Ulcerative Colitis Treatment Records and HIPAA: Privacy, Access, and Disclosure Explained

Product Pricing
Ready to get started? Book a demo with our team
Talk to an expert

Ulcerative Colitis Treatment Records and HIPAA: Privacy, Access, and Disclosure Explained

Kevin Henry

HIPAA

March 13, 2026

8 minutes read
Share this article
Ulcerative Colitis Treatment Records and HIPAA: Privacy, Access, and Disclosure Explained

Your ulcerative colitis treatment records are Protected Health Information (PHI). This guide explains how HIPAA protects them, how you can access them, when disclosures are allowed, and what happens if there’s a security incident.

HIPAA Privacy Rule Protections

What counts as PHI for ulcerative colitis?

PHI includes any identifiable details about your ulcerative colitis care—diagnoses, colonoscopy reports, pathology, medication lists (for example, biologics), care plans, clinical notes, billing records, and communications with your clinicians. If a covered entity or its business associate creates, receives, maintains, or transmits it, it is protected.

Designated Record Set and your rights

Your right of access applies to the Designated Record Set—records a provider or health plan uses to make decisions about you. For ulcerative colitis, this typically covers your medical and billing records, care management files, and test results used for treatment decisions.

Permitted uses and disclosures

Without your written Patient Authorization, covered entities may use or disclose PHI for treatment, payment, and health care operations. Other permissible disclosures include certain public health activities, health oversight, and as required by law. Disclosures must follow the “minimum necessary” standard when not for treatment.

Patient Authorization when required

Written Patient Authorization is required for most nonroutine purposes—such as marketing, sale of PHI, many research uses without a waiver, and release of psychotherapy notes. Authorizations must describe what will be disclosed, to whom, for what purpose, and include an expiration and your signature; you may revoke them in writing.

Business associates and safeguards

Vendors that handle your PHI (for example, cloud EHR providers or billing services) must sign Business Associate Agreements and implement safeguards comparable to the covered entity’s obligations.

De-identification

Records stripped of identifiers under HIPAA’s de-identification standards are no longer PHI and may be used or shared more freely, provided re-identification risks are controlled.

Safeguarding Electronic Health Records

Administrative safeguards

  • Risk analysis and ongoing risk management tailored to Electronic Health Record Security.
  • Policies for access, data retention, incident response, and workforce training focused on privacy and phishing awareness.
  • Vendor due diligence and Business Associate oversight.

Technical safeguards

  • Role-based access, unique user IDs, multi-factor authentication, and automatic logoff.
  • Encryption in transit and at rest, secure messaging, and device encryption for laptops and mobiles.
  • Audit logs and monitoring to detect unusual access to ulcerative colitis charts.
  • Segmentation or tagging for specially protected data (for example, psychotherapy notes or substance use records held in the same EHR).

Physical safeguards

  • Facility security, locked server areas, screen privacy, and policies for paper printouts of your records.
  • Inventory and secure disposal of media that store PHI.

Practical steps you can take

  • Use strong passwords and multi-factor authentication on patient portals and apps.
  • Review portal activity where available and report suspected misuse promptly.
  • Choose third-party apps carefully; once PHI leaves a HIPAA-regulated system at your direction, privacy practices may differ.

Breach Notification Requirements

What counts as a breach?

A breach is an impermissible use or disclosure of unsecured PHI that compromises privacy or security. Providers assess four factors: the nature and sensitivity of PHI involved, the unauthorized person, whether the PHI was actually viewed or acquired, and how risks were mitigated. Encrypted data meeting federal guidelines generally falls under a safe harbor.

Who must be notified and when

  • You must be notified without unreasonable delay and no later than 60 calendar days after discovery.
  • For breaches affecting 500 or more residents of a state or jurisdiction, notice also goes to media and to federal regulators within 60 days; smaller breaches are reported to regulators annually.
  • Business associates must notify the covered entity so it can notify you.

What notices include

Notices explain what happened, what types of information were involved (for example, diagnoses, medications, or insurance IDs), steps you should take, how the entity is mitigating harm, and how to contact the organization for help. Law enforcement may delay notice in limited circumstances.

Patient Access to Medical Records

Your right of access

You may inspect or get a copy of your ulcerative colitis records in the Designated Record Set. Exclusions include psychotherapy notes and information compiled for legal proceedings. You may request your records in paper or electronic format and direct a copy to yourself or a third party you designate.

Timelines and fees

  • Providers must respond within 30 days; if they need more time, they may take one 30-day extension with written explanation.
  • Any fee must be reasonable and cost-based (for example, labor for copying and supplies). You cannot be forced to pick up records in person or to use a portal if you request a different method that is reasonably producible.

How to make an effective request

  • Specify you are requesting access under HIPAA and identify the exact dates, tests, or documents (for example, colonoscopy on a given date, pathology report, medication list).
  • State your preferred format (PDF, portal download, or mailed paper copy) and destination.
  • Keep a copy of your request and follow up if you do not receive a timely response.

Amendments and corrections

If something is inaccurate or incomplete, you may request an amendment. Providers must act within 60 days (with one 30-day extension), and if they deny, they must explain why and let you add a statement of disagreement to your record.

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Confidentiality of Psychotherapy Notes

Psychotherapy notes are a narrow category: a mental health professional’s separate, private notes analyzing the contents of counseling sessions. They are not part of the general medical record and are excluded from your right of access under HIPAA.

Disclosing psychotherapy notes typically requires your specific, written authorization. This is different from routine mental health information (diagnosis, medications, session start/stop times, treatment plan), which is part of the Designated Record Set and usually accessible.

Substance Use Disorder Record Regulations

Substance use disorder (SUD) treatment records may be subject to 42 CFR Part 2, often referred to as Substance Use Confidentiality rules. Part 2 is stricter than HIPAA and generally requires your written consent for most disclosures by federally assisted SUD programs, even for treatment, payment, and operations.

When Part 2 can apply to your UC care

If SUD services are integrated into your ulcerative colitis care or noted within the same EHR, Part 2 data should be clearly segmented or tagged. Redisclosure is highly restricted—recipients are often prohibited from sharing Part 2 information further without your consent.

Limited exceptions

Part 2 allows narrow exceptions, such as bona fide medical emergencies, research under specific safeguards, audits and evaluations, and certain court orders. When both HIPAA and Part 2 apply, providers follow the more protective rule.

Patient Authorization essentials

For uses and disclosures not permitted by HIPAA (or by Part 2, when applicable), a Patient Authorization must specify what information is shared, with whom, for what purpose, and when the authorization expires. You may revoke it at any time in writing, which stops future uses or disclosures.

Minimum necessary and role-based access

Outside of treatment, covered entities should limit access and disclosures to the minimum necessary to achieve the stated purpose and use role-based controls to enforce this in the EHR.

Accounting of Disclosures

You may request an Accounting of Disclosures for the past six years for disclosures other than treatment, payment, health care operations, and those you authorized. The accounting lists the date, recipient, a brief description of what was disclosed, and the purpose. Providers must respond within 60 days (with one 30-day extension) and may charge a fee for additional requests within a 12‑month period.

Conclusion

Ulcerative colitis treatment records receive robust protection under HIPAA. You control access through rights to inspect, obtain copies, and authorize disclosures, while organizations must secure EHRs, follow the Breach Notification Rule, and respect heightened rules for psychotherapy notes and SUD records. Knowing these boundaries helps you share information confidently while safeguarding your privacy.

FAQs.

What are the HIPAA privacy protections for ulcerative colitis treatment records?

Your ulcerative colitis information is PHI. HIPAA permits use and disclosure for treatment, payment, and operations without your authorization, requires the minimum necessary for most other disclosures, mandates Business Associate safeguards, and gives you rights to access and request amendments within the Designated Record Set.

How can patients access their ulcerative colitis medical records?

Send a written request to your provider or health plan identifying what you need and your preferred format. They must respond within 30 days (one 30‑day extension allowed). Reasonable, cost‑based fees may apply. You may direct a copy to yourself or a third party and are not required to use a portal if you request another reasonably producible format.

What safeguards protect electronic ulcerative colitis treatment records?

Security programs combine administrative, physical, and technical controls: risk management, staff training, access controls, multi‑factor authentication, encryption in transit and at rest, audit logging, device security, and vendor oversight. Data segmentation helps protect specially sensitive information within a single EHR.

When must providers notify patients of a breach involving their records?

If unsecured PHI is breached, you must be notified without unreasonable delay and no later than 60 calendar days after discovery. Notices describe what happened, what data was involved, steps you can take, and what remedies are being offered; larger incidents also trigger regulatory and, at times, media notice.

No. Psychotherapy notes—separately kept notes analyzing counseling sessions—are excluded from your right of access and usually require specific authorization for disclosure. Routine mental health information in your medical record (for example, diagnoses, medications, and care plans) remains accessible.

Share this article

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Related Articles