Navigating Protected Health Information: A Comprehensive Guide to HIPAA Compliance
HIPAA sets the national baseline for how you create, use, store, and share protected health information (PHI). This guide explains what the law expects of you, how to protect electronic PHI (ePHI), and how to respond if something goes wrong—so you can maintain protected health information confidentiality while running a modern healthcare operation.
HIPAA Overview and Scope
What HIPAA covers
HIPAA applies to PHI—any individually identifiable health information in any form (paper, verbal, electronic) that relates to a person’s health, care, or payment. Once PHI is de-identified to remove specific identifiers or transformed into a limited data set under a data use agreement, HIPAA’s privacy requirements no longer apply to that data.
Who must comply
Covered entities (CEs)—healthcare providers that transmit certain transactions electronically, health plans, and healthcare clearinghouses—and their business associates (BAs) must comply. HIPAA’s Security Rule focuses on ePHI, requiring you to ensure its confidentiality, integrity, and availability with reasonable and appropriate measures.
Preemption and interplay with state law
HIPAA preempts less stringent state privacy laws, but states can set stricter standards. You must follow whichever rule better protects a patient’s privacy, which may require aligning HIPAA policies with state-specific consent or retention requirements.
Roles of Covered Entities
Core obligations
- Publish a Notice of Privacy Practices (NPP) and apply the minimum necessary standard to non-treatment uses.
- Designate privacy and security officials, train your workforce, and enforce sanctions for violations.
- Execute business associate agreements (BAAs) before sharing PHI with vendors.
- Provide individual rights: access, amendments, restrictions, confidential communications, and an accounting of disclosures.
- Maintain policies, documentation, and audit trails to demonstrate readiness for a HIPAA compliance audit.
Operational focus
Covered entities must embed privacy by design in day-to-day workflows—scheduling, billing, referrals, patient portals, and remote care. You should periodically test access controls, validate identity-proofing processes, and verify the accuracy of role-based permissions to prevent overexposure of PHI.
Responsibilities of Business Associates
Who qualifies as a BA
A business associate is any non-workforce partner that creates, receives, maintains, or transmits PHI on behalf of a covered entity—examples include EHR vendors, cloud hosting providers, billing services, and analytics firms. Subcontractors that handle PHI are BAs too and must comply via downstream agreements.
BA responsibilities
- Sign a BAA specifying permitted uses/disclosures and the required safeguards for ePHI.
- Implement administrative, physical, and technical measures consistent with the Security Rule.
- Report incidents and suspected breaches to the CE without unreasonable delay and cooperate with PHI breach notification procedures.
- Limit uses to the minimum necessary and return or destroy PHI at contract end when feasible.
- Flow down HIPAA obligations to subcontractors and maintain documentation for inspections.
Key HIPAA Rules Overview
The rules at a glance
- Privacy Rule: Governs how PHI may be used and disclosed and establishes patient rights.
- Security Rule: Requires safeguards for ePHI, including risk analysis, access controls, and transmission security.
- Breach Notification Rule: Sets timelines and content for notifying affected individuals, HHS, and sometimes the media.
- Enforcement Rule: Describes investigations, resolution agreements, and civil money penalties.
- Omnibus Rule: Strengthened BA accountability and modified privacy requirements, including marketing and sale of PHI.
Enforcement and accountability
Regulators evaluate whether your safeguards are reasonable and appropriate for your size, complexity, and risk. Findings can lead to corrective action plans and HIPAA enforcement penalties, including tiered monetary penalties and, in some cases, criminal exposure for intentional misuse.
Ready to simplify HIPAA compliance?
Join thousands of organizations that trust Accountable to manage their compliance needs.
Privacy Rule Principles
Permitted uses and disclosures
You may use and disclose PHI for treatment, payment, and healthcare operations without an authorization. Other disclosures require authorization unless an exception applies (for example, certain public health and law enforcement purposes). Always apply the minimum necessary principle for non-treatment purposes.
Individual rights
- Right of access to their PHI in a designated record set in the requested readily producible format when feasible.
- Right to request amendments, restrictions, and confidential communications.
- Right to an accounting of certain disclosures and to know your privacy practices via the NPP.
Protecting confidentiality
Build day-to-day controls to safeguard protected health information confidentiality—clear desk policies, screen privacy, careful conversation practices, and vetted release-of-information workflows. Use de-identification or limited data sets with data use agreements for secondary purposes when possible.
Security Rule Safeguards
Administrative safeguards
- Security management process with ongoing risk assessment under HIPAA and documented risk management plans.
- Assigned security responsibility, workforce security, and training with clear sanction policies.
- Information access management and contingency planning (backup, disaster recovery, emergency mode operations).
Map your program to the administrative safeguards HIPAA requires, then revisit controls at least annually or after significant changes (new systems, mergers, or telehealth expansions).
Physical safeguards
- Facility access controls, workstation security, and media disposal/re-use procedures.
- Device encryption, secure storage, and chain-of-custody for removable media and hardware repairs.
Technical safeguards
- Unique user IDs, multi-factor authentication, automatic logoff, and role-based access controls.
- Audit controls and integrity checks to detect improper alteration or destruction of ePHI.
- Encryption for data at rest and in transit, plus secure transmission protocols and key management.
These electronic protected health information safeguards work best when governed by a living risk register, metrics (for example, mean time to revoke access), and executive oversight that aligns security investments with clinical and business priorities.
Breach Notification Requirements
What counts as a breach
A breach is an impermissible use or disclosure of unsecured PHI that compromises privacy or security. You must presume a breach unless a documented risk assessment shows a low probability of compromise based on the data’s sensitivity, who received it, whether it was viewed or acquired, and mitigation steps taken.
Notification timelines and recipients
- Individuals: Notify without unreasonable delay and no later than 60 calendar days after discovery.
- HHS: For 500+ affected in a state/jurisdiction, notify contemporaneously with individual notice (no later than 60 days). For fewer than 500, log and report to HHS within 60 days after the end of the calendar year.
- Media: If 500+ individuals in a state/jurisdiction are affected, notify prominent media outlets.
- Business associates: Must notify the covered entity without unreasonable delay to enable timely downstream notices.
Content and methods of notice
Describe what happened, the types of PHI involved, steps individuals should take, what you are doing to investigate and mitigate, and how to contact you. Use first-class mail (or email if the individual has agreed). Provide substitute notice when contact information is insufficient.
Special cases and safe harbor
If PHI is encrypted or destroyed consistent with HHS guidance, the incident is generally not a breach. Law enforcement can request a delay of notifications if notice would impede an investigation; document the request and the duration.
Practical steps
- Activate your incident response plan, contain the issue, and preserve logs.
- Complete and document the four-factor risk assessment and your PHI breach notification procedures.
- Offer remediation (for example, credit monitoring) when appropriate; update policies to prevent recurrence.
Conclusion
HIPAA compliance is an ongoing program, not a one-time project. By aligning Privacy and Security Rule requirements with your workflows, conducting periodic risk assessments, and preparing for audits and incidents, you can protect patients, reduce liability, and sustain trust in every encounter.
FAQs
What information qualifies as protected health information under HIPAA?
PHI is individually identifiable health information that relates to a person’s past, present, or future health, the provision of care, or payment for care. It includes identifiers such as names, addresses, contact details, dates, account numbers, and device identifiers when linked to health data. PHI can exist in paper, electronic, or verbal form; once de-identified per HIPAA methods, it is no longer PHI.
How do covered entities differ from business associates?
Covered entities directly deliver care, process claims, or standardize transactions (providers, health plans, clearinghouses). Business associates are vendors or partners that handle PHI for a covered entity, such as cloud hosts, billing firms, or analytics providers. CEs are primarily responsible for overall compliance and patient rights; BAs must implement Security Rule safeguards, follow permitted uses in the BAA, and promptly report incidents to the CE.
What are the main requirements of the HIPAA Security Rule?
The Security Rule requires administrative, physical, and technical safeguards for ePHI. Core expectations include a documented risk analysis and ongoing risk management, workforce training, access controls, audit logging, integrity protections, and encryption for data in transit and at rest where reasonable and appropriate. You must ensure the confidentiality, integrity, and availability of ePHI and regularly review and update controls.
When must a breach of PHI be reported under HIPAA guidelines?
You must notify affected individuals without unreasonable delay and no later than 60 days after discovering a breach of unsecured PHI. For incidents affecting 500 or more individuals in a state or jurisdiction, you must also notify HHS and the media within the same 60-day window. Smaller breaches must be logged and reported to HHS within 60 days after the end of the calendar year. Business associates must alert the covered entity promptly to enable timely notices.
Ready to simplify HIPAA compliance?
Join thousands of organizations that trust Accountable to manage their compliance needs.