Is HIPAA a Confidentiality Law? What It Really Covers and What It Doesn’t

Check out the new compliance progress tracker


Product Pricing Demo Video Free HIPAA Training
LATEST
video thumbnail
Admin Dashboard Walkthrough Jake guides you step-by-step through the process of achieving HIPAA compliance
Ready to get started? Book a demo with our team
Talk to an expert

Is HIPAA a Confidentiality Law? What It Really Covers and What It Doesn’t

Kevin Henry

HIPAA

March 02, 2024

6 minutes read
Share this article
Is HIPAA a Confidentiality Law? What It Really Covers and What It Doesn’t

HIPAA Overview and Purpose

At its core, HIPAA creates a federal baseline for health information privacy and security. It is often described as a confidentiality law, but more precisely it sets rules that govern how Protected Health Information (PHI) may be used, disclosed, and safeguarded to support care while protecting Health Information Privacy.

HIPAA aims to balance patient trust with the practical needs of the health system. It permits essential information flows for treatment, payment, and operations, while requiring limits, accountability, and transparency from Covered Entities and their partners.

HIPAA Privacy Rule Standards

The Privacy Rule defines what counts as PHI, sets conditions for its use and disclosure, and grants individuals rights over their information. It applies to PHI in any form—paper, oral, or Electronic PHI (ePHI)—held by regulated organizations.

  • Individual rights: access and obtain copies, request amendments, receive an accounting of certain disclosures, request restrictions, and choose confidential communications.
  • Use and disclosure limits: follow the “minimum necessary” standard except for treatment and certain other circumstances; issue a Notice of Privacy Practices that explains how PHI is used.
  • De-identification and limited data sets: data without identifiers is not PHI; a limited data set may be shared under a data use agreement for specific purposes.

What counts as Protected Health Information (PHI)?

PHI is individually identifiable health information related to a person’s past, present, or future health, care, or payment for care. If data can reasonably identify the individual and is created or received by a regulated entity, it is PHI. Once properly de-identified, it is no longer PHI.

Covered Entities and Their Roles

Covered Entities include health plans, health care clearinghouses, and health care providers who transmit health information electronically in connection with standard transactions. These organizations must implement the Privacy Rule and ensure their partners follow it.

Business associates—vendors that create, receive, maintain, or transmit PHI on behalf of a Covered Entity—must also comply. Written agreements define permitted uses, Security Rule safeguards for Electronic PHI, and breach responsibilities that flow down to subcontractors.

Permitted Uses and Disclosures of PHI

HIPAA allows certain uses and disclosures without an authorization and requires others. Where an authorization is needed, it must be specific, time-limited, and revocable by the individual.

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

  • Treatment, payment, and health care operations (TPO) are permitted disclosures that enable routine care delivery and administrative functions.
  • Required disclosures include providing PHI to the individual upon request and to federal regulators for compliance investigations.
  • Additional permitted disclosures without authorization include public health reporting, health oversight activities, certain judicial and law enforcement purposes, research under defined safeguards, organ and tissue donation, to avert serious threats, specialized government functions, and workers’ compensation programs.
  • Incidental disclosures are allowed when reasonable safeguards are in place, and the minimum necessary principle applies where required.

HIPAA Security Rule Safeguards

The Security Rule focuses on Electronic PHI. It requires a risk-based program that is scalable to an organization’s size, complexity, and risks, covering administrative, physical, and technical safeguards.

  • Administrative: risk analysis and risk management, workforce training, contingency planning, and vendor oversight.
  • Physical: facility access controls, workstation and device security, and media disposal procedures.
  • Technical: access controls (unique IDs, authentication), audit controls, integrity protections, encryption and transmission security, and automatic logoff where appropriate.

Security measures must be documented, reviewed periodically, and updated as technology, threats, and operations evolve.

Limitations and Exceptions of HIPAA

HIPAA does not cover every situation or every type of health-related data. It applies to PHI handled by Covered Entities and their business associates; it does not generally apply to employers in their role as employers, most life insurers, or many consumer apps and wearables that operate outside the clinical system.

Some information is excluded or governed elsewhere, such as de-identified data and education records covered by other laws. HIPAA also allows specific exceptions—like certain law enforcement or public health disclosures—where community needs outweigh confidentiality.

Enforcement typically rests with federal regulators and state attorneys general. Individuals have robust access and privacy rights under HIPAA, but there is no broad private right to sue under HIPAA itself; other laws may provide remedies in particular circumstances.

Distinguishing HIPAA from Other Privacy Laws

HIPAA is narrowly scoped to health care delivery and payment chains. Other laws may govern similar data in different contexts—for example, student health records in schools, substance use disorder treatment records with heightened confidentiality, consumer health apps under general consumer protection rules, and state health privacy statutes that can be more stringent.

Think of HIPAA as a sector-specific framework: it protects Health Information Privacy within regulated health care, while other federal and state laws fill gaps for non‑covered settings or add safeguards for sensitive information. Together, these laws shape the full privacy landscape that applies to your data.

Conclusion

HIPAA functions as a confidentiality law within the health care system by defining PHI, setting Privacy Rule and Security Rule requirements, and allowing clearly defined permitted disclosures. It is not universal—its scope is limited to Covered Entities and their business associates, with explicit limits and exceptions. To understand your protections, always consider both HIPAA and the other privacy laws that may apply to your situation.

FAQs

What protections does HIPAA provide for health information?

HIPAA protects PHI by limiting how it may be used and shared, requiring the minimum necessary standard, granting you rights to access and correct your records, and mandating safeguards for Electronic PHI. Organizations must provide notices, train staff, manage vendors, and investigate and address breaches.

Does HIPAA cover all types of health data?

No. HIPAA covers PHI handled by Covered Entities and their business associates. Data held only by consumer apps, fitness trackers, or employers acting as employers is often outside HIPAA unless those tools are offered on behalf of a Covered Entity. De-identified data is also outside HIPAA.

Who must comply with HIPAA regulations?

Health plans, health care clearinghouses, and health care providers that conduct standard electronic transactions must comply, along with their business associates and relevant subcontractors. Workforce members must follow organizational policies and procedures that implement the Privacy Rule and Security Rule.

How does HIPAA differ from other confidentiality laws?

HIPAA is a sector-specific framework focused on health care delivery and payment. Other laws may apply in schools, consumer technology, financial services, or for particularly sensitive records. As a result, your rights and the rules for disclosure can vary depending on who holds your data and why.

Share this article

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Related Articles