Sharing Patient Information With Police Without Violating HIPAA: Examples and Risks

Check out the new compliance progress tracker


Product Pricing Demo Video Free HIPAA Training
LATEST
video thumbnail
Admin Dashboard Walkthrough Jake guides you step-by-step through the process of achieving HIPAA compliance
Ready to get started? Book a demo with our team
Talk to an expert

Sharing Patient Information With Police Without Violating HIPAA: Examples and Risks

Kevin Henry

HIPAA

September 19, 2024

7 minutes read
Share this article
Sharing Patient Information With Police Without Violating HIPAA: Examples and Risks

HIPAA Disclosure to Law Enforcement

Under the HIPAA Privacy Rule, you may disclose Protected Health Information (PHI) to law enforcement in narrowly defined situations. Your goal is to meet a legitimate investigative need while protecting patient privacy and adhering to the minimum necessary standard when it applies.

HIPAA permits disclosures to law enforcement for specific purposes (often summarized from 45 CFR 164.512(f)), including:

  • In response to certain Law Enforcement Requests: a court order, warrant, subpoena, or administrative request that meets HIPAA’s criteria.
  • To identify or locate a suspect, fugitive, material witness, or missing person (limited identifiers only).
  • About a victim of a crime (with consent, or under strict conditions when the person cannot agree).
  • About a decedent when death may have resulted from criminal conduct.
  • When a crime occurs on your premises.
  • When necessary to report a crime in an emergency, including details of the crime, location, and perpetrator.

Minimum necessary and scope control

For most permitted disclosures, provide only what is reasonably necessary for the stated purpose. The minimum necessary rule does not apply to disclosures required by law or made pursuant to a court order, but you still must limit the disclosure to the exact terms of the order.

Preventing Serious and Imminent Threats

The Imminent Threat Exception (often referenced from 45 CFR 164.512(j)) allows you to disclose PHI to law enforcement when, in good faith, you believe it is necessary to prevent or lessen a serious and imminent threat to a person or the public.

What qualifies as a serious and imminent threat

The threat must be specific, likely, and imminent—not speculative. You should disclose only to persons able to reduce the threat, such as police or a potential target, and limit PHI to details that help mitigate the danger.

Examples

  • A patient makes a credible, time-bound threat to harm a named individual; you alert police with relevant clinical observations and identifiers needed to intervene.
  • During an emergency hold, a patient states an immediate plan to commit violence at a particular location; you share details necessary to prevent the event.

Required by Law Reporting

HIPAA permits disclosure when another law requires it. In “required by law” situations, you must disclose exactly what the statute or regulation compels and follow any procedural conditions it sets.

Common required-by-law examples

  • Mandatory reporting of certain injuries (for example, gunshot or stabbing wounds) to law enforcement where state law mandates it.
  • Mandatory reporting of child abuse or neglect to the appropriate authorities; law enforcement may be among the designated recipients.
  • Reporting adult abuse, domestic violence, or neglect when state law requires, subject to specific victim-safety conditions.

Documentation and minimum necessary

Keep a record of the legal authority you relied on (statute, regulation, or order). The minimum necessary rule does not apply to disclosures required by law, but you should still confine the disclosure to the information the law specifically requires.

Court Orders and Subpoenas

Court-Ordered Disclosure authorizes you to release PHI strictly within the four corners of the order. Provide only what the judge has ordered and nothing more.

Subpoenas and administrative requests

For subpoenas, discovery requests, or administrative demands that are not signed by a judge, HIPAA typically requires either the patient’s authorization or “satisfactory assurances,” such as proof of notice to the patient or a qualified protective order. If those conditions are not met, work with counsel to narrow, defer, or move to quash the request.

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Practical steps

  • Confirm the validity and scope of the order or subpoena and the specific PHI requested.
  • Disclose only the records specified; redact or withhold unrelated information.
  • Document the process, including who requested the PHI, the authority cited, and what was released.

Law Enforcement Access Safeguards

Establish safeguards so your team can respond lawfully and consistently to Law Enforcement Requests. Clear workflows reduce risk and help you release only what is appropriate.

Policy and workflow controls

  • Designate a privacy or security officer to triage requests and approve disclosures.
  • Use standardized request-intake forms that capture purpose, authority, scope, and deadlines.
  • Apply a minimum necessary review for permitted (but not required) disclosures; de-identify data when full identifiers are not needed.

Technical and physical safeguards

  • Enable audit logs and access alerts; require “break-the-glass” justifications when retrieving PHI for non-routine purposes.
  • Transmit PHI securely (encrypted email, secure portal, or verified fax) and maintain chain-of-custody records where appropriate.
  • Store released documents and correspondence in a restricted repository for accountability.

Verification Procedures for PHI Disclosure

Before disclosing PHI, perform Identification Verification and confirm authority as required by the HIPAA Privacy Rule. Verification protects patients and shields your organization from improper release.

How to verify identity and authority

  • In person: examine a government photo ID and official credentials; record the badge or ID number and agency.
  • By phone or email: call back through the agency’s main public number, not a number provided by the requester, and confirm the request and case number.
  • Request written documentation on agency letterhead that cites the legal basis (e.g., court order, warrant, statute) and the specific PHI sought.
  • For exigent circumstances under the Imminent Threat Exception, document the facts you relied on and limit the disclosure to what is needed to avert the threat.

Disclosure logging

Maintain a log capturing the requester’s name, agency, legal authority, purpose, PHI disclosed, date and time, and the staff member who approved the release. Robust logs support accountability and breach assessments.

Risks of Unauthorized Disclosure

Improper releases can trigger Civil and Criminal Penalties, government investigations, and significant operational fallout. Enforcement actions often focus on patterns of noncompliance, weak verification, and excessive disclosures.

  • Civil penalties: monetary fines that scale by level of culpability (from lack of knowledge to willful neglect) and can accumulate per violation.
  • Criminal penalties: for knowingly obtaining or disclosing PHI in violation of HIPAA, with potential fines and imprisonment for aggravated conduct.
  • Regulatory oversight: investigations, corrective action plans, and mandated monitoring by federal authorities.

Breach notification and operational impact

  • Breach notification: unless a risk assessment shows a low probability of compromise, you may need to notify affected individuals, regulators, and in some cases the media within strict timelines.
  • Costs and disruption: incident response, legal review, patient outreach, and reputational damage can be substantial.

Key takeaways

  • Match each request to a specific HIPAA permission or legal requirement before disclosing PHI.
  • Verify identity and authority, apply minimum necessary when applicable, and document every step.
  • Use standardized safeguards so your team can respond quickly without over-disclosing.

FAQs

You may disclose limited PHI without consent when HIPAA specifically permits it, such as to comply with a valid court order or warrant, to locate a suspect or missing person (limited identifiers), to report a crime on the premises or in an emergency, to report certain injuries or abuse when required by law, or to address a serious and imminent threat. Provide only what is necessary for the purpose, and follow any conditions in the HIPAA Privacy Rule.

How do healthcare providers verify law enforcement authority?

Perform Identification Verification by checking official credentials, confirming identity through a call-back to the agency’s publicly listed number, and obtaining written documentation that cites the legal basis and scope of the request. Record badge numbers, case numbers, and the precise authority (e.g., court order, statute). If the request claims exigent circumstances, document the facts and limit the disclosure accordingly.

What are the risks of unauthorized disclosure of PHI?

Unauthorized releases can lead to civil fines, potential criminal liability, regulatory investigations, breach-notification duties, and reputational harm. Costs often include legal fees, incident response, and corrective action plans, even when the disclosure was unintentional.

When is disclosure required by law?

Disclosure is required when a statute, regulation, or binding court order mandates it—for example, mandatory reporting of specified injuries, child abuse or neglect, or other incidents defined by state law, as well as a judge-signed order that directs release of particular records. In these situations, disclose exactly what the law or order requires and keep thorough documentation.

Share this article

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Related Articles