What Does HIPAA Stand For?

HIPAA stands for Health Insurance Portability and Accountability Act. It was formed in 1996 and, among other things, protects patient health information.

Who must be HIPAA compliant?

The HIPAA Rules apply to two groups: covered entities and business associates. A covered entity is a health plan, health care clearinghouse or health care provider who electronically transmit any health information. Examples of covered entities are:

  • Doctors
  • Dentists
  • Pharmacies
  • Health insurance companies
  • Company health plans

A business associate is a person or entity that performs certain functions or activities that involve the use or disclosure of protected health information on behalf of, or provides services to, a covered entity. Examples of business associates (whose services involve access to PHI) are:

  • CPA
  • Attorney
  • IT providers
  • Billing and coding services
  • Laboratories

For more detailed information on the definition of a covered entity and businesses associate visit The Department of Health and Human Services (HHS) website.


HIPAA Privacy Rule

The HIPAA Privacy Rule provides federal protections for personal health information and gives patients rights to their own protected health information (PHI). The Privacy Rule permits the disclosure of PHI needed for patient care and other important purposes. The Privacy Rule applies to all healthcare providers, including those who do not use an Electronic Health Record (EHR) system, and includes all mediums: electronic, paper, and oral.

Privacy Rule Basics:

  • Spells out administrative responsibilities
  • Discusses written agreements between covered entities and business associates
  • Discusses the need for privacy policies and procedures
  • Describes employer responsibilities to train workforce members and implement requirements regarding their use and disclosure of PHI.

Privacy Rule Examples

  • Train all employees on its privacy policies and procedures
  • Properly dispose of documents containing protected health information
  • Secure medical records with lock and key or pass code
  • Create procedure for individuals to know to whom they can submit a complaint about a covered entity's compliance with the Privacy Rule

HIPAA Security Rule

The HIPAA Security Rule requires covered entities, business associates, and their subcontractors to implement safeguards to protect electronic protected health information (ePHI) that is created, received, or maintained. It specifies a series of administrative, physical, and technical safeguards to ensure the confidentiality, integrity, and availability of ePHI. Most violations of the HIPAA Security Rule result from businesses not following policies and procedures to safeguard ePHI.

Security Rule Basics:

  • Establish a national set of security standards for ePHI
  • Protects health information held or transmitted in electronic form
  • Requires administrative, physical, and technical safeguards to secure ePHI
  • Supports the Privacy Rule requirement to reasonably safeguard PHI in all forms

Security Rule Examples:

  • Designate a security officer who is responsible for HIPAA compliance
  • Create policies and procedures that explain proper use of workstations and electronic media
  • Ensure all employees have unique passwords
  • Limit physical access to covered entity's facilities

HIPAA Breach Notification Rule

The Breach Notification Rule requires covered entities, business associates, and their subcontractors to provide notification following a breach of unsecured PHI to affected individuals, the HHS Secretary, and the media (if breach affects more than 500 residents of a state or jurisdiction). The Breach Notification Rule consists of protocols a business must undertake in the event of data compromise.

It includes elements such as:

  • What constitutes a breach
  • Necessary parties to be notified
  • Notification timelines
  • Notification methods
  • Notification content
  • Remediation plan

HITECH Act

The Health Information Technology for Economic and Clinical Health (HITECH) Act, passed in 2009, increases noncompliance penalties and incentives for covered entities to implement an EHR system. It also extends requirements of the HIPAA Security Rule and some aspects of the HIPAA Privacy Rule to business associates. Covered entities are financially penalized or rewarded for complying with mandates, including Meaningful Use.


HIPAA Final Omnibus Rule

The final omnibus rule was passed in January 2013 and became effective in March 2013. The rule is intended to strengthen HIPAA Privacy and Security Rules and Health Information Technology for Economic and Clinical Health (HITECH) Act. The final omnibus rule expands the HIPAA requirements expected of covered entities and business associates and adds subcontractors of business associates that access PHI to the list of organizations that must comply with HIPAA regulations. The rule requires a modification of business associate agreements to include requirements from the final omnibus rule. The final omnibus rule also included a compliance date of September 23, 2013 for covered entities, business associates, and subcontractors of business associates. So time to comply is up!


HIPAA Fines

The Health Information Technology for Economic and Clinical Health (HITECH) Act and HIPAA final omnibus rule provide additional guidance and authority for the HHS to enforce HIPAA compliance through audits and financial penalties.

HHS HIPAA compliance audits have begun. HHS Office for Civil Rights former Director Leon Rodriguez said, "These changes [omnibus rule] not only greatly enhance a patient's privacy rights and protections, but also strengthen the ability of my office to vigorously enforce the HIPAA privacy and security protections." The main form of enforcement is an audit. HIPAA compliance audits can be triggered by one of five ways:

  • Self reported data breach (required under Breach Notificaton Rule)
  • Complaints to the HHS by patients
  • Complaints to the HHS by current or ex-employees
  • Data breach of over 500 patient records
  • Random targets chosen by HHS

Audits are one way the HHS identifies HIPAA violations. Once identified, the HHS then determines how to penalize covered entities, business associates, and potentially their subcontractors for noncompliance. The penalties outlined below are per day and per violation. This means that if you have multiple violations you could potentially get fined up to $50,000 per day for each violation until the violation is resolved. The following chart summarizes compromise and/or noncompliance penalties.


Violation Category:
A. Did not know
Penalty:
$100 - $50,000
Total Per Calendar Year:
$1,500,000
Violation Category:
B. Reasonable Cause
Penalty:
$1,000 - $50,000
Total Per Calendar Year:
$1,500,000
Violation Category:
C. i. Willful Neglect - Corrected
Penalty:
$10,000 - $50,000
Total Per Calendar Year:
$1,500,000
Violation Category:
C. ii. Willful Neglect - Not Corrected
Penalty:
$50,000
Total Per Calendar Year:
$1,500,000

Risk Analysis and Risk Management

Risk Analysis

The HHS directs covered entities, business associates, and their subcontractors to "Conduct an accurate and thorough assessment of the potential risks and vulnerabilities to the confidentiality, integrity, and availability of electronic protected health information held by the covered entity or business associate." HHS HIPAA Security Rule. A risk analysis is also required as part of Meaningful Use.

To use a medical analogy, a HIPAA security risk analysis is the examination and testing you use to make a diagnosis. Just as you use a diagnosis and other clinical data to create a treatment plan, you will use the risk analysis to create a risk management plan. However, without the diagnosis you cannot properly treat the problem, or in this case to become HIPAA compliant.

The risk analysis process is designed to accomplish two things:

  1. Identify potential security risks of an organization
  2. Determine the likelihood and potential impact of these risks

Risk Management

"Implement security measures sufficient to reduce risks and vulnerabilities to a reasonable and appropriate level to comply with [the General Requirements of the Security Rule]." HHS HIPAA Security Rule.

To continue with the medical analogy, after the diagnosis or HIPAA security risk analysis, it is essential to create a treatment plan. A diagnosis without a treatment plan is not only ineffective, but also irresponsible. The risk management plan is essential to effectively secure protected health information (PHI) and to become HIPAA compliant.

The risk management process is designed to accomplish two things:

  1. Implement security measures
  2. Evaluate and maintain security measures

Meaningful Use

The American Recovery and Reinvestment Act of 2009 authorizes the Centers for Medicare & Medicaid Services (CMS) to implement incentive programs for Meaningful Use of certified Electronic Health Record (EHR) systems. Meaningful Use is a Medicare and Medicaid EHR Incentive Program, which provide financial incentives for eligible hospitals and professionals (physicians, dentists, etc.) to meaningfully use certified EHR technology.

To receive an EHR incentive payment, hospitals and professionals must provide reports showing that they are meaningfully using their EHRs and meeting certain objectives set by the CMS. If hospitals or professionals reach the objectives established for Meaningful Use, they can receive annual payments up $44,000 for Medicare and $63,750 for Medicaid. The program started in 2011, and payments will continue through 2016 to eligible hospitals and professionals. After 2015, CMS will require eligible hospitals and professionals to meet Meaningful Use or hospitals and professionals may be subject to financial penalty.

One Meaningful Use requirement is to complete a thorough and accurate risk analysis of EHR systems. The risk analysis required for Meaningful Use is just a part of the security risk analysis required for HIPAA compliance, and can be taken care of at the same time. A HIPAA security risk analysis reviews all systems that interact with protected health information (PHI), including your EHR systems. Visit the CMS website for more detailed Meaningful Use information.

Let Us Help You Get HIPAA Compliant.

We've helped over 800,000 businesses with data security and compliance.

First Name *

Last Name *

Email *

Phone *

* Please fill out the highlighted fields

Thank you!

A representative will contact you shortly.

Check out our Learning Center for practical security tips.

We are excited to work with you.

*Required

Thank you!

Your request has been submitted.