Frequently Asked Questions about HIPAA Privacy (2024)

Frequently Asked Questions about HIPAA Privacy

Please use this page as a quick reference for frequently asked questions about HIPAA privacy. We welcome the opportunity to enhance this page with reliable information.

Q. What does the HIPAA Privacy Rule do?

A. The HIPAA Privacy Rule for the first time creates national standards to protect individuals’ medical records and other personal health information.

    • gives patients more control over their health information.
    • sets boundaries on the use and release of health records.
    • establishes appropriate safeguards that health care providers and others must achieve to protect the privacy of health information.
    • holds violators accountable, with civil and criminal penalties that can be imposed if they violate patients’ privacy rights.
    • and it strikes a balance when public responsibility supports disclosure of some forms of data – for example, to protect public health.

For patients – it means being able to make informed choices when seeking care and reimbursem*nt for care based on how personal health information may be used.

    • It enables patients to find out how their information may be used, and about certain disclosures of their information that have been made.
    • It generally limits release of information to the minimum reasonably needed for the purpose of the disclosure.
    • It generally gives patients the right to examine and obtain a copy of their own health records and request corrections.
    • It empowers individuals to control certain uses and disclosures of their health information.

Q. Who may access confidential information?

A. Only those people who need access for business reasons and who have been authorized to receive it.

Q. What is meant by having access to the "minimum necessary" information to do our jobs?

A. We have access to all information that we need to do our jobs, but we should not have access to unnecessary information.

Q. What is the difference between "consent" and "authorization" under the HIPAA Privacy Rule?

A. The Privacy Rule permits, but does not require, a covered entity voluntarily to obtain patient consent for uses and disclosures of protected health information for treatment, payment, and health care operations. Covered entities that do so have complete discretion to design a process that best suits their needs.

An “authorization” is required by the Privacy Rule for uses and disclosures of protected health information not otherwise allowed by the Rule. Where the Privacy Rule requires patient authorization, voluntary consent is not sufficient to permit a use or disclosure of protected health information unless it also satisfies the requirements of a valid authorization.

Q. Who is our privacy officer? Who is our security officer?

A. Privacy Officer: C'Shalla Parker and Security Officer: William McCreary

Q. Why do we need privacy and security officers?

A. They are responsible for the overall protection of patient privacy and the security of all our information, whether on paper, in the computer, or in conversation.

Q. May the hospital use or disclose a patient's entire medical record based on the patient' signed consent?

A. Yes, as long as the Authorization describes, among other things, the information to be used or disclosed by the hospital in a "specific and meaningful fashion," and is otherwise valid under the Privacy Rule.

Q. Who is responsible for maintaining a secure environment and patient privacy?

A. Everyone.

Q. May I discuss patients with my spouse if he/she doesn't work here and promises to keep it secret?

A. No.

Q. Am I permitted to look up my sick father's medical record?

A. No. You are not permitted to look at your father's record unless your father has informed the hospital that that is okay in writing. While parents usually want family involvement in their treatment, it shouldn't be assumed. Sometimes an individual does not want family members to know the details.

Q. Does the HIPAA Privacy Rule permit a doctor to discuss a patient's health status, treatment, or payment arrangements with the patient's family and friends?

A. Yes. The HIPAA Privacy Rule specifically permits covered entities to share information that is directly relevant to the involvement of a spouse, family members, friends, or other persons identified by a patient, in the patient’s care or payment for health care. If the patient is present, or is otherwise available prior to the disclosure, and has the capacity to make health care decisions, the covered entity may discuss this information with the family and these other persons if the patient agrees or, when given the opportunity, does not object. The covered entity may also share relevant information with the family and these other persons if it can reasonably infer, based on professional judgment that the patient does not object. Under these circ*mstances, for example:

    • A doctor may give information about a patient’s mobility limitations to a friend driving the patient home from the hospital.
    • A hospital may discuss a patient’s payment options with her adult daughter.
    • A doctor may instruct a patient’s roommate about proper medicine dosage when she comes to pick up her friend from the hospital.
    • A physician may discuss a patient’s treatment with the patient in the presence of a friend when the patient brings the friend to a medical appointment and asks if the friend can come into the treatment room.

Q. If I have access to view my own medical record electronically is that considered a HIPAA violation?

A. No. It isNOT a HIPAA violation to view your own medical record. The University of Toledopolicy (3364-90-01)states, "Workforce members are permitted to view only his/her own PHI using University computing systems which the workforce member is authorized to access." A workforce membermay NOT access the health record of a family member or friend, including minor children.Please note: a workforce member may not alter or change their own medical record. Refer to Policy Release of Health Information 3364-90-01.

Q. We know that diagnoses and test results are confidential. What other information about a patient is confidential? What about billing records?

A. Essentially any information that is patient-identifiable, even the patient's address, is confidential and must be protected. Only when the patient has agreed may it be used or disclosed for specific purposes. Also, removal of the patient's name does not mean the patient's identity is protected; other information such as a medical record number, a zip code, or a date of birth could still be used for identification.

Q. What patient information can we disclose to any caller or visitor who asks?

A. This depends on what status the patient has requested at admission to the hospital. A patient can request to have all, some or none of their information provided over the phone to callers. Patients who are listed as "confidential" in STAR do not want their information given out, and we must be careful not to let that happen. Be sure to check the status of the patient in STAR before disclosing information over the phone.

Q. What could happen to me if I talked about patients even though I no longer worked here?

A. We are all required to keep patient information confidential "forever". A privacy breach could result in legal penalties even if you no longer work here.

Q. We know that medical records whether paper or electronic are confidential. What about handwritten notes and phone calls?

A. All forms of information written, spoken, or electronic are confidential and must be protected.

Q. What should you do if another organization asks for access to patient information in your computer system?

A. Forward the request to your privacy (C'Shalla Parker) or security officer (William McCreary). This access must be closely scrutinized first.

Q. How do you know what material is confidential?

A. Hospital guidelines describe what information is confidential, including anything that could be used to identify a patient. Computer user IDs and access codes, payroll information, confidential memos, and many other documents are also considered confidential information.

Please refer toThe University of Toledo's Confidentiality of Patient Information policy

Q. How should you dispose of confidential papers?

A. Put them in the locked shredder bin in your area. Make sureyou alwaysleave your work space free of paper PHI before you leave at the end of your shift.

Please refer toThe University of Toledo's Medical Record Retention and Destruction; Disposal of Protected Health Information policy.


Computer and IT FAQs related to Information Security

Q. Who is responsible if I "lend" my password to my co-worker and she uses it to look up information on a friend she's concerned about?

A. Both of us have violated our organization's policy. I am ultimately responsible for having shared my password.

Q. Why does everyone have his or her own unique user ID (i.e., log-on ID, etc.)?

A. Each person must have his or her own user ID so that he or she can be held accountable for activity connected to that ID.

Q. What are some important rules for making up "good" passwords? Ones that are hard for someone else to guess?

A. They should be at least six characters long; contain both numbers and letters; never be a real word or a significant number string; never be the name of a fictional character, a car model, or such.

Q. Is it okay to hide your password under your mouse pad or keyboard tray?

A. No. Passwords "hidden" this way can be easily found. This is not taking reasonable care to keep your password secret.

Q. What should you do if a well-known staff physician says that he has lost his password but needs immediate access to his patient's lab results and asks you to look up that patient's records for him?

A. But you should let the physician know you are not comfortable in doing this. And you should report the incident to the security officer. Thus the physician can get his password restored, and you are on record for noting that the patient look-up was done at the physician's request.

Q. What should you do if your computer access doesn't let you see information you need? Is it all right to ask a co-worker to share her password when the need is legitimate?

A. You should talk to your manager and arrange for the necessary access. It is never permissible to use someone else's password.

Q. Is it all right to bring in software from home? Why or why not?

A. Unless it has been approved and virus-scanned, it may contain a virus or other malicious code that could infect your PC and others on the network. Loading of software on PCs can also create issues with software necessary to do business which could render the PC inoperable. It is not in the interest ofUToledo to utilize unlicensed software, this creates legal issues

Q. Why is it important to log off when you leave your PC, even if no one else is around?

A. Even at the end of the day, housecleaning crews and others may be in the area and use your access - for which you will be held responsible!

Q. Can you identify two ways to protect the information on your computer screen?

A. Turn the screen away from public view. Use a password-protected screen saver that pops up after a few minutes of idle time and hides the information. Log off when you leave the area.

Q. Why is it important to read the message when you log on that tells you the last time you logged on?

A. If it was at an hour or on a day when you know you couldn't have logged on, someone else may have used your user ID and password. You must report this at once and change your password.

*For more information concerning the HIPAA privacy rule http://www.hhs.gov/ocr/hipaa/

Frequently Asked Questions about HIPAA Privacy (2024)

FAQs

What are three things that the HIPAA privacy Rule does? ›

HIPAA rules ensure that: PHI is only accessed by authorized parties. Patients have access to copies of their personal records upon request. Covered entities safeguard PHI through reasonable physical, administrative, and technical measures.

What are 3 exceptions to HIPAA privacy Rule? ›

Some of the key exceptions to the HIPAA Privacy Rule include: Treatment, Payment, and Healthcare Operations: Healthcare providers are permitted to use and disclose protected health information (PHI) without patient authorization for purposes of treatment, payment, and healthcare operations.

What to do with questions and concerns about HIPAA? ›

Filing a Complaint

If you believe that a HIPAA-covered entity or its business associate violated your (or someone else's) health information privacy rights or committed another violation of the Privacy, Security, or Breach Notification Rules, you may file a complaint with the Office for Civil Rights (OCR).

What impact does HIPAA have on patient privacy? ›

The HIPAA Privacy Rule

The Rule requires appropriate safeguards to protect the privacy of protected health information and sets limits and conditions on the uses and disclosures that may be made of such information without an individual's authorization.

What are the main privacy requirements of HIPAA? ›

A central aspect of the Privacy Rule is the principle of "minimum necessary" use and disclosure. A covered entity must make reasonable efforts to use, disclose, and request only the minimum amount of protected health information needed to accomplish the intended purpose of the use, disclosure, or request.

What information can be shared without violating HIPAA? ›

HIPAA permits health care providers to disclose to other health providers any protected health information (PHI) contained in the medical record about an individual for treatment, case management, and coordination of care and, with few exceptions, treats mental health information the same as other health information.

What cannot be disclosed under HIPAA? ›

Protected health information (PHI) cannot be shared under HIPAA. So what exactly is considered PHI according to HIPAA? It's information that can identify a particular patient, including health records, lab reports, bills, or even verbal conversations.

When can Hippa be violated? ›

A HIPAA violation is noncompliance on the part of a HIPAA-covered entity with the standards set by the Health Insurance Portability and Accountability Act of 1996. Examples of HIPAA violations include: Unauthorized access to Protected Health Information (PHI) Failure to perform an organization-wide risk assessment.

What information does HIPAA not protect? ›

Individually identifiable health information that is held by anyone other than a covered entity, including an independent researcher who is not a covered entity, is not protected by the Privacy Rule and may be used or disclosed without regard to the Privacy Rule.

What is the most common violation of HIPAA? ›

1. Poor Access Control Policies. The HHS (Department of Health and Human Services) and state attorney generals cite “failure to implement proper access controls” for protecting patient information as one of the most common HIPAA violations by healthcare services.

What can override HIPAA? ›

There are myriad examples--aside from the three above--of how state laws may take precedence over HIPAA. The simple rule of thumb is that any provision--in state laws or HIPAA--that gives greater protection to patients' privacy or right to access their own health information takes precedence.

What happens if someone violates HIPAA? ›

Penalty: $50,000 per violation, with an annual maximum of $1.5 million for identical violations. In addition to these civil monetary penalties, criminal penalties can also be imposed for certain offenses, such as obtaining or disclosing PHI knowingly and in violation of the rules, or under false pretenses.

Does HIPAA really protect your privacy? ›

The HIPAA Rules apply only when PHI is created, received, maintained, or transmitted by covered entities and business associates. For example, the HIPAA Rules do not protect the privacy of your Internet search history, information you voluntarily share online, or your geographic location information.

Does HIPAA do enough to protect patient privacy? ›

Yes, HIPAA Protects You

The same privacy protections you expect at a doctor's office are in operation for health insurance companies. HIPAA doesn't apply to other kinds of insurance. If a life insurance company acquires information about your health, it's not required to safeguard it the way HIPAA-covered entities are.

What are the pros and cons of HIPAA privacy rule? ›

HIPAA compliance offers benefits such as safeguarding sensitive data, empowering patients with rights, ensuring data security and confidentiality, fostering standardized healthcare transactions, and maintaining insurance coverage portability, but its implementation involves administrative burdens, costs, potential ...

What is the exception to HIPAA confidentiality? ›

7 Exceptions to HIPAA
  • Personal Use. HIPAA does not apply to the use or disclosure of PHI by an individual for personal use. ...
  • Law Enforcement. ...
  • Research. ...
  • Colleges and Universities. ...
  • Emergency Situations. ...
  • State Law Contradictions. ...
  • Worker's Compensation.
Mar 13, 2023

What is one exception to HIPAA confidentiality? ›

Imminent danger: Healthcare providers may share patient information with anyone as necessary to prevent or lessen a serious and imminent threat to the health and safety of a person or the public.

Are there exceptions to the privacy rule? ›

Further, HIPAA Privacy Rule exceptions exist when the PHI of one individual is included with the PHI of another. This can happen if (for example) a patient´s medical record includes medical information relating to their parents.

What 3 types of disclosures do not require patient authorization per HIPAA? ›

A covered entity is permitted, but not required, to use and disclose protected health information, without an individual's authorization, for the following purposes or situations: (1) To the Individual (unless required for access or accounting of disclosures); (2) Treatment, Payment, and Health Care Operations; (3) ...

Top Articles
Latest Posts
Article information

Author: Sen. Emmett Berge

Last Updated:

Views: 5916

Rating: 5 / 5 (80 voted)

Reviews: 95% of readers found this page helpful

Author information

Name: Sen. Emmett Berge

Birthday: 1993-06-17

Address: 787 Elvis Divide, Port Brice, OH 24507-6802

Phone: +9779049645255

Job: Senior Healthcare Specialist

Hobby: Cycling, Model building, Kitesurfing, Origami, Lapidary, Dance, Basketball

Introduction: My name is Sen. Emmett Berge, I am a funny, vast, charming, courageous, enthusiastic, jolly, famous person who loves writing and wants to share my knowledge and understanding with you.