HIPAA Violations Patient Navigators Should Know About: Common Examples and How to Avoid Them
As a patient navigator, you routinely handle Protected Health Information (PHI). That makes you a front‑line guardian of privacy and Electronic PHI Security, as well as a key player in Administrative Safeguards. This guide highlights common pitfalls and shows practical ways to prevent an Unauthorized Disclosure.
You will learn how the Minimum Necessary Standard applies to daily tasks, what to watch for when communicating or disposing of PHI, and how Business Associate Agreements and Risk Analysis Compliance fit into your workflow. Use the checklists in each section to strengthen your habits immediately.
Unauthorized Access to PHI
What it is
Accessing a record “out of curiosity,” using a coworker’s login, or opening charts for patients you are not supporting are all forms of unauthorized access. Even brief looks can be reportable violations because the Minimum Necessary Standard was not followed.
Real‑world examples
- Viewing a friend’s lab results to “see how they’re doing.”
- Leaving a workstation unlocked so others can see open charts.
- Using shared or generic credentials that bypass audit trails.
How to avoid it
- Access only the records you need for your assigned tasks; document your role when prompted.
- Use unique credentials, strong passwords, and multifactor authentication; never share logins.
- Lock screens whenever you step away; enable automatic timeouts on devices handling ePHI.
- Review access logs when asked and promptly report anything that looks off.
- Follow Administrative Safeguards, including sanction policies for improper access.
Disclosures Without Valid Authorization
What it is
Sharing PHI without a valid HIPAA authorization or a permitted purpose is an Unauthorized Disclosure. Disclosures for treatment, payment, and health care operations may be permitted, but they must still meet the Minimum Necessary Standard.
Risky scenarios
- Discussing a patient’s diagnosis with a family member who lacks permission.
- Emailing full records to a community resource without confirming a valid authorization.
- Ignoring a patient’s revocation or expiration date on an authorization form.
How to avoid it
- Verify identity before any disclosure and confirm the legal authority to receive PHI.
- Use approved Release of Information workflows and HIPAA‑compliant authorization forms.
- Disclose only the Minimum Necessary; summarize when full records aren’t required.
- Track authorizations, expiration dates, and patient revocations; document each disclosure.
- When uncertain, escalate to your privacy officer before you share.
Using Unsecure Communication Channels
What it is
Sending PHI through unsecured SMS, personal email, or social media messages creates avoidable risk to Electronic PHI Security. Even confirming that an individual is a patient can be a disclosure if done on unsecure channels.
Preferred practices
- Use encrypted patient portals, secure messaging apps, or organization‑approved email with encryption.
- Confirm patient identity with two identifiers before discussing PHI.
- If a patient asks for unencrypted email or text, explain the risks and document their preference as policy allows.
- Avoid auto‑forwarding to personal inboxes; disable PHI storage on unmanaged devices.
- Follow BYOD and Mobile Device Management rules for any device accessing ePHI.
Improper PHI Disposal Procedures
What it is
Throwing printed PHI into regular trash or discarding devices containing ePHI without sanitization can lead to major breaches. Paper, labels, and device storage all require secure handling.
Ready to simplify HIPAA compliance?
Join thousands of organizations that trust Accountable to manage their compliance needs.
How to dispose securely
- Place paper PHI in locked shred bins; use cross‑cut shredding or certified destruction.
- For ePHI, use approved wiping, de‑identification, or physical destruction per policy before disposal or reuse.
- Clear printers and fax machines promptly; collect misprints and mis‑faxes immediately.
- Use vetted disposal vendors under Business Associate Agreements with documented chain of custody.
- Log destruction events when required and retain certificates of destruction.
Missing Business Associate Agreements
What it is
Vendors that create, receive, maintain, or transmit PHI—such as cloud services, texting platforms, scanning/shredding companies, or interpreters—must have Business Associate Agreements (BAAs) in place before you share PHI with them.
How to avoid it
- Inventory all vendors that touch PHI and confirm signed BAAs exist before any disclosure.
- Ensure downstream subcontractors are covered by their own BAAs.
- Share only the Minimum Necessary and verify the vendor’s safeguards for Electronic PHI Security.
- Centralize BAAs and review them during onboarding and annual vendor assessments.
Failure to Perform a Risk Analysis
What it is
The HIPAA Security Rule requires an accurate and thorough assessment of risks to the confidentiality, integrity, and availability of ePHI. Skipping or delaying this process undermines Risk Analysis Compliance and leaves gaps in protections.
Your role as a navigator
- Report workflow risks you observe, such as unsecured devices or repeated mis‑faxes.
- Participate in training and attestations tied to Administrative Safeguards.
- Support remediation steps, like adopting new secure tools and retiring risky workarounds.
- Confirm updates to procedures after system changes or incidents.
Discussing PHI in Public Spaces
What it is
Conversations in hallways, elevators, waiting rooms, rideshares, cafeterias, or at home can expose PHI to unauthorized listeners. While incidental disclosures can occur, you must apply reasonable safeguards to prevent avoidable exposure.
How to avoid it
- Move sensitive discussions to private areas; use low voices and avoid full names in public.
- Turn computer screens away from public view; use privacy filters.
- When calling patients, verify identity first and avoid leaving detailed PHI on voicemails.
- Never discuss cases on social media or with friends and family.
FAQs.
What are common HIPAA violations by patient navigators?
Frequent issues include snooping in charts without a need to know, disclosing PHI to family or community partners without valid authorization, using unsecure texting or email for PHI, tossing printouts into regular trash, working with vendors before BAAs are signed, skipping Risk Analysis Compliance activities, and discussing PHI where others can overhear.
How can patient navigators prevent unauthorized access to PHI?
Access only records tied to your duties, follow the Minimum Necessary Standard, use unique credentials with multifactor authentication, lock screens, and report suspicious access. Regular training and adherence to Administrative Safeguards and audit procedures further reduce risk.
What are the consequences of failing to secure electronic PHI?
Consequences may include patient harm from privacy breaches, incident response and notification costs, corrective action plans, organizational fines, and employment sanctions. Poor Electronic PHI Security can also disrupt care and damage community trust.
How should patient navigators handle PHI disposal?
Use secure shred bins for paper and approved sanitization or destruction for devices and media. Collect misprints immediately, verify chain of custody with disposal vendors under Business Associate Agreements, and document destruction as required by policy.
Ready to simplify HIPAA compliance?
Join thousands of organizations that trust Accountable to manage their compliance needs.