Health Insurance Portability and Accountability Act (Public Law 104-191)
HIPAA establishes national standards for protecting individuals’ medical records and health information. The Privacy Rule protects all individually identifiable health information, the Security Rule safeguards electronic PHI, and the Breach Notification Rule requires notification following breaches of unsecured PHI. Enforcement is by the HHS Office for Civil Rights (OCR).
18
PHI Identifiers
4
Penalty Tiers
$1.5M
Max Annual Penalty
1996
Enacted
Protects all individually identifiable health information (PHI). Establishes patient rights to access, amend, and receive accounting of disclosures of their health information.
Requires administrative, physical, and technical safeguards to protect electronic PHI (ePHI). Covers access controls, audit controls, integrity controls, and transmission security.
Requires notification to affected individuals, HHS Secretary, and media (if 500+ affected) following a breach of unsecured protected health information.
Provisions for compliance investigations, civil money penalties, and hearing procedures. Four-tier penalty structure established by the HITECH Act.
Standards for 8 electronic healthcare transactions and medical data code sets. Covered entities using electronic media must comply with these standards.
Identify all protected health information across your organisation: where it’s created, received, maintained, and transmitted. Map all 18 PHI identifiers.
Conduct a thorough risk analysis of ePHI per the Security Rule. Identify threats and vulnerabilities to the confidentiality, integrity, and availability of ePHI.
Implement administrative, physical, and technical safeguards. Address access controls, workforce training, facility security, and encryption requirements.
Establish Business Associate Agreements with all entities that create, receive, maintain, or transmit PHI on your behalf. Monitor compliance.
Develop and test breach notification procedures meeting HIPAA timelines: individual notification, HHS reporting, and media notification for large breaches.
Regular risk assessments, workforce training, policy updates, and audit log reviews. Prepare for potential OCR compliance reviews and investigations.