Even if your technology isn’t compatible between departments, you must still follow the HIPAA laws. Technology tools are immeasurably helpful to medical staff members, but sometimes they can also create problems when it comes to patient privacy. That’s the lesson that staff members at a Veterans Affairs hospital in California recently learned, according to a July 31, 2019 report by the VA’s Office of Inspector General (OIG). Incompatible Systems Drove the Issues The problems that the OIG found stemmed from the fact that the facility’s high-resolution esophageal manometry (HRM) device was unable to interface with the VA’s EHR system starting in 2013. “The gastroenterology (GI) provider stated that, along with the facility Biomed and IT, a decision was made to continue to use the facility’s HRM without the ability to interface with the patients’ EHR,” said John D. Daigh, Jr., MD, the assistant inspector general for healthcare inspections, in his report. “Based on this decision, the GI provider developed and implemented two workarounds that were not in accordance with VA security and privacy policies concerning sensitive personal information. These workarounds included the use of the GI provider’s personal computer and emails, a non-VA (unencrypted) flash drive, and the Cloud.” The way the staffers transferred information between the two systems led to a breach of patients’ private information. In fact, 99 percent of the emails that the physician sent from his personal email account contained patients’ sensitive personal information, as did 91.7 percent of texts between the GI provider and staff members. In total, the OIG pinpointed 133 patients whose sensitive personal information was cited in emails and text messages from the provider to staff members. The OIG determined that the situation did not meet the criteria for a formal breach notification, but the facility was at risk of disclosing their personal information. “A complete/full risk assessment would have shown a possibility of disclosure based on the ease to obtain the information and the length of time the unencrypted information remained on an unprotected site,” the report noted. Here’s How to Avoid A Similar Fate in the ED Setting If your ED practice is considering using personal text, email, or other accounts, make sure you stay within the regulations with a few quick tips. Training matters: The first step you should take involves devising a comprehensive plan that includes realistic procedures to combat the accidental and intentional loss of ePHI. Educating administrative and clinical staff on the rules related to HIPAA-compliant communication via text, interoffice messaging, and email is essential to keep your practice safe and secure. Integrating HIPAA-compliant, user-friendly software and applications across the different mobile products your group utilizes is crucial to the success of your overall plan. Apps for HIPAA-compliant texting meet health care industry standards for security and privacy during the communication of ePHI. Additionally, with text messaging, and due to the features included in secure messaging solutions, it ensures that system administrators can audit access to encrypted ePHI and any transmission of confidential data in compliance with HIPAA regulations. In addition, consider these seven tips when mobile devices are being used in your practice: Bottom line: SMS texting is not encrypted or secure, yet providers engage in the practice of “unsafe texting” often, leaving their patients and themselves vulnerable to cyberattacks and the loss of ePHI. Due to the confusing nature of the policies, it is wise to seek the advice and assistance of health care IT experts schooled in the complexities of the HIPAA security rules and regulations. Resource: To read more about the case, visit www.va.gov/oig/pubs/VAOIG-17-03557-177.pdf.