The Complete Guide to HIPAA Privacy: Rules, Patient Rights, PHI, and Compliance

Product Pricing
Ready to get started? Book a demo with our team
Talk to an expert

The Complete Guide to HIPAA Privacy: Rules, Patient Rights, PHI, and Compliance

Kevin Henry

HIPAA

December 08, 2025

9 minutes read
Share this article
The Complete Guide to HIPAA Privacy: Rules, Patient Rights, PHI, and Compliance

HIPAA Privacy Rule Overview

The HIPAA Privacy Rule sets national standards for how covered entities and their business associates use, disclose, and safeguard Individually Identifiable Health Information. It applies to health information in any form—paper, oral, or electronic—and establishes consistent rights for patients alongside clear duties for organizations.

Covered entities include health plans, Health Care Clearinghouses, and health care providers that conduct standard electronic transactions. Business associates—such as billing companies, cloud services, or analytics vendors—must also protect protected health information (PHI) when they create, receive, maintain, or transmit it on a covered entity’s behalf.

Core principles anchor HIPAA Privacy: give individuals meaningful control over their PHI; use or disclose only the minimum necessary; permit essential sharing for treatment, payment, and health care operations; and require transparent privacy practices, workforce training, and enforceable policies.

Understanding Protected Health Information

Protected health information is Individually Identifiable Health Information that relates to a person’s past, present, or future physical or mental health, the provision of care, or payment for care, when held by a covered entity or business associate. PHI spans demographics, medical record numbers, claims data, biometric identifiers, and entries within Electronic Health Records.

PHI is identifiable when it can reasonably reveal who the person is—alone or in combination with other data. Direct identifiers include names, full addresses, and device or account numbers; indirect details like dates or unique characteristics can also identify someone when combined with other elements.

Data is not PHI when de-identified by removing specified identifiers under the “safe harbor” method or when an expert determines re-identification risk is very small. Limited data sets—stripped of most direct identifiers—may be used for research, public health, or operations with a data use agreement in place.

Some information held by a covered entity is outside HIPAA’s scope, such as employment records in the entity’s role as employer. Conversely, information from consumer apps may be PHI if the app acts on behalf of a covered entity; otherwise, it is typically governed by consumer privacy laws, not HIPAA.

Patient Rights under HIPAA

  • Right of access: You may inspect or obtain a copy of your PHI—often within 30 days—and choose the format, including electronic copies from Electronic Health Records. You can also direct a copy to a designated third party.
  • Right to request an amendment: You can ask a covered entity to correct or add information in your records. If denied, you may submit a statement of disagreement to be included in your file.
  • Right to request restrictions: You can ask an organization to limit certain uses or disclosures. If you pay in full out-of-pocket for a specific service, you can require that information not be shared with your health plan for payment or operations for that service.
  • Confidential Communications: You may request to receive PHI by alternative means or at alternative locations—such as a different mailing address or phone number—to enhance privacy or safety.
  • Accounting of Disclosures: You can request a record of certain non-routine disclosures made by a covered entity within a defined look-back period, excluding most treatment, payment, and health care operations.
  • Notice of Privacy Practices: You are entitled to a plain-language notice explaining how your PHI may be used and your rights under HIPAA Privacy.
  • Right to complain: You can file complaints with the covered entity and with the appropriate federal office if you believe your privacy rights have been violated.

Permitted Uses and Disclosures of PHI

Certain uses and disclosures are allowed without your written authorization. The most common are for treatment, payment, and health care operations (often called “TPO”), enabling care coordination, billing, quality improvement, and related activities essential to the health system.

HIPAA also permits disclosures for defined public interest and benefit activities, subject to conditions. Examples include public health reporting, Health Oversight Activities such as audits or investigations, judicial and administrative proceedings, law enforcement purposes, organ and tissue donation, workers’ compensation, research under an approved waiver, and preventing or lessening a serious and imminent threat to health or safety. Uses and disclosures required by law are also allowed.

Incidental disclosures can occur despite reasonable Privacy Safeguards, but they must be truly incidental to an otherwise permitted use and limited by the minimum necessary standard. Minimum necessary does not apply to disclosures for treatment, to the individual, or those required by law, among a few other exceptions.

When a use or disclosure is not otherwise permitted, a valid, written authorization is required. Marketing communications that are not face-to-face or are financed by third parties, the sale of PHI, and most uses of psychotherapy notes typically require explicit authorization.

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

HIPAA Compliance Requirements

Organizations must build a privacy program that translates HIPAA’s requirements into daily practice. This starts with designating a privacy official and a contact person, adopting written policies and procedures, and training the workforce with role-based instruction and periodic refreshers. Sanctions must apply when policies are violated.

Covered entities—including providers, health plans, and Health Care Clearinghouses—and their business associates must execute business associate agreements that specify permitted PHI uses, required safeguards, and breach reporting duties. Vendor due diligence and ongoing oversight are integral to compliance.

Processes must exist to fulfill patient rights, manage authorizations, apply the minimum necessary rule, and respond to privacy complaints. Documentation, including policies, notices, risk assessments, and training records, should be retained for the required period, and regularly reviewed for effectiveness.

Risk analysis and risk management connect the Privacy Rule with security practices. Organizations should evaluate how PHI flows through people, processes, and systems; identify threats; implement mitigations; and adapt controls as operations and technologies change. When incidents occur, respond promptly, mitigate harm, and follow applicable breach notification obligations.

Finally, account for state laws. When a state law is more stringent than HIPAA on patient access, consent, or redisclosure—for example, for behavioral health or certain reproductive health information—the stricter rule generally prevails.

Safeguards for PHI Protection

Administrative safeguards

  • Governance: appoint a privacy official, define responsibilities, and empower escalation paths for issues and complaints.
  • Policies and training: codify acceptable uses, minimum necessary, and data handling; provide scenario-based training to all workforce members and apply sanctions when needed.
  • Risk management: map PHI flows, assess risks, and implement layered controls; test incident response and update after lessons learned.
  • Vendor oversight: perform due diligence, execute business associate agreements, and monitor adherence to Privacy Safeguards.

Physical safeguards

  • Facility access controls, visitor management, and secure areas for records and servers.
  • Device and media controls for laptops, removable media, and paper—including encryption, tracking, and secure destruction.
  • Workstation security such as screen privacy filters, automatic screen locks, and clean desk practices.

Technical safeguards

  • Access controls: unique user IDs, role-based access, and multi-factor authentication for systems holding Electronic Health Records and other PHI.
  • Integrity and transmission security: strong encryption at rest and in transit, endpoint protection, and patch management.
  • Audit controls and monitoring: detailed logs, anomaly detection, and periodic access reviews to verify minimum necessary use.
  • Data loss prevention: rules that flag or block improper sharing via email, cloud storage, or removable media.

Privacy Practices and Authorizations

Notice of Privacy Practices (NPP)

An NPP explains how a covered entity uses and discloses PHI, states your rights, and names contacts for questions or complaints. Providers typically share it at the first service encounter and post it prominently; health plans distribute it upon enrollment and when materially changed. Good-faith acknowledgment of receipt should be documented.

Authorizations

When HIPAA requires permission beyond routine or permitted disclosures, a written authorization must identify what information will be used or disclosed, who will send and receive it, the purpose, and an expiration date or event. It must include your signature, your right to revoke, and—when relevant—statements about the potential for redisclosure by the recipient.

When authorizations are required

  • Marketing that involves financial remuneration from a third party.
  • Sale of PHI or other arrangements exchanging PHI for value.
  • Most uses and disclosures of psychotherapy notes, aside from limited exceptions.
  • Research that does not meet waiver or de-identification conditions.

Operational tips

  • Use minimum necessary and role-based workflows by default; elevate access only when justified and documented.
  • Standardize authorization forms and renewal intervals; verify identities before releasing PHI.
  • Support patient preferences for Confidential Communications, and ensure staff can honor restrictions tied to out-of-pocket payments.
  • Maintain logs that support an Accounting of Disclosures and demonstrate consistent application of Privacy Safeguards.

Conclusion

HIPAA Privacy protects trust in health care by empowering individuals and setting predictable, enforceable rules for PHI. By understanding what PHI is, honoring patient rights, limiting uses and disclosures, and implementing layered safeguards, you can meet legal obligations while enabling high-quality, coordinated care.

FAQs.

What rights do patients have under HIPAA Privacy Rule?

Patients have rights to access and receive copies of their PHI, request amendments, ask for restrictions, choose Confidential Communications, obtain an Accounting of Disclosures, receive a Notice of Privacy Practices, and submit complaints without retaliation. Some rights have defined timelines and exceptions, such as limits on access to psychotherapy notes or information compiled for legal proceedings.

How is protected health information defined?

PHI is Individually Identifiable Health Information created or received by a covered entity or business associate that relates to health status, care provided, or payment for care. It includes identifiers and clinical or billing details across paper, oral, and electronic forms, such as entries in Electronic Health Records. De-identified data and certain employment records are not PHI.

What are the permitted uses of PHI without authorization?

HIPAA permits uses and disclosures for treatment, payment, and health care operations, as well as specific public interest and benefit activities. These include public health reporting, Health Oversight Activities, law enforcement, court orders, organ donation, workers’ compensation, certain research under a waiver, and situations required by law, all subject to conditions and the minimum necessary standard.

How must covered entities ensure HIPAA compliance?

Covered entities must assign leadership, adopt and enforce privacy policies, train the workforce, implement administrative, physical, and technical Privacy Safeguards, manage business associates through contracts and oversight, honor individual rights, and maintain documentation and monitoring. Regular risk analysis, incident response, and continuous improvement keep the privacy program effective and aligned with HIPAA.

Share this article

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Related Articles