So how do you go about upholding these guidelines to protect all of this information? Why, through the HIPAA Privacy and Security Rules of course! These terms may sound interchangeable, but don’t let them fool you! They both have their own distinct roles to play when it comes to HIPAA as a whole.

On average, the global cost of a data breach in 2023 is about 4.45 million USD. This number is actually a 15% increase since 2020. Ensuring the security of protected health information (PHI) can shield your company from financial losses, as well as losing the trust of your clients.
Luckily, we have the Health Insurance Portability and Accountability Act (HIPAA). HIPAA is a federal regulation that protects the privacy and security of PHI. No matter what type of media the information is on, such as on a computer or paper, your company must adhere to HIPAA rules and regulations to protect it.
So how do you go about upholding these guidelines to protect all of this information? Why, through the HIPAA Privacy and Security Rules of course! These terms may sound interchangeable, but don’t let them fool you! They both have their own distinct roles to play when it comes to HIPAA as a whole.
For example, the HIPAA Privacy Rule covers PHI in any medium. The HIPAA Security Rule covers electronically protected health information (ePHI) specifically.
Let’s start by discussing some of the basic terms you are about to hear me say over and over throughout this blog. Protected Health Information (PHI) is any patient information when in the possession of a covered entity. A covered entity is anyone who performs healthcare operations, such as providing treatment or collecting payments.
This information relates to:

PHI also includes anything that identifies the individual. This could be their name, birthdate, home address, etc.
Electronic Protected Health Information (ePHI) includes what a covered entity creates, receives, maintains, or transmits in electronic form. Mediums such as emails, texts, and so on. Now that you have a better idea of what these terms mean, let’s go over how they apply to HIPAA. More specifically, the Security & Privacy Rules.
The HIPAA Privacy Rule’s role in keeping information safe is an essential pillar which all health organizations and their business associates must uphold. Not only does it protect individually identifiable health information, but it allows patients to understand and control the use of their health information.

HIPAA Privacy Rule requirements:
The tenets of the Privacy rule are:
As I said before, patients have the right to access their information at any time. As a covered entity you have the responsibility to the patient under the HIPAA Privacy Rule to respect these rights.
For example, under the Privacy Rule, covered entities must ensure patients understand how they use and disclose their PHI. Giving patients a Notice of Privacy Practices that explains how they use their information accomplishes this. This notice should also cover a patient's legal rights with respect to their PHI and the covered entity’s legal duties.
Patients also have the right to review and obtain a copy of their medical records held by either covered entities or business associates. It is the general rule that healthcare providers have to provide patient’s their medical records within 30 days of a filed request.
Quick side note, a business associate is an organization or entity that performs certain functions which involve the use of PHI on behalf of a covered entity. An example of a business associate might be a healthcare clearinghouse that handles a provider’s claims before sending them to a payer.

Another patient right that covered entities must honor is the right to request a revision of their PHI. If a patient requests this, the covered entity must make a reasonable effort to provide the alteration. If they deny the request, the covered entity must provide the patient with a written denial. The patient can then decide to submit a statement of disagreement for inclusion in the record.
Individuals also hold the right to receive an accounting of disclosures. Also to be able to request the restriction of the use or disclosure of their PHI. Note that a covered entity is not obligated to agree to a restriction request, however, there must be a procedure in place to evaluate these requests. If they accept the restriction request, the provider must agree to the set terms, except for the purposes of treating a patient in an emergency situation.
Now that you know a little more about the HIPAA Privacy Rule, let’s move on to look at the Security rule and see how it differs. The HIPAA Security rule has the same basic idea in that it helps to protect patients’ health information. However, this rule covers e-PHI only. All electronic information created, received, used, or maintained by a covered entity falls under the Security Rule.
Security measures implemented through administrative, physical, and technical safeguards help to ensure the integrity and confidentiality of ePHI. Let’s look into these practices which can help you avoid some of the more common security gaps that lead to data loss and security breaches.

Administrative safeguards create the standards and regulations for your healthcare information security program which include:
Physical safeguards control physical access to things such as computer systems, phones, or your office in general. Some required physical safeguards include:
Technical safeguards might include things such as hardware, software, and other technology that help limit access to e-PHI. Some required technical safeguards include:

Healthcare providers must adhere to HIPAA rules.
Professionals including doctors, clinics, hospitals, nursing homes, and pharmacies are some of the covered entities that readily come to mind. Health plans and healthcare clearinghouses are some of the less obvious, but just as important, professionals that must comply with these rules, too.
Essentially, to keep it simple, if you perform certain functions or actions that involve the use or disclosure of PHI or ePHI, you need to follow HIPAA rules and guidelines.
Although it is impossible to guarantee you will never be a victim of a data breach, by following the proper guidelines you can reduce the risk drastically. Any healthcare facility that handles PHI or e-PHI is responsible for complying with HIPAA Privacy AND Security Rules.
Taking the time to monitor the security of patients’ sensitive information is essential. Having a security process in place, along with a contingency plan, can save you from both data and financial losses.
In nec dictum adipiscing pharetra enim etiam scelerisque dolor purus ipsum egestas cursus vulputate arcu egestas ut eu sed mollis consectetur mattis pharetra curabitur et maecenas in mattis fames consectetur ipsum quis risus mauris aliquam ornare nisl purus at ipsum nulla accumsan consectetur vestibulum suspendisse aliquam condimentum scelerisque lacinia pellentesque vestibulum condimentum turpis ligula pharetra dictum sapien facilisis sapien at sagittis et cursus congue.
Convallis pellentesque ullamcorper sapien sed tristique fermentum proin amet quam tincidunt feugiat vitae neque quisque odio ut pellentesque ac mauris eget lectus. Pretium arcu turpis lacus sapien sit at eu sapien duis magna nunc nibh nam non ut nibh ultrices ultrices elementum egestas enim nisl sed cursus pellentesque sit dignissim enim euismod sit et convallis sed pelis viverra quam at nisl sit pharetra enim nisl nec vestibulum posuere in volutpat sed blandit neque risus.

Feugiat vitae neque quisque odio ut pellentesque ac mauris eget lectus. Pretium arcu turpis lacus sapien sit at eu sapien duis magna nunc nibh nam non ut nibh ultrices ultrices elementum egestas enim nisl sed cursus pellentesque sit dignissim enim euismod sit et convallis sed pelis viverra quam at nisl sit pharetra enim nisl nec vestibulum posuere in volutpat sed blandit neque risus.
Feugiat vitae neque quisque odio ut pellentesque ac mauris eget lectus. Pretium arcu turpis lacus sapien sit at eu sapien duis magna nunc nibh nam non ut nibh ultrices ultrices elementum egestas enim nisl sed cursus pellentesque sit dignissim enim euismod sit et convallis sed pelis viverra quam at nisl sit pharetra enim nisl nec vestibulum posuere in volutpat sed blandit neque risus.
Vel etiam vel amet aenean eget in habitasse nunc duis tellus sem turpis risus aliquam ac volutpat tellus eu faucibus ullamcorper.
Sed pretium id nibh id sit felis vitae volutpat volutpat adipiscing at sodales neque lectus mi phasellus commodo at elit suspendisse ornare faucibus lectus purus viverra in nec aliquet commodo et sed sed nisi tempor mi pellentesque arcu viverra pretium duis enim vulputate dignissim etiam ultrices vitae neque urna proin nibh diam turpis augue lacus.