What Is HIPAA?
The Health Insurance Portability and Accountability Act (HIPAA) is a U.S. federal law that safeguards the security and privacy of sensitive health information. HIPAA applies to:
- All individuals, as everyone can or may possess PHI
- Health plans (a "covered entity")
- Healthcare clearing houses (a "covered entity")
- Qualifying healthcare providers (a "covered entity")
- Business associates providing a service to or on behalf of a covered entity
Created by the Federal Department of Health and Human Standards (HHS) in 1996, HIPAA contains the following privacy protection standards, broken down into five general rules:
1. HIPAA Security Rule
The HIPAA Security Rule addresses the administrative, physical, and technical safeguards that covered entities must put in place to secure electronic protected health information (ePHI). These protections help ensure the confidentiality, integrity, and security of electronically stored, transmitted, or received PHI.
The Security Rule essentially helps covered entities implement and enforce the privacy protections enumerated in the HIPAA Privacy Rule, as pertaining to ePHI. Due largely to the HITECH Act, much, if not most, of all patient health information is now in digital form and is therefore subject to the HIPAA Security Rule.
2. HIPAA Privacy Rule
The HIPAA Privacy Rule, or Standards for Privacy of Individually Identifiable Health Information, establishes national standards for the protection of certain health information, specifically protected health information (PHI), electronic protected health information (ePHI), and personally identifiable information (PII) when it is considered PHI.
The HIPAA Privacy Rule gives patients the right to:
- Request corrections to their data
- Access their medical records
- Limit how their healthcare data can be shared by covered entities without their authorization
- Ensure that only authorized parties can access PHI
- Secure the appropriate use and disclosure of their health information
3. HIPAA Breach Notification Rule
HIPAA’s Breach Notification Rule requires HIPAA covered entities and their business associates to provide notification following a breach of unsecured PHI. Specifically, covered entities must notify:
- Affected individuals
- The Secretary of Health and Human Services
- In certain circumstances, the media
Business associates must notify covered entities if the breach occurred within their jurisdiction. Notification must be provided to affected individuals no more than 60 days after the breach and must include:
- A brief description of the breach
- What type of information was involved
- How individuals should protect themselves from potential harm resulting from the breach
- How the covered entity is handling the breach and preventing future breaches
- Contact information for the covered entity
4. HIPAA Enforcement Rule
The HIPAA Enforcement Rule outlines provisions pursuant to:
- HIPAA compliance
- HIPAA investigations
- Procedures for hearings
- Civil monetary penalties (CMPs) for HIPAA violations
5. HIPAA Omnibus Rule
HIPAA’s Omnibus Rule is a set of legal requirements aimed at increasing the level of security and privacy of health information shared between healthcare providers. The Omnibus Rule was enacted in 2013 to strengthen the protections established under the HITECH Act. It also was the Rule that expanded the definition of “business associate” to include “all entities that create, receive, maintain, or transmit PHI on behalf of a covered entity, making clear that companies that store PHI on behalf of health care providers and health plans are business associates.”
What Is HITECH?
Hand-in-hand with HIPAA is the HITECH Act (Health Information Technology for Economic and Clinical Health Act), which passed in 2009 and urges health providers to:
- Adopt electronic health records (EHR) to improve quality of patient care
- Adhere to expanded data breach notification requirements
- Secure ePHI data using appropriate privacy protections
Both HIPAA and HITECH address ePHI security, but measures within HITECH support the enforcement of HIPAA through the Breach Notification Rule and the HIPAA Enforcement Rule.
The Importance of Protected Health Information (PHI)
Protected health information (PHI) is data about patients':
As technology continues to expand, the definition of PHI will as well. Compliance with HIPAA laws will depend largely on covered entities’ ability to stay ahead of these changes and correctly identify and secure PHI in all its various forms.
Why Healthcare Leaders Count on Fortra for HIPAA and HITECH Compliance
Fortra’s automated, simplified security solutions can help healthcare entities more easily satisfy auditor demands and protect healthcare data as they strive to meet the rigorous requirements of HIPAA’s Security Rule. Covered healthcare entities and business associates meet their HIPAA Security Rule obligations through Fortra’s proven cybersecurity and compliance solutions. For example, our automated data security solutions directly address HIPAA security requirements while reducing the risk of human error and lowering the compliance burden on IT staff.
Fortra Solutions for HIPAA Compliance
Our healthcare security solutions enable you to not only break the healthcare attack chain but do so in a way that meets critical HIPAA compliance requirements and keeps your organization’s name out of breach headlines. Fortra surrounds sensitive healthcare data at all points in time, wherever it resides.
Fortra’s arsenal of compliance-ready solutions increase efficiency and productivity, seamlessly integrate automation into your critical business processes, and achieve HIPAA compliance with minimal impact on your internal resources and workflow.
Fortra’s HIPAA compliance solutions include:
“The support team is a huge strength. The ease of use is good, and I always enjoy the interactions. There are there to help us when we need it.”
– Integration Manager at Southeastern Health
Featured Resource
Steps to Ensure HIPAA Compliance
As many organizations find that they are either covered entities or business associates subject to HIPAA law, the question of how to become HIPAA compliant is top of mind. “Unexpected covered entities” can include organizations in fields from marketing to finance, and all are expected to comply (see FAQs for more).
Responsibilities of Covered Entities
Under HIPAA, covered entities have the responsibility to:
- Provide individuals with the rights outlined above
- Comply with HIPAA policies that protect the privacy and security of patient health data
Responsibilities Include:
Privacy responsibilities
Security responsibilities
And more, including:
HIPAA Compliance Steps
Perform a Risk Assessment
Covered entities have been fined for failing to implement regular risk assessments as part of their ongoing HIPAA-compliant strategies. Identify and prioritize potential security threats to PHI and ePHI, and factor in elements like human error, natural disasters, and technical shortcomings.
Covered entities have been fined for failing to implement regular risk assessments as part of their ongoing HIPAA-compliant strategies. Identify and prioritize potential security threats to PHI and ePHI, and factor in elements like human error, natural disasters, and technical shortcomings.
Establish HIPAA Compliance Controls
Implement PHI safeguards in the following three areas:
- Administrative: Train employees to properly access and handle PHI. Includes role-based access, the principle of least privilege, PHI and ePHI storage and transmission best practices, security awareness training, integrity and audit controls, and more.
- Physical: Physically protect areas containing PHI and ePHI, such as server rooms, file cabinets, and workstations. Implement mandatory log-out or lock screen policies when employees are away from their desks, require ID badges to access sensitive health information, and lock paper files containing patient health data.
- Technical: These safeguards center around ensuring the security of electronic PHI (ePHI) by employing cybersecurity-oriented HIPAA compliance solutions like secure file transfer (SFT), data encryption, data loss protection (DLP), data classification, and more.
Implement PHI safeguards in the following three areas:
- Administrative: Train employees to properly access and handle PHI. Includes role-based access, the principle of least privilege, PHI and ePHI storage and transmission best practices, security awareness training, integrity and audit controls, and more.
- Physical: Physically protect areas containing PHI and ePHI, such as server rooms, file cabinets, and workstations. Implement mandatory log-out or lock screen policies when employees are away from their desks, require ID badges to access sensitive health information, and lock paper files containing patient health data.
- Technical: These safeguards center around ensuring the security of electronic PHI (ePHI) by employing cybersecurity-oriented HIPAA compliance solutions like secure file transfer (SFT), data encryption, data loss protection (DLP), data classification, and more.
Assign a HIPAA Compliance Officer
Establish a HIPAA point person and a chain of command leading up to them. This team will be responsible for heading and keeping track of HIPAA-related efforts, involving all stakeholders, overseeing the creation of HIPAA privacy and security practices, implementing employee HIPAA compliance training, and creating a breach plan that includes HIPAA-mandated notification, reporting, and mitigation.
Establish a HIPAA point person and a chain of command leading up to them. This team will be responsible for heading and keeping track of HIPAA-related efforts, involving all stakeholders, overseeing the creation of HIPAA privacy and security practices, implementing employee HIPAA compliance training, and creating a breach plan that includes HIPAA-mandated notification, reporting, and mitigation.
Create a Breach Notification Process
Put a plan in place to facilitate mandatory breach reporting within 60 days of a discovered breach. This must include notifying the Office for Civil Rights (OCR) and all affected parties. Include the media when the breach affects more than 500 individuals in a particular jurisdiction, and all notifications must be accomplished “without unreasonable delay.”
Put a plan in place to facilitate mandatory breach reporting within 60 days of a discovered breach. This must include notifying the Office for Civil Rights (OCR) and all affected parties. Include the media when the breach affects more than 500 individuals in a particular jurisdiction, and all notifications must be accomplished “without unreasonable delay.”
Document all HIPAA-Related Policies and Procedures
HIPAA standards require accurate documentation of all HIPAA-related policies and procedures. In the event of an OCR audit, these records will prove an organization’s HIPAA compliance — or failure to comply. Documentation includes:
HIPAA privacy policies
HIPAA security controls
HIPAA remediation plans
Internal audit reports
Certificates of employee training
Risk assessments
HIPAA standards require accurate documentation of all HIPAA-related policies and procedures. In the event of an OCR audit, these records will prove an organization’s HIPAA compliance — or failure to comply. Documentation includes:
HIPAA privacy policies
HIPAA security controls
HIPAA remediation plans
Internal audit reports
Certificates of employee training
Risk assessments
Consequences and Penalties of HIPAA Noncompliance
HIPAA violations occur when the HIPAA Administrative Simplification Regulations have been breached. The HIPAA Administrative Simplification Regulations are “what most people consider to be HIPAA because they contain the General Provisions and the Enforcement Rule (Part 160), the Standards for Electronic Transactions and Data Elements (Part 162), and the Privacy, Security, and Breach Notification Rules (Part 164)." However, they were not published with HIPAA in 1996, but rather several years later. For all intents and purposes, the Administrative Simplification Regulations are the regulatory portion of the HIPAA Act, comprising all the standards and legal requirements outlined in the HIPAA Rules.
Very specific guidelines around how health data is stored and shared by hospitals, clinics, insurers, research facilities, pharmacies, and public health organizations are necessary to ensure patient privacy. Breaching the trust of individuals who’ve entrusted their data comes with consequences.
HIPAA Security Rule Checklists
The HIPAA Security Rule is a set of national standards requiring appropriate:
- Administrative safeguards
- Physical safeguards
- Technical safeguards
These safeguards ensure the confidentiality, integrity, and availability of electronic PHI that is created, maintained, received, or used by a covered entity. The Security Rule is a subset of the Privacy Rule, applying only to electronic health information, and explains how to protect digital patient data as covered under the Privacy Rule. Its intent is to provide the necessary technical, physical, and administrative specifications to comply with HIPAA privacy law protecting digital health data.
Fortra helps covered entities and business associates comply with the Security Rule by providing the technical security solutions necessary to protect electronically stored, transmitted, and generated health information under HIPAA law. These include solutions for:
There are three categories of safeguards to help ensure the HIPAA Security Rule is adhered to by covered entities and business associates — administrative, physical, and technical.
Administrative Safeguards to Meet HIPAA Security Rule Requirements
Per the HIPAA Security Rule, covered entities must enforce:
Identify and analyze risks
Designate a Privacy Official
Manage information access
Train your workforce
Evaluate policies and procedures
Physical Safeguards for HIPAA Security Rule Compliance
Per the HIPAA Security Rule, covered entities must implement:
Limit physical access
Secure workstations and devices
Technical Safeguards for HIPAA Security Rule Compliance
Per the HIPAA Security Rule, covered entities must:
Control access to ePHI
Audit controls around ePHI
Ensure the integrity of ePHI
Secure the transmission of ePHI
Learn More About How Fortra Can Help with HIPAA Security Rule Compliance
Fortra is the single provider you need to feel confident in your ability to implement the technical safeguards central to HIPAA Security Rule compliance.