CDMP Fundamentals • 100 Questions • 90 Minutes
← Back to HIPAA Compliance

📚 Understanding HIPAA — A Beginner's Guide

🎓 What Is It?

HIPAA is a U.S. federal law enacted in 1996 that protects the privacy and security of individuals' health information. Think of it as the 'data protection law for healthcare.' If GDPR protects all personal data in Europe, HIPAA specifically protects health-related data in the United States. It tells healthcare providers, insurance companies, and their partners exactly how they must handle patient information — from the moment it is created to the moment it is destroyed. HIPAA is not optional: if you handle health data in the U.S., you must comply.

👥 Who It Applies To

HIPAA applies to two main groups: (1) Covered Entities — these are healthcare providers (doctors, hospitals, clinics, pharmacies, dentists), health plans (insurance companies, HMOs, Medicare, Medicaid), and healthcare clearinghouses (organizations that process health data between providers and payers). (2) Business Associates — these are any third-party companies or individuals that perform services for a covered entity and have access to Protected Health Information (PHI). Examples include IT service providers, cloud hosting companies, billing companies, law firms, accountants, EHR vendors, shredding companies, and data analytics firms. If your consulting firm touches PHI, you are a Business Associate.

🌐 Geographic Scope

HIPAA is a United States federal law and applies to all covered entities and business associates operating within the United States, its territories, and anywhere U.S. patient data is processed. Unlike GDPR, HIPAA does not have explicit extraterritorial reach, but if a foreign company is a Business Associate of a U.S. Covered Entity and handles PHI, they must comply with HIPAA through their Business Associate Agreement. Many states also have their own health privacy laws that may impose additional requirements beyond HIPAA.

📅 Key Dates

1996: HIPAA signed into law by President Clinton. 2000: Privacy Rule proposed. 2003: Privacy Rule enforcement begins (April 14). 2005: Security Rule enforcement begins (April 20). 2009: HITECH Act enacted as part of the American Recovery and Reinvestment Act, significantly strengthening HIPAA enforcement and breach notification requirements. 2013: Omnibus Rule finalized (January 25), extending direct liability to Business Associates and updating breach notification standards. Today: HIPAA is actively enforced by the HHS Office for Civil Rights (OCR), with regular audits and investigations.

⚠ Penalties

Did Not Know — The covered entity or business associate did not know and, by exercising reasonable diligence, would not have known that the act was a HIPAA violation. $25,000 - $68,928 per violation category per year (adjusted for inflation)
  • A small medical practice unknowingly uses an email service that does not encrypt messages containing PHI, and a breach occurs.
  • An employee accesses a patient record they genuinely believed they were authorized to view as part of treatment, but the access was not within the Minimum Necessary standard.
  • A clinic's legacy system stores PHI in an unencrypted database and the organization was unaware this was a HIPAA requirement.
Reasonable Cause — The violation was due to reasonable cause and not willful neglect. The organization knew or should have known about the issue but the failure was not due to willful neglect. $1,000 - $68,928 per violation, up to $137,886 per violation category per year
  • A hospital's IT department knew about a software vulnerability affecting PHI systems but delayed patching due to resource constraints.
  • A Business Associate failed to update their BAA after HIPAA regulations changed, despite receiving notice from the Covered Entity.
  • A healthcare provider continued to fax PHI to an outdated fax number after being notified of the change, resulting in misdirected records.
Willful Neglect — Corrected: The violation was the result of willful neglect of HIPAA requirements, but the organization corrected the violation within 30 days of discovery. $10,000 - $68,928 per violation, up to $344,638 per violation category per year
  • A hospital knew its servers lacked encryption for ePHI but took corrective action within 30 days after an audit finding.
  • A health plan intentionally did not conduct a required risk assessment for two years but quickly implemented one after being contacted by OCR.
  • A practice knowingly shared PHI with a vendor without a BAA but executed one promptly after the issue was identified.
Willful Neglect — Not Corrected: The violation was the result of willful neglect and was not corrected within 30 days. This is the most severe tier and can also result in criminal penalties including imprisonment. $50,000 - $68,928 per violation, up to $2,067,813 per violation category per year
  • Anthem Inc. paid $16 million in 2018 after a data breach affecting 78.8 million individuals, where investigators found long-standing failures in risk analysis and access controls.
  • A healthcare organization refuses to provide patients with access to their medical records despite repeated requests and OCR guidance.
  • A provider knowingly dumps unshredded patient records in a public dumpster and takes no corrective action after being notified.

📖 Key Terms Glossary

PHI (Protected Health Information)

Any information about a person's health, healthcare services, or payment for healthcare that can be linked to a specific individual. This is the core data HIPAA protects. If data is about health AND can identify a person, it is PHI.

Example: A medical record that says 'John Smith, DOB 03/15/1980, diagnosed with Type 2 Diabetes on 01/10/2024' is PHI because it contains health information linked to an identifiable individual.

ePHI (Electronic Protected Health Information)

PHI that is created, stored, transmitted, or received in electronic form. This includes data in EHR systems, databases, emails, cloud storage, mobile devices, USB drives, and any other electronic medium. The HIPAA Security Rule specifically focuses on protecting ePHI.

Example: A patient's lab results stored in an Oracle database, a PDF of a medical record on a shared drive, or a patient's insurance information sent via email are all ePHI.

Covered Entity (CE)

An organization that must comply with HIPAA because of the type of work it does. There are exactly three types: (1) Healthcare Providers who transmit health information electronically (doctors, hospitals, clinics, pharmacies), (2) Health Plans (insurance companies, HMOs, Medicare, Medicaid), and (3) Healthcare Clearinghouses (organizations that process nonstandard health information into standard formats).

Example: Your local hospital, your health insurance company (like Blue Cross), and the billing clearinghouse that translates insurance claims between the hospital and insurance company are all Covered Entities.

Business Associate (BA)

Any person or organization (other than a Covered Entity's own workforce) that performs a function or activity on behalf of a Covered Entity that involves access to PHI. Since the 2013 Omnibus Rule, Business Associates are directly liable for HIPAA compliance — not just through their contracts.

Example: A cloud hosting company (like AWS) that stores a hospital's patient database, an IT consultant who manages a clinic's EHR system, a medical billing company, a law firm handling malpractice cases, or a shredding company that destroys paper records are all Business Associates.

Business Associate Agreement (BAA)

A legally binding contract between a Covered Entity and a Business Associate that establishes exactly what the BA is allowed to do with PHI, what safeguards they must implement, and what happens if there is a breach. You MUST have a BAA in place BEFORE sharing any PHI with a Business Associate. No BAA means no PHI sharing — period.

Example: Before a hospital can use a cloud EHR vendor, they must sign a BAA that specifies the vendor will encrypt all ePHI, report breaches within a specific timeframe, return or destroy PHI when the contract ends, and allow the hospital to audit their security practices.

TPO (Treatment, Payment, and Healthcare Operations)

The three main purposes for which a Covered Entity can use or disclose PHI WITHOUT getting the patient's specific authorization. Treatment means providing care, Payment means billing and collecting payment, and Operations means running the business of healthcare (quality assessment, training, compliance activities). Most routine healthcare activities fall under TPO.

Example: A doctor sharing a patient's lab results with a specialist for a referral (Treatment), a hospital sending a claim to an insurance company (Payment), or a clinic conducting an internal quality audit of patient outcomes (Operations) — all permitted under TPO without separate patient authorization.

Minimum Necessary Standard

A core HIPAA principle that says when using or disclosing PHI, you must make reasonable efforts to limit the information to the minimum amount necessary to accomplish the purpose. You should not access or share an entire medical record when only a small portion is needed. This does NOT apply to treatment disclosures between providers, but it applies to almost everything else.

Example: If an insurance company needs to verify that a patient had a specific procedure for a claim, the hospital should only send information about that procedure — not the patient's entire medical history, mental health records, and genetic information.

De-identification

The process of removing or altering the 18 specific identifiers from health data so that the remaining information cannot be used to identify an individual. HIPAA provides two methods: the Expert Determination method (a statistician certifies the risk is very small) and the Safe Harbor method (all 18 identifiers are removed). Once data is properly de-identified, it is no longer PHI and HIPAA no longer applies to it.

Example: A hospital wants to share patient data with a research university. They remove all names, dates, zip codes (keeping only first 3 digits if population is over 20,000), Social Security numbers, and all other identifiers. The remaining dataset — which contains diagnoses, procedures, and lab values but cannot be linked to any individual — is de-identified and can be shared freely.

Designated Record Set

The group of records maintained by or for a Covered Entity that includes medical records, billing records, enrollment records, and any other records used to make decisions about individuals. Patients have the right to access and request amendments to their Designated Record Set. This is important for database professionals because you need to know exactly which tables and systems constitute the Designated Record Set.

Example: A hospital's Designated Record Set includes the EHR database, the billing system, the patient portal records, lab result databases, imaging records, and insurance enrollment files. It does NOT typically include psychotherapy notes (which have extra protections), peer review records, or information compiled for legal proceedings.

Notice of Privacy Practices (NPP)

A document that every Covered Entity must provide to patients explaining how the organization may use and disclose their PHI, the patient's rights regarding their PHI, and the organization's legal duties. Think of it as the healthcare equivalent of a privacy policy. It must be provided at the first interaction and posted prominently.

Example: When you visit a new doctor's office for the first time, they hand you a multi-page document explaining that they may share your records with specialists, insurance companies, and for hospital operations, that you have the right to request copies of your records, and that you can file a complaint if you believe your privacy has been violated. That document is the NPP.

Authorization

A detailed, written permission signed by a patient that allows a Covered Entity to use or disclose PHI for purposes BEYOND the standard TPO uses. Unlike general consent, an authorization must be specific: it must name the information to be disclosed, who will receive it, the purpose, and an expiration date. Patients can revoke authorizations at any time.

Example: A patient wants their medical records sent to their life insurance company. Since this is not Treatment, Payment, or Operations, the hospital needs a signed Authorization from the patient specifying which records, sent to which insurance company, for what purpose, and how long the authorization is valid.

Breach

Under HIPAA, a breach is the acquisition, access, use, or disclosure of unsecured PHI in a way that violates the Privacy Rule and compromises the security or privacy of the PHI. There is a presumption that any impermissible use or disclosure is a breach unless the Covered Entity can demonstrate a low probability that the PHI was compromised, based on a 4-factor risk assessment.

Example: A hospital employee emails a spreadsheet containing 500 patients' names, diagnoses, and Social Security numbers to their personal email account. This is an impermissible disclosure of unsecured PHI, and unless the 4-factor risk assessment shows low probability of compromise, it is a breach requiring notification.

HITECH Act

The Health Information Technology for Economic and Clinical Health Act, enacted in 2009. It dramatically strengthened HIPAA by: (1) making Business Associates directly liable for HIPAA compliance, (2) requiring breach notification, (3) increasing penalties, (4) promoting the adoption of electronic health records, and (5) giving state attorneys general the power to enforce HIPAA. If HIPAA was the original law, HITECH was the major upgrade that gave it real teeth.

Example: Before HITECH, a cloud hosting company that lost patient data had no direct HIPAA liability — only the hospital was responsible. After HITECH, the cloud company is directly liable and can be fined by OCR independently of the hospital.

OCR (Office for Civil Rights)

The division within the U.S. Department of Health and Human Services (HHS) that is responsible for enforcing HIPAA. OCR investigates complaints, conducts compliance audits, issues guidance, and levies fines. They are the 'HIPAA police.' When there is a breach affecting 500 or more individuals, it is reported to OCR and posted on their public 'Wall of Shame' breach portal.

Example: If a patient believes their doctor improperly shared their medical records, they file a complaint with OCR. OCR then investigates, may request documentation from the healthcare provider, and can impose corrective action plans or financial penalties.

Risk Analysis (Risk Assessment)

A thorough, systematic evaluation of the potential risks and vulnerabilities to the confidentiality, integrity, and availability of ePHI held by an organization. This is the single most important HIPAA requirement and the most commonly cited deficiency in OCR enforcement actions. It must be documented, comprehensive, and updated regularly. It is NOT a one-time checkbox exercise.

Example: A hospital conducts a risk analysis by inventorying all systems containing ePHI (EHR, billing, email, mobile devices, medical devices), identifying threats (hackers, employee error, natural disaster, device theft), assessing current safeguards, determining the likelihood and impact of each threat, and documenting a risk level for each combination. The output is a risk register with prioritized remediation actions.

Encryption

The process of converting readable data (plaintext) into an unreadable format (ciphertext) using a mathematical algorithm and a key. Under HIPAA, encryption is technically an 'addressable' specification — meaning you must implement it or document why an equivalent alternative is reasonable. In practice, encryption is the single most effective way to protect ePHI and is considered a safe harbor: if encrypted ePHI is lost or stolen, it is NOT considered a breach.

Example: A hospital encrypts its SQL Server database using TDE (Transparent Data Encryption) so that if someone steals the physical hard drive, they cannot read the patient data. They also use TLS 1.2+ for all data in transit. If a laptop with encrypted ePHI is stolen, the hospital does NOT need to report it as a breach because the data was rendered unusable.

Audit Controls

Hardware, software, and procedural mechanisms that record and examine activity in information systems that contain or use ePHI. In database terms, this means logging who accessed what data, when, from where, and what they did with it. HIPAA requires you to implement audit controls AND regularly review the audit logs.

Example: A hospital's EHR system logs every time a user views, creates, modifies, or prints a patient record. The log captures the user ID, timestamp, patient record accessed, action taken, and IP address. The Privacy Officer reviews these logs monthly and investigates any anomalies, such as a billing clerk accessing oncology records they have no business reason to view.

Access Control

The mechanisms and policies that restrict access to ePHI to only authorized persons who need the information to perform their job functions. HIPAA requires unique user identification (no shared accounts), emergency access procedures, automatic logoff, and encryption/decryption capabilities. The principle is simple: only the right people should see the right data at the right time.

Example: A hospital's database has role-based access control where nurses can view and update patient vitals and medication records for patients on their floor, but cannot access billing information. Billing staff can see charges and insurance data but cannot view clinical notes. Administrators have broader access but all access is logged.

Integrity Controls

Policies and procedures to protect ePHI from improper alteration or destruction. In database terms, this means ensuring that patient data cannot be modified without authorization and that all changes are tracked. This includes checksums, hash verification, version control for records, and database integrity constraints.

Example: A hospital's EHR database uses foreign key constraints, triggers that log all UPDATE and DELETE operations to an audit table, and nightly checksum verification to ensure no records have been tampered with. If a lab result is modified, the system retains the original value, the new value, who changed it, and when.

Workforce

Under HIPAA, the 'workforce' is defined more broadly than just employees. It includes employees, volunteers, trainees, and any other persons whose conduct is under the direct control of the Covered Entity or Business Associate, whether or not they are paid. This is important because ALL workforce members must receive HIPAA training and be subject to sanctions for violations.

Example: A hospital's HIPAA workforce includes not just paid doctors, nurses, and administrators, but also medical students doing rotations, volunteer candy stripers, unpaid interns in the IT department, and temporary contractors working on-site under the hospital's supervision. All of these individuals need HIPAA training.

Subcontractor

A person or entity to whom a Business Associate delegates a function, activity, or service involving PHI. Under the Omnibus Rule, subcontractors of Business Associates are themselves considered Business Associates and must comply with HIPAA. This creates a chain of compliance responsibility that flows down through every level of outsourcing.

Example: A hospital (Covered Entity) hires a billing company (Business Associate) to process claims. The billing company outsources data entry to an offshore firm (Subcontractor). The offshore firm is now also a Business Associate under HIPAA, must sign a BAA with the billing company, and is directly liable for HIPAA compliance.

Psychotherapy Notes

Notes recorded by a mental health professional documenting the contents of counseling sessions. These have EXTRA protections under HIPAA — they are separated from the rest of the medical record and require a specific written authorization from the patient before they can be disclosed. They cannot be disclosed even for TPO purposes without authorization, with very limited exceptions.

Example: A psychiatrist keeps handwritten session notes about a patient's childhood trauma discussions. Even if the patient's insurance company requests the full medical record for a claim, the psychotherapy notes CANNOT be included without a separate, specific authorization signed by the patient.

Accounting of Disclosures

A patient's right to receive a list of certain disclosures of their PHI that a Covered Entity has made. The Covered Entity must track and be able to provide this accounting for disclosures made in the six years prior to the request. Disclosures for TPO, disclosures to the individual, and certain other categories are exempt. This requires robust logging in your database systems.

Example: A patient requests an accounting of disclosures from their hospital. The hospital must provide a list showing: 'On 03/15/2024, your immunization records were disclosed to the State Health Department for public health reporting. On 06/01/2024, your records were disclosed to Attorney Jane Doe pursuant to a court order.' The hospital does NOT need to list routine disclosures for treatment or billing.

Omnibus Rule

The 2013 final rule that made sweeping updates to HIPAA regulations. Key changes: (1) Business Associates became directly liable for compliance, (2) the breach notification standard changed from 'significant risk of harm' to a presumption that any impermissible use/disclosure is a breach, (3) genetic information was explicitly added as PHI, (4) patient rights were strengthened, and (5) penalties were increased. If you see HIPAA guidance from before 2013, it may be outdated.

Example: Before the Omnibus Rule, a cloud storage vendor hosting hospital data was not directly liable under HIPAA — only the hospital was. After the Omnibus Rule, that vendor is directly liable, can be independently fined by OCR, and must implement the same safeguards as the hospital for the ePHI they store.