{"id":1371,"date":"2017-10-23T17:46:59","date_gmt":"2017-10-24T00:46:59","guid":{"rendered":"https:\/\/blog.sprucehealth.com\/?p=1371"},"modified":"2023-10-26T06:04:04","modified_gmt":"2023-10-26T13:04:04","slug":"seven-ways-email-violating-hipaa","status":"publish","type":"post","link":"https:\/\/sprucehealth.com\/blog\/seven-ways-email-violating-hipaa\/","title":{"rendered":"Seven Ways Your Email Is Violating HIPAA"},"content":{"rendered":"<p>Email is everywhere, but regulations imposed by HIPAA make it a challenge to use the technology for healthcare without exposing your practice to\u00a0tens of thousands or even millions of dollars in possible penalties. Infractions can be subtle, too, so you might be at risk even when you think you&#8217;re covered.<\/p>\n<p>We&#8217;ve\u00a0talked about the academic\u00a0<a href=\"https:\/\/sprucehealth.com\/blog\/bottom-line-hipaa-compliance-email\/\">nuts and bolts of using email under HIPAA<\/a>\u00a0before, but now it&#8217;s time for some tough love and brass tacks. Read on as we go through\u00a0seven of the most high-impact and\u00a0potentially surprising ways that your current use of email might be violating HIPAA.<\/p>\n<h2>1) You Don&#8217;t Have Patient Consent<\/h2>\n<p>The U.S. Department of Health and Human Services (HHS) has given <a href=\"https:\/\/sprucehealth.com\/blog\/bottom-line-hipaa-compliance-email\/#patientconsent\">explicit guidance<\/a>, on several occasions, that patients and providers can use unencrypted email for protected health information (PHI), so long as the patient is aware of the security risks and still prefers email over other communication options.<\/p>\n<p>The flip side of this\u00a0guidance is that a failure to meet any of\u00a0its stated criteria implies an immediate HIPAA violation. So ask yourself, for every patient you&#8217;re emailing:<\/p>\n<ol>\n<li>Is this patient\u00a0aware of the security risks of email?<\/li>\n<li>Have we discussed other communication options with better security?<\/li>\n<li>Have they stated a preference (or at least given consent) for email despite the risks and availability of other options?<\/li>\n<li>Have I documented that\u00a0preference\/consent\u00a0somewhere?<\/li>\n<\/ol>\n<p>Patient\u00a0preference is a powerful tool for HIPAA compliance, but that also means that its absence is a powerful liability. Don&#8217;t skip this easy compliance step.<\/p>\n<h2>2) You Don&#8217;t Have a BAA<\/h2>\n<p><a href=\"https:\/\/sprucehealth.com\/blog\/hipaa-compliance-baa-care\/\">Business Associate Agreements<\/a> (BAAs) are\u00a0important legal documents\u00a0that are required by HIPAA and that help ensure that your business partners treat your\u00a0patients&#8217; PHI with the same care and dedication that HIPAA requires of you. In the case of email, you want to know that your email provider has systems in place, such as modern encryption,\u00a0to safeguard your important data, and a BAA will put those assurances in writing.<\/p>\n<p>Even if you have patient consent to use insecure email, skipping out on getting a BAA with your email provider may put you in violation of HIPAA. Your patient\u00a0may have agreed to the technical limitations of email, but they haven&#8217;t given you a free pass to ignore\u00a0other HIPAA requirements, such as the administrative and legal safeguards that a proper BAA would provide.<\/p>\n<p>It&#8217;s simple to do, and you should have a signed BAA with your email provider.<\/p>\n<p><img fetchpriority=\"high\" decoding=\"async\" class=\"aligncenter size-full wp-image-1386\" src=\"https:\/\/sprucehealth.com\/blog\/wp-content\/uploads\/2017\/10\/signing.jpg\" alt=\"\" width=\"760\" height=\"394\" srcset=\"https:\/\/sprucehealth.com\/blog\/wp-content\/uploads\/2017\/10\/signing.jpg 760w, https:\/\/sprucehealth.com\/blog\/wp-content\/uploads\/2017\/10\/signing-300x156.jpg 300w\" sizes=\"(max-width: 760px) 100vw, 760px\" \/><\/p>\n<h2>3) You Have a BAA but It Doesn&#8217;t Cover What You Think It Does<\/h2>\n<p>Surprise! This may be the &#8220;gotcha&#8221; item for many of you, so read carefully. At Spruce, we hear from many providers\u00a0who &#8220;have secure email with a BAA,&#8221; but it often turns out that what they actually have is\u00a0<span style=\"text-decoration: underline;\">regular<\/span> email with a BAA.<\/p>\n<p>It is common for email providers to offer a BAA that covers their storage and internal handling of your PHI but that leaves all responsibility for message transmission on you, the user. This isn&#8217;t malicious; it&#8217;s just a reflection of the email provider&#8217;s inability to control the Internet beyond its own walls. Despite recent advances, standard email transmission is fundamentally unencrypted and insecure, so no company will sign a BAA that promises otherwise. Unfortunately, you&#8217;re still responsible for\u00a0message transmission under HIPAA, so you can&#8217;t ignore this omission.<\/p>\n<p>The most notable example of this disconnect may be <a href=\"https:\/\/sprucehealth.com\/blog\/bottom-line-hipaa-compliance-email\/#baa\">the BAA that Google signs for email under its G Suite product offering<\/a>. It&#8217;s a legitimate BAA that you should absolutely sign if you use the service, but it doesn&#8217;t\u00a0provide coverage for emailing people outside of your own practice, such as, say, your patients.<\/p>\n<p>Don&#8217;t get caught misinterpreting what your BAA\u00a0will protect you from and what it won&#8217;t; it is extremely easy to violate HIPAA and endanger your patients&#8217; PHI by using an email service that has a completely valid BAA in place.<\/p>\n<h2>4) You Haven&#8217;t Thought About Your &#8220;Technical Safeguards&#8221;<\/h2>\n<p>The HIPAA regulations devote a good amount of attention to specific &#8220;<a href=\"https:\/\/www.ecfr.gov\/cgi-bin\/retrieveECFR?gp=&amp;SID=463722b49854ff59f05bc4a66f52c336&amp;mc=true&amp;n=pt45.1.164&amp;r=PART&amp;ty=HTML#se45.1.164_1312\">technical safeguards<\/a>&#8221; that should be in place for systems that interact with electronic PHI. While not all of these security measures\u00a0are absolute requirements under the law,\u00a0standard email clearly fails to meet even\u00a0a lenient interpretation of the criteria.<\/p>\n<p>Happily, email technology has been progressing over the past few decades, and there are now measures that you can take to make your use of email more secure. Even if you have\u00a0your patients&#8217; consent to use &#8220;insecure&#8221; email, there is still a good argument that you should do your best to minimize every security risk that you can, and not doing so could easily constitute a HIPAA violation.<\/p>\n<p>Check out our recent <a href=\"https:\/\/sprucehealth.com\/blog\/bottom-line-hipaa-compliance-email\/#technical\">deep dive on HIPAA and email<\/a> to learn more about the technical safeguards that you now have available and should investigate.<\/p>\n<p><img decoding=\"async\" class=\"aligncenter size-full wp-image-1387\" src=\"https:\/\/sprucehealth.com\/blog\/wp-content\/uploads\/2017\/10\/computer.jpg\" alt=\"\" width=\"760\" height=\"380\" srcset=\"https:\/\/sprucehealth.com\/blog\/wp-content\/uploads\/2017\/10\/computer.jpg 760w, https:\/\/sprucehealth.com\/blog\/wp-content\/uploads\/2017\/10\/computer-300x150.jpg 300w\" sizes=\"(max-width: 760px) 100vw, 760px\" \/><\/p>\n<h2>5) You&#8217;ve Only Thought About Your &#8220;Technical Safeguards&#8221;<\/h2>\n<p>You might be ahead of the game on email security. Maybe you know all about TLS, SPF, DKIM, DMARC, and other alphabet-soup Internet security acronyms. Maybe you even use a fully end-to-end\u00a0encrypted email system. You could still, however, be violating HIPAA with your email.<\/p>\n<p>Technical safeguards are not the only type of safeguards required by HIPAA, so having a perfect set of them won&#8217;t automatically make you compliant; the regulations also focus on &#8220;administrative&#8221; and &#8220;physical&#8221; safeguards, and both of these are critical to any HIPAA effort.<\/p>\n<p>Administrative safeguards are, broadly, documented workflow policies that you follow to ensure the safety of PHI. One well-known administrative safeguard is\u00a0the principle of\u00a0communicating\u00a0only the &#8220;minimum necessary&#8221; amount of information for a given interaction, ensuring that PHI exposure is kept low\u00a0even if there is a technical breach. Other administrative safeguards include having a privacy officer, performing internal risk analyses, and keeping up with\u00a0regular policy checkups. HIPAA requires all of these and more, but they don&#8217;t have to be onerous; learn more in our <a href=\"https:\/\/sprucehealth.com\/blog\/easiest-complete-hipaa-compliance-checklist-youll-ever-see\/\">HIPAA compliance checklist<\/a>.<\/p>\n<p>Physical safeguards are, unsurprisingly, controls that you put in place around the physical security of your patients&#8217; PHI. For email, this generally means considering the physical location of any downloaded emails that you have. Are they stored on a laptop? Who has access to the room it&#8217;s in?<\/p>\n<p>Technical safeguards may be the most obviously important HIPAA requirements for email, but a complete approach to compliance will also consider administrative and physical safeguards, as well as the rest of the HIPAA regulation as a coherent whole. Cherrypicking criteria to follow will not lead to compliance.<\/p>\n<h2>6) You&#8217;re\u00a0Sending\u00a0PHI but Not Realizing It<\/h2>\n<p>Some healthcare providers\u00a0attempt to comply with HIPAA by\u00a0limiting their email use to\u00a0information that does not constitute PHI. This is, in theory, a workable strategy, but it can be devilishly hard to use in practice.<\/p>\n<p>Per HHS, HIPAA protects most &#8220;<a href=\"https:\/\/www.hhs.gov\/hipaa\/for-professionals\/privacy\/special-topics\/de-identification\/index.html#protected\">individually identifiable health information<\/a>,&#8221; including\u00a0demographic data, payment information, and contact details, depending on context.\u00a0Since the use of personal addresses makes email inherently &#8220;individually identifiable,&#8221;\u00a0you must then be extremely careful to ensure that your message content does not rise to the level of &#8220;health information.&#8221;<\/p>\n<p>If you\u00a0run a general practice clinic, for example,\u00a0HIPAA might allow you to send\u00a0your entire\u00a0patient panel a generic email\u00a0about\u00a0flu\u00a0vaccines without it being\u00a0PHI, as it\u00a0would not be &#8220;health information&#8221; about any specific person. If your practice specializes in cosmetic plastic surgery, on the other hand, you might\u00a0not even be able to send a monthly newsletter, as there could be an argument that simply identifying people as patients of your practice would constitute\u00a0health information.<\/p>\n<p>When it comes to PHI, the line is blurry, the bar is low, and the consequences\u00a0are steep. In further HHS guidance, the department states that even &#8220;an indication that the individual was treated at a certain clinic&#8221; can be\u00a0PHI. You might\u00a0be comfortable using email for non-PHI purposes, but it can be exceptionally hard to determine exactly what those are.<\/p>\n<h2>7) You&#8217;re Emailing Someone Other Than the Patient<\/h2>\n<p>You might have\u00a0a patient&#8217;s consent to email with them about\u00a0PHI, but that\u00a0allowance does not extend\u00a0to your interactions with anybody else, including other healthcare providers. Communication with anybody other than the patient or their explicitly designated third-parties should be fully compliant with all\u00a0aspects of HIPAA, and anything else is likely to be a HIPAA violation.<\/p>\n<p>Since standard email is, nearly by definition, not compatible with many HIPAA regulations, you should avoid it by default whenever you need to communicate\u00a0PHI to anybody who is not the exclusive subject of that PHI and who hasn&#8217;t consented specifically to its use.<\/p>\n<hr \/>\n<h2>Alternatives to Email<\/h2>\n<p>Email can certainly be used in a HIPAA-compliant manner, but it may not be worth the trouble. Instead, many modern communications solutions are now available specifically for healthcare, and they make HIPAA compliance simple while also enabling secure messaging, telemedicine, access logging, team collaboration, and many other advanced features that email will never\u00a0natively support.<\/p>\n<p>Of course, Spruce is one of these solutions. \ud83d\ude09<\/p>\n<p>Our software platform supports\u00a0email, too, but we think that the healthcare communication world is so much bigger and richer\u00a0than simple email.\u00a0<a href=\"https:\/\/spruce.io\/app\">Check Spruce out<\/a>, and let&#8217;s figure out what your medical communication goals are and how we can help you reach them. Yes, including email, if you really want it.<\/p>\n<p><a href=\"https:\/\/spruce.io\/app\"><img decoding=\"async\" class=\"aligncenter size-full wp-image-1274\" src=\"https:\/\/sprucehealth.com\/blog\/wp-content\/uploads\/2017\/09\/download_spruce.png\" alt=\"\" width=\"290\" height=\"64\" \/><\/a><\/p>\n<hr \/>\n<p><em>This article is part of a series of posts relating to HIPAA law and regulation. The information provided is\u00a0meant as general guidance only and is not intended to be legal advice.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Email is everywhere, but regulations imposed by HIPAA make it a challenge to use the technology for healthcare without exposing your practice to\u00a0tens of thousands or even millions of dollars in possible penalties. Infractions can be subtle, too, so you might be at risk even when you think you&#8217;re covered.<\/p>\n","protected":false},"author":1,"featured_media":1383,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"slim_seo":{"title":"Seven Ways Your Email Is Violating HIPAA - Spruce Blog","description":"Email is everywhere, but regulations imposed by HIPAA make it a challenge to use the technology for healthcare without exposing your practice to\u00a0tens of thousan"},"footnotes":""},"categories":[14],"tags":[26,16,41,15],"different-template":[],"class_list":["post-1371","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-hipaa","tag-communication","tag-compliance","tag-email","tag-hipaa"],"acf":[],"_links":{"self":[{"href":"https:\/\/sprucehealth.com\/blog\/wp-json\/wp\/v2\/posts\/1371","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sprucehealth.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sprucehealth.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sprucehealth.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/sprucehealth.com\/blog\/wp-json\/wp\/v2\/comments?post=1371"}],"version-history":[{"count":0,"href":"https:\/\/sprucehealth.com\/blog\/wp-json\/wp\/v2\/posts\/1371\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/sprucehealth.com\/blog\/wp-json\/wp\/v2\/media\/1383"}],"wp:attachment":[{"href":"https:\/\/sprucehealth.com\/blog\/wp-json\/wp\/v2\/media?parent=1371"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sprucehealth.com\/blog\/wp-json\/wp\/v2\/categories?post=1371"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sprucehealth.com\/blog\/wp-json\/wp\/v2\/tags?post=1371"},{"taxonomy":"different-template","embeddable":true,"href":"https:\/\/sprucehealth.com\/blog\/wp-json\/wp\/v2\/different-template?post=1371"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}