HIPAA Cheat Sheet for CDI Specialists: PHI, Minimum Necessary, and Documentation Best Practices
Protected Health Information Overview
Under the HIPAA Privacy Rule, Protected Health Information (PHI) is any individually identifiable information about a patient’s health status, care, or payment that is created or maintained by a covered entity or its business associate. For CDI specialists, this includes EHR notes, provider queries, diagnostic results, and coding/abstracting work products that reference a specific patient.
PHI is identifiable when it includes one or more direct identifiers or when a reasonable person could re-identify the individual from the data. Employment or education records kept by a non-covered employer or school are not PHI, even if health-related.
The 18 HIPAA identifiers
- Names
- Geographic subdivisions smaller than a state (street address, city, county, precinct, ZIP code, and similar geocodes)
- All elements of dates (except year) related to an individual; ages over 89 may be aggregated as 90+
- Telephone numbers
- Fax numbers
- Email addresses
- Social Security numbers
- Medical record numbers
- Health plan beneficiary numbers
- Account numbers
- Certificate/license numbers
- Vehicle identifiers and serial numbers (including license plates)
- Device identifiers and serial numbers
- Web URLs
- IP addresses
- Biometric identifiers (finger, voice prints, etc.)
- Full-face photos and comparable images
- Any other unique identifying number, characteristic, or code
De-identified data and limited data sets
Data are de-identified when the 18 identifiers are removed and you have no actual knowledge of residual identifiability, or when an expert determines the risk is very small. A limited data set may include city, state, ZIP code, and dates, but excludes direct identifiers and requires a data use agreement.
Minimum Necessary Standard Application
The Minimum Necessary Standard requires you to limit the PHI you access, use, or disclose to the least amount needed to accomplish a specific task. Your Health Information Technology tools (e.g., EHR filters, role-based views) should support this principle in day-to-day CDI work.
Key exceptions
- Uses or disclosures for treatment by a health care provider
- Disclosures to the individual (or personal representative)
- Uses/disclosures made under a valid authorization
- Uses/disclosures required by law or for compliance investigations
Practical steps for CDI specialists
- Open only the charts and time frames necessary to support the current review or query.
- Use targeted searches (labs, imaging, problem lists) instead of browsing entire records.
- Avoid sensitive areas (e.g., psychotherapy notes or specially protected records) unless policy permits and the information is directly relevant.
- Share summaries or de-identified details when full PHI is not required.
- Configure worklists and dashboards to display minimal elements needed for triage.
Documentation Compliance Guidelines
High-quality Medical Record Documentation underpins accurate coding, appropriate reimbursement, and defensible quality metrics. Your documentation should be accurate, timely, complete, consistent, and auditable.
Core principles
- Authenticate entries with date, time, and credentials; never chart for another user.
- Ensure diagnoses are clinically supported by exam findings, diagnostics, and treatment.
- Use standard terminology; avoid ambiguous abbreviations and copy-paste cloning.
- Capture present-on-admission, severity, and cause/relationship as appropriate.
Compliant provider queries
- State the clinical indicators succinctly and objectively; avoid leading language.
- Offer clinically reasonable options, including “unable to determine,” and “other (specify).”
- Route through approved workflows; retain queries and responses per policy.
- Time-stamp, attribute, and reconcile changes back to the record to maintain integrity.
Corrections and amendments
- Correct errors via approved addendum/amendment functionality; preserve the audit trail.
- Never delete or obscure prior content; document the reason for the change.
Common pitfalls to avoid
- Copy-forward without verification, resulting in contradictory notes.
- Unsubstantiated diagnoses or severity levels inconsistent with the clinical picture.
- Storing PHI on personal devices, unapproved spreadsheets, or unsecured notes.
Patient Privacy Safeguards
Protect privacy with layered administrative, physical, and technical controls. Build safeguards into daily workflows so that protecting PHI becomes the easy, default path.
Ready to simplify HIPAA compliance?
Join thousands of organizations that trust Accountable to manage their compliance needs.
Administrative, physical, and technical measures
- Administrative: annual training, role-based policies, sanctions for violations, and vendor management (business associate agreements).
- Physical: badge-controlled areas, clean-desk policy, privacy screens, and secure disposal of paper with PHI.
- Technical: unique IDs, multi-factor authentication, auto-locking screens, encryption at rest and in transit, and DLP tools.
Communication hygiene
- Use approved secure messaging; avoid PHI in email subject lines or unencrypted channels.
- Verify identity before discussing cases by phone; keep voices low in public areas.
- Limit whiteboard or huddle content to the Minimum Necessary.
Remote and mobile work safeguards
- Access systems through VPN on managed, patched devices; avoid public Wi‑Fi for PHI.
- Restrict printing and local downloads; store only in approved repositories.
- Do not paste PHI into unapproved apps or external tools (including generative AI services).
Data Access and Disclosure Controls
Control who can view what, when, and why. Effective access governance reduces risk while enabling efficient CDI review.
Provisioning and access governance
- Apply role-based access control; review access rights at onboarding, job changes, and offboarding.
- Use “break-glass” access only for emergencies, with justification and post-event review.
- Isolate VIP/sensitive charts and enforce heightened monitoring.
Disclosures and sharing
- Confirm legal basis (treatment, payment, health care operations, authorization, or law) before sharing PHI.
- Verify recipient identity and permissible purpose; send via approved secure channels.
- Document non-routine disclosures and maintain an accounting when required.
- Prefer de-identified or limited data sets when full PHI is not necessary.
Audit and Monitoring Practices
Compliance Auditing validates that policies work as intended and that users follow them. Use Health Information Technology to automate, alert, and report.
What to monitor
- Access logs for inappropriate viewing (e.g., snooping, same-surname lookups, VIP charts).
- Query quality, turnaround times, and resolution rates.
- Copy-paste prevalence, late entries, and signature completion.
- Security events from DLP/endpoint tools and failed login patterns.
Metrics and cadence
- Set thresholds and KPIs (e.g., percent of queries with complete clinical indicators, number of unauthorized accesses detected per month).
- Conduct periodic risk analyses and targeted deep dives after changes in workflow or technology.
Responding to findings
- Investigate promptly, document outcomes, and apply sanctions when appropriate.
- Close the loop with corrective actions, training refreshers, and policy updates.
Reporting and Breach Response Procedures
Act quickly and methodically when privacy or security incidents occur. Early containment and thorough documentation reduce patient harm and regulatory exposure.
Immediate actions
- Contain the incident (e.g., recall/secure misdirected messages, disable compromised accounts).
- Preserve evidence (timestamps, messages, screenshots) and notify your privacy/compliance leader.
- Record who, what, when, where, and how; avoid speculating beyond known facts.
Risk assessment
- Type and sensitivity of PHI involved
- Unauthorized person who used/received the PHI
- Whether the PHI was actually viewed or acquired
- The extent to which risks have been mitigated (e.g., confirmed deletion, encryption)
Notifications
- Notify affected individuals without unreasonable delay and no later than 60 days after discovery, describing what happened, what information was involved, recommended protective steps, and contact information.
- For incidents affecting 500 or more residents of a state or jurisdiction, notify prominent media and report to the designated federal authority within 60 days; for fewer than 500, submit the annual log as required.
- Document all determinations, risk assessments, and notifications to maintain a defensible record.
Post-incident improvement
- Address root causes via process redesign, technical hardening, and focused training.
- Track action items to completion and reassess risk after changes are implemented.
Conclusion
As a CDI specialist, you safeguard both clinical integrity and patient trust. By mastering PHI boundaries, applying the Minimum Necessary Standard, documenting clearly, and enforcing strong Data Security Protocols, you reduce risk and improve care quality. This guide is informational and not legal advice; follow your organization’s policies and consult your privacy officer for case-specific direction.
FAQs
What constitutes PHI under HIPAA?
PHI is individually identifiable health information created or maintained by a covered entity or business associate that relates to health status, care, or payment. It includes common identifiers such as names, dates (except year), contact details, medical record numbers, biometric data, full-face photos, device and account numbers, IP addresses, and any other unique code that could identify a patient.
How does the Minimum Necessary rule apply to CDI specialists?
You should access, use, and disclose only the PHI required to perform your CDI task—nothing more. Use role-based views, targeted chart searches, and de-identified summaries when feasible. The rule does not apply to disclosures for treatment or to the individual, but limiting exposure remains a good practice.
What are the key documentation requirements for HIPAA compliance?
Authenticate entries, ensure clinical support for diagnoses, avoid leading queries, and maintain an audit trail for corrections. Keep queries and responses in approved systems, use standard terminology, and refrain from copying forward content that you have not verified. Store PHI only in sanctioned locations.
How should a CDI specialist respond to a suspected HIPAA breach?
Immediately contain the issue, preserve evidence, and notify your privacy/compliance lead. Complete a four-factor risk assessment, document decisions, and coordinate required notifications—typically without unreasonable delay and no later than 60 days after discovery—then implement corrective actions to prevent recurrence.
Ready to simplify HIPAA compliance?
Join thousands of organizations that trust Accountable to manage their compliance needs.