HIPAA and HITECH require physician practices and hospitals to have procedures in place to deal with specific aspects of PHI (Protected Health Information) including disclosures, access and security. Major components are the Privacy Rule, the Security Rule and the Breach Notification Rule. This checklist provides an overview of the requirements. A companion worksheet is available on the AdvantEdge website and upon request.
More detail is available in the official HHS documents and the AdvantEdge Compliance Office is available to assist clients in any of these areas.
The Privacy Rule applies to all media types including paper, oral, and electronic. It requires organizations to consider the confidentiality, integrity, and availability of PHI and to have procedures in place to address the use and disclosure of PHI, notice of privacy practices, and minimum necessary approach to using PHI.
The HIPAA Security Rule requires appropriate Administrative, Physical, and Technical Safeguards to ensure the confidentiality, integrity, and security of electronic PHI.
For more details, the Indian Health Service has prepared a detailed HIPAA Security Checklist.
Breach Notification Rule
Healthcare providers and their business associates are required to provide full disclosure about a breach. Any instance where PHI has been compromised and is in the position to be used in a harmful manner is considered a breach.
The use of health information technology continues to expand in health care. Although these new technologies provide many opportunities and benefits for consumers, they also pose new risks to consumer privacy. Because of these increased risks, the Health Insurance Portability and Accountability Act (HIPAA) and the Health Information Technology for Economic and Clinical Health Act (HITECH) include national standards for the privacy of protected health information, the security of electronic protected health information, and breach notification to consumers. HITECH also requires HHS to perform periodic audits of covered entity and business associate compliance with the HIPAA Privacy, Security, and Breach Notification Rules.
- The audit protocol covers Privacy Rule requirements for (1) notice of privacy practices for PHI, (2) rights to request privacy protection for PHI, (3) access of individuals to PHI, (4) administrative requirements, (5) uses and disclosures of PHI, (6) amendment of PHI, and (7) accounting of disclosures.
- The protocol covers Security Rule requirements for administrative, physical, and technical safeguards
- The protocol covers requirements for the Breach Notification Rule.
– – – – –