The Health Insurance Portability and Accountability Act of 1996, also known as “HIPAA,” is the most significant development in U.S. health care in recent history.
Two sets of regulations, referred to as the Privacy Rule and Security Rule, outline the requirements that must be followed when entities subject to the rules use and share health information.
The Privacy Rule, a Federal law, gives you rights over your health information and sets rules and limits on who can look at and receive your health information. The Privacy Rule applies to all forms of individuals' protected health information, whether electronic, written, or oral. The Security Rule is a Federal law that requires security for health information in electronic form.
What information is protected?
HIPAA defines “protected health information” as individually identifiable health information that is:
How is this information protected?
Which data elements are considered Protected Health Information (PHI)?
The following individually identifiable data elements, when combined with health information about that individual, make such information protected health information (PHI):
Examples of information that is protected:
We call the entities that must follow the HIPAA regulations "covered entities."
Covered entities include:
In addition, business associates of covered entities must follow parts of the HIPAA regulations.
Often, contractors, subcontractors, and other outside persons and companies that are not employees of a covered entity will need to have access to your health information when providing services to the covered entity. We call these entities “business associates.” Examples of business associates include:
Covered entities must have contracts in place with their business associates, ensuring that they use and disclose your health information properly and safeguard it appropriately. Business associates must also have similar contracts with subcontractors. Business associates (including subcontractors) must follow the use and disclosure provisions of their contracts and the Privacy Rule, and the safeguard requirements of the Security Rule.
Who is not required to follow these laws?
Many organizations that have health information about you do not have to follow these laws.
Examples of organizations that do not have to follow the Privacy and Security Rules include:
What Does the Privacy Rule Have To Do With Research?
When research involves the use or disclosure of PHI by entities subject to the regulations, the rules will apply. Researchers have legitimate needs to use, access, and disclose PHI to carry out a wide range of health research studies. In most instances, the Privacy Rule requires an authorization from the individual or a waiver of authorization from an IRB or Privacy Board before a covered entity can access, use or disclose PHI for research purposes. In general, there are two types of human research that would involve PHI:
What Is Required for Research in order to access, use or disclose Protected Health Information (PHI)?
Researchers may access, use, and/or disclose PHI for research purposes from the Electronic Medical Record (EMR) if they have one of the following:
What is the IRB’s Role?
In most instances, researchers at UM/JHS use the UM/JHS HIPAA Research Authorization to use and share PHI for research purposes. However, in some instances, the Privacy Rule allows an IRB to waive the requirement for a signed authorization from the individual for use of PHI in research.
When can an IRB waive the requirement for an authorization?
It is always preferred to obtain authorization to use an individual’s PHI. In order to waive the requirement for an authorization, the IRB must determine that the study meets the following criteria:
What kind of waivers does the IRB grant:
In most instances, a full waiver of authorization is granted only when there is no opportunity for the researcher to obtain authorization from the individual. Partial waivers of authorization are often granted to allow researchers to access the EMR to identify potential research participants.
If you need a waiver of authorization to conduct your research, use one of the protocol templates for your protocol to ensure the HSRO receives the information necessary to approve the waiver. You can find the protocol templates on the HSRO Website. The IRB will include the results of the review of your request in the IRB determination letter.
The requirements for de-identifying information are so extensive that often the data is of limited value to researchers.
The Privacy Rule permits the use and disclosure of PHI via a “limited data set” with a “data use agreement”. A limited data set is a limited set of identifiers to be used for research, public health, and health care operations purposes.
It permits use of some identifiable health information:
Data Use Agreement is required for the use of a Limited Data Set. A data use agreement does the following:
Access to PHI on Decedent Information
The HIPAA Rule protects individually identifiable health information about a decedent for 50 years following the date of death of the individual. University of Miami may use or disclose PHI to the researcher, if the researcher provides that:
A researcher seeking to access to PHI for decedent research must use the Investigator’s Certification for Research with Decedents’ Information (Form D).
Terms common to documents or discussions of privacy, security, confidentiality and HIPAA are included below.
Confidentiality: the condition in which information is shared or released in a controlled manner. Information considered confidential should be protected against theft or improper use and should not be made available or disclosed to unauthorized individuals, entities or processes without express permission from the appropriate party
Covered Entity: a health plan, a healthcare clearinghouse or a healthcare provider who is required to comply with HIPAA regulations regarding the use and disclosure of Protected Health Information (PHI).
Data Use Agreement: An investigator-submitted agreement required for the disclosure of a limited data set by a covered entity to the investigator. The agreement must specify the permitted uses of the limited data set and who may use or receive the data set. The agreement restricts further use and disclosure and restricts re-identification of the data or contact with subjects.
De-Identified Information: health information is considered de-identified (and therefore, not PHI) if the following apply:
note – the 18 standard identifiers which must be removed for data to be considered “de-identified” are:
ePHI: electronic PHI (i.e. a subset of PHI)
HIPAA: the federal Health Insurance Portability and Accountability Act. This act regulates, among other things, the maintenance and disclosure of protected health information (“PHI”), which includes ePHI, about patients treated by “covered entities”. In addition, this act prescribes a process through which researchers may obtain or create PHI about patients who are also research participants or potential research participants
Hybrid Entity: a single, legal entity that uses or discloses PHI for only a part of its business operations. The Privacy Rule applies only to the healthcare components of a hybrid entity that use or disclose PHI.
Limited Data Set: health information that a covered entity may disclose (pursuant to a data use agreement) to an investigator for research purposes based on the fact that certain direct identifiers have been removed. The investigator receiving the limited data set must submit the data use agreement signed by an authorized UM official and obtain IRB approval before obtaining the limited data set for use in his/her study
Note – direct identifiers that must be removed in order for data to be included in a limited data set are
Note – the following are allowed in a limited data set:
Privacy: an individual’s right to be free from unauthorized or unreasonable intrusion into his/her private life and the right to control access to personal information. The term “privacy” applies to persons whereas the term “confidentiality” refers to the treatment of personal information.
Privacy and Security Rule: standards for Privacy of Individually Identifiable Health Information, promulgated by the U.S. Department of Health and Human Services pursuant to the Health Insurance Portability and Accountability Act of 1996 (“HIPAA”) and codified at part 160 and part 164 , subpart C (Security Standards for the Protection of ePHI) and subpart E of Title 45 of the U.S. Code of Federal Regulations (as amended from time to time)
Protected Health Information (PHI): identifiable information about the past, present, or future physical or mental health or condition (including the provision of his/her health care, insurance, payment status etc) of an individual obtained or managed by a covered entity. PHI may be information that is recorded electronically, on paper or orally. PHI must be protected from unauthorized use or disclosure by the Covered Entity under HIPAA regulations.
Note -- PHI must be identifiable information or information that may be linked to an identifier. PHI does not include de-identified information
Research Related Health Information—RHI: personally identifiable information used in research that is distinct from PHI by not being associated with, or derived from, the provision of health care or payment for care.
Security: the safeguards placed upon the availability, integrity, and confidentiality of information to protect information from unauthorized access, disclosure, misuse and accidental damage. Safeguards may be physical, electronic, or administrative and they may control access, training, computer systems, policies and procedures, physical environment, and behaviors.
Sensitive Information: private and/or health care information including information relating to an identifiable individual’s private activities or practices (e.g. sexual preferences or practices; drug or alcohol treatment history; mental health or treatment history; HIV status; diagnosis information; financial information including social security numbers or health insurance data; criminal history or background etc).