Avoiding the Wall of Shame: Protect PHI

Click here for more information

obelisk
Photo by archer10 (Dennis)

In one of our previous posts, we said that step one in avoiding the “wall of shame” is to identify any Protected Health Information, or PHI, that your organization may have.

Step two is to protect those PHI elements, rendering them unusable, unreadable, or indecipherable to unauthorized individuals.

Isolation of PHI can be multifaceted. First ask yourself, “Do we really need to collect this? Why?” You might be surprised to learn that the real answer is “No”. One method of isolation may be not collecting the data at all.

For those instances where the PHI must be collected, you need to utilize encryption — likely multiple modes of encryption depending upon whether the data is at rest (within a database and/or on computer media), or is in motion (moving between computers). The National Institute of Standards and Technology (NIST) has guidelines that can be used as a starting discussion point for data that is at rest, and for data that is in motion.

You can also come up with a consistent method of sharing de-identified equivalents by removal of information which links medical information to a particular individual. Using a patient chart ID, for example, might sufficiently identify a record without needing to use the patient’s name and address.

You might find that for the majority of occasions where the PHI is really not needed for the task at hand, then de-identified substitutes can be used. While coming up with these equivalents, ask yourself again if the de-identified element alone is enough for all of the tasks without having to collect the actual PHI behind it.

For example, we have clients who regularly need to share lab data (CD4, HIV Viral Load, etc.) among healthcare providers. Some of this same data must also be shared with government entities charged with tracking disease progression, statistics, and outbreaks. The community-based organizations (CBO) may need a way to verify individuals to whom they provide care, while the government entities may only need to know some basic demographic data about the individual (while still isolating each individual).

For the CBOs, we might use a de-identified client code comprised of a few letters of their first and last name in combination with the individual’s date of birth and gender. The CBOs could then use an agreed upon method of comparing that client code against physical identification that the individual provides at the time they receive services — maybe requiring the individual show a government issued ID.

For the government entities who need the lab information, we might just associate some auto-incremented serial number with those same individuals when the lab and demographic information are passed along.

The key to PHI isolation and protection here is to identify those elements that must be collected, identify with whom to share those elements, and identify what form that sharing takes place.

Need help clarifying, isolating and protecting your PHI data? Give us a call.

Avoiding the Wall of Shame: Identify PHI

Click here for more information

Protect
Photo by Unhindered by Talent

In one of our previous posts, we referenced the “wall of shame” maintained by the U.S. Dept of Health and Human Services, which lists organizations who reported lost, stolen, or improperly disclosed patient records.

What can you do to protect your organization from inadvertently screwing up like this, and making it onto this lineup?

First, know what is worth protecting. In reference to “wall of shame” avoidance, you need to know what constitutes Protected Health Information, or PHI.

What is PHI

PHI, as defined by the Health Insurance Portability and Accountability Act of 1996 (HIPAA), means any information recorded in any form/medium (or shared orally) that meets both of the following criteria:

  • Is created or received by a health care provider, health plan, employer, or health care  clearinghouse; and
  • Relates to the past, present, or future physical or mental health or condition of an individual; the provision of health care to an individual; or the past, present, or future payment for the provision of health care to an individual; and
    • That identifies the individual; or
    • With respect to which there is a reasonable  basis to believe the information can be used to  identify the individual.

So, depending upon what service your organization provides, and even possibly where you are located, what you need to protect will vary.

Location, Location, Location

Why would location matter? Take, for example, one of our clients who provide healthcare services to individuals with HIV or AIDS in a dense urban setting where tens of thousands of people live within a single ZIP Code. Inadvertent disclosure of just a five digit ZIP Code from this dense urban area would not alone constitute a HIPAA breach.

Take a similar provider providing HIV/AIDS services in a sparsely populated, rural region, and all bets are off. ZIP code alone might be enough to identify that person.

Not sure what to protect? Contact us.