including diagnoses, procedures, supplies/devices, and additional clinical data. Specifically, HIPAA requires the use of ICD-9 for diagnoses, CPT 4 and CDT for procedures, HCPCS for supplies/devices, and Health Level Seven (HL7) for additional clinical data.
Covered entities and business associates must use the standard code sets to send and receive information in the following transactions:
- Health claims, attachments to health claims, and the status of health claims;
- Enrolling in or withdrawing from a health plan;
- Transactions regarding eligibility for a health plan;
- Advice on health care payment and remittance;
- Payments for health plan premiums and any other electronic funds transfers;
- The first report of an injury; and
- Referral certifications and authorizations.
Personnel Designations
Designating the right people to handle sensitive information is crucial. Covered entities and business associates must designate a privacy official and a security official to develop and implement policies and procedures related to the security and privacy of PHI.
These officials are responsible for ensuring that all aspects of PHI handling are properly managed. This includes creating and enforcing policies and procedures that protect sensitive information.
A covered entity must train all members of its workforce on its policies and procedures regarding PHI within a reasonable time after hiring. This ensures that everyone is on the same page when it comes to handling sensitive information.
Training is also necessary when material changes are made to an entity's policies and procedures. This ensures that everyone is aware of the changes and can adapt accordingly.
Recordkeeping
Recordkeeping is a crucial aspect of Administrative Simplification, and it's essential to understand what's required. Entities subject to HIPAA must keep records showing their compliance.
These records must be made available for review by the U.S. Department of Health and Human Services (HHS) if requested. This includes documentation of policies and procedures used to comply with HIPAA requirements.
Business associates of covered entities must also document their policies and procedures, and retain written records of those policies and procedures as well as compliance activities. This is a requirement for both covered entities and their business associates.
Retention of these records is also a must, with a minimum retention period of six years from each document's creation.
National Provider Identifiers (NPI)
The National Provider Identifier (NPI) is a unique 10-digit number that helps simplify administrative processes in healthcare, such as referrals and billing. It's used to identify healthcare providers and is required for all HIPAA-covered entities.
The NPI was introduced as part of the Administrative Simplification rules under HIPAA and is used to replace all other identifiers used by health plans, Medicare, Medicaid, and other government programs. It's not meant to replace a provider's DEA number, state license number, or tax identification number.
The NPI is not an embedded intelligence number, it's simply a unique identifier that can't be reused. Institutions may obtain multiple NPIs for different sub-parts, such as a free-standing cancer center or rehab facility.
All healthcare providers are eligible to be assigned an NPI, and healthcare providers who are covered entities must obtain and use NPIs. The compliance dates for using NPIs are May 23, 2007 for all but small health plans, and May 23, 2008 for small health plans.
Here are the compliance dates for using NPIs:
The NPI is a crucial part of the Administrative Simplification rules, which aim to increase the efficiency of the healthcare system by creating standards for the use and dissemination of healthcare information.
HIPAA Compliance Penalties
HIPAA has a tiered system of monetary penalties for violations, and the penalties increase depending on the nature and extent of the violation and the harm caused.
The least serious level of violation is "did not know", if the covered entity did not know about the violation, and would not have learned of it through reasonable diligence.
The maximum penalty for "did not know" violations is $50,000, and the maximum penalty for all identical violations in a calendar year is $1,500,000.
The next level is "reasonable cause", for actions or omissions the covered entity knew, or would have known with reasonable diligence, were a violation of the rules. This level carries a penalty of $1,000-$50,000 per violation, with a maximum of $1,500,000 for all identical violations in a calendar year.
Violations due to willful neglect can result in a penalty of $50,000 per violation, with a maximum of $1,500,000 for all identical violations in a calendar year.
If the violation is corrected within thirty days of when the person legally responsible for the violation found out about the failure to comply, the penalty will be waived in all cases except willful neglect.
Here is a breakdown of the penalty amounts for different levels of violations:
In all cases, the Secretary of HHS will consider many factors when determining the amount of a penalty.
Education
Education plays a crucial role in the implementation of the HIPAA Privacy Rule and Security Rule. Healthcare providers must receive initial training on HIPAA policies and procedures.
This training covers how to handle protected health information (PHI), including medical records, billing information, and other health information. Providers must learn about patient rights under HIPAA.
Regular fresher training is recommended to keep healthcare providers up to date with any changes in HIPAA regulations and best practices. This includes updates on new policies, procedures, and material changes to existing practices.
Effects on Research and Clinical Care
HIPAA has significantly impacted research and clinical care, causing both positive and negative effects.
The implementation of HIPAA has led to a drop in follow-up surveys completed by patients being followed long-term, with a 95% decrease in some cases.
Researchers have been affected by HIPAA restrictions, making it challenging to perform chart-based retrospective research and evaluate patients prospectively for follow-up.
This has resulted in a more than 70% decrease in patient accrual for cancer studies, as well as a tripling of time spent recruiting patients and mean recruitment costs.
The legal language required for research studies is now extensive, making these complex documents less user-friendly for participants.
Many researchers believe that HIPAA privacy laws harm the cost and quality of medical research.
Here are some key statistics on the impact of HIPAA on research:
- A study from the University of Michigan found a drop from 96% to 34% in the proportion of follow-up surveys completed by study patients being followed after a heart attack.
- A study on cancer prevention recruitment found a 73% decrease in patient accrual, a tripling of time spent recruiting patients, and a tripling of mean recruitment costs.
Costs and Issues
Implementing the HIPAA regulations can be costly. Many medical centers and practices were charged with complying with the new requirements before the enactment of the HIPAA Privacy and Security Acts.
The costs of compliance were significant, prompting many to seek private consultants for assistance. This added expense was a burden for many medical practices and centers.
Some medical centers and practices turned to private consultants for compliance assistance, which added to their overall costs.
Costs of Implementation
Implementing new regulations can be a costly affair. Many medical centers and medical practices were charged with complying with the HIPAA Privacy and Security Acts, which required significant resources.
The costs of implementation were substantial, with many practices turning to private consultants for compliance assistance. This added to the overall expense of meeting the new requirements.
Issues of Concern
One major issue with solar panels is their high upfront cost, which can range from $15,000 to $30,000 or more for a typical residential installation.
The cost of solar panels can be offset by government incentives, such as tax credits and rebates, which can cover up to 30% of the total cost.
However, the cost of solar panels can be a significant barrier for many homeowners, especially those with limited budgets.
Maintenance costs for solar panels are relatively low, typically around $100 to $300 per year, and can be performed by homeowners themselves.
However, if a panel is damaged or needs to be replaced, the cost can be substantial, ranging from $500 to $1,500 per panel.
In some cases, the cost of repairing or replacing a solar panel may not be worth it, especially if the panel is nearing the end of its 25-year lifespan.
The efficiency of solar panels can also be affected by environmental factors, such as shading from trees or buildings, which can reduce their energy output by up to 50%.
However, this can be mitigated by installing panels on south-facing roofs or using specialized panels designed for shaded areas.
In addition, the weight of solar panels can put additional stress on roofs, especially if they are not designed to handle the extra load.
However, most modern roofs are designed to handle the weight of solar panels, and manufacturers often provide guidance on the maximum weight capacity of their panels.
Consequences of HIPAA Non-Compliance
HIPAA non-compliance can result in significant fines, with the largest loss of data affecting 4.9 million people by Tricare Management of Virginia in 2011.
The US Department of Health and Human Services Office for Civil Rights received 91,000 complaints between April 2003 and January 2013, with 22,000 leading to enforcement actions.
Civil penalties for HIPAA violations can range from $100 to $50,000 per violation, with an annual maximum of $25,000 for repeat violations.
A fine of up to $50,000 and imprisonment up to 1 year can be imposed for covered entities and specified individuals who "knowingly" obtain or disclose individually identifiable health information.
The largest fines were levied against Memorial Healthcare Systems in 2017 for $5.5 million and against Cignet Health of Maryland in 2010 for $4.3 million.
Criminal penalties can include a fine of up to $250,000 and imprisonment up to 10 years for offenses committed with the intent to sell, transfer, or use individually identifiable health information for commercial advantage, personal gain, or malicious harm.
The table below summarizes the civil penalties for HIPAA violations:
Don't let HIPAA non-compliance happen to you. Take the necessary steps to ensure compliance and avoid these significant fines.
Implementation and Tools
The HIPAA Omnibus Rule introduced new tools to help with implementation, including a risk assessment tool to help organizations identify and mitigate risks.
The risk assessment tool is a key component of the HIPAA Security Rule and helps organizations identify vulnerabilities in their systems.
Covered entities must also implement a security awareness and training program to educate employees on HIPAA policies and procedures.
This training program should include regular updates and reminders to ensure employees are aware of any changes to HIPAA policies.
The HIPAA Breach Notification Rule requires covered entities to notify affected individuals in the event of a breach.
This notification must be made in a timely manner, with no delay in reporting the breach to the affected individuals.
Covered entities must also notify the Department of Health and Human Services (HHS) of any breaches that affect more than 500 individuals.
The HHS website provides a list of covered entities that have experienced a breach, which is updated regularly.
The HIPAA Security Rule requires covered entities to implement administrative, technical, and physical safeguards to protect electronic protected health information (ePHI).
These safeguards include access controls, audit controls, and integrity controls to ensure the confidentiality, integrity, and availability of ePHI.
Frequently Asked Questions
What are the main three rules of the Health Insurance Portability and Accountability Act HIPAA?
The main three rules of HIPAA are the Privacy Rule, Security Rule, and Breach Notification Rule, which work together to safeguard patient health information. Understanding these rules is crucial for protecting sensitive medical data.
Is HIPAA only in the US?
No, HIPAA applies internationally when sharing protected health information (PHI) with overseas third parties. This means that HIPAA rules can extend beyond the US borders.
What does HIPAA protect against?
HIPAA protects against threats to the security and integrity of sensitive information, as well as unauthorized uses or disclosures of that information. This includes potential risks to patient data, such as hacking, theft, or misuse.
What are the 5 main purposes of HIPAA?
HIPAA has five main provisions: Privacy, Security, Transaction, Identifiers, and Enforcement rules, which work together to ensure compliance with handling sensitive patient information. Understanding these provisions is crucial for businesses to protect and manage Protected Health Information (PHI) effectively.
What does HIPAA actually protect?
HIPAA protects individuals' medical records and other identifiable health information, safeguarding sensitive health details from unauthorized access. This protection applies to health plans, clearinghouses, and certain healthcare providers.
Sources
- https://en.wikipedia.org/wiki/Health_Insurance_Portability_and_Accountability_Act
- https://www.ncbi.nlm.nih.gov/books/NBK500019/
- https://www.dshs.texas.gov/health-insurance-portability-accountability-act-hipaa-home
- https://compliance.byuh.edu/research-memos/student-services/health-insurance-portability-and-accountability-act-hipaa
- https://saviynt.com/glossary-listing/health-insurance-portability-and-accountability-act-hipaa
Featured Images: pexels.com