HIPAA and Employee Data: What’s Covered, What Isn’t, and Compliance Steps
Understanding how HIPAA intersects with employee data helps you protect privacy, avoid enforcement actions, and run compliant benefits programs. This guide clarifies what counts as Protected Health Information (PHI), what falls outside HIPAA, and the practical steps to build a defensible compliance program.
HIPAA Coverage of Employee Health Information
HIPAA applies to covered entities—health plans, most health care providers, and health care clearinghouses—and to their business associates that create, receive, maintain, or transmit PHI for them. Employers are not covered entities in their role as employers, but the group health plans they sponsor are covered entities.
When employee data becomes PHI
- Group health plan data: enrollment, eligibility, claims, preauthorizations, appeals, and care management communications.
- Employee assistance programs and wellness programs integrated with the health plan.
- On‑site clinics or telehealth services that bill a health plan or otherwise operate as providers subject to HIPAA.
- Any individually identifiable health information an employer receives from a plan or provider for plan administration under strict HIPAA rules.
Key conditions to remember
- PHI is covered only when created, received, maintained, or transmitted by a covered entity or business associate.
- The “minimum necessary” standard limits how much PHI you access, use, or disclose.
- Plan sponsors must erect firewalls that segregate plan PHI from general HR files and restrict access to authorized personnel.
Exclusions of Employment and Financial Records
Employment records that an employer maintains in its role as employer are expressly excluded from HIPAA. These are not PHI, even if they contain medical details.
Common exclusions
- Leave requests and certifications (e.g., FMLA), ADA accommodation files, fitness‑for‑duty notes, and pre‑employment or workplace drug testing results retained by HR.
- Workers’ compensation records held by the employer (though providers’ records remain subject to HIPAA and may be disclosed as permitted by law).
- Security and badge logs, incident reports, and general personnel files.
Financial information
Payroll data, bank details, credit card numbers, and tax forms are not PHI and are outside HIPAA. However, patient billing information held by a provider or health plan is PHI because it is tied to health care services.
Note that other federal or state laws may govern employment and financial records; HIPAA simply does not.
Implementing Safeguards for PHI
To protect PHI and electronic PHI (ePHI), you must implement Administrative Safeguards, Physical Safeguards, and Technical Safeguards, supported by sound policies and procedures.
Administrative Safeguards
- Designate a Privacy Official and Security Official; define roles and “need‑to‑know” access.
- Adopt policies for minimum necessary, authorizations, disclosures, and breach response.
- Workforce clearance, role‑based access, and a written sanction policy for violations.
- Contingency planning: data backups, disaster recovery, emergency operations.
- Vendor oversight and Business Associate Agreements before any PHI sharing.
Physical Safeguards
- Facility access controls and visitor management for areas storing PHI.
- Workstation security, privacy screens, secure storage for paper PHI.
- Device and media controls: encryption, inventory, and certified destruction.
Technical Safeguards
- Unique user IDs, multi‑factor authentication, and least‑privilege access.
- Encryption in transit and at rest; secure messaging for PHI.
- Audit logs and monitoring; integrity controls to prevent improper alteration.
- Session timeouts, mobile device management, and data loss prevention.
Operational disciplines
- Data mapping and classification so you know exactly where PHI/ePHI resides.
- Change management to evaluate security impacts before system updates.
- Documented Breach Notification procedures and an incident response playbook.
Conducting Risk Assessments
A HIPAA Risk Assessment (risk analysis) is the cornerstone of the Security Rule and informs risk management decisions.
Ready to simplify HIPAA compliance?
Join thousands of organizations that trust Accountable to manage their compliance needs.
How to execute a defensible assessment
- Scope: inventory systems, applications, data stores, vendors, and data flows touching ePHI.
- Identify threats and vulnerabilities: phishing, misconfigurations, lost devices, insider misuse, third‑party risk.
- Evaluate likelihood and impact; assign risk ratings and document existing controls.
- Prioritize remediation with owners, timelines, and target control states.
- Track closure, validate effectiveness, and keep evidence of decisions.
- Review at least annually and whenever you introduce major technology or process changes.
Training Employees on HIPAA Compliance
Training ensures policies become daily habits and is required for workforce members with PHI access.
Program essentials
- Provide training before granting access and refresh at least annually; add role‑based modules for HR staff who handle plan PHI.
- Cover PHI definitions, minimum necessary, approved communication channels, identity verification, and secure disposal.
- Teach phishing recognition, password hygiene, and incident reporting without delay.
- Explain how Business Associate Agreements affect vendor interactions and data sharing.
- Measure comprehension with quizzes and track completion for audit readiness.
Establishing Business Associate Agreements
Business associates include any vendor that creates, receives, maintains, or transmits PHI on behalf of your plan or provider functions—cloud services, TPAs, analytics, EAP vendors, consultants, and more.
What your BAA must cover
- Permitted uses and disclosures and the minimum necessary standard.
- Safeguard obligations aligned to Administrative Safeguards and Technical Safeguards.
- Incident and Breach Notification duties, including timelines and cooperation.
- Subcontractor flow‑downs, right to audit, and documentation retention.
- Return or destruction of PHI at termination and rights to terminate for cause.
Vendor risk management
- Conduct due diligence (security questionnaires, certifications, penetration testing summaries) before sharing PHI.
- Maintain an up‑to‑date inventory of vendors and signed Business Associate Agreements.
- Reassess vendors periodically and after significant incidents or service changes.
Understanding Penalties for Non-Compliance
HIPAA enforcement includes Civil and Criminal Penalties, corrective action plans, and ongoing monitoring. Costs also stem from investigations, remediation, and reputational damage.
Civil enforcement
- OCR applies tiered civil monetary penalties per violation, with annual caps adjusted for inflation.
- Factors include the nature and duration of non‑compliance, harm caused, and your cooperation and remediation.
- State attorneys general may bring separate actions under HIPAA and state law.
Criminal enforcement
- Knowingly obtaining or disclosing PHI in violation of HIPAA can trigger criminal fines and imprisonment.
- Offenses involving false pretenses or intent to sell, transfer, or use PHI for personal gain or malicious harm carry higher penalties.
Breach Notification obligations
- Notify affected individuals without unreasonable delay and no later than 60 days after discovery of a reportable breach.
- Notify HHS, and for breaches affecting 500 or more individuals in a state or jurisdiction, notify prominent media as required.
- Maintain a log of smaller breaches and submit annually to HHS.
Conclusion
Separate plan PHI from HR records, enforce least‑privilege access, implement layered safeguards, complete a rigorous Risk Assessment, train your workforce, and manage vendors through strong Business Associate Agreements. These steps reduce risk, streamline Breach Notification if needed, and demonstrate good‑faith HIPAA compliance.
FAQs.
What types of employee data are protected under HIPAA?
PHI includes any individually identifiable health information created, received, maintained, or transmitted by a health plan, provider, clearinghouse, or their business associates. For employees, this commonly covers group health plan records (enrollment, claims, preauthorizations), EAP or wellness program data tied to the plan, and clinical records when the employee is a patient. Employment records kept by HR in its employer role are not PHI.
How should employers handle PHI to remain compliant?
Segregate plan PHI from HR files, restrict access to designated staff, and apply Administrative Safeguards, Physical Safeguards, and Technical Safeguards. Conduct a formal Risk Assessment, train your workforce, document policies and sanctions, and maintain Business Associate Agreements with vendors. Prepare an incident response plan with clear Breach Notification procedures and test it.
Are financial and employment records covered by HIPAA?
No. Financial records like payroll and banking data and employment records (e.g., leave certifications, ADA files, drug test results) held by the employer are outside HIPAA. However, billing information maintained by a provider or health plan is PHI because it relates to health care services. Other laws—not HIPAA—may govern non‑PHI employment and financial records.
What are the consequences of HIPAA non-compliance for employers?
Expect tiered civil monetary penalties, potential criminal exposure for egregious violations, and corrective action plans enforced by regulators. You may face investigation costs, legal fees, vendor re‑engineering, reputational harm, and the expenses of Breach Notification, credit monitoring, and long‑term remediation.
Table of Contents
Ready to simplify HIPAA compliance?
Join thousands of organizations that trust Accountable to manage their compliance needs.