HIPAA Privacy Rule for Dummies: Plain-English Overview and Compliance Basics

Check out the new compliance progress tracker


Product Pricing Demo Video Free HIPAA Training
LATEST
video thumbnail
Admin Dashboard Walkthrough Jake guides you step-by-step through the process of achieving HIPAA compliance
Ready to get started? Book a demo with our team
Talk to an expert

HIPAA Privacy Rule for Dummies: Plain-English Overview and Compliance Basics

Kevin Henry

HIPAA

February 28, 2024

7 minutes read
Share this article
HIPAA Privacy Rule for Dummies: Plain-English Overview and Compliance Basics

Overview of HIPAA Privacy Rule

The HIPAA Privacy Rule sets national standards for how health information is used and shared in the United States. It tells you who can see, use, and disclose your health data and under what conditions, balancing patient privacy with the flow of information needed for quality care.

The Rule applies to Covered Entities—health care providers, health plans, and health care clearinghouses—and to their Business Associates, which are vendors or partners that handle Protected Health Information (PHI) on their behalf. It establishes core principles like individual rights, minimum necessary use, and accountability through documented compliance policies and procedures.

While the Security Rule focuses on electronic PHI (ePHI) and details Administrative Safeguards, Physical Safeguards, and Technical Safeguards, the Privacy Rule requires reasonable protections for PHI in any form—paper, oral, or electronic—so people’s data is kept confidential throughout the care and payment process.

Definition of Protected Health Information

Protected Health Information (PHI) is individually identifiable health information created, received, maintained, or transmitted by a Covered Entity or Business Associate. It relates to a person’s past, present, or future physical or mental health, the health care they receive, or the payment for that care.

PHI includes common identifiers that could tie the information back to you, such as:

  • Name, address, and contact details (including email and phone)
  • Dates directly related to an individual (birth, admission, discharge)
  • Numbers like Social Security, medical record, account, certificate, or plan IDs
  • Device identifiers, IP addresses, and biometric identifiers
  • Full-face photos and comparable images

Data is not PHI when it is de-identified. De-identification can be achieved by removing specific identifiers (often called the “safe harbor” method) or through expert determination that the risk of re-identification is very small. A limited data set, which excludes most direct identifiers, may be used for certain purposes under a data use agreement.

Rights of Individuals Under the Privacy Rule

Right of Access

You can see and get a copy of your health records, including an electronic copy when available. Covered Entities must provide access within a reasonable timeframe and can charge only a cost-based fee for copies.

Right to Request Amendments

If information is incorrect or incomplete, you can request an amendment. Providers must review and respond; if they deny the request, you may add a statement of disagreement to your record.

Right to an Accounting of Disclosures

You can request a list of certain disclosures of your PHI made by the Covered Entity, excluding routine ones like treatment, payment, and health care operations, and disclosures you authorized.

Right to Request Restrictions and Confidential Communications

You may ask providers and plans to limit specific uses or disclosures and to communicate with you in a particular way (for example, via a different address). Covered Entities must honor certain restriction requests, especially when you pay out of pocket for services.

Right to Notice and to Complain

You are entitled to a Notice of Privacy Practices that explains how your PHI is used, your rights, and how to contact the organization’s privacy office. You can file complaints with the provider or with regulators without fearing retaliation.

Responsibilities of Covered Entities and Business Associates

Covered Entities

Covered Entities must adopt clear compliance policies and procedures, designate a privacy official, train their workforce, and apply sanctions for violations. They must provide the Notice of Privacy Practices, manage authorizations, honor individual rights requests, and apply the minimum necessary standard for uses and disclosures that are not for treatment.

Business Associates

Business Associates may create, receive, maintain, or transmit PHI only as allowed by a Business Associate Agreement (BAA). They must implement safeguards, limit uses and disclosures, ensure their subcontractors do the same, and report incidents involving PHI to the Covered Entity.

Minimum Necessary and Verification

Except for treatment and a few other situations, organizations should use, access, or disclose only the minimum PHI needed for the task. They must verify the identity and authority of requestors before releasing PHI and document these processes.

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Permitted Uses and Disclosures of PHI

Without Authorization

PHI may be used or disclosed without your written authorization for treatment, payment, and health care operations (often called “TPO”). Additional allowances include public health reporting, health oversight activities, certain law enforcement purposes, judicial and administrative proceedings, organ and tissue donation, research under specific safeguards, averting serious threats to health or safety, and workers’ compensation programs.

With Authorization

Most other uses—like marketing, many research activities without a waiver, or sharing psychotherapy notes—require your signed authorization describing what will be disclosed, to whom, and for what purpose. You can revoke an authorization prospectively at any time.

Required Disclosures

Covered Entities must disclose PHI to you upon request and to regulators for compliance investigations. They must also follow state laws that are more protective of privacy where applicable.

De-identified and Limited Data Sets

De-identified data is not PHI and can be used or shared freely. Limited data sets, stripped of most direct identifiers, can be used for research, public health, or health care operations under a data use agreement that limits re-identification and onward disclosure.

Safeguards and Compliance Requirements

Administrative Safeguards

Establish written compliance policies and procedures, assign a privacy official, conduct risk-based assessments, train staff regularly, manage authorizations and access rights, and maintain incident response and complaint handling processes. Periodically audit compliance and update practices when laws or operations change.

Physical Safeguards

Protect paper and electronic records with facility access controls, secure storage, clean desk practices, device and media controls, and secure disposal (such as shredding or certified destruction). Limit physical access to areas where PHI is stored or discussed.

Technical Safeguards

Use unique user IDs, strong authentication, role-based access, encryption where appropriate, automatic logoff, and audit logging for systems that store or transmit ePHI. Monitor for inappropriate access and remediate promptly.

Ongoing Program Management

Document decisions, BAAs, training, and risk mitigation steps. Test your processes, track deadlines for responding to individual rights requests, and ensure your compliance policies and procedures stay aligned with current operations and technologies.

Consequences of Non-Compliance

Civil Enforcement

Regulators can investigate complaints or suspected breaches and impose corrective action plans, monitoring, and tiered civil monetary penalties based on the level of negligence. Penalties apply on a per-violation basis and can add up quickly when issues are widespread or long-running.

Criminal Liability

Knowingly obtaining or disclosing PHI in violation of HIPAA can trigger criminal charges, with higher penalties for false pretenses or for actions taken for personal gain or malicious harm. Courts may impose fines and imprisonment depending on the circumstances.

Operational and Reputational Harm

Beyond fines, non-compliance can cause patient distrust, contract losses, costly remediation, and disruptions to clinical and business operations. A strong privacy culture and consistent safeguards are the best protection.

Conclusion

The HIPAA Privacy Rule gives you clear rights over your information and sets firm expectations for Covered Entities and Business Associates. By following the minimum necessary standard, honoring individual rights, and maintaining robust Administrative, Physical, and Technical Safeguards, organizations can meet legal obligations and earn lasting patient trust.

FAQs.

What types of information are protected under the HIPAA Privacy Rule?

Protected Health Information (PHI) includes any identifiable health information about your health status, care received, or payment for care, when held by a Covered Entity or Business Associate. It spans paper, electronic, and verbal forms and includes identifiers like names, addresses, record numbers, and full-face photos.

How do covered entities use and disclose PHI?

They may use and disclose PHI without authorization for treatment, payment, and health care operations, and for specific public interest purposes defined by the Rule. Other uses—such as many marketing activities—require your written authorization. In all cases, they apply the minimum necessary standard when it’s applicable.

What rights do individuals have regarding their health information?

You have the right to access and receive copies of your records, request amendments, obtain an accounting of certain disclosures, request restrictions, choose confidential communication methods, receive a Notice of Privacy Practices, and file complaints without retaliation.

What are the penalties for violating the HIPAA Privacy Rule?

Penalties range from corrective action plans and tiered civil monetary fines to criminal charges for intentional misconduct. Consequences can also include reputational damage, contract losses, and extensive remediation costs.

Share this article

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Related Articles