Health Insurance Portability and Accountability Act (HIPAA) Compliance
Introduction
Protected health information (PHI) breaches have affected over 176 million patients in the United States. Most of these breaches resulted from employees' negligence and noncompliance with HIPAA regulations rather than external hacking.[1]
The US Health Insurance Portability and Accountability Act of 1996 (HIPAA), also known as the Kennedy–Kassebaum Act or Kassebaum-Kennedy Act, comprises 5 Titles, as mentioned below.[2][3][4]
- Title I: Protects health insurance coverage for workers and their families during job changes or losses. This Title restricts new healthcare plans from denying coverage based on preexisting conditions.
- Title II: Addresses healthcare fraud and abuse, implements medical liability reform, and promotes administrative simplification by establishing national standards for electronic healthcare transactions and national identifiers for providers, employers, and health insurance plans.
- Title III: Provides guidelines for pre-tax medical spending accounts and introduces changes to health insurance laws and deductions for medical insurance.
- Title IV: Offers guidelines for group healthcare plans, including modifications to health coverage provisions.
- Title V: Regulates company-owned life insurance policies, provides provisions for treating individuals without US citizenship, and repeals financial institution rules related to interest allocation.
Why was HIPAA established?
- The statute aims to establish confidentiality systems within healthcare facilities and beyond.
- The primary goal of HIPAA is to protect the privacy of PHI.
Whom does HIPAA cover?
- All individuals working in healthcare facilities or private offices
- Students
- Non-patient care employees
- Healthcare plans (eg, insurance companies)
- Billing companies
- Electronic medical record companies
What are the primary goals of HIPAA?
- To limit the use of PHI to individuals with a "need to know."
- To impose penalties on those who fail to comply with confidentiality regulations.
What healthcare information is protected?
- Any healthcare information that contains an identifier linking it to a specific patient (eg, name, social security number, telephone number, email address, street address, and other personal identifiers)
What is the difference between HIPAA privacy rules, use, and disclosure of information?
- Privacy rules: Require patients to give signed consent for the use or disclosure of their personal information
- Use: Refers to how information is utilized within a healthcare facility
- Disclosure: Refers to how information is shared outside a healthcare facility
What are the legal exceptions when healthcare professionals can breach confidentiality without permission?
- Gunshot wounds
- Stab wounds
- Injuries sustained during a criminal act
- Abuse of children or older adults
- Infectious, communicable, or reportable diseases
What types of data are protected by HIPAA?
- Written, paper, spoken, or electronic data
- Transmission of data within and outside a healthcare facility
- Any individual or institution involved with healthcare-related data
- Data size is irrelevant.
(Please see StatPearls' companion resource, "Patient Confidentiality," for more information.)
What types of electronic devices must facility security systems protect?
- Both hardware and software
- Unauthorized access to healthcare data or devices, including user attempts to change passwords at defined intervals
What are the qualifications and responsibilities of a HIPAA security officer?
- An information technology (IT) background
- Document and maintain security policies and procedures
- Audit systems
- Conduct risk assessments and ensure compliance with policies and procedures
What does a security risk assessment entail?
- It should be conducted at all healthcare facilities.
- It involves assessing the risks of virus infections and hacking attempts.
- It includes developing safeguards to mitigate identified risks.
What are physical safeguards?
- They secure printers, fax machines, and computers.
- They help install locks on computer rooms and record storage areas.
- They destroy sensitive information when it is no longer needed.
What type of employee training for HIPAA is necessary?
- Training should ideally be conducted under the supervision of the security officer.
- The level of training and access should correspond to the employee's responsibilities.
- Annual HIPAA training, including updates, is mandatory for all employees.
What type of reminder policies should be in place?
- Email alerts and posters
- Log-on and log-off computer notices
How should a sanctions policy for HIPAA violations be written?
- The policy should be clear, unambiguous, and written in plain English.
- It should apply equally to all employees and contractors.
- The sale of information should result in termination.
- Repeated offenses should lead to progressively harsher penalties.
What discussions regarding patient information may be conducted in public locations?
- None
- All conversational information is protected by confidentiality and HIPAA.
- Patient information or PHI should not be discussed in public locations.
How do you protect electronic information?
- Computer screens should be pointed away from public view.
- Privacy sliding doors should be used at the reception desk.
- PHI should never be left unattended.
- Workstations should be logged off when leaving the area.
How do you ensure password protection?
- By not sharing passwords
- By not writing down passwords
- By not verbalizing passwords
- By not emailing passwords to others
How do you select a safe password?
- One should avoid selecting consecutive digits.
- One should not choose information that can be easily guessed.
- One should select something memorable but not easily guessed.
Function
Register For Free And Read The Full Article
- Search engine and full access to all medical articles
- 10 free questions in your specialty
- Free CME/CE Activities
- Free daily question in your email
- Save favorite articles to your dashboard
- Emails offering discounts
Learn more about a Subscription to StatPearls Point-of-Care
Function
Functions of HIPAA
When enacting HIPAA, Congress established federal standards to ensure the security of electronic PHI (ePHI), thereby safeguarding the confidentiality, integrity, and availability of health information. This law protects individuals' health information while allowing authorized access for healthcare providers, clearinghouses, and healthcare plans to facilitate continued medical care.[5][6][7]
As mentioned below, the rise in ePHI exchange has necessitated robust security standards to safeguard sensitive health information while ensuring proper access for healthcare-related entities.
- Security standards became essential due to the increasing exchange of PHI between covered and non-covered entities. These standards ensure the availability, integrity, and confidentiality of ePHI. Additionally, state laws with stricter guidelines may overrule federal security guidelines.
- The Federal Security Rule mandates standards that protect individuals' health information while allowing authorized access by healthcare providers, clearinghouses, and health insurance plans. The Federal Security Rule establishes federal standards to ensure the availability, confidentiality, and integrity of ePHI. In some cases, state laws with stricter requirements may take precedence over these federal standards.
- Healthcare providers, plans, and business associates are committed to safeguarding private health information. However, traditional methods, such as securing paper records in locked cabinets, are no longer sufficient in the digital age. Information is increasingly stored and transmitted electronically, so the Federal Security Rule establishes clear national standards to protect ePHI.[8][9]
Issues of Concern
There are 5 sections of the HIPAA Act, also referred to as "Titles," as outlined below.[10][11][12][13]
Title I. Focus on Healthcare Access, Portability, and Renewability
- Regulates the availability of group and individual health insurance policies. Title I amended the Employee Retirement Income Security Act, the Public Health Service Act, and the Internal Revenue Code.
- Requires coverage and limits the restrictions a group healthcare plan can impose on benefits for preexisting conditions. Specifically, group healthcare plans can only deny benefits related to preexisting conditions for up to 12 months after enrollment or 18 months for late enrollment.
- Allows individuals to shorten the exclusion period based on the duration of their previous coverage before enrolling in a new plan, taking into account any breaks in coverage.
- Includes "creditable coverage," which applies to most group and individual healthcare plans, as well as Medicare and Medicaid.
-
Defines a "significant break" as any 63 consecutive days without creditable coverage. This also permits premiums based on factors such as body mass index or tobacco use avoidance.
- Requires insurers to issue policies without exclusions to individuals leaving group healthcare plans with creditable coverage exceeding 18 months. Title I also mandates insurers to renew individual policies as long as they are offered or provide alternatives to discontinued plans without exclusions as long as the insurer remains in the market, regardless of the individual's health condition.
Title II. Preventing Healthcare Fraud and Abuse; Administrative Simplification; Medical Liability Reform
- Establishes policies and procedures for maintaining the privacy and security of individually identifiable health information, outlines offenses, and creates civil and criminal penalties for violations.
- Introduces programs to control fraud and abuse, along with Administrative Simplification rules.
- Requires the Department of Health and Human Services to enhance the efficiency of the healthcare system by establishing standards.
The Department of Health and Human Services implemented the following 5 rules to enforce Administrative Simplification:
- Privacy Rule
- Transactions and Code Sets Rule
- Security Rule
- Unique Identifiers Rule
- Enforcement Rule
Privacy Rule
The HIPAA Privacy Rule governs the use and disclosure of PHI by "covered entities," which include healthcare clearinghouses, health insurers, employer-sponsored healthcare plans, and medical providers. Covered entities are required to disclose PHI to an individual upon request within 30 days. Additionally, these entities must provide and disclose PHI as mandated by law enforcement, such as for investigating suspected child abuse.
- Covered entities may disclose PHI to law enforcement upon receiving court orders, subpoenas, or administrative requests.
-
A covered entity may reveal PHI to facilitate treatment, payment, or healthcare operations without requiring the patient's written authorization.
- Any other disclosures of PHI require the covered entity to obtain the individual's prior written authorization.
- When a covered entity discloses PHI, it must make a reasonable effort to disclose only the minimum amount of information necessary.
- The Privacy Rule grants individuals the right to request corrections to any inaccurate PHI and requires covered entities to take reasonable steps to ensure the confidentiality of communications with individuals.
- The Privacy Rule requires covered entities to notify individuals of PHI use, track disclosures, and document privacy policies and procedures.
2013 Omnibus Rule update: The revised definition of "significant harm" to an individual in breach analysis requires a more comprehensive investigation of covered entities intending to disclose previously unreported breaches. The protection of PHI was extended from indefinite to 50 years after an individual's death. Additionally, the HIPAA Privacy Rule may be waived during a natural disaster.
Right to access: The Privacy Rule requires medical providers to grant individuals access to their PHI upon written request. Providers must supply a copy of the requested information within 30 days. Afterward, individuals can request the information electronically or as a hard copy.
- Individuals have the right to access all health-related information, except psychotherapy notes and information collected by a provider, for legal defense purposes.
- Providers may charge a reasonable fee for copying costs, but no charge is allowed when providing data electronically from a certified electronic health record using the "view, download, and transfer" function."
- Individuals may authorize information delivery through encrypted or unencrypted email, media, direct messaging, or other methods. However, they must understand and accept the risks of using unencrypted data transfer methods.
- Individuals may request that their PHI be delivered to a third party in writing.
- Individuals may request in writing that their provider send PHI to a designated service, such as a Personal Health Record application, to collect or manage their records.
Relative disclosure: Hospitals are prohibited from disclosing information over the phone to relatives of admitted patients. This restriction has hindered efforts to locate missing persons, as seen in incidents like airline crashes, where hospitals are reluctant to reveal the identities of passengers being treated, making it challenging for relatives to find them.
Transactions and Code Sets Rule
HIPAA was created to improve the efficiency of the healthcare system by standardizing healthcare transactions. Part C of HIPAA, titled "Administrative Simplification," mandates that healthcare plans adopt standardized processes for healthcare transactions. For instance, medical providers seeking reimbursements are required to submit electronic claims that comply with HIPAA standards to receive payment.
Security Rule
This rule complements the Privacy Rule. While the Privacy Rule pertains to all PHI, the Security Rule is specific to ePHI. The Security Rule outlines 3 key security safeguards—administrative, physical, and technical.
Administrative safeguards: Policies and procedures must clearly outline how the entity will comply with the act. Covered entities are required to adopt written privacy procedures and designate a privacy officer responsible for developing and implementing necessary policies and procedures. These procedures must define the classes of employees with access to ePHI and restrict access to those who need it to perform their job functions. The procedures should cover access authorization and the processes for establishing, modifying, and terminating access. Ongoing training for employees on handling PHI is essential. Additionally, covered entities must back up their data and implement disaster recovery plans. Internal audits are necessary to assess operations and identify potential security violations, with clear instructions for addressing and responding to security breaches.
Physical safeguards: Procedures must regulate physical access to protected data, including the introduction and removal of hardware and software from the network, ensuring access is limited to authorized individuals. Procedures must also control and monitor access to equipment containing PHI. Workstations must be arranged to ensure monitor screens are invisible to the public. Additionally, if covered entities employ contractors or agents, they must receive thorough training on handling PHI.
Technical safeguards: Technical safeguards include controlling access to computer systems and enabling covered entities to protect communications containing ePHI over open networks.
- Information systems storing PHI must be safeguarded against unauthorized access.
- Data within these systems must not be altered or erased without proper authorization.
- Data corroboration methods, such as checksums, double-keying, message authentication, and digital signatures, must be used to ensure data integrity and authenticate communicating entities.
- Covered entities must make their HIPAA documentation available to government authorities.
- IT documentation should include detailed records of all configuration settings for network components.
- Entities must have documented risk analysis and risk management programs in place.
Unique Identifiers Rule (National Provider Identifier)
HIPAA-covered entities, including healthcare providers engaging in electronic transactions, healthcare clearinghouses, and large healthcare plans, must use the National Provider Identifier (NPI) exclusively to identify healthcare providers in standard transactions.
The NPI replaces all other identifiers used by healthcare plans, Medicare, Medicaid, and other government programs. However, NPI does not replace a provider's DEA number, state license, or tax identification number. The NPI consists of 10 digits (which may be alphanumeric), with the last digit serving as a checksum. The NPI is devoid of any embedded intelligence and does not carry additional meaning. NPI is unique and national, never reused, and, with the exception of institutions, a provider typically has only 1 NPI. Institutions may obtain multiple NPIs for different "sub-parts," such as a free-standing surgery or wound care center.
Enforcement Rule
- This rule imposes civil monetary penalties for violations of HIPAA regulations and establishes procedures for investigations and hearings related to such breaches.
- The US Department of Health and Human Services has investigated over 20,000 cases, often resolving them by requiring changes in privacy practices or corrective actions.
- If noncompliance is determined, entities must implement corrective measures.
- Complaints have been investigated against a wide range of organizations, including pharmacy chains, major healthcare centers, insurance groups, hospital networks, and smaller providers.
The Department of Health and Human Services has identified the following issues, ranked by frequency:
- Misuse and improper disclosure of PHI
- Lack of protections for health information
- Patients denied access to their health information
- Use or disclosure of PHI exceeding the minimum necessary
- Inadequate safeguards for ePHI
According to the Department of Health and Human Services, the entities most commonly required to take corrective action are listed below in order of frequency:
- Private practices
- Hospitals
- Outpatient facilities
- Group insurance plans
- Pharmacies
Title III. Tax-Related Health Provisions Governing Medical Savings Accounts
- Standardizes the allowable pre-tax savings per person in a medical savings account.
- Extends medical savings accounts to employees covered by employer-sponsored high-deductible plans for small businesses and self-employed individuals.
Title IV. Application and Enforcement of Group Health Insurance Requirements
- Specifies conditions for group healthcare plans related to coverage for individuals with preexisting conditions and modifies continuation of coverage requirements.
- Clarifies the continuation coverage provisions and includes specific updates to COBRA regulations.
Title V. Revenue Offset Governing Tax Deductions for Employers
- Establishes provisions for company-owned life insurance, prohibiting tax deductions for interest on loans related to life insurance policies, endowments, or contracts owned by the company.
- Repeals the financial institution rules related to interest allocation.
- Amends provisions of laws related to individuals who renounce US citizenship or permanent residency, expanding the expatriation tax to apply to those considered to be giving up their US status for tax avoidance purposes.
- Publishes the names of former citizens in the public record through the creation of the Quarterly Publication of Individuals Who Have Chosen to Expatriate.
Clinical Significance
The HIPAA Privacy and Security Rules have substantially transformed the operations of medical institutions and healthcare providers. Their complex legal requirements, severe civil and financial penalties, and increased paperwork and implementation costs have significantly influenced healthcare practices. Comprehensive training in HIPAA is essential for all healthcare professionals to understand the potential risks and actions that could result in violations.[14][15]
Clinical Care Effects
HIPAA, combined with its severe penalties for violations, may cause medical centers and practices to withhold life-saving information from individuals who have a right to it and urgently need it. According to the HIPAA Privacy Rule, the US Government Accountability Office found that healthcare providers were often "uncertain about their legal privacy responsibilities" and tended to take an overly cautious approach to disclosing information. The solution lies in educating all healthcare professionals and support staff to ensure they understand when PHI can be legally shared.
Education and Training Effects
Education and training are essential for healthcare providers and students to implement the HIPAA Privacy and Security Rules effectively. Practical training and education should describe the regulatory background and purpose of HIPAA and provide a comprehensive review of its principles and key provisions.
Research Effects
HIPAA restrictions on research have affected the ability to perform chart-based retrospective studies, making it more challenging to evaluate patients prospectively for follow-up.[11][16]
- The HIPAA Privacy Rule has led to a 95% decrease in the completion of follow-up surveys by patients being monitored long-term.
- Recruitment of patients for cancer studies has resulted in a 70% decrease in patient accrual, a tripling of the time spent on recruitment, and an increase in mean recruitment costs.
- The legal language required for research studies has become extensive due to the need to protect participants' health information. While such information is crucial, the lengthy legal sections can make these complex documents less user-friendly for those required to read and sign them.
Many researchers believe that HIPAA privacy laws negatively impact the cost and quality of medical research.[7]
Costs
The HIPAA Privacy and Security Acts mandate that all medical centers and practices comply with their provisions. The costs associated with developing and updating systems, increasing paperwork, and dedicating time to staff education have significantly impacted the finances of medical centers and practices, especially as reimbursements from insurance companies and Medicare have decreased. Ultimately, the potential costs of violating the statutes are so substantial that institutions must allocate scarce resources to ensure compliance and to educate employees on the statutory rules.
Clinical Conclusions
HIPAA presents a significant risk of violations that almost any medical professional can inadvertently commit. Staff with limited education and understanding are particularly prone to breaching these rules during routine tasks. At the same time, a small number of violations involve personal gain or curiosity; most result from momentary lapses that lead to costly mistakes. Simple errors, such as writing an incorrect address, phone number, or email on a form or inadvertently disclosing protected information aloud, can put a practice at risk. HIPAA education and training are essential, as is the design and maintenance of systems that minimize human errors and ensure compliance.[17][18][19]
Other Issues
Violations of HIPAA
Civil violations
- An individual who unknowingly violates HIPAA is subject to a $100 fine per violation, with an annual maximum of $25,000 for repeated violations.
- For a violation due to reasonable cause and not willful neglect, the penalty is $1000 per violation, with an annual maximum of $100,000 for repeated offenses.
- For violations due to willful neglect that are corrected within the required period, the penalty is $10,000 per violation, with an annual maximum of $250,000 for repeated violations.
- For a HIPAA violation due to willful neglect that is not corrected, the penalty is $50,000 per violation, with an annual maximum of $1,000,000, $50,000, or $1.5 million per violation.
Criminal violations
- For covered entities and specified individuals who willfully and knowingly obtain or disclose individually identifiable health information, the penalty is up to $50,000, with imprisonment for up to 1 year.
- The penalty for offenses committed under false pretenses is up to $100,000, with imprisonment for up to 5 years.
- For offenses committed with the intent to sell, transfer, or use individually identifiable health information for commercial advantage, personal gain, or malicious harm, the penalty is up to $250,000, with imprisonment for up to 10 years.
The US Department of Health and Human Services—Office for Civil Rights has received over 100,000 complaints of HIPAA violations, many of which have resulted in civil and criminal prosecutions.
Examples of HIPAA violations and breaches include:
- Hospital staff disclosed a patient's HIV testing results in a waiting room, prompting a requirement for regular HIPAA training for staff and repositioning of computer monitors to ensure privacy.
- An office manager accidentally faxed confidential medical records to an employer instead of a urologist's office, resulting in a stern warning letter and mandatory HIPAA training for all employees.
- A surgeon was terminated after illegally accessing the personal records of celebrities, fined $2,000, and sentenced to 4 months in jail.
- A private practice lost an unencrypted flash drive containing PHI, resulting in a $150,000 fine and the requirement to implement a corrective action plan.
- A private physician had their license suspended for submitting a patient's bill to collection agencies with CPT codes that revealed the patient's diagnosis.
- Texas hospital employees received an 18-month jail term for the wrongful disclosure of private patient medical information.
- A Walgreens pharmacist violated HIPAA by sharing confidential information about a customer who had dated her husband, resulting in a $1.4 million HIPAA award.
- Virginia employees were terminated for accessing medical files without a legitimate medical need.
- An employee was terminated for inadvertently disclosing a pregnancy test result aloud in the back office of a medical clinic.
- A sales executive was fined $10,000 for filling out prior authorization forms and placing them in patient charts.
- Six doctors and 13 employees were terminated at UCLA for viewing Britney Spears's medical records without a legitimate reason.
- A cardiac monitor vendor was fined $2.5 million when a laptop containing hundreds of patient medical records was stolen from a car.
- An employee was terminated at the Washington State Medical Center for improperly accessing over 600 confidential patient health records.
- A hospital employee posted on Facebook about a patient's death, stating, "She should have worn her seatbelt."
- A hospital was fined $2.2 million for allowing an ABC film crew to film two patients without their consent.
- A cardiology group was fined $200,000 for posting surgical and clinical appointments on a publicly accessible internet calendar.
- Tricare Management of Virginia exposed the confidential data of nearly 5 million individuals.
- Cignet Health of Maryland was fined $4.3 million for ignoring patient requests to obtain copies of their records and for disregarding federal officials' inquiries.
- A Virginia physician was prosecuted for sharing patient information with an employer under false pretenses.
Enhancing Healthcare Team Outcomes
The HIPAA underscores the importance of protecting patient privacy and ensuring secure handling of protected health information. Despite its critical role in safeguarding healthcare data, clinicians and healthcare teams face challenges in fully understanding and consistently applying HIPAA regulations. These challenges stem from evolving technologies, intricate privacy requirements, and inadequate training on secure data practices. This gap has resulted in widespread breaches affecting millions of patients, primarily due to negligence or unintentional noncompliance. Interprofessional education and collaboration are essential to address these issues and enhance outcomes, safety, and team performance.
To improve compliance, healthcare teams must adopt a multifaceted approach. Physicians, advanced practitioners, nurses, pharmacists, and support staff need robust training in HIPAA principles, including secure data transmission, mobile device protocols, and breach prevention. Effective care coordination requires the development of comprehensive systems to minimize errors, such as inadvertent disclosures or mishandling of PHI. Responsibilities include regular risk assessments by IT professionals, continuous audits, and the establishment of clear policies on access and data use. By fostering open communication across disciplines, teams can share insights on best practices, ensure accountability, and reinforce a culture of compliance.
Patient-centered care is enhanced when all team members understand the legal and ethical parameters of PHI use. Collaborative strategies, such as secure communication platforms and shared training modules, can ensure that healthcare providers act consistently in accordance with HIPAA while maintaining efficient workflows. In research contexts, streamlined processes for PHI management can mitigate the regulatory burden and improve patient recruitment while safeguarding privacy. Through interprofessional efforts and targeted education, healthcare teams can effectively navigate HIPAA’s complexities, reduce violations, and prioritize patient trust and safety.
References
Kessler SR, Pindek S, Kleinman G, Andel SA, Spector PE. Information security climate and the assessment of information security risk among healthcare employees. Health informatics journal. 2020 Mar:26(1):461-473. doi: 10.1177/1460458219832048. Epub 2019 Mar 14 [PubMed PMID: 30866704]
Mermelstein HT, Wallack JJ. Confidentiality in the age of HIPAA: a challenge for psychosomatic medicine. Psychosomatics. 2008 Mar-Apr:49(2):97-103. doi: 10.1176/appi.psy.49.2.97. Epub [PubMed PMID: 18354061]
Iyiewuare PO, Coulter ID, Whitley MD, Herman PM. Researching the Appropriateness of Care in the Complementary and Integrative Health Professions Part 2: What Every Researcher and Practitioner Should Know About the Health Insurance Portability and Accountability Act and Practice-based Research in the United States. Journal of manipulative and physiological therapeutics. 2018 Nov-Dec:41(9):807-813. doi: 10.1016/j.jmpt.2018.11.003. Epub 2019 Feb 10 [PubMed PMID: 30755332]
Liu X, Sutton PR, McKenna R, Sinanan MN, Fellner BJ, Leu MG, Ewell C. Evaluation of Secure Messaging Applications for a Health Care System: A Case Study. Applied clinical informatics. 2019 Jan:10(1):140-150. doi: 10.1055/s-0039-1678607. Epub 2019 Feb 27 [PubMed PMID: 30812040]
Level 3 (low-level) evidenceBerry MD, Thomson Reuters Accelus.. Healthcare Reform. Enforcement and Compliance. Issue brief (Health Policy Tracking Service). 2018 Dec 24:2018():1-38 [PubMed PMID: 30681783]
Berry MD, Thomson Reuters Accelus.. Business of Health. Business of Healthcare. Issue brief (Health Policy Tracking Service). 2018 Dec 24:2018():1-60 [PubMed PMID: 30681304]
Kels CG, Kels LH. Potential Harms of HIPAA. JAMA. 2018 Dec 11:320(22):2378-2379. doi: 10.1001/jama.2018.17183. Epub [PubMed PMID: 30535213]
Lam JS, Simpson BK, Lau FH. Health Insurance Portability and Accountability Act Noncompliance in Patient Photograph Management in Plastic Surgery. Annals of plastic surgery. 2019 May:82(5):486-492. doi: 10.1097/SAP.0000000000001760. Epub [PubMed PMID: 30648996]
Reynolds RA, Stack LB, Bonfield CM. Medical photography with a mobile phone: useful techniques, and what neurosurgeons need to know about HIPAA compliance. Journal of neurosurgery. 2020 Jan 1:132(1):260-264. doi: 10.3171/2018.8.JNS182075. Epub 2019 Jan 4 [PubMed PMID: 30611147]
Mattioli M. Security Incidents Targeting Your Medical Practice. MD advisor : a journal for New Jersey medical community. 2018 Summer:11(2):4-10 [PubMed PMID: 30570893]
Baker FX, Merz JF. What gives them the right? Legal privilege and waivers of consent for research. Clinical trials (London, England). 2018 Dec:15(6):579-586. doi: 10.1177/1740774518803122. Epub 2018 Oct 3 [PubMed PMID: 30280910]
Sims MH, Hodges Shaw M, Gilbertson S, Storch J, Halterman MW. Legal and ethical issues surrounding the use of crowdsourcing among healthcare providers. Health informatics journal. 2019 Dec:25(4):1618-1630. doi: 10.1177/1460458218796599. Epub 2018 Sep 7 [PubMed PMID: 30192688]
Kloss LL, Brodnik MS, Rinehart-Thompson LA. Access and Disclosure of Personal Health Information: A Challenging Privacy Landscape in 2016-2018. Yearbook of medical informatics. 2018 Aug:27(1):60-66. doi: 10.1055/s-0038-1667071. Epub 2018 Aug 29 [PubMed PMID: 30157506]
Bradley D. HIPAA compliance efforts. Pediatric emergency care. 2004 Jan:20(1):68-70 [PubMed PMID: 14716172]
Butler M. Top HITECH-HIPPA compliance obstacles emerge. Journal of AHIMA. 2014 Apr:85(4):20-4; quiz 25 [PubMed PMID: 24834549]
Roberts MK, Fisher DM, Parker LE, Darnell D, Sugarman J, Carrithers J, Weinfurt K, Jurkovich G, Zatzick D. Ethical and Regulatory Concerns in Pragmatic Clinical Trial Monitoring and Oversight. Ethics & human research. 2020 Sep:42(5):29-37. doi: 10.1002/eahr.500066. Epub [PubMed PMID: 32937035]
Level 2 (mid-level) evidenceWhite JM. HIPPA compliance for vendors and suppliers. Journal of healthcare protection management : publication of the International Association for Hospital Security. 2014:30(1):91-7 [PubMed PMID: 24707761]
McMahon EB, Lee-Huber T. HIPPA privacy regulations: practical information for physicians. Pain physician. 2001 Jul:4(3):280-4 [PubMed PMID: 16900255]
Bilimoria NM. HIPPA security rule compliance for physicians: better late than never. The Journal of medical practice management : MPM. 2005 Jul-Aug:21(1):39-42 [PubMed PMID: 16206804]