See how you may be violating privacy laws without realizing it. As technology continues to advance, it is increasingly crucial for healthcare providers to possess a strong understanding of privacy and security regarding protected health information (PHI). “There’s the Privacy Rule, which tends to be more focused on the nonelectronic and access aspects of an individual’s protected health information, and then there’s a Security Rule, which focuses on the electronic management of that individual’s information,” says Melissa Dill, product management leader for the healthcare consulting practice at Crowe LLP. Now is as good a time as any to take a closer look at how your practice manages private information. For guidance on proper PHI disposal, follow this expert advice. Realize Violations Range From Minor to Massive Background: The HIPAA Privacy and Security Rules offer organizations guidance on how best to set up policies and implement procedures to assess risks, protect PHI/ePHI, and avoid violations. The rules advise not only on the provisions of the federal law, but also provide practices with guidelines to assist with HIPAA compliance planning. What is PHI? PHI is best defined as “all ‘individually identifiable health information’ held or transmitted by a covered entity or its business associate, in any form or media, whether electronic, paper, or oral,” according to the HHS Office for Civil Rights (OCR) guidance on the HIPAA Privacy Rule. Furthermore, any personal information that can identify the patient and is associated with the medical record is also protected data. In fact, federal guidance lists 18 categories of “personal identifiers” that must be secured by covered entities (CEs) and business associates (BAs). A few of these include names, phone numbers, medical record numbers, and most dates related to birth, death, admission, and discharge. When it comes to the Privacy Rule, violations vary in intensity, from minor infractions to serious ones. Dill points to common issues like “simple things such as physicians’ handwritten notes being left somewhere where they can be seen by individuals who don’t have a need to see those notes, things being printed out and left on a printer for others to see, or an individual calling an office and wanting information and perhaps not being the patient, but being a patient’s parent, daughter, or child who does not have permission to access such records.” Many of these kinds of incidents happen when someone left papers lying around the office without realizing or remembering they contained private information, Dill says. “Those sorts of things that you don’t necessarily think of as an issue are the easy things to have a compliance issue or a violation,” cautions Dill. Examples: In 2020, OCR publicized the following HIPAA violations, Dill says: Remember: If you aren’t worried about a fine as low as $10,000, think about how many E/M visits it would take for you to earn that much money. For instance, you’ll collect about $92 for every level-three, established-patient office visit with a Medicare patient. Therefore, you’d have to perform 109 level-three office visits to pay that fine, which would take up about 36 hours of the physician’s time, assuming the physician spent the minimum 20 minutes referenced in the visit’s code descriptor. Invest in Strong HIPAA Security or Pay the Price Regarding the Security Rule, practices should consider adopting or refining the systems they currently have in place. This might mean investing in technologies and other resources to monitor compliance and protect patient records. If practices are investing in those technologies and resources, they should confirm that they’re investing in the right tools that will protect them from breaches, or from cybersecurity incidents, Dill says. These things “have to be very seriously considered. All you have to do is go online and search ‘cybersecurity breaches in healthcare,’ and it will bring up a laundry list,” she adds. Dispose of PHI Correctly and Communicate With Staff Generally, practices can violate privacy laws without realizing it and without bad intent. “I think a lot of the disposal problems are just plain old organizational-procedural inertia — staff are doing things the way they’ve always been done, and nobody has checked to see if it’s the proper, secure way,” explains Jim Sheldon-Dean, founder and director of compliance services for Lewis Creek Systems LLC in Charlotte, Vermont. For example, “staff may assume what they throw away is destroyed when it may not be,” Sheldon-Dean continues. It’s important everyone look more carefully at their nonelectronic information and get into the habit of handling it with the same care as electronic information. This means checking all the paper, pill bottles, or data. “It all needs to be subject to information flow analysis to ensure all information is secure until destroyed,” Sheldon-Dean advises. Reminder: Though the HIPAA Privacy and Security Rules don’t offer specifics on the best way to dispose of PHI, OCR does provide helpful examples on how to safeguard patient data and how to safely dispose of it when necessary. OCR also offers guidance on the intersection of the rules and PHI disposal. The following topics outlined in their Frequently Asked Questions (FAQ) section: Also, understand that if anyone throws out PHI with the trash, it must be “rendered essentially unreadable, indecipherable, and otherwise cannot be reconstructed prior to it being placed in a dumpster,” OCR notes in the FAQs on PHI disposal. For additional information on PHI disposal and staff training, visit www.hhs.gov/sites/default/files/disposalfaqs.pdf.