preview

HIPAA Essay

Decent Essays

The Health Insurance Portability and Accounting Act (HIPAA) is geared towards the protection of anyone with Protected Health Information (PHI). It was passed in 1996 by congress placing new rules to protect PHI under the enforcement of the Department of Health and Human Services (HHS). Under HIPAA anyone who handles health care information such as, clearinghouses, health care plans, and health care providers who transmits certain types of healthcare information electronically is considered a covered entity subject to regulation under HIPAA. HIPAA sets up two major rules addressing privacy and security. The first, the Privacy Rule, addresses the need to keep PHI confidential by limiting its disclosure and use. There are several means in …show more content…

The first is when the owner of the PHI requests it. Although the covered entity may deny the request if it believes it will cause harm to the life or physical safety of the requester or another person. The second is in the event of an HHS investigation. There are several other important individual rights under the Privacy Rule. Covered entities are required to keep records detailing the disclosures of a person’s PHI. Although covered entities do not need to detail every disclosure, but rather specific types as detailed in the Privacy Rule. Also, any notices given to people about their PHI must be written in a simple, easy to understand manner. Other things to note are requirements to report breaches, and in the event that a person requests access to his or her own PHI, the covered entity must respond within 30 days with a possible extension of another 30 days with notification. The other major part of HIPAA is the Security Rule. The purpose of the Security Rule is to ensure that PHI is secure and requires that certain types of safeguards be put in place. This rule has three different types of safeguards put in place. The first category has to do with administrative safeguards. These are as follows, security management process, assigned security responsibility, workforce security, information access management, security awareness training, security incident procedures, contingency plans,

Get Access