HIPAA Privacy Rule for Dummies: Simple Guide to PHI, Patient Rights, and Compliance

Check out the new compliance progress tracker


Product Pricing Demo Video Free HIPAA Training
LATEST
video thumbnail
Admin Dashboard Walkthrough Jake guides you step-by-step through the process of achieving HIPAA compliance
Ready to get started? Book a demo with our team
Talk to an expert

HIPAA Privacy Rule for Dummies: Simple Guide to PHI, Patient Rights, and Compliance

Kevin Henry

HIPAA

March 15, 2024

7 minutes read
Share this article
HIPAA Privacy Rule for Dummies: Simple Guide to PHI, Patient Rights, and Compliance

Understanding HIPAA Privacy Rule

What the Privacy Rule does and who must follow it

The HIPAA Privacy Rule sets national standards for how covered entities and their business associates use and disclose Protected Health Information (PHI). It balances two goals: protecting privacy and allowing the flow of health information needed for treatment, payment, and health care operations.

Covered entities include health care providers, health plans, and clearinghouses. Business associates handle PHI on their behalf. Together, they must safeguard Individually Identifiable Health Information in any form—paper, verbal, or electronic.

Permitted uses and disclosures

Other uses typically require written authorization. When sharing PHI, the Minimum Necessary Standard applies, meaning you disclose only what’s needed for the task.

De-identified information

Data that is de-identified is not PHI. De-identification occurs through expert determination or by removing specific identifiers under the “Safe Harbor” method. Limited data sets may be used for research and public health with a data use agreement.

Identifying Protected Health Information

What counts as PHI

PHI is Individually Identifiable Health Information that relates to a person’s health status, care, or payment and can reasonably identify the individual. It includes obvious identifiers and many indirect ones.

  • Names, addresses, contact details, and dates related to care.
  • Medical record numbers, account numbers, and device identifiers.
  • Clinical notes, imaging, lab results, bills, and insurance details.
  • Any combination of data points that could identify the person.

What is not PHI

  • De-identified information that cannot identify an individual.
  • Employment records held by a covered entity in its role as employer.
  • Student records covered by FERPA.

Applying the Minimum Necessary Standard

Design workflows to use, access, and disclose only the least amount of PHI needed. The standard does not apply to disclosures for treatment, to the individual, pursuant to an authorization, or to HHS for oversight. Role-based access, need-to-know rules, and routine protocols help you comply.

Explaining Patient Rights Under HIPAA

Right of access

You may request to inspect or obtain copies of your PHI in the form and format you prefer if readily producible. Covered entities generally must respond within 30 days, with one allowable 30-day extension when necessary, and may charge a reasonable, cost-based fee.

Right to request amendment

If you believe your record is inaccurate or incomplete, you can request an amendment. The entity typically has 60 days to act (with a limited extension). If denied, you can submit a statement of disagreement that becomes part of the record.

Right to an accounting of disclosures

You may receive an accounting of certain non-routine disclosures of your PHI for a defined lookback period. Routine treatment, payment, and operations disclosures are generally excluded.

Right to request restrictions

You can ask a provider to restrict disclosures to a health plan for a specific service when you pay in full out-of-pocket. Other restriction requests may be considered but are not required except in this scenario.

Right to confidential communications

You may request alternative means or locations for communications—such as a different address, phone number, or portal—when reasonable.

Right to a Notice of Privacy Practices

You are entitled to a clear Notice of Privacy Practices that explains how your PHI is used and your rights. Providers typically post it prominently and offer copies at the first encounter and upon request.

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Ensuring HIPAA Compliance Requirements

Core program elements

  • Designate leadership: define Privacy Officer Responsibilities and assign a Security Officer.
  • Policies and procedures: cover uses/disclosures, patient rights, sanctions, incident response, and retention.
  • Training and awareness: train workforce on job-specific privacy practices and phishing awareness.
  • Business Associate Agreements: contractually require partners to safeguard PHI.

Administrative Safeguards and Risk Analysis and Mitigation

Conduct an organization-wide risk analysis to identify where ePHI resides, the threats and vulnerabilities, and the likelihood and impact of harm. Prioritize mitigation actions, assign owners, and track progress with timelines.

  • Administrative Safeguards: security management process, workforce security, information access management, and contingency planning.
  • Technical and physical safeguards (at a high level): access controls, audit controls, encryption, device and facility security.

Repeat risk analysis regularly and after significant changes, then update the risk management plan accordingly.

Documentation and monitoring

  • Maintain written policies, meeting notes, training logs, and incident records.
  • Review audit logs and access reports; investigate anomalies and document outcomes.
  • Test contingency plans and revise procedures after exercises or real events.

Implementing Privacy Policies and Safeguards

A practical rollout plan

  1. Inventory PHI and data flows across EHRs, billing, portals, and third parties.
  2. Map lawful bases for each use/disclosure and embed Minimum Necessary Standard controls.
  3. Issue or refresh the Notice of Privacy Practices and verify patient distribution.
  4. Execute and track Business Associate Agreements with vendors handling PHI.
  5. Establish a request center for access, amendments, restrictions, and confidential communications.

Controls that work day-to-day

  • Role-based access, multi-factor authentication, and automatic logoff on all systems with ePHI.
  • Encryption of devices and transmissions; secure messaging for patient communications.
  • Standard release-of-information workflows with identity verification and approval checks.
  • Sanction policy enforcement for policy violations, with fair and consistent application.

Operational playbooks and metrics

  • Incident response: triage, contain, perform a breach risk assessment, notify when required, and implement corrective actions.
  • Change management: assess privacy impact before adopting new tech or workflows.
  • Program metrics: training completion, access request turnaround, and incident closure times.

Managing HIPAA Enforcement and Penalties

How enforcement works

The U.S. Department of Health and Human Services’ Office for Civil Rights Enforcement investigates complaints, breach reports, and targeted compliance reviews. Outcomes can include technical assistance, corrective action plans, resolution agreements, and monetary penalties.

Civil and criminal exposure

Civil penalties are tiered by culpability and assessed per violation, with annual caps and inflation adjustments. Serious or willful violations carry higher exposure. Criminal penalties can apply for knowingly obtaining or disclosing PHI, with increased penalties for false pretenses or harmful intent.

Breach notification basics

After discovering a breach of unsecured PHI, entities must notify affected individuals without unreasonable delay and no later than 60 days. Larger breaches trigger additional notices to HHS and, in some cases, the media. Your analysis should document the nature and extent of PHI involved, to whom it was disclosed, whether it was actually viewed or acquired, and mitigation steps taken.

Responding to investigations

  • Preserve evidence and assemble policies, risk analyses, training logs, and audit reports.
  • Demonstrate Risk Analysis and Mitigation activities and Administrative Safeguards in practice.
  • Implement and monitor corrective actions; validate effectiveness with follow-up audits.

In summary, you can meet HIPAA Privacy Rule obligations by understanding what PHI is, honoring patient rights promptly, embedding the Minimum Necessary Standard into daily operations, maintaining strong Administrative Safeguards, and preparing for Office for Civil Rights Enforcement through documented, repeatable practices.

FAQs.

What types of information are protected under the HIPAA Privacy Rule?

The rule protects Individually Identifiable Health Information—PHI—related to a person’s health, care, or payment that can identify them. It includes demographic details, medical and billing records, insurance information, and any data that, alone or combined, could reveal identity. De-identified information and certain employment or FERPA records are not PHI.

How can patients request access or amendments to their PHI?

Submit a written request to the provider or health plan. For access, specify your preferred form and format; you should receive a response within 30 days (with a limited extension) and may be charged a reasonable, cost-based fee. For amendments, explain what is wrong and why; the entity generally has 60 days to accept or deny and must let you add a statement of disagreement if denied.

What are the key compliance measures for covered entities?

Designate leadership and define Privacy Officer Responsibilities; maintain clear policies and procedures; train the workforce; execute Business Associate Agreements; conduct ongoing Risk Analysis and Mitigation; implement Administrative Safeguards with role-based access, audit logging, and incident response; apply the Minimum Necessary Standard; and provide an accurate Notice of Privacy Practices.

What penalties exist for violating HIPAA Privacy Rule?

Enforcement by the Office for Civil Rights can result in corrective action plans and tiered civil monetary penalties per violation, scaled by the level of negligence and subject to annual caps. In egregious cases, criminal penalties may apply for knowingly obtaining or disclosing PHI, with heightened consequences for intentional misuse.

Share this article

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Related Articles