preview

HIPAA: Protecting Our Privacy Essay

Good Essays

HIPAA
Identity theft has always been in the back of my mind whenever I use my debit card but I wasn’t too concerned about my health information until I learned about HIPAA. It is a very important set of rules and standards that protects our privacy.
Health Insurance Portability and Accountability Act or HIPAA is a statute endorsed by the U.S. Congress in 1996. It offers protections for many American workers which improves portability and continuity of health insurance coverage. The seven titles of the final law are Title I - Health care Access , Portability, Title II - Preventing Health Care Fraud and Abuse; administrative simplification; Medical Liability Reform; Title III – Tax-related Health Provisions; Title IV – Application and …show more content…

HIPAA also assures continued improvement in the efficacy of electronic information system each year. These are accomplished by the rules of Title II: the Privacy Rule, the Transactions and Code Sets Rule, the Security Rule, the Unique Identifiers Rule, and the Enforcement Rule. (Jeffries, n.d)
The privacy rule applies to personal health information in any form, electronic or paper, which includes the entire medical record. Individuals have full access to their information, can limit who can gain access to his or her records, can request changes to their medical record if there’s any reason they suspect that the information isn't accurate. In addition, the private information shared is kept to the minimal amount needed. Also, the patients have the privilege to decide whether or not to release their protected health information or PHI for purposes unrelated to any treatments or payment issues, such as research project. (Krager & Krager, 2008) HIPAA implemented specific code sets for diagnosis and procedures to be used in all transactions. Covered entities must adhere to the content and format requirements of each standard. (Center for Medicare and Medicaid Services, n.d)The security rule supplements the privacy rule; it deals specifically with electronic PHI or ePHI. It applies to covered entities that transmit health information in electronically. The Security Rule requires covered entities to keep appropriate

Get Access