The Standards for Privacy of Individually Identifiable Health Information (Privacy Rule) establishes a set of national standards for the protection of patients' rights and certain health information.
Its standards address the use and disclosure of individuals' health information, known as protected health information or PHI by organizations subject to the Privacy Rule, as well as standards for an individual's rights to understand and control how their health data is used.
A major goal of the Privacy Rule is to ensure PHI is properly protected while allowing the flow of health information needed to provide and promote high quality health care, and to protect the public's health and well being.
In short, the rule attempts to strike a balance between confidentiality, integrity and availability of health care data. This means the rule is designed to be flexible, while remaining comprehensive enough to cover the variety of uses and disclosures it needs to address.
Learn how UpGuard is protecting the healthcare sector from data breaches >
The HIPAA Privacy Act is one part of the Health Insurance Portability and Accountability Act of 1996 (HIPAA) that was signed into federal law by President Bill Clinton on 21 August 1996. The Act itself consists of five titles:
Under HIPAA, the Secretary of HHS was required to publicize standards for the electronic exchange, privacy and security of health information, collectively known as the Administrative Simplification provisions.
Learn how to choose an ideal HIPAA compliance product >
Other important HIPAA rules include the HIPAA Security Rule, HIPAA Breach Notification Rule, and HIPAA Omnibus Rule. Additionally, the Health Information Technology for Economic and Clinical Health Act (HITECH Act) made changes to the Security Rule and Breach Notification Rule.
HIPAA required the Secretary to issue privacy regulations governing personal health information, if Congress did not enact privacy legislation within three years of the passage of HIPAA. As Congress failed to enact legislation, HHS developed a proposed rule and released it for public comment on November 3, 1999. Over 52,000 comments were made and the final regulation, which is known as the Privacy Rule was published on December 28, 2000.
The Privacy Rule was later modified on August 14, 2002.
A major purpose of the Privacy Rule is to define and limit the circumstances in which an individual's protected health information may be used or disclosed by covered entities.
Covered entities cannot use or disclose PHI unless:
There are only two situations when PHI must be disclosed:
Find out important HIPAA-related statistics >
The HIPAA Privacy Rule is important because it seeks to protect the confidentiality of medical records and PHI.
In 2017, the Health Care Industry Cybersecurity Task Force convened by the US Department of Health and Human Services (HHS Office) concluded that health care cybersecurity was in critical condition.
The truth is health care providers are lagging far behind other industries, when it comes to information security. Like many industries, the healthcare industry is increasingly reliant on internet-connected devices: from sharing patient records and lab results to medical devices and elevators.
This is generally a good thing for patients, patient information can be transferred quickly, patient engagement is higher and there is better clinical support. However, this same technology can be vulnerable to vulnerabilities, cause data leaks or be infected with malware.
Reports show ransomware attacks and other cyber attacks are on the rise and health care organizations are one of the biggest targets. A good example is the 2017 WannaCry ransomware worm that infected an estimated 200,000 computers across 150 countries, including the United Kingdom's National Health Service.
The attack targeted a zero day vulnerability called EternalBlue. EternalBlue exploited the SMB protocol in old Microsoft Windows Operating Systems to spread, encrypting data and holding the computer systems for ransom.
The reason the health care systems is such an attractive target for cybercriminals is largely due to the valuable information that electronic health records hold, namely protected health information (PHI) and personally identifiable information (PII). This health information is highly private data and its unauthorized disclosure can result in personal embarrassment, identity theft and financial harm.

Learn how UpGuard helped Burgess Group achieve HIPAA compliance.
The Privacy Rule applies to:
Learn how to comply with HIPAA's third-party risk requirements >
Health plans are individual or group plans that provide or pay the cost of medical care. This includes dental, vision, prescription drug, and health insurers, health maintenance organizations, Medicare, Medicaid, Medicare+Choice and Medicare supplement insurers, employer-sponsored group health plans, government and church-sponsored health plans, and multi-employer health plans, and long-term care insurers (excluding nursing home fixed-indemnity policies).
There are exceptions:
Every health care provider, regardless of size, who electronically transmits health information in connection with certain transactions is a covered entity.
These transactions include:
It's important to note that the use of electronic technology, e.g. email, does not necessarily make a health care provider a covered entity. The transaction must be in connected with one of the transactions outlined above.
Additionally, it's important to note that whether the electronic transmit is directly made by the health care provider or by a third-party vendor, it must still be adequately protected.
This is why vendor risk management has become increasingly important in the health care industry.
Health care clearinghouses are entities that process nonstandard information they receive from another entity into a standard format or vice versa.
Generally, this means receiving individually identifiable health information when providing health care services to a health plan or health care provider as a business associate. In such cases, only certain provisions of the Privacy Rule are applicable to the clearinghouse's use and disclosure of PHI.
Examples include billing services, repricing companies, community health management, information systems, and value-add networks.
A business associate is a person, service provider or organization, other than a member of a covered entity's workforce, that performs certain functions or activities on behalf of, or provides certain services to, a covered entity that involve the use or disclosure of PHI. A covered entity can be the business associate of another covered entity.
When a covered entity outsources to a business associate, they must contractually impose specific safeguards to protect PHI in a business associate agreement. Moreover, a covered entity cannot authorize a business associate to make any use or disclosure of PHI that would violate the Privacy Rule.
Common business associate products and services include:
Note: If a person or organization does not use or disclose PHI, they are not a business associate.
Follow this checklist to implement a HIPAA compliance program.
The Privacy Rule protects all individually identifiable health information held or transmitted by a covered entity or business associate, whether in paper, oral or electronic form. This information is known as protected health information (PHI) or electronic protected health information (ePHI).
PHI includes information, including demographic data, that relates to:
That can be used to identify an individual or where there is a reasonable basis to believe it can be used to identify the individual. Individually identifiable health information includes many common identifiers (e.g. name, address, birth date, Social Security Number).
However, PHI excludes employment records that a covered entity maintains in its capacity as an employer and education and other records subject to or defined in the Family Educational Rights and Privacy Act (FERPA).
Additionally, there are no restrictions on the use or disclosure of de-identified health information that has been either:
HIPAA outlines 18 identifiers that must be treated with special care:
Read our full guide on protected health information for more information >
A covered entity is permitted, but not required, to use and disclose PHI without an individual's authorization for the following purposes or situations:
Learn about the most common HIPAA violations >
HHS recognizes covered entities range from small providers to large, multi-state health plans. Therefore, there is flexibility and scalability in the Privacy Rule to allow entities to analyze their own needs and implement solutions appropriate for their environment, size, resources and business.
However, it's important to note that the Privacy rule is only one part of HIPAA compliance.
That said, there are some requirements:

The Department of Health and Human Services, Office for Civil Rights (OCR) is responsible for administering and enforcing these standards and may conduct complaint investigations and compliance reviews.
Covered entities that fail to comply voluntarily with the standards may be subject to civil money penalties. In addition, certain violations of the Privacy Rule may be subject to criminal prosecution.
Before a civil penalty is imposed, OCR will notify the covered entity and provide them with an opportunity to provide written evidence that could reduce or bar them from the penalty. This must be submitted to OCR within 30 days of receipt of the notice.
Additionally, if OCR intends to impose a penalty, a covered entity has the right to request an administrative hearing to appeal.
The civil penalties range from $100 to $50,000+ per HIPAA violation with a Calendar Year Cap of $1,500,000.
Civil penalties will not be imposed in some situations if:
In addition, OCR may choose to reduce a penalty if the failure to comply was due to a reasonable cause and the penalty would be excessive, given the nature and extent of the noncompliance.
If a person knowingly obtains or discloses PHI they may face a criminal penalty of up to $50,000 and one-year imprisonment. This can increase to $100,000 and up to five years imprisonment for wrongful conduct under false pretenses and $250,000 and up to 10 years imprisonment for wrongful conduct involving the intent to sell, transfer or use PHI for commercial advantage, personal gain or malicious harm.
Learn more about the penalties for HIPAA violations >
UpGuard helps the healthcare industry protect patient data and avoid costly regulatory violations by offering security measures specifically developed for supporting compliance with the HIPAA privacy rule.
Vendor Risk by UpGuard is a vendor risk management solution covering the complete lifecycle of vendor risk management, including:
Risk assessments allow healthcare organizations to perform a detailed risk analysis of all third-party security risks that could potentially lead to data compromise. To help healthcare organizations expedite both the risk assessment and HIPAA compliance tracking process, UpGuard has developed a HIPAA-specific security questionnaire.
UpGuard’s HIPAA questionnaire helps healthcare entities easily determine whether their vendors are compliant with HIPAA’s security standards, and a risk mapping features highlights any security risks threatening HIPAA compliance so that they can be addressed to avoid a violation.
UpGuard’s security rating solution to gives you a single-pane-of-glass view of the state of security of your entire vendor network. Each vendor’s security score is based on an analysis of 70+ common attack vectors, including:
UpGuard’s security rating solution includes a projected score improvement feature indicating the projected impact of each specific remedial action on a vendor’s overall security posture. When used alongside UpGuard’s HIPAA questionnaire, security teams can use this feature to prioritize tasks with the greatest positive impact on HIPAA compliance.
