Self-Access to PHI: Requirements, Risks, and Examples Under HIPAA

Check out the new compliance progress tracker


Product Pricing Demo Video Free HIPAA Training
LATEST
video thumbnail
Admin Dashboard Walkthrough Jake guides you step-by-step through the process of achieving HIPAA compliance
Ready to get started? Book a demo with our team
Talk to an expert

Self-Access to PHI: Requirements, Risks, and Examples Under HIPAA

Kevin Henry

HIPAA

September 30, 2024

8 minutes read
Share this article
Self-Access to PHI: Requirements, Risks, and Examples Under HIPAA

HIPAA Right of Access Provisions

Under HIPAA, you have the right to inspect and obtain a copy of your protected health information (PHI) maintained by a covered entity in its Designated Record Set. The Designated Record Set includes medical and billing records and other records a provider or health plan uses to make decisions about you, but excludes psychotherapy notes and information compiled for legal proceedings.

Covered entities must respond to a valid request within 30 days, with one permissible 30‑day extension when they provide a written reason and a new due date. They must provide the PHI in the form and format you request if it is readily producible, or in a readable alternative if not. You may request Alternative Access Formats to accommodate disability or language needs.

Reasonable, cost‑based fees are allowed for labor, supplies, and postage associated with copying and PHI transmission, but entities may not charge retrieval or access fees. Identity verification is required, yet processes cannot be so burdensome that they delay access. You cannot be forced to use a portal; the entity must still fulfill the request in another way to maintain Covered Entity Compliance.

The “minimum necessary” standard does not limit what you receive under the Right of Access. However, it applies to how workforce members handle PHI while fulfilling your request.

Methods for Accessing PHI

Electronic methods

  • Patient portal download or secure messaging when available.
  • Encrypted email or secure download links; unencrypted email if you request it after being advised of the risks.
  • Machine‑readable exports (for example, CCD or FHIR‑based files) when systems support them.
  • Portable media (CD, DVD, or USB) following Portable Media Security controls such as encryption and password protection.

Paper and in‑person options

  • Printed copies mailed to you or available for pickup.
  • Onsite inspection of records at a scheduled time.
  • Fax when appropriate and verified, recognizing fax‑specific PHI transmission risks (misdials, wrong recipient).

Alternative Access Formats

  • Accessible formats (large print, audio, Braille, or accessible PDFs) when requested.
  • Plain‑language summaries if you agree in advance to the scope and any allowable fee.

For every method, the entity should confirm your preferred form and format and document the choice, ensuring the PHI transmission process reflects your request while safeguarding security.

Security Risk Analysis for PHI Access

HIPAA’s Security Rule requires a Security Rule Risk Analysis and an ongoing Security Management Process. Before and during fulfillment, the entity should identify reasonably anticipated threats and vulnerabilities tied to self-access workflows and apply appropriate safeguards without creating unreasonable barriers to access.

Common risks to evaluate

  • Misaddressed email, insecure PHI transmission, or interception of unencrypted messages.
  • Loss or theft of portable media, weak passwords, or lack of encryption.
  • Malware introduced by unknown USB devices or personal computers.
  • Identity verification failures leading to disclosure to the wrong person.
  • Overly broad internal access or inadequate audit logging by staff fulfilling requests.

Risk management actions

  • Encrypt PHI at rest and in transit, and use secure portals or links by default.
  • Offer alternatives when a requested format is not secure, while honoring the Right of Access.
  • Capture informed patient preference when the patient chooses an inherently less secure method.
  • Maintain audit trails, validate recipient details, and apply least‑privilege access during fulfillment.

The outcome of the Security Rule Risk Analysis should be visible in day‑to‑day procedures, templates, and technical controls used to process requests.

Direct System Connections to Individual Devices

Patients sometimes ask to connect their own laptops, phones, or USB devices directly to clinical systems. Direct connections to individual devices are rarely necessary and often create unacceptable exposure to malware, data leakage, and loss of control over ePHI.

HIPAA does not require covered entities to connect enterprise systems to a patient’s personal device. A sensible approach is to decline direct connections while offering safe alternatives that still meet the access requirement, such as an encrypted, facility‑supplied USB drive, a secure download link, or printed copies.

Safer patterns

  • Use a read‑only export workstation isolated from the production network.
  • Write data only to facility‑provided, pre‑encrypted media with strong passwords shared separately.
  • Disable autorun and scan any inbound media; never allow unknown devices on clinical networks.

These practices satisfy access rights while maintaining Portable Media Security and reducing threat paths.

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Examples of PHI Access Requests

1) “Email me my lab results.”

Default to encrypted email or a secure link. If you prefer unencrypted email, the entity should warn you of the risks, document your preference, confirm the address, and send only the requested PHI.

2) “I want my entire chart on a USB drive I bring from home.”

The entity should decline using patient‑supplied media due to malware and data‑loss risk, but offer a facility‑encrypted USB instead. This balances access with security and keeps PHI transmission under organizational control.

3) “I need large‑print copies due to low vision.”

Provide large‑print or other Alternative Access Formats within standard timeframes. Charge only allowable, cost‑based fees associated with copying and postage.

4) “Please mail a copy to my attorney.”

Process a signed, written request that designates the recipient and delivery location. Verify identity and address, apply appropriate safeguards, and document the third‑party transmission details.

5) “I want to inspect my records in person.”

Schedule a time and provide a private space for inspection. Do not charge for inspection itself. Allow reasonable note‑taking; copies are provided upon request per standard fee rules.

6) “Send my records to my health app.”

If the system supports API‑based export, provide an electronic copy in the requested format after confirming the app and destination. Inform you of security considerations and document your preference and authorization.

7) “Fax my records to my employer’s HR department.”

Confirm the fax number, warn about fax‑specific risks, and use a cover sheet minimizing PHI. When feasible, propose more secure alternatives while respecting your chosen method.

Managing Unacceptable Security Risks

When a requested method presents an unacceptable risk (for example, plugging a personal USB into a clinical workstation), the entity should not proceed. HIPAA allows you to choose less secure methods, but it does not require the entity to compromise system security to do so.

Decision framework

  • Identify the specific risk and link it to the Security Management Process.
  • Offer equivalent, reasonable alternatives that meet the same access outcome.
  • If you still select a less secure but acceptable alternative (such as unencrypted email), record your informed choice and proceed.
  • Deny only those methods that would expose systems or other patients’ PHI, while still fulfilling the request via a safe option.

Controls may include encryption, address verification, two‑channel password delivery, redaction of non‑requested data, and chain‑of‑custody for media. These measures keep Covered Entity Compliance intact while honoring your Right of Access.

Documentation of Access Decisions

Good documentation proves both access and security were handled correctly. It also enables consistency across teams and audits.

What to capture

  • Request details: date received, requestor identity, scope (which parts of the Designated Record Set), and preferred form/format.
  • Verification steps taken and any proxies or third‑party designations.
  • Method of fulfillment, PHI transmission details, addresses/emails used, and delivery dates.
  • Security Rule Risk Analysis touchpoints and any risk acceptance by the patient.
  • Fees charged with cost‑basis, and any 30‑day extension letters with reasons.
  • Partial denials with rationale, excluded categories (for example, psychotherapy notes), and review rights where applicable.

Conclusion

Self‑Access to PHI works best when access rights and security move together. By anchoring requests to the Designated Record Set, applying a practical Security Management Process, using secure defaults with clear alternatives, and documenting each decision, you deliver timely access while minimizing risk.

FAQs

Is looking up your own medical record a HIPAA violation?

If you are a workforce member, using your job credentials to “peek” at your own record is typically a HIPAA violation and an internal policy breach. You should access your information through approved patient pathways—such as a portal or a formal Right of Access request. For patients, requesting or viewing your own PHI through proper channels is not a violation.

What are the security risks when accessing PHI directly?

Key risks include misaddressed or intercepted transmissions, unencrypted storage, malware from unknown devices, loss or theft of portable media, weak identity verification, and over‑broad internal access during fulfillment. Managing these through encryption, verified destinations, secure media, and documented preferences keeps access safe.

How does HIPAA require covered entities to handle access requests?

They must verify identity, respond within 30 days (with one documented extension if needed), provide PHI from the Designated Record Set in the requested form and format if readily producible, offer reasonable Alternative Access Formats, charge only cost‑based fees, and apply Security Rule safeguards without creating unreasonable barriers to access.

Share this article

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Related Articles