Why is HIPAA Important in Health IT?

Confidential file with hipaa written on it looks foreboding

In today’s hacker-crazed society, finding ways to protect patient data on the Internet is a top priority for healthcare providers.

Hospitals, private physicians, health IT professionals and other organizations invest millions of dollars in security systems to protect patient data. When security breaches occur, these entities can be forced to pay millions of dollars to settle patient data disputes and lawsuits, especially if they violate HIPAA privacy laws.

What is HIPAA?

In 1996, the federal government imposed a national policy to protect the confidentiality of personal health data and information, and instituted a minimum set of guidelines to increase security measures. That federal rule is known as the Health Insurance Portability and Accountability Act, or HIPAA, a familiar acronym used in offices, hospitals and government agencies to protect the release of someone’s personal information.

The HIPAA Security Rule was established as a set of national security standards for the protection of all electronically protected health information that covered entities and their business associates create, receive, maintain or transmit. According to the Office of the National Coordinator for Health Information Technology, the security rule contains the administrative, physical, and technical safeguards that covered entities and business associates must put in place to secure electronically protected health information.

What Does HIPAA Protect?

The goal of the security rule is to help healthcare providers avoid some of the common security gaps that could lead to a cyber attack and data loss. The safeguards aim to protect people, information, technology and facilities that healthcare providers depend on for secure patient care. Each safeguard has different requirements that are applied, according to the federal Health Information Technology guide:

  • Administrative safeguards focus on administrative actions, policies and procedures able to prevent, detect, contain and correct security violations.
  • Physical safeguards are physical measures, policies and procedures to protect electronic information systems and related buildings and equipment from natural and environmental hazards and unauthorized intrusion.
  • Organizational standards provide specific criteria required for written contracts or other arrangements.
  • Policies and procedures require a covered entity to adopt reasonable and appropriate policies and procedures to comply with the provisions of HIPAA.

An effective HIPAA compliance plan should include Internet applications and files to protect patient data and make it difficult for hackers to gain access to patient data.

Healthcare Cyber Attacks On The Rise

In reality, no individual, institution or government agency is safe from a cyber attack, not even government agencies charged with the task of protecting all Americans.

The Department of Health and Human Services (HHS), the federal agency responsible for HIPAA enforcement, isn’t immune to hacking, as noted by Elizabeth Litten in her blog “Hackers: Take My Health Information, But Please Don’t Take My Health.”

The Washington Times recently spotlighted security breaches at the federal agency. HHS experienced security breaches at the hands of hackers in five separate divisions in the past three years, according to Litten’s blog. The Times noted “a House Committee on Energy and Commerce report … described the breaches as having been relatively unsophisticated and the responsible security officials as having been unable to provide clear information regarding the security incidents,” Litten wrote.

“We know it’s not a question of ‘if’ sensitive information maintained electronically will be compromised by a hacking or other type of cyber security incident, but ‘when’ – regardless of who maintains it – and how destructive an incident it will be,” Litten added.

William Maruca, another blogger, opined about the exposure healthcare professionals face as “a result of the negligent disposal of medical practice’s patient records in an unlocked dumpster.”

Examples of Unintentional HIPAA Violations

In other blogs, Litten and Maruca spotlighted instances of HIPAA breaches crossing into the field of professional sports.

Litten wrote about the publicity that followed the ticker-tape parade for the U.S. women’s soccer team in New York City, where shredded confetti, apparently large enough for discarded medical information to be legible, rained down from office towers.

Litten and Maruca also discussed the New York Giants’ defensive end Jason Pierre-Paul’s medical record tweet by ESPN reporter Adam Schefter.

After a screenshot of a page from Pierre-Paul’s medical record was tweeted, there ensued a “flurry of speculation over whether the disclosure may have violated HIPAA or other privacy laws,” Maruca penned. In Litten’s opinion, “the Pierre-Paul incident provides an opportunity to review when medical information that relates to one’s employment is protected under HIPAA and when it isn’t,” she wrote. They pointed out the HHS 2002 finding that a professional athlete has the same HIPAA rights as anyone else.

How to Safeguard Protected Health Information

Maruca believes encrypting all electronically protected health information, especially when transferring it by mail, cloud storage or file transfer protocol (FTP) sites, or saving it to mobile devices, is the way to go.

Encryption is a method of converting an original message or regular text into coded text. It is encrypted by means of an algorithm. There is a low probability that anyone other than the receiving party, who has the key to the code or access to another confidential process, would be able to translate and convert it into comprehensible text, as described in the federal Health Information Technology guide.

Another blogger, Michael Kline, pointed out six steps physicians should use to protect Internet-based patient data. Kline contends the following six tips can help improve the security of protected health information:

  1. Review the Internet applications your practice uses.
  2. Ask the application’s manufacturer about its security safeguards.
  3. Investigate all Internet and external complaints and concerns.
  4. Keep track of the steps you take to identify and fix the problem.
  5. Provide a mechanism by which employees can report concerns anonymously.
  6. Don’t allow staff to use unauthorized public networks.

The federal government also provides recommendations to keep protected health information out of the hands of hackers. It begins with electronic health records (EHR), which affect the types and combination of safeguards you will need to maintain secure and confidential patient care information, according to the federal Health Information Technology guide.

“Most EHRs and related equipment have security features built-in or provided as part of a service, but they are not always configured or enabled properly,” the guide states, adding that it is the responsibility of a physician and the office staff to “keep up-to-date with software upgrades and available patches.” The government recommends vigilance as part of a physician’s regular responsibility.

YES! Please send me a FREE guide with course info, pricing and more!
Facebook
Twitter
LinkedIn

Academic Calendar

SUMMER I – 2024

Application Deadline April 12, 2024
Start Date April 29, 2024
End Date June 23, 2024

SUMMER II – 2024

Application Deadline June 7, 2024
Start Date June 24, 2024
End Date August 18, 2024

FALL I – 2024

Application Deadline August 2, 2024
Start Date August 19, 2024
End Date October 13, 2024

FALL II – 2024

Application Deadline September 27, 2024
Start Date October 14, 2024
End Date December 8, 2024

SPRING I – 2025

Application Deadline December 13, 2024
Start Date January 6, 2025
End Date March 2, 2025

SPRING II – 2025

Application Deadline February 14, 2025
Start Date March 3, 2025
End Date April 27, 2025

SUMMER I – 2025

Application Deadline April 11, 2025
Start Date April 28, 2025
End Date June 22, 2025

Get Our Program Guide

If you are ready to learn more about our programs, get started by downloading our program guide now.