Understanding the HIPAA Privacy Rule: A Comprehensive Guide
Overview of the HIPAA Privacy Rule
The HIPAA Privacy Rule sets national standards for how health information is used and disclosed, and how individuals can exercise control over their data. It protects Protected Health Information (PHI) in any form—paper, electronic, or oral—while enabling the flow of information needed for high‑quality care.
Legally, the Privacy Rule is codified at 45 CFR Part 160 and Subparts A and E of Part 164. These provisions define key terms, outline permitted and required disclosures, and establish Privacy Safeguards and individual rights that every covered entity must honor.
The rule balances two goals: giving you meaningful rights over your information and allowing covered entities to use PHI for treatment, payment, and healthcare operations. Outside those core purposes, most other uses require your written authorization or must fall under a specific public‑interest permission.
Covered Entities and Their Responsibilities
Who is a covered entity?
- Health care providers that transmit standard transactions electronically (for example, electronic claims).
- Health plans (insurers, HMOs, employer health plans, and government programs like Medicare).
- Health care clearinghouses that translate data between formats.
Business associates—vendors or consultants that create, receive, maintain, or transmit PHI on a covered entity’s behalf—are also directly liable for safeguarding PHI. Written Business Associate Agreements (BAAs) are required to define allowed uses and security expectations.
Core responsibilities
- Publish and distribute a Notice of Privacy Practices explaining uses of PHI and your rights.
- Adopt policies and procedures, designate a privacy official, and train the workforce regularly.
- Apply the minimum necessary standard to limit PHI use and disclosure, except for treatment and other specified exceptions.
- Verify requestors’ identities, mitigate breaches or improper uses, and document actions for at least six years.
Authorization Requirements
A signed authorization is required for most uses and disclosures outside treatment, payment, and operations. Authorizations must be specific, time‑limited, revocable, and written in plain language. Special rules apply to marketing, sale of PHI, research, and psychotherapy notes, which typically require explicit authorization.
Protected Health Information (PHI) Defined
What counts as PHI
PHI is individually identifiable health information related to a person’s past, present, or future physical or mental health, the provision of care, or payment for care. It remains PHI whether stored in an Electronic Health Record, on paper, or shared verbally.
The 18 identifiers
- Names
- Geographic subdivisions smaller than a state (e.g., street address, city, ZIP code)
- All elements of dates (except year) and ages over 89
- Telephone numbers
- Fax numbers
- Email addresses
- Social Security numbers
- Medical record numbers
- Health plan beneficiary numbers
- Account numbers
- Certificate/license numbers
- Vehicle identifiers and license plates
- Device identifiers and serial numbers
- Web URLs
- IP addresses
- Biometric identifiers (e.g., fingerprints, voiceprints)
- Full‑face photos and comparable images
- Any other unique identifying number, characteristic, or code
De‑identification and limited data sets
Data are no longer PHI if de‑identified via the safe harbor method (removing the 18 identifiers) or expert determination showing minimal re‑identification risk. Limited data sets—stripped of direct identifiers but retaining some details—may be shared for research, public health, or operations with a Data Use Agreement.
What is not PHI
De‑identified information, education records covered by FERPA, and employment records maintained by a covered entity in its role as employer are not PHI. Health information of individuals deceased for more than 50 years is also excluded.
Individual Rights Under the Privacy Rule
Right of access and copies
You can inspect or obtain a copy of your PHI in a designated record set, usually within 30 days, with one permissible 30‑day extension when necessary. You may choose the form and format if readily producible, and fees must be reasonable and cost‑based.
Right to request amendments
You may request corrections to inaccurate or incomplete PHI. If a request is denied, the provider must explain the reason and allow you to submit a statement of disagreement that travels with the record.
Right to an accounting of disclosures
You can receive a list of certain disclosures made without authorization (for example, public health reporting) for the prior six years, excluding disclosures for treatment, payment, and health care operations.
Right to request restrictions
You may ask a provider to limit disclosures of PHI. Providers must honor your request to restrict disclosures to a health plan for an item or service you paid for in full out‑of‑pocket, as long as the disclosure is only for payment or operations.
Right to confidential communications
You can request communications by alternative means or at alternative locations (such as a different mailing address), and health plans must accommodate reasonable requests.
Right to receive a Notice of Privacy Practices and to file complaints
Covered entities must provide a clear Notice of Privacy Practices and explain how to submit a complaint to the organization or to the government. Retaliation for filing a complaint is prohibited.
Ready to simplify HIPAA compliance?
Join thousands of organizations that trust Accountable to manage their compliance needs.
Safeguards for PHI Protection
Privacy Safeguards
Covered entities must implement administrative, physical, and technical measures to prevent impermissible uses or disclosures. Practical controls include role‑based access, need‑to‑know policies, workstation privacy, secure disposal, identity verification, and routine auditing of disclosures.
Electronic Health Record Security
Electronic PHI also falls under the HIPAA Security Rule. Strong EHR security typically includes encryption, multi‑factor authentication, unique user IDs, automatic logoff, audit logs, device management, and secure messaging. These controls support Privacy Safeguards by reducing breach risk and improving accountability.
Data minimization and de‑identification
Apply the minimum necessary standard to everyday workflows, redact direct identifiers when full detail is unnecessary, and consider limited data sets or de‑identified data for secondary uses. These choices protect privacy while preserving utility.
Compliance and Enforcement Mechanisms
Oversight and investigations
The HHS Office for Civil Rights (OCR) enforces the Privacy Rule through complaint investigations, compliance reviews, and audits. Findings may result in corrective action plans, monitoring, or monetary penalties.
Penalties for noncompliance
HIPAA includes tiered civil monetary penalties that scale with the level of culpability and are subject to annual caps. Serious, knowing violations can also lead to criminal enforcement by the Department of Justice, including fines and potential imprisonment.
Breach notification and remediation
When a breach of unsecured PHI occurs, covered entities must notify affected individuals without unreasonable delay and no later than 60 days after discovery, notify HHS, and in some cases the media. A risk assessment guides whether notification is required and what remediation steps to take.
Implementing the Privacy Rule in Healthcare Settings
A practical implementation roadmap
- Assess: Map data flows, identify the designated record sets, and catalog vendors handling PHI.
- Govern: Appoint a privacy official, update policies, and align BAAs with operational realities.
- Inform: Refresh the Notice of Privacy Practices and patient‑facing forms, including Authorization Requirements.
- Operationalize: Embed minimum necessary rules in scheduling, billing, referrals, and release‑of‑information workflows.
- Secure: Align EHR security with risk findings—encryption, MFA, auditing, and secure device practices.
- Educate and test: Train staff, run tabletop privacy incidents, and correct gaps quickly.
- Monitor: Track metrics (access request turnaround, breach trends, audit log anomalies) and perform periodic reviews.
Everyday workflow examples
- Release of information: Validate identity, check the scope against the request, and document disclosures.
- Care coordination: Share only what the receiving provider needs for treatment; avoid nonessential details.
- Patient communications: Use verified contact preferences and avoid including PHI in voicemail unless authorized.
Conclusion
The HIPAA Privacy Rule—set at 45 CFR Part 160 and Subparts A and E of Part 164—gives you rights over your health information and holds covered entities accountable. By applying Privacy Safeguards, honoring authorizations and individual rights, and aligning EHR security with risk, organizations can protect PHI while supporting safe, efficient care.
FAQs.
What types of information are protected under the HIPAA Privacy Rule?
The rule protects PHI—any individually identifiable health information about your health status, care, or payment for care. It includes common identifiers (like name, email, or medical record number) and all formats: electronic, paper, and oral communications.
How do covered entities comply with the Privacy Rule?
They publish a Notice of Privacy Practices, adopt policies, train staff, limit PHI to the minimum necessary, manage BAAs, honor individual rights, secure EHR systems, and document decisions for six years. They also investigate incidents and mitigate any improper uses or disclosures.
What rights do individuals have to access their health information?
You can access and obtain copies of PHI in a designated record set, generally within 30 days, choose the form and format if readily producible, request amendments, receive an accounting of certain disclosures, request restrictions, specify confidential communications, and file complaints without retaliation.
What are the penalties for violating the HIPAA Privacy Rule?
OCR may impose tiered civil monetary penalties based on the nature and extent of the violation and resulting harm, often accompanied by corrective action plans. Intentional, wrongful disclosures can trigger criminal penalties enforced by the Department of Justice.
Table of Contents
Ready to simplify HIPAA compliance?
Join thousands of organizations that trust Accountable to manage their compliance needs.