HIPAA Security Implementation, Version 1.0

Thousands of US health-care organizations have been waiting for the Health Insurance Portability and Accountability Act (HIPAA) Security Rule to be finalized. First proposed nearly five years ago, the rule has now been issued in final form. The Security Rule is just one part of HIPAA-federal legislation that was passed into law in August 1996. The act is meant to provide better access to health insurance, limit fraud and abuse, and reduce the overall cost of health care. This article will provide a detailed overview of the final HIPAA Security Rule. First, the basics:

What: The rule applies to electronic protected health information (EPHI), which is individually identifiable health information in electronic form.

Who: Covered Entities (CEs) must comply with the rule's requirements. These are health plans, health care clearinghouses, or health care providers who transmit any protected health information in electronic form.

How: CEs must maintain reasonable and appropriate administrative, physical, and technical safeguards to protect against any reasonably anticipated threats or hazards to the security or integrity of EPHI.

Why: The basic purpose of the Security Rule is to protect the confidentiality, integrity, and availability of EPHI when it is stored, maintained , or transmitted.

When: The final Security Rule will be effective as of April 21, 2003. Most CEs will have until April 21, 2005 to comply; small health plans (those with annual receipts of $5 million or less) will have until April 21, 2006.

Unlike other security best practices or standards, the HIPAA Security Rule is federal law. There are clear, defined consequences in the event of infringement; CEs who violate the rule can face penalties of up to $250,000 in fines and 10 years in jail. CEs that do not comply with the Security Rule may also find themselves subject to adverse publicity and a dwindling customer base if customers don't believe their health data is being appropriately protected. Business partners may be unwilling to exchange data with non-compliant organizations. Non-compliant CEs may also be subject to lawsuits from business partners or customers.

GUIDING PRINCIPLES

There are several principles upon which the final Security Rule is based:

Категории