By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
Health Works CollectiveHealth Works CollectiveHealth Works Collective
  • Health
    • Mental Health
  • Policy and Law
    • Global Healthcare
    • Medical Ethics
  • Medical Innovations
  • News
  • Wellness
  • Tech
Search
© 2023 HealthWorks Collective. All Rights Reserved.
Reading: HIPAA and Protecting Patient Information
Share
Notification Show More
Font ResizerAa
Health Works CollectiveHealth Works Collective
Font ResizerAa
Search
Follow US
  • About
  • Contact
  • Privacy
© 2023 HealthWorks Collective. All Rights Reserved.
Health Works Collective > eHealth > Medical Records > HIPAA and Protecting Patient Information
BusinessMedical RecordsTechnology

HIPAA and Protecting Patient Information

Tim_Edlund
Tim_Edlund
Share
4 Min Read
hipaa
SHARE

The Health Insurance Portability and Accountability Act (HIPAA) has many physicians nervous about their responsibilities in protecting patient information. Respecting patient privacy has always been both a moral and legal issue, but new technologies raise new questions about how to safeguard confidential information.

The Health Insurance Portability and Accountability Act (HIPAA) has many physicians nervous about their responsibilities in protecting patient information. Respecting patient privacy has always been both a moral and legal issue, but new technologies raise new questions about how to safeguard confidential information.

hipaaElectronic protected health information (EPHI) refers to individually identifiable health information that is created or stored electronically. Like a traditional chart, strict rules govern who can access EPHI.

In my next post, I’ll tell you about specific ways to control access to patient health information. Today, I’ll focus on the broader issue of data security.

More Read

10 Important Technology Tips For Healthcare Workers
Community Management that Works – Featured on SlideShare
Incentivizing in Hospitals to Control Costs
4 Barriers to Private Practice for Med School Graduates
Pick a Horse and Other Sage Advice About Leadership Decisions

HIPAA requires healthcare providers to assess their data security risks and take reasonable measures to safeguard patient information. Choosing the right electronic medical record (EMR) software is essential to keeping data secure and complying with HIPAA guidelines. 

EPHI Encryption

Encryption is a method of encoding data that allows only authorized readers to properly view it. Encryption makes data indecipherable—or cryptic—to unauthorized eyes. Intended audiences, such as physicians and administrators, are able to view data when they possess a key. Effective keys can be as simple as username-password combinations and as complex as biometric recognition of fingerprints or retinas.

While EPHI encryption is not yet required by law, the Department of Health and Human Services recommends encryption as a best practice for protecting patient information. The best EMR softwares encrypt this data at all times—in transmission and at rest. 

protecting patient information

Most internet users are familiar with little lock icons near the address bar. These icons tell you when your transmissions are encrypted.

However, many users don’t realize that data at rest on their hard drive may not be encrypted. It is important to encrypt data at rest to protect confidential information in the event of loss or theft.

Theft and loss of unencrypted hard drives and portable devices account for the majority of HIPAA breaches.

hipaa breachesSource: The Proftiable Practice

The risks of theft and loss can be further mitigated by storing data on dedicated off-site servers—in the cloud.  

What About Cloud Solutions?

Cloud-based solutions are not inherently more or less secure than on-premise solutions. It’s all about how the system is set up and the software it uses.

While running an EMR on a cloud provider may seem more vulnerable, the crucial factor is the security measures put in place by the provider. The same is true for on-premise solutions—nearly all of which also have exposure to attacks from the internet. Cloud-based solutions are often more secure because they are managed by expert teams—something that smaller organizations may not be able to afford on-premise.

What is clear is that cloud solutions for healthcare providers must provide access controls and encryption to prevent security breaches. The best cloud networks use encrypted storage, not only for active data, but also for backups. 

Cloud solutions decrease the burden on hospital IT departments and save smaller clinics the costs associated with building and maintaining expert security systems. Choosing the right cloud provider is one strategy to simplify the complexity of meeting HIPAA standards.

TAGGED:HIPAA
Share This Article
Facebook Copy Link Print
Share

Stay Connected

1.5kFollowersLike
4.5kFollowersFollow
2.8kFollowersPin
136kSubscribersSubscribe

Latest News

file a police report after a car accident
Can Filing a Police Report Help with Medical Bills?
Policy & Law
November 2, 2025
Slips and falls can happen in the blink of an eye, often in spaces we believe to be safe. A brief moment of misstep
When a Simple Fall Becomes a Serious Health Concern
Health
November 1, 2025
How Setting Boundaries Helps Trauma Survivors Heal
Health
October 30, 2025
how to improve REM sleep
Unlock Better Sleep: How to Improve REM Sleep Naturally
Wellness
October 30, 2025

You Might also Like

hospital web site
BusinesseHealthHospital Administration

Is Your Hospital Website Costing You Revenue?

September 30, 2013

How the Healthcare Industry Has Reduced Aggravation For Patients

February 8, 2016
Image
BusinessHospital AdministrationPublic Health

Emergency Room – Don’t Use It For Primary Care!

March 19, 2013
BusinessTechnology

Healthcare and Technology : Garnering Interest in Your Product

June 17, 2011
Subscribe
Subscribe to our newsletter to get our newest articles instantly!
Follow US
© 2008-2025 HealthWorks Collective. All Rights Reserved.
  • About
  • Contact
  • Privacy
Welcome Back!

Sign in to your account

Username or Email Address
Password

Lost your password?