HIPAA Privacy Rule Requirements: Paper, Oral, and Electronic PHI Compliance

Check out the new compliance progress tracker


Product Pricing Demo Video Free HIPAA Training
LATEST
video thumbnail
Admin Dashboard Walkthrough Jake guides you step-by-step through the process of achieving HIPAA compliance
Ready to get started? Book a demo with our team
Talk to an expert

HIPAA Privacy Rule Requirements: Paper, Oral, and Electronic PHI Compliance

Kevin Henry

HIPAA

February 21, 2025

7 minutes read
Share this article
HIPAA Privacy Rule Requirements: Paper, Oral, and Electronic PHI Compliance

HIPAA Privacy Rule requirements apply to protected health information in every format—paper files, oral conversations, and electronic records. If you create, receive, maintain, or transmit PHI, you need policies, procedures, and safeguards that keep disclosures appropriate, access controlled, and risk managed while supporting care and operations.

HIPAA Privacy Rule Scope

What counts as PHI

Protected health information (PHI) is any individually identifiable health information related to a person’s health status, care, or payment that you hold or transmit in paper, oral, or electronic form. Names, addresses, full‑face photos, medical record numbers, claim details, and diagnoses are common examples.

Who must comply

The Privacy Rule covers “covered entities” (health care providers that conduct standard transactions, health plans, and health care clearinghouses) and their business associates that handle PHI on their behalf. Your responsibilities follow the PHI, regardless of whether it sits in a filing cabinet, an EHR, or is spoken at a nursing station.

Where PHI resides

Many Privacy Rule rights and obligations attach to “designated record sets,” such as medical and billing records used to make decisions about individuals. You should know what systems, repositories, and workflows comprise your designated record sets to respond accurately to access requests and apply controls consistently.

Safeguards Requirement

The Privacy Rule requires reasonable safeguards to protect PHI against inappropriate uses and disclosures. You must tailor controls to your risks, environment, and workforce.

Administrative safeguards

  • Written policies and procedures covering uses/disclosures, sanctions, and complaint handling.
  • Workforce training and role‑based access standards to limit who may see PHI.
  • Risk assessments and routine monitoring of how paper, oral, and electronic PHI flows through your operations.

Physical safeguards

  • Controlled access to areas where PHI is present (records rooms, nursing stations, call centers).
  • Screen privacy (positioning monitors), locked storage, and clean‑desk practices.
  • Secure disposal of paper PHI (e.g., shredding) and protection for fax/copier output.

Technical safeguards

  • Access controls, authentication, and audit trails for systems that store ePHI.
  • Transmission protections (e.g., encryption) for electronic exchanges.
  • Standardized templates and data‑minimizing fields to keep disclosures tight and consistent.

Apply these safeguards to everyday scenarios: speak quietly in semi‑public areas, confirm identities on calls, and avoid leaving detailed PHI on voicemail unless the individual prefers it.

Documentation of Oral Communications

HIPAA does not require you to transcribe conversations. It does require documentation of policies, decisions, and certain events that govern how oral PHI is handled.

What to document

  • Policies and procedures for telephone, in‑person, and teleconference communications involving PHI.
  • Patient preferences (e.g., approved family/friends, alternate phone numbers, confidential communication requests).
  • Authorizations, restrictions, denials of access, and requests for amendments or accounting of disclosures.
  • Verification steps used before sharing PHI by phone or in person.

Practical controls for spoken PHI

  • Use call scripts that limit disclosures to the minimum necessary.
  • Designate semi‑private spaces for sensitive discussions and post “speak softly” reminders.
  • For voicemail, leave only limited information unless the individual has consented to more detail.

Retention

Maintain required HIPAA documentation—policies, procedures, and designated records of decisions—for six years from the date of creation or last effective date. Keep these materials accessible to staff and ready for audits or complaint investigations.

Access to Oral Information

Right of access and oral PHI

Individuals have a right to access PHI in your designated record sets. If information exists only as an unrecorded conversation, there is typically nothing to produce. If the substance of a conversation is documented (e.g., clinical notes, call logs), that record is subject to access.

Accepting and fulfilling requests

You may require a written request and verification of identity, as permitted by HIPAA and state law. Provide access in the requested form and format if readily producible, including electronic copies of electronic records, and respond within HIPAA’s required timeframe (30 days, with a single 30‑day extension when documented).

Summaries and explanations

You may offer a summary or explanation of the PHI if the individual agrees in advance to any related fees. This can help translate complex notes or call entries into clear, actionable information.

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Security Rule Applicability

The HIPAA Security Rule applies to electronic PHI (ePHI) only. It prescribes administrative, physical, and technical safeguards specifically for systems that create, receive, maintain, or transmit ePHI.

What the Security Rule covers

  • Access management, risk analysis, and workforce security for ePHI.
  • Technical safeguards such as unique user IDs, transmission security, and integrity controls.
  • Facility and device protections aligned to ePHI storage and processing.

Paper and oral PHI

Paper and oral PHI are not subject to the Security Rule. However, the Privacy Rule still requires reasonable administrative safeguards, physical safeguards, and prudent practices to prevent impermissible uses or disclosures. In practice, many organizations align paper/oral controls with Security Rule concepts to standardize risk management.

Minimum Necessary Standard

Core requirement

Except for defined exceptions, you must make reasonable efforts to limit uses, disclosures, and requests to the minimum necessary PHI to accomplish the purpose. Build this expectation into policies, training, and daily workflows.

Key exceptions

  • Disclosures to or requests by a health care provider for treatment.
  • Disclosures to the individual who is the subject of the PHI.
  • Uses or disclosures made pursuant to a valid authorization.
  • Uses or disclosures required by law or to HHS for compliance review.

Putting minimum necessary into practice

  • Define role‑based access, standardized templates, and checklists that limit data elements.
  • For oral PHI, hold conversations where fewer people can overhear and avoid unnecessary identifiers.
  • When requesting PHI from others, specify the least amount needed to meet your purpose.

Breach Notification Rule

What counts as a breach

A breach is an impermissible acquisition, access, use, or disclosure of unsecured PHI that compromises its security or privacy. You may avoid notification only if a documented risk assessment shows a low probability that the PHI has been compromised.

Risk assessment factors

  • The nature and extent of PHI involved (type, sensitivity, and likelihood of re‑identification).
  • The unauthorized person who used the PHI or to whom the disclosure was made.
  • Whether the PHI was actually acquired or viewed.
  • The extent to which risk has been mitigated (e.g., swift retrieval, satisfactory assurances).

Unsecured PHI and safe harbor

The breach notification obligation applies to unsecured PHI. For ePHI, strong encryption can render data unusable, unreadable, or indecipherable; for paper, secure destruction (e.g., shredding) prevents compromise. If PHI is properly secured, notification is generally not required.

Who to notify and when

  • Notify affected individuals without unreasonable delay and no later than 60 days after discovery.
  • Notify HHS; for breaches affecting 500 or more individuals in a state or jurisdiction, notify prominent media outlets.
  • Maintain a log of smaller breaches and submit annually as required.

Operational playbook

  • Detect and contain the incident; preserve evidence.
  • Conduct and document the risk assessment.
  • Issue breach notification letters and regulatory reports, and implement corrective actions.
  • Review policies, retrain staff, and strengthen safeguards to prevent recurrence.

Conclusion

To meet HIPAA Privacy Rule requirements across paper, oral, and electronic PHI, know your designated record sets, implement layered administrative, physical, and technical safeguards, and apply minimum necessary rigorously. When incidents occur, execute the Breach Notification Rule promptly. Consistent policies, training, and monitoring keep you compliant and protect patient trust.

FAQs

Does the HIPAA Privacy Rule cover oral PHI?

Yes. The Privacy Rule protects PHI in all forms—paper, oral, and electronic. You must use reasonable safeguards for spoken PHI, such as confirming identities, speaking quietly in shared spaces, and limiting details on voicemail to the minimum necessary.

Does the Security Rule apply to paper PHI?

No. The Security Rule applies to electronic PHI only. Paper and oral PHI are governed by the Privacy Rule’s safeguard requirements, which emphasize administrative and physical safeguards like access controls, locked storage, and training.

What are the minimum necessary requirements under HIPAA?

You must limit uses, disclosures, and requests to the minimum PHI needed for the purpose, using role‑based access, standardized protocols, and data‑minimizing templates. The standard does not apply to treatment, disclosures to the individual, uses/disclosures authorized by the individual, or those required by law or requested by HHS.

What constitutes a breach of PHI requiring notification?

A breach is an impermissible acquisition, access, use, or disclosure of unsecured PHI that compromises privacy or security. Unless you can document a low probability of compromise after assessing key factors, you must provide breach notification to affected individuals, HHS, and, for large incidents, the media.

Share this article

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Related Articles