Unsecured transmission of Protected Health Information (PHI) is one of the most common types of HIPAA breaches, but it is also easy to safeguard against with the right solutions.
In simple terms, a breach occurs when PHI is accessed, used, or disclosed in a way that violates HIPAA regulations. For example, when protected information is transmitted over an unsecured channel.
PHI is subject to strict privacy and security regulations under the Health Insurance Portability and Accountability Act (HIPAA). A breach can lead to severe penalties like fines and being listed publicly on the Office for Civil Rights' "Wall of Shame."
Related: What is the OCR and what does it do?
Before getting into unsecured transmission and what that means, let's look at the PHI that is usually involved. There's no definitive and exhaustive list of PHI because it varies depending on patient identifiers used during the course of their care. However, according to reports from the Department of Health and Human Services (HHS), the most commonly included identifiers in HIPAA compliance breaches are:
HHS reports show that breaches commonly occur because of the following:
It's this last type of breach, the unsecured transmission of ePHI, that we'll delve into more. ePHI transmitted over unsecured channels, such as email or messaging apps, may be intercepted by unauthorized individuals, leading to breaches.
In our digital world, it's one of the likeliest ways your practice or healthcare organization will run afoul of HIPAA regulations.
Unsecured transmission of PHI occurs when PHI is transmitted over unencrypted email, faxes or messages without safeguards to protect the information. This can happen in a variety of ways, including:
To avoid unsecured transmission of PHI, covered entities like your healthcare practices should:
Related: Can I send a HIPAA compliant fax?