emPower
What are the three rules of Hipaa?

Understanding HIPAA Privacy Rule : The Three Fundamental Rules to Keep in Mind

Neglecting the three HIPAA rules can lead to large fines, loss of face, and for an employee worker – loss of job. Businesses can lose up to 1.5 million dollars as fines. So, if you are covered under HIPAA, you must comply with the three HIPAA rules.


Understanding HIPPA Privacy Rule

The Health Insurance Portability and Accountability Act (HIPAA) is a significant piece of U.S. legislation that provides data privacy and security provisions to safeguard medical information.

Understanding HIPAA rules is critical for any entity that deals with protected health information (PHI), including healthcare providers, insurance companies, and business associates. These rules mandate that strict controls are in place to prevent unauthorized access to PHI, ensuring the privacy of patients and the confidentiality of their health information.

In essence, HIPAA rules act as a protective shield for sensitive patient data, minimizing the risk of breaches and promoting trust between patients and healthcare providers. Compliance is not only legally mandated but a crucial aspect of patient care in today’s data-driven world.

The three HIPAA rules

The Health Insurance Portability and Accountability Act (HIPAA) lays out three rules for protecting patient health information.  

  1. The Privacy Rule 
  2. The Security Rule
  3. The Breach Notification Rule

These three rules set national standards for the purpose. These standards address the issue of protecting health information, which could be used for identifying a person. 

 

1. The Privacy Rule

The standards set by the Privacy rule address subjects such as: 

  1. Which organizations must follow the HIPAA standards
  2. What is protected health information (PHI)
  3. How organizations can share and use PHI
  4. Permitted usage and disclosure of PHI
  5. Patient’s rights over their health information

Healthcare entities covered by HIPAA include:

  1. Health plans 
  2. Health care clearinghouses 
  3. Health care providers 

HIPAA also applies to business associates who conduct healthcare transactions for covered entities. 

Usage and disclosure limitations 

The privacy rule restricts the usage of health information which could identify a person (PHI). Covered entities cannot use or disclose PHI unless:

  • It’s permitted under the Privacy rule, or
  • The individual has authorized it in writing.

The Privacy rule does not restrict de-identified health information. 

Hippa-Rules

2. The Security Rule

The security rule sets the standards for the protection of PHI in electronic format (ePHI). 

The Security rule standards cover:

  1. Which organizations must follow the security rule
  2. What health information is protected under the security rule
  3. What safeguards must be in place for the purpose

The security rule covers all healthcare providers who use ePHI. It also covers business associates of such providers. 

All the covered entities must protect all ePHI that they create, receive, store, or send. They must: 

  1. Ensure the confidentiality, integrity, and availability of the PHI
  2. Protect the ePHI against all threats to its security and integrity 
  3. Protect it against impermissible use or disclosure
  4. Train employees, and ensure compliance with the security rule
  5. Adapt suitable policies and procedures

The covered entities are also required to perform risk analysis and create a risk management plan to mitigate the risk to ePHI. 

The risk analysis process should at least include the following steps. 

  1. Identify potential risks to patient health information
  2. Create a risk management plan 
  3. Put in place administrative, physical, and technical safeguards
  4. Conduct HIPAA training, and train workers to follow HIPAA policies and procedures
  5. Document their risk analysis process
  6. Conduct risk analysis yearly to identify and mitigate new risks

 

3. The breach notification rule 

HIPAA considers all PHI usage or disclosures that aren’t permitted under the Privacy rule as a breach. 

The breach notification rule requires covered entities to send alerts upon discovery of a breach. Once a covered entity becomes aware of a breach, the alerts have to be sent within next 60 days. 

Covered entities are required to alert:

  1. Affected individuals
  2. Health and Human Services (HHS)
  3. Media, if necessary

Business associates of a covered entity need to alert their covered entity too. 

If the breach affects more than 500 people, the HHS must be notified immediately. The HHS would post it on their website. The covered entity would also need to post the message on their website.

Organizations may also choose not to send alerts, but only if they can prove that there is low probability of the PHI being compromised. 

HIPAA-Breach.

Reportable Breaches and Exceptions

Organizations should consider all impermissible uses and disclosures as a breach of PHI. But, they need to send alerts only for unsecured PHI. Besides this, the breach notification rule is flexible under three more circumstances.

  1. If it was unintentional or done in good faith, and was within the scope of the authority.
  2. If it was done unintentionally between two people permitted to access the PHI.
  3. The organization has a good faith belief that the person to whom the disclosure was made would not be able to retain the PHI.

In any case, the organization should ensure that such incidents don’t reoccur. 

Breach alerts are required only for unsecured PHI. If you secured it as specified by this guidance, then you don’t need to send the alerts. 

The HHS Office for Civil Rights enforces the three HIPAA rules. Violations of the HIPAA rules may result in fines and penalties. In some cases, criminal penalties may also apply. 

If you want to know more about the three HIPAA rules, you may visit the HHS website.  

Like this post? Subscribe to receive updates directly in your inbox.