HIPAA Privacy Rule at Work: Can Employees Access or Share PHI?
Employee Access to PHI
Who can access PHI at work?
Under the HIPAA Privacy Rule, only workforce members of a covered entity or its business associates may access Protected Health Information (PHI), and only to perform assigned duties. Your employer is usually not a covered entity, but your employer-sponsored group health plan is. Employees who support that plan—or staff of a provider, clinic, or insurer—may access PHI when their job requires it.
Role-based access and the minimum necessary
Covered entities must implement role-based permissions so people see only what they need to do their work. This “minimum necessary” standard governs most payment and health care operations uses. Organizations meet this through Protected Health Information access controls, unique user IDs, and documented need-to-know rules tied to job roles and workflows.
HIPAA workforce authorization in practice
Access is granted through documented HIPAA workforce authorization. Examples include a benefits administrator verifying eligibility, a billing specialist processing a claim, or a nurse reviewing charts for treatment. Using PHI for hiring, firing, or other employment decisions is not permitted.
Employment records vs. PHI
Medical information kept solely as part of employment records (for example, a doctor’s note for sick leave) is not PHI under HIPAA. Separate policies and other laws may still protect it, but HIPAA’s rules on access and disclosure do not apply to those employment records.
Sharing PHI Among Employees
Permitted internal disclosures
Sharing PHI among authorized workforce members is allowed for treatment, payment, and health care operations. For example, a claims analyst can confer with a utilization review nurse to resolve a claim. Disclosures for treatment are exempt from the minimum necessary standard; payment and operations are not.
Limit sharing to what’s needed
Even inside your organization, share only what is necessary to perform the task. If a summary or de-identified data will do, prefer that option. Do not forward PHI to supervisors, peers, or vendors who are not authorized for that information.
Secure collaboration
Use approved channels (secure messaging, encrypted email, or the EHR) and avoid public chat tools or personal email. Label PHI where feasible, verify recipient identity, and include a callback number for misdirected messages. Keep conversations about PHI out of common areas.
Employee Access to Own PHI
Where to make your request
To see or get copies of your PHI, submit a Right of Access request to the covered entity that holds the records: your health care provider, insurer, or the employer’s group health plan/third-party administrator—not your general HR team unless they serve as the plan administrator.
What to expect
- Timeline: the covered entity must respond within 30 calendar days (one 30-day extension is allowed with written notice).
- Scope: access to the “designated record set,” such as medical and billing records; not psychotherapy notes or certain litigation/quality review files.
- Format and fees: you may request paper or electronic copies; only reasonable, cost-based fees may be charged for copies and mailing.
- Identity verification: bring valid ID; remote portals may require multi-factor authentication.
Practical tips
Be specific about dates, providers, and types of records you want. If you need the records sent to a third party (for example, a caregiver), include a signed, clear direction with the recipient’s address and preferred format.
Safeguards for PHI
Administrative safeguards
Policies, risk analysis, and workforce training form the backbone of administrative safeguards for PHI. Define who may access PHI, when, and for what purpose; maintain sanction and incident response procedures; and review access logs routinely.
Physical safeguards
Strengthen physical security for health records with locked file rooms, clean-desk rules, badge-controlled areas, privacy screens, and secure disposal (cross-cut shredding or certified media destruction). Limit visitor access and escort vendors.
Technical safeguards
Implement technical safeguards for healthcare data such as encryption at rest and in transit, multi-factor authentication, automatic logoff, robust audit logging, and role-based access. Segment networks, patch systems promptly, and block insecure file-sharing tools.
Ready to simplify HIPAA compliance?
Join thousands of organizations that trust Accountable to manage their compliance needs.
Consequences of Unauthorized Access
Organizational actions
Violations trigger HIPAA compliance disciplinary measures ranging from retraining and written warnings to suspension or termination, depending on severity and intent. Breaches may require notification to affected individuals and regulators.
Legal and professional exposure
Civil penalties, criminal liability for knowing misuse, and state privacy claims may apply. Licensed professionals can face board sanctions. Repeated or intentional snooping (for example, looking up a neighbor’s records) is treated especially seriously.
Employer's Role in PHI Access
Plan sponsor responsibilities
For employer-sponsored group health plans, the employer acts as the plan sponsor and must limit PHI use to plan administration. Plan administration separation requirements require firewalls so employment decisions are kept separate from plan functions involving PHI.
Governance and vendors
Employers should adopt written plan documents, designate privacy and security officials, and execute business associate agreements with TPAs and vendors. Regular audits, access reviews, and breach drills keep controls effective.
Access control discipline
Use role-based provisioning, periodic recertification, and prompt deprovisioning at offboarding. Monitor logs for unusual access patterns and remediate gaps quickly.
Employee Training on PHI
What effective training covers
- Policies: who may access/share PHI, minimum necessary, and approved communication channels.
- Security awareness: phishing, password hygiene, secure remote work, and reporting suspicious activity.
- Practical scenarios: misdirected emails, requesting one’s own records, and responding to patient/member inquiries.
- Accountability: how sanctions work, when to escalate, and timelines for breach reporting.
Frequency and format
Provide onboarding training before access is granted, role-based refreshers at least annually, and just-in-time updates when systems or policies change. Use short modules and simulations to reinforce real-world decision-making.
Conclusion
The HIPAA Privacy Rule allows employee access and sharing of PHI only for authorized, job-related purposes and with strict safeguards. Clear roles, strong access controls, and ongoing training help you protect privacy, run compliant operations, and earn trust.
FAQs
Can a co-worker legally access my PHI under HIPAA?
Only if they are part of a covered entity or its business associate, are authorized for that role, and need the information to perform their job. Curious browsing or using PHI for employment decisions is not allowed. Employment records kept solely by the employer are not PHI, but other laws and policies may still restrict access.
What are the consequences of unauthorized PHI disclosure by employees?
Consequences can include internal discipline up to termination, mandatory breach notifications, regulatory investigations, civil penalties, potential criminal liability for willful misuse, and professional sanctions for licensed staff. Organizations also tighten monitoring and may require remedial training.
How should employees request access to their own PHI?
Send a Right of Access request to the covered entity that holds your records—your provider, insurer, or the employer’s group health plan/TPA. Specify what you need, choose paper or electronic format, verify your identity, and expect a response within 30 days (with one possible 30-day extension).
What safeguards must employers implement to protect PHI in the workplace?
Employers should maintain administrative safeguards (policies, training, sanctions), physical safeguards (secure areas, clean-desk, locked storage, proper disposal), and technical safeguards (encryption, MFA, audit logs, role-based access). Regular risk analyses and vendor oversight keep protections effective.
Ready to simplify HIPAA compliance?
Join thousands of organizations that trust Accountable to manage their compliance needs.