Email systems assist in HIPAA compliant data retention by automatically archiving correspondence and allowing easy retrieval.
According to the HHS: “A covered entity must maintain, until six years after the later of the date of their creation or last effective date, its privacy policies and procedures, its privacy practices notices, disposition of complaints, and other actions, activities, and designations that the Privacy Rule requires to be documented.”
HIPAA’s Privacy Rule sets the document retention requirements for covered entities and business associates. This determines how long medical records and other documentation containing protected health information (PHI) should be kept within the organization before disposal. The retention timeline allows for the availability of PHI for legal, regulatory, and operational purposes, including audits, compliance investigations, and patient requests for their medical records.
In a Record Management Journal article, the following statement regarding email communication as a method of record keeping stands out: “The article reviews the development of traditional correspondence and its representation features in the USA and discusses how the evolution of the email system has successfully incorporated experience of correspondence recordkeeping to achieve the integrated functionality of email creation, transmission, storage and organization. Drawing on major email preservation research and project documentation, it reviews the role persistent representation features play in management, preservation and access of email correspondence.”
Email communication is one of the best methods for retaining communication records in any organization. In healthcare organizations where the requirements for HIPAA compliant email come into play, this benefit facilitates administrative functions. This process starts when the email is sent or received within the organization's email system.
The email service automatically logs every action related to an email, including when it was created, sent, received, opened, forwarded, replied to, or deleted. These logs capture data like the date and time of each action, the identity of the person acting, and the specific details of the email content, including attachments.
See also: Top 10 HIPAA compliant email services
Beyond the requirement for how long data should be held, the Security Rule provides the steps necessary to prevent the loss and exactly how data should be destroyed once the time is up. Data loss prevention methods include:
See also: How to safely dispose of ePHI
TLS 1.2 or higher is recommended.
Disposing of ePHI requires securely deleting electronic records or physically destroying hardware so that data cannot be recovered.