Shared email inboxes lack individualized access controls. With multiple staff members sharing a single account, it can be nearly impossible to determine who sent or received specific communications, but organizations can still mitigate risks. A Perspectives in Health Information Management study published in 2022 notes, “The mean number of records affected by a breach due to unintentional insider threats is more than twice that of breaches caused by malicious intent such as external cyberattacks and theft.”
The anonymity increases the chance of this threat as staff can access data and transmit information without stringent access logs. Inadequate security also exposes the organization to accidentally sending PHI to the wrong recipient. These risks are avoidable through the division and efficient management of email accounts.
HIPAA Security Rule Section 164.312 (a)(2)(i) addresses Unique User identification, a rule requiring that covered entities, “assign a unique name and/or number for identifying and tracking user identity.” Each user with access to electronic PHI (ePHI) must have a unique identifier to track and monitor their actions within certain systems. Shared email accounts do not provide this level of individual accountability.
With staff members accessing the data in shared accounts and sharing passwords, PHI can easily be accessed by former employees long after their departure. This risk is one of many that lead to a potential data breach, the consequences of which result in a series of breach notification protocols that sap the healthcare sector's limited resources.
Related: HIPAA Compliant Email: The Definitive Guide
The option is not inherently compliant. For Outlook to be HIPAA compliant, organizations must have a subscription to the appropriate Microsoft 365 or Office 365 plan, which grants access to a business associate agreement.
They protect ePHI and control access to it through the implementation of appropriate technology and policies.
Yes, staff members can bear individual liability for data breaches if their actions contribute to unauthorized access or disclosure.