
HIPAA Safe Harbor is a crucial concept in the healthcare industry, and it's essential to understand its significance.
HIPAA Safe Harbor refers to the de-identification of protected health information (PHI), which removes personal identifiers to prevent re-identification.
According to the article, the Safe Harbor method involves removing 18 specific identifiers, such as names, addresses, and dates of birth.
This de-identification process ensures that PHI is no longer considered identifiable and therefore is not subject to HIPAA regulations.
De-identification Methods
The HIPAA Privacy Rule allows covered entities to de-identify data using two methods: Safe Harbor and Expert Determination.
The Safe Harbor method is a more hands-on approach that involves removing 18 PHI identifiers from data, including names, dates, and social security numbers.
To satisfy HIPAA provision 164.514(b)(2), covered entities must remove all 18 identifiers, such as geographic subdivisions, telephone numbers, and email addresses.
The identifiers to be de-identified include names, account numbers, biometric identifiers, and certificate and license numbers.
These identifiers can be used to uniquely identify a person and must be removed when using the Safe Harbor method.
Covered entities may also wish to re-identify data at a later date, which requires assigning a unique code to the dataset or specific records.
A predetermined set of 18 data values must be redacted from a patient dataset using the Safe Harbor method, which greatly reduces the utility of the remaining dataset for research purposes.
Here are the 18 identifiers to be removed under the Safe Harbor method:
- Names
- Account numbers
- Biometric identifiers
- Certificate and License numbers
- Dates, such as discharge dates, except the year
- Device identifiers and serial numbers
- Email addresses
- Fax numbers
- Full face photos and comparable images
- Geographic data, including geographic units, formed
- Health plan beneficiary numbers
- Internet protocol addresses
- Medical record numbers
- Social Security numbers
- Telephone numbers
- Vehicle identifiers and serial numbers, including license plates
- Web URLs
- Any unique identifying number characteristic or code
De-Identifiable Data
De-identified data is no longer considered protected health information (PHI) under HIPAA, so it's not subject to the same regulations.
The HIPAA Safe Harbor method requires removing 18 specific data values to de-identify patient data.
You can use the Safe Harbor method to de-identify patient data, but it greatly reduces the utility of the remaining dataset for research purposes.
The Safe Harbor method includes removing service dates, such as admission and discharge dates, which can help understand disease progression.
To de-identify patient data, you must remove all geographic subdivisions smaller than a state, including street address, city, county, and zip code.
You should also remove all dates (except year) related to an individual, such as birth dates and admission/discharge dates.
Removing telephone numbers, fax numbers, email addresses, and social security numbers is also required.
The HIPAA Safe Harbor method specifies the following list of specific data elements that you must remove:
- Names
- All geographic subdivisions smaller than a state, including street address, city, county, and zip code
- All dates (except year) related to an individual, such as birth dates and admission/discharge dates
- Telephone numbers
- Fax numbers
- Email addresses
- Social Security numbers
- Medical record numbers
- Health plan beneficiary numbers
- Account numbers
- Certificate/License numbers
- Vehicle identifiers and serial numbers
- Device identifiers and serial numbers
- Web URLs
- IP addresses
- Biometric identifiers, including finger and voice prints
- Full face photographic images and similar images
By removing these data elements, you can de-identify patient data and ensure HIPAA compliance.
Elements to Remove
Names must be removed from a dataset to ensure it is de-identified.
According to the HIPAA Safe Harbor Method, you must remove all geographic subdivisions smaller than a state, including street address, city, county, and zip code.
Telephone numbers and fax numbers must be removed as well.
Removing email addresses is also necessary to de-identify a dataset.
Social Security numbers and medical record numbers are also identifiers that must be removed.
You must also remove health plan beneficiary numbers, account numbers, and certificate/license numbers.
Device identifiers and serial numbers, vehicle identifiers and serial numbers, and web URLs must be removed as well.
IP addresses and biometric identifiers, including finger and voice prints, must also be removed.
Full face photographic images and similar images must be removed to de-identify a dataset.
Here is a list of data elements that must be removed to ensure a dataset is de-identified:
- Names
- All geographic subdivisions smaller than a state, including street address, city, county, and zip code
- All dates (except year) related to an individual, such as birth dates and admission/discharge dates
- Telephone numbers
- Fax numbers
- Email addresses
- Social Security numbers
- Medical record numbers
- Health plan beneficiary numbers
- Account numbers
- Certificate/License numbers
- Vehicle identifiers and serial numbers
- Device identifiers and serial numbers
- Web URLs
- IP addresses
- Biometric identifiers, including finger and voice prints
- Full face photographic images and similar images
Structural also identifies credit card numbers, international bank account numbers (IBAN), and SWIFT codes for bank transfers as other types of identifiers that should be removed.
De-Identification Process
The HIPAA Safe Harbor method of de-identification is a process of removing specific information about a patient that can be used to identify them. This includes the patient's name, address, and other identifying factors.
The Safe Harbor method involves removing 18 specific identifiers, including names, dates of birth, and geographic locations. This is a more hands-on approach to de-identification.
To de-identify patient data, you can use either the Safe Harbor or Expert Determination method. The Safe Harbor method is a highly prescriptive method that protects patient privacy, but it also reduces the utility of the remaining dataset for research purposes.
The Expert Determination method involves human expert review, where a tokenized dataset is analyzed by a human expert with deep domain expertise in statistics and data science.
To choose between Safe Harbor and Expert Determination, consider the balance between utility and patient privacy. If you're looking to make your data available for further research and analysis, Expert Determination may be the better choice.
Here are the 18 identifiers that must be removed using the Safe Harbor method:
- Names
- Account numbers
- Biometric identifiers
- Certificate and License numbers
- Dates, such as discharge dates, except the year
- Device identifiers and serial numbers
- Email addresses
- Fax numbers
- Full face photos and comparable images
- Geographic data, including geographic units, formed
- Health plan beneficiary numbers
- Internet protocol addresses
- Medical record numbers
- Social Security numbers
- Telephone numbers
- Vehicle identifiers and serial numbers, including license plates
- Web URLs
- Any unique identifying number characteristic or code
The Expert Determination method involves a human expert reviewing the tokenized dataset to determine if the tokens pose a very small risk of re-identification. The expert may recommend redaction, modification, or removal of additional data elements to reduce risk.
Compliance and Regulation
Compliance and Regulation is a crucial aspect of HIPAA Safe Harbor. Failure to comply with the HIPAA Privacy Rule, Security Rule, and Breach Notification Rule can result in civil money penalties. Fines for relatively benign violations can range from $119 to $59,522 dollars.
To avoid these penalties, companies must abide by the HIPAA Security and Breach Notification Rules. The HIPAA Enforcement Rule outlines the penalties for non-compliance, which can be broken down into two types: civil money penalties and criminal penalties. Civil money penalties can be further divided into fines for "did not know", "reasonable cause", "willful neglect with correction", and "willful neglect without correction." Criminal penalties for intentional misuse, false pretenses, and personal gain can result in imprisonment and fines up to $250,000 dollars.
Here are the specific civil money penalties outlined in the HIPAA Enforcement Rule:
Choosing Expert Determination
Expert determination is a method of de-identification that involves a human expert reviewing a tokenized dataset to determine if the tokens pose a very small risk of re-identification.
This method provides a great deal of flexibility when trying to balance the utility of patient data without compromising patient privacy.
The expert may recommend redaction, modification, or removal of additional data elements in the existing tokenized dataset to reduce risk of re-identification.
These recommendations are typically documented in a written expert determination report, otherwise known as a certification.
Organizations must then implement these recommendations as remediations to their existing tokenized patient data.
Here are some key characteristics of expert determination:
A key advantage of expert determination is that it allows for the de-identification of patient data for organizations looking to make their data available for further research and analysis.
This is particularly useful for organizations working with rare diseases, where the patient diagnosis, zip code, and a few other data elements may raise the risk that someone could determine a patient's identity.
Understanding the Privacy Rule
The HIPAA Privacy Rule is the foundation of the entire HIPAA framework, first proposed in 1999 and finalized in 2000. It sets the stage for subsequent HIPAA rules and regulations, including the most recent update in December 2020, which adapts certain protections to the COVID-19 environment.
The Privacy Rule defines the specific conditions under which PHI may be used or disclosed, to whom, and why. It also explains cases in which PHI must be disclosed and restrictions on permitted uses and disclosures.
The primary function of the Privacy Rule is to define the conditions under which use or disclosure is permitted. These conditions include:
- When a use or disclosure of PHI is requested by its subject or a representative or in other cases in which the use or disclosure is to its subject or their representative.
- When the use or disclosure is critical to the treatment of patients, the billing of clients, or the general fidelity of healthcare operations of the covered entity.
- When the use or disclosure occurs after a period in which the subject or representatives have been given an opportunity to agree or object, such as notifications to family members.
- When one instance of use or disclosure is closely linked to and incidental to a permitted use or disclosure, such as in the case of an accidental overuse or over-disclosure.
- When the use or disclosure is in the public interest or for public benefit, including but not limited to law enforcement, public health concerns, governmental functions, and research.
- When the use or disclosure is of a limited data set, with identifiable information removed, for scientific research, pending agreement on safeguards, PHI is used.
Uses and disclosures that fall outside the scope of these conditions are not permitted. But uses or disclosures to the subject of PHI are required, as are disclosures to government agencies like the HHS.
Cybersecurity, Simplified
HIPAA compliance is a complex process, but it's essential to protect sensitive patient data. The HIPAA Security Rule ensures the confidentiality, integrity, and availability of PHI and electronic PHI (ePHI).
The Security Rule has three components: Administrative, Physical, and Technical safeguards. Administrative safeguards are implemented at the management level, including security management protocols and workforce training.
To ensure compliance, covered entities must establish a risk management program to monitor, analyze, and mitigate threats and vulnerabilities impacting PHI and ePHI.
Here are the three components of the HIPAA Security Rule:
RSI Security is a trusted provider of custom-tailored solutions to HIPAA compliance. They offer a unique blend of software-based automation and managed services to help organizations manage IT governance, risk management, and compliance efforts.
What Is
The HIPAA Safe Harbor provision is a clear method to transform protected health information (PHI) into de-identified data.
This provision is included in the HIPAA Privacy Rule, which restricts how PHI can be used and disclosed. The HIPAA Safe Harbor provision is the process of removing specific information about a patient that can be used to identify them.
The HIPAA Safe Harbor method involves removing 18 PHI identifiers, including names, geographic locations, critical dates, and social security numbers.
Here are the 18 PHI identifiers that must be removed:
- The name(s) of the individual patient, their family members and employers, household members, and other close connections that could be used to identify the PHI's subject
- Geographic location(s) of a smaller subdivision than the state the patient lives within
- Critical dates unique to the individual, except for years, including birth date, dates of admission and dismissal from a medical facility, and specific age for patients over 90
- Telephone numbers at which the patient can be reached (home, mobile, work, etc.)
- All information pertinent to the patient's vehicle(s), including license plate numbers
- Fax numbers at which the patient may be sent documents, including home and work
- Numbers to identify the patient's medical devices, such as model and serial numbers
- Email addresses at which the patient can be reached, including personal and work
- Web universal resource locators (URLs) unique to the patient, like personal websites
- The patient's social security number, save for a limited portion thereof in some cases
- Any internet protocol (IP) addresses associated with the patient's connected devices
- All numbers related to the patient's medical records, including coding for procedures
- All biometric identifiers of the patient, including data on retina scans and fingerprints
- All numbers and coding related to the patient's healthcare plans and beneficiaries
- Full-face photographs or images that could reasonably be used for facial recognition
- All numbers and credentials related to all of the patient's personal and work accounts
- All other coding or numbers that are unique to the individual and could be used for the purpose of identification, except any those for covered entities' permitted re-identification
- Numbers pertinent to the patient's certificates, licenses, and other official documentation
By removing these identifiers, covered entities satisfy HIPAA provision 164.514(b)(2) and, by extension, 164.514(a).
Sources
- https://satoricyber.com/data-classification/the-safe-harbor-method-of-de-identification-2/
- https://www.techtarget.com/healthtechsecurity/feature/De-Identification-of-PHI-According-to-the-HIPAA-Privacy-Rule
- https://www.tonic.ai/guides/using-tonic-structural-and-the-safe-harbor-method-to-de-identify-phi
- https://www.datavant.com/hipaa-privacy/privacy-compliance-deidentified-patient-data
- https://blog.rsisecurity.com/safe-harbor-provisions-under-hipaa-explained/
Featured Images: pexels.com