The Health Law Partners, P.C., assists health care providers, suppliers, plans, and organizations with their HIPAA compliance needs. For example, our HIPAA attorneys can assist with:
The HIPAA privacy rule (45 CFR Part 164) addresses the use and disclosure of “protected health information” (PHI) by covered entities (i.e., providers, health plans, and clearinghouses). It also addresses standards for privacy rights that must be afforded individuals. According to the government, a major goal of the HIPAA privacy rule is to make sure that covered entities appropriately protect health information while allowing the flow of health information needed to provide and promote high-quality health care. Given the diverse entities covered by HIPAA, the privacy rule is flexible to cover the variety of uses and disclosures that need to be addressed.
Regulations released in January of 2013 add to the privacy and security protections for health information. The regulations may require substantial changes for many health care professionals and organizations, and business associates subject to these conditions, and make access to a qualified, knowledgeable HIPAA attorney important for providers.
In summary, the HIPAA Privacy Rule:
The HIPAA security rule (45 CFR part 164) addresses the integrity, confidentiality, and availability of electronically protected health information (EPHI). EPHI means any protected health information maintained or transmitted in an electronic medium.
The security rule sets forth certain general requirements. The general requirements mandate that covered entities:
To achieve the general requirements set forth above, covered entities must meet 18 standards. To meet each of these standards, the Security Rule sets forth “implementation specifications” that serve as the “instructions” for compliance with each standard. Some implementation specifications are “required” while others are “addressable.” The standards and their related “implementation specifications” are broken down into three broad categories: administrative safeguards, physical safeguards, and technical safeguards.