A History of HIPAA: 8 Things You Should Know

The Health Insurance Portability and Accountability Act (HIPAA) was enacted in 1996 to protect American families from the dangers of losing health insurance coverage. Mainly it was designed to provide workers with insurance portability during a job change or loss. Its secondary purpose is to ensure the security and privacy of individual health information. HIPAA turned 20 last year, but the healthcare system is still a long way from full compliance.

1. PHI covers a lot of ground.

There have been several amendments to HIPAA since it was signed into law. The first in 2003, known as the Privacy Rule, defined Protected Health Information (PHI) as any health-related information that can be used to identify a particular individual. This can be information related to an individual’s past, present or future physical or mental health or condition, any provisions of healthcare to an individual, and any past, present, or future payment for the provision of healthcare to an individual.

2. Organizations can be slow on the uptake.

The Security Rule was enacted in 2005 to standardize the handling of electronic PHI by providing specific guidelines for physical, technical, and administrative safeguards. Unfortunately, last year’s HIPAA compliance survey by NueMD found that only 70 percent of healthcare organizations planned to strive for HIPAA compliance. This number is certainly disappointing when the adoption rate is lower among employer groups offering group health plan’s, business associates, and health insurance agencies. This is based on Total HIPAA’s assessment of these other groups.

3. HHS OCR enforces compliance.

Under the Enforcement Rule of 2006, the Department of Health and Human Services Office for Civil Rights (HHS OCR) received the responsibility to monitor organizations who should be complying with HIPAA regulations. HHS OCR has the power to investigate complaints related to the Privacy and Security Rules, and to fine those who fail to meet HIPAA regulations. The penalties range as low as $100 to $1.5 million per violation, but resolutions with HHS OCR have been in the hundreds of thousands of dollars to all the way into the millions having multiple settlements exceeding $5 million.

4. All health-related businesses count.

Any businesses that see health related information connected to an individual is expected to comply with HIPAA. The Health Information Technology for Economic and Clinical Health (HITECH) Act requires healthcare organizations to notify their business associates and subcontractors that they are legally expected to work in accordance with HIPAA. The 2016 NueMD survey indicated that only 60 percent of healthcare organizations surveyed were aware of this expectation.

5. Your organization may be subject to an audit.

For over six years now HHS OCR has conducted compliance audits in hopes of increasing HIPAA compliance. In 2011, OCR implemented a pilot audit program (Phase One) to assess the controls and processes implemented by 115 covered entities to comply with HIPAA’s requirements. Phase Two of OCR’s HIPAA audit program started last year by selecting over 200 Covered Entities and Business Associates, sending notification letters in the summer and fall to inform them that they were selected for a desk audit. Last year only 40 percent of healthcare organizations were aware these audits were being conducted according to the NueMD survey. Currently, the on-site audits by OCR have been delayed to late 2017 or early 2018.

6. PHI must be stored for at least 6 years.

HIPAA requires Covered Entities and Business Associates to maintain documentation of PHI they have collected for a minimum of six (6) years from the date of its creation, or the date when it last was in effect, whichever is later. Organizations that hold PHI need to review their state’s retention requirements before properly disposing PHI to assure state compliance.

7. HIPAA compliance declines.

The NueMD surveys also showed that from 2014 to 2016 the number of employed security and privacy officers had gone from 56 and 55 percent down to 53 and 54 percent, respectively. There are also fewer healthcare organizations providing HIPAA compliance training, from 62 to 58 percent.

8. The dawn of electronic communication.

More healthcare providers are using phone apps, email, and social media to get in touch with patients. As more organizations move to communicate electronically, it is important to monitor the security of these processes. Total HIPAA has reviewed HIPAA compliant software for electronic communication like email encryption and text messaging to help organizations figure out a best-fit solution.

Where do we go from here?

In summary, adoption of HIPAA compliance is still in its infancy. OSHA took more than 20 years to be widely adopted by US-based companies. Although the first portion of HIPAA went into effect 20 years ago, key parts of the law have only been in effect since 2009.

HHS still has not ruled on whether patients, employees, or clients can share in the fines now being levied by HHS when these individual’s PHI has been breached. If HHS rules that individuals can be reimbursed when their PHI is breached, the flood gates will open. Those groups that need to be HIPAA compliant will rush to complete the process and may be caught playing catch up. Don’t get lost in the rush. Act now and become HIPAA compliant.

Also, four state supreme courts have upheld HIPAA as a Standard of Care (Missouri, North Carolina, Connecticut, and West Virginia). This means that Covered Entities who don’t properly protect PHI could face legal action from private citizens, not just HHS.

People are more aware of their rights under HIPAA than you might realize. Not being HIPAA compliant exposes your practice or company to a whole host of regulatory issues that are best mitigated before there is an issue. The reality is, compliance is much more affordable than ever, and noncompliance is much more costly than ever.

Are you HIPAA Compliant?

Contact Us

By: Total HIPAA Guest Bloggers

Sharing is caring!

Documents

Looking for a Business Associate Agreement?

Download our free template to get started on your path toward HIPAA compliance.


Download Now

Want to stay informed?

Join our community, stay ahead of the curve on HIPAA compliance and receive free expert guidance.

State of HIPAA Compliance in 2025

Watch the recording of this webinar to learn more about how you can become and stay HIPAA compliant!

Document
Register for Webinar

Related Posts

Essential Guide to Email Authentication and Deliverability: How to Configure DMARC, SPF, and DKIM Records

Essential Guide to Email Authentication and Deliverability: How to Configure DMARC, SPF, and DKIM Records

Essential Guide to Email Authentication and Deliverability: How to Configure DMARC, SPF, and DKIM Records
*This process is technical and requires access to your Domain Name Server (DNS). It’s recommended to have an IT professional handle these configurations to avoid potential issues. If you proceed yourself, back up your current settings with screenshots or copies before making any changes.
Organizations rely heavily on email for marketing and communication, making it a prime target for malicious actors. Phishing, spoofing, and other email attacks can inflict significant financial and reputational damage. In response to this growing threat, email providers are tightening their security measures, and businesses that aren’t paying attention risk having their emails blocked.
A recent announcement from Microsoft, highlighted in their Tech Community blog, highlights that Outlook is implementing stricter requirements for high-volume senders to protect users from unwanted and potentially harmful messages. This move serves as a clear signal: email authentication is no longer optional – it’s required for all organizations, regardless of their sending volume.
The key to making sure your emails reach their intended recipients is all in the configuration and alignment of your Domain-based Message Authentication, Reporting and Conformance (DMARC), Sender Policy Framework (SPF), and DomainKeys Identified Mail (DKIM) records. These protocols verify an organization actually sent the emails and tells receiving servers your messages are legitimate and shouldn’t be sent to spam folders or blocked.
What makes SPF, DKIM, and DMARC so crucial?
SPF (Sender Policy Framework): This record lists the authorized mail servers permitted to send emails on your behalf. When your email server receives an email, it checks it and verifies if the sending server’s IP address matches the list in your SPF record. This helps prevent attackers from spoofing your domain using unauthorized servers.
DKIM (DomainKeys Identified Mail): DKIM adds a digital signature to your outgoing emails. This signature is cryptographically linked to your domain and verified by the receiving server using a public key published in your DNS records. DKIM ensures the integrity of the email content and confirms that it hasn’t been tampered with in transit.
DMARC (Domain-based Message Authentication, Reporting & Conformance): DMARC builds upon SPF and DKIM. It tells receiving servers what to do with emails that fail SPF and/or DKIM checks. You can set policies to “none” (monitor), “quarantine” (send to spam), or “reject” (block). DMARC also enables reporting, allowing you to gain valuable insights into who sends emails using your domain and identify potential spoofing attempts.
Microsoft’s Stance: A Wake-Up Call
The stricter requirements being implemented by Outlook for high-volume senders emphasize the need for organizations to set up and review their authentication protocols. While the current focus is on high-volume senders, it is clear: email providers are looking for authenticated mail. Failing to correctly set up your DMARC, SPF, and DKIM records will lead to deliverability issues of emails.
What Your Company Needs to Do Now:
Regardless of size or email volume, every company should take the following steps to make sure its email authentication is configured correctly. Here’s a checklist:
Audit Your Existing Records: Check for existing SPF, DKIM, and DMARC configurations. Are they accurate and up-to-date?
Implement Missing Records: If you are missing any of these records, add them immediately. *Consult with your IT team or email service provider for guidance.
Check Alignment: It’s crucial to make sure there is alignment between your SPF, DKIM, and DMARC records. This means that the domain used for SPF and the signing domain in DKIM should match the “From” address domain in your emails. DMARC relies on this alignment to function effectively.
Start with a Monitoring Policy: For DMARC, it’s often best to start with a “none” policy to monitor how your emails are being handled and identify any legitimate sending sources that might not be properly authenticated.
Gradually Enforce Stronger Policies: Once you clearly understand your email flows and have addressed any authentication issues, move gradually towards stronger DMARC policies like “quarantine” or “reject” to protect your domain from spoofing actively.
Regularly Review and Update: The email landscape is constantly changing. Regularly review and update your authentication records as needed, especially when changing your emails or third-party sending services.
The Benefits of Proper Email Authentication:
Properly configuring and aligning your DMARC, SPF, and DKIM records offers significant benefits:
Improved Email Deliverability: Your legitimate emails are more likely to reach the inbox, avoiding spam folders and blocks.
Enhanced Brand Reputation: Protecting your domain from spoofing builds trust with your recipients and safeguards your brand’s reputation.
Increased Security: You significantly reduce the risk of using your domain for phishing and other malicious activities.
Compliance with Evolving Standards: By staying ahead of the curve, you ensure your email practices align with the increasingly stringent requirements of email providers.
The message is clear: email authentication is no longer optional. The recent emphasis from major providers like Microsoft underscores its critical importance in maintaining reliable and secure email communication. By taking the steps to audit and align your DMARC, SPF, and DKIM records, your organization can protect itself, customers, and reputation. Don’t wait until your emails are blocked – act now to secure your email.
Have questions or need help with your HIPAA compliance? Schedule a call with our experts today. https://www.totalhipaa.com/get-started/
To check your DMARC Records go here
https://www.totalhipaa.com/dmarc-lookup-free/
All records, a free and easy tool to use
https://easydmarc.com/

Save & Share Cart
Your Shopping Cart will be saved and you'll be given a link. You, or anyone with the link, can use it to retrieve your Cart at any time.
Back Save & Share Cart
Your Shopping Cart will be saved with Product pictures and information, and Cart Totals. Then send it to yourself, or a friend, with a link to retrieve it at any time.
Your cart email sent successfully :)