{"id":281,"date":"2016-08-31T18:55:03","date_gmt":"2016-09-01T01:55:03","guid":{"rendered":"https:\/\/blog.sprucehealth.com\/?p=281"},"modified":"2023-10-26T06:19:08","modified_gmt":"2023-10-26T13:19:08","slug":"seven-ways-phone-making-mobile-hipaa-violation","status":"publish","type":"post","link":"https:\/\/sprucehealth.com\/blog\/seven-ways-phone-making-mobile-hipaa-violation\/","title":{"rendered":"Seven Ways Your Phone Could Be Making You a Mobile HIPAA Violation"},"content":{"rendered":"<p>You use your cell phone. A lot. You use your cell phone somewhere in your medical practice, also a lot. You know it. We know it. The U.S. Department of Health and Human Services (HHS), which administers HIPAA, knows it, and so does the Office for Civil Rights (OCR), which hands out penalties for HIPAA violations.<\/p>\n<p>Over four years ago, 84% of practicing physicians reported using a smartphone in their practice, and that number is certainly higher now.[1] Furthermore, recent enforcement actions by OCR have targeted healthcare organizations with\u00a0deficiencies related to mobile-device HIPAA policy.[2] We all know the potential for danger is there, but the usefulness of smartphones in medicine is\u00a0simply undeniable.<\/p>\n<p>While a fully HIPAA-compliant approach to mobile devices requires a complete organizational effort,\u00a0it&#8217;s still worth your time to make sure that your own personal HIPAA house is in order. For starters, check out our list of\u00a0seven common ways that your cell phone could be\u00a0making you a mobile HIPAA violation:<\/p>\n<h1>1) Text Messaging<\/h1>\n<p>Texting is insanely useful, but it&#8217;s also a potential HIPAA disaster zone. If you&#8217;re texting colleagues about patients, and the content of your messages reaches the level of protected health information (PHI), then the full force of HIPAA is going to apply to what you&#8217;re doing. Within a reasonable approximation of the law, you can assume that your messages should be encrypted both in transit and &#8220;at rest&#8221; (when stored on your phone and the phone of whoever is receiving them). Also within a reasonable approximation, this is definitely not the default case for most cell phone messaging apps.<\/p>\n<p>There are other possible pitfalls, too. If your messages contain PHI, then you are likely on the hook for assuring compliance with all facets of the HIPAA Security Rule, not just encryption. This includes\u00a0considerations of data integrity, access control, auditing, and many other issues.\u00a0Then, if you&#8217;re also texting patients, there is even more to think about. For a primer on this tricky subject, see our\u00a0<a href=\"https:\/\/sprucehealth.com\/blog\/hipaa-compliance-can-text-patients\/\">post on texting patients<\/a>.<\/p>\n<p><strong>How to Fix It:<\/strong> Don&#8217;t text PHI to anybody through non-medical communications apps. If your organization provides an approved messaging app, then use it, and make sure your colleagues are on it, too. If you&#8217;re looking for a medical communications app that will cover you for all of the HIPAA technical safeguards that you need to consider, check out our <a href=\"http:\/\/www.sprucehealth.com\">Spruce Care Messenger<\/a>.<\/p>\n<h1>2) Your Camera Roll<\/h1>\n<p>If you work in a hospital, you&#8217;ve probably had a consultant ask you to text them a quick picture of an ECG, an x-ray, a rash, or something else. Or maybe you sometimes\u00a0snap\u00a0pictures of important\u00a0findings to upload into your EHR. There are a lot of possible uses for mobile photography in medicine, and it can certainly improve care. However, cell phone makers haven&#8217;t built their photo apps with HIPAA in mind, and your medical pictures likely qualify as PHI that isn&#8217;t being protected properly.<\/p>\n<p>How can you tell if a picture constitutes PHI? The law defines PHI as all\u00a0&#8220;individually identifiable health information,&#8221; so if a picture contains any type of health information along with enough detail to identify a specific individual, then it is PHI. Helpfully, HIPAA\u00a0law also includes an\u00a0enumerated\u00a0list of <a href=\"http:\/\/www.hhs.gov\/hipaa\/for-professionals\/privacy\/special-topics\/de-identification\/#safeharborguidance\">18 possible identifiers<\/a> that must be\u00a0absent from a record before it can be considered not to be PHI. These &#8220;Safe Harbor&#8221; criteria give you an easy checklist to run through when making PHI determinations. Assuming there is no text in a given\u00a0photograph, then the applicable PHI-defining criterion is &#8220;Full-face photographs and any comparable images.&#8221; The phrase &#8220;comparable images&#8221; is not explicitly defined, but it is likely to cover any medical picture that conveys as much uniqueness\u00a0as a &#8220;full-face photograph,&#8221; such as a notable\u00a0physical feature or a tattoo.<\/p>\n<p><strong>How to Fix It:<\/strong> Don&#8217;t take photographs that meet\u00a0any of the <a href=\"http:\/\/www.hhs.gov\/hipaa\/for-professionals\/privacy\/special-topics\/de-identification\/#safeharborguidance\">18 HIPAA Safe Harbor criteria<\/a>, especially including pictures of a patient in which they are recognizable. If you need to take such pictures, do so through an app that was designed with HIPAA technical safeguards in mind.<\/p>\n<h1>3) Insecure Wi-Fi<\/h1>\n<p>You&#8217;re in a coffee shop soaking up some complimentary wi-fi on your phone. You check your work email and see that somebody from your practice or hospital team has sent\u00a0you a message about a mutual patient, which you scan quickly. You don&#8217;t respond. Have you committed a HIPAA violation? Maybe!<\/p>\n<p>When you checked your email, you caused the transmission of data\u00a0from the email server to your phone. Depending on how that connection was established, this transfer might have been unencrypted or suboptimally encrypted, flowing right across the public wi-fi network at the coffee shop. Is it likely that somebody snooped on it? No. Does that matter to HIPAA? No. HIPAA is about processes and systems, and exposing PHI to unencrypted transmission is generally verboten, regardless of\u00a0outcome and especially if a better way exists and is reasonable to implement.<\/p>\n<p>If you are unaccustomed to thinking about electronic data transmission security, then take the postal system as an analogy. If you send a postcard written in plain English through the mail, anybody who picks it up can read it. This is the equivalent of sending an <span style=\"text-decoration: underline;\"><strong>un<\/strong><\/span>encrypted message across an <span style=\"text-decoration: underline;\"><strong>un<\/strong><\/span>encrypted connection. If you put that same postcard in an opaque envelope, however, you&#8217;re now doing the equivalent of sending an <span style=\"text-decoration: underline;\"><strong>un<\/strong><\/span>encrypted message across an encrypted connection; nobody can read it unless they crack the envelope. Alternatively, you could send the postcard without an envelope but write its\u00a0message in a gibberish language that only your recipient can read. This would be like sending an encrypted message across an <span style=\"text-decoration: underline;\"><strong>un<\/strong><\/span>encrypted connection: anybody can\u00a0pick up the card and look at it, but the message will\u00a0be nonsensical.<\/p>\n<p>The bottom line: if\u00a0you&#8217;re on a mobile device\u00a0and want\u00a0to access PHI across a network, you need to make sure either that your network connection is encrypted or that any PHI you are transmitting\u00a0is encrypted.\u00a0There is <a href=\"http:\/\/www.hhs.gov\/hipaa\/for-professionals\/breach-notification\/guidance\/index.html\">HHS guidance<\/a> on this, but it gets technical very quickly (e.g., do you know what NIST is or what they have to say about TLS?)<\/p>\n<p><strong>How to Fix It:<\/strong>\u00a0Use a remote-access technology solution that ensures a secure, encrypted connection between your mobile device and the PHI that you are accessing. VPN solutions can do this when implemented correctly. Alternatively, if a secure connection cannot be guaranteed, then you should transmit only encrypted PHI.<\/p>\n<h1>4) Your Contact List<\/h1>\n<p>The contact app on cell phones is maybe the greatest invention ever. The only phone numbers we now know by heart\u00a0are\u00a0those we were dialing 15 years ago, and\u00a0we&#8217;re all to the point where\u00a0we don&#8217;t even answer\u00a0calls if there isn&#8217;t a recognizable\u00a0name attached. It sure is magic to have all those numbers connected\u00a0to names and stored electronically on our mobile devices. Unless you&#8217;re a physician who uses\u00a0their phone to contact patients, in which case that contact list might be a sneaky but real HIPAA violation. Here, store this in your phone under &#8220;HIPAA Police&#8221;: 800-368-1019. That&#8217;s OCR&#8217;s contact number, so you&#8217;ll know who&#8217;s calling when they come knocking.<\/p>\n<p>In fact, the exact way your contact list can betray you is a bit subtle. If you don&#8217;t label the contacts as patients, and you don&#8217;t have any written communication with them (e.g., text messages) on your phone, you might think you&#8217;re in the clear, but it&#8217;s not quite that simple. If you store patients\u00a0as\u00a0contacts, you&#8217;ll also have to ban every other app from accessing the list, because many apps leverage your phone book\u00a0as a way of improving your (and their) social network.<\/p>\n<p>With your phone book&#8217;s help, social apps might\u00a0view\u00a0one of your patients as being a likely &#8220;friend of a friend&#8221; of another of your patients, simply because they share the common connection of you. This can\u00a0lead to those services recommending your patients to each other as new connections to make. If somebody then recognizes somebody else from your elevator or waiting room, the dots become easy to connect, and it&#8217;s likely that PHI has now been leaked. This goes double if you practice in a sensitive or niche field, such as psychiatry, where simply knowing that someone is a patient is a weighty fact.<\/p>\n<p>One significant bummer: if patients are storing your number in <em>their<\/em> contact lists, all of the above nightmare scenario can still occur, even without you\u00a0doing anything wrong. If your patients let their social apps access\u00a0their phone books, the apps can figure out that two people with the same saved number (yours) likely know each other. This seems to have happened to at least one psychiatrist recently.<\/p>\n<p><strong>How to Fix It:<\/strong>\u00a0Only store patient contacts within secure communication apps that were designed with HIPAA in mind. Of course the <a href=\"http:\/\/www.sprucehealth.com\">Spruce Care Messenger<\/a> fits this bill perfectly, which you probably already guessed.\u00a0If you want to be extra cautious, you could also recommend to your patients not to store your number in their contact list if they allow their\u00a0social apps to\u00a0access it.<\/p>\n<h1>5) It&#8217;s Just so Stealable<\/h1>\n<p>HIPAA spends a lot of time discussing &#8220;reasonable and appropriate administrative, technical, and physical safeguards&#8221; for organizations that interact with PHI. With this in mind, now let us agree\u00a0that there is almost nothing less physically safeguarded than a cell phone. They are literally designed to be as small and easily mobile as possible, and they are high-value targets for theft. If your phone is a gateway to your patients&#8217; PHI, either because you store PHI on the phone directly or because the phone is set up to\u00a0access PHI across a network, then you need to take its intrinsic stealability seriously.<\/p>\n<p>Start by assuming that your phone can be stolen at any moment; internalize that you cannot\u00a0put an effective &#8220;physical safeguard&#8221; on it. Your only option is to plan around\u00a0this vulnerability by adopting the best &#8220;administrative&#8221; and &#8220;technical&#8221; safeguards that you can. See what we&#8217;re doing there? HIPAA is about processes and systems, and it allows you to compensate for deficiencies in one area\u00a0by beefing up in\u00a0others. You just have to put thought into it.<\/p>\n<p><strong>How to Fix It:<br \/>\nAdministrative safeguards:<\/strong> Decide which, if any, PHI you really need to access from your phone. Remove your phone&#8217;s access to PHI that you don&#8217;t need. If you are storing PHI directly, delete any that you don&#8217;t absolutely need. Make it a policy to turn on encryption, passwords, and other technical features wherever you can.<br \/>\n<strong>Technical\u00a0safeguards:<\/strong>\u00a0Modern iOS and Android phones use whole-disk encryption when their passcode is enabled. Enable your passcode, and set the phone to wipe if too many incorrect codes\u00a0are entered. After this, if possible, store PHI (or PHI access) only within apps that require\u00a0further authentication after the passcode, such as the <a href=\"http:\/\/www.sprucehealth.com\">Spruce Care Messenger<\/a>. If your phone supports it, also enable the ability to remotely wipe the device, so you can clear its memory from afar if it gets stolen.<\/p>\n<h1>6) The Cloud<\/h1>\n<p>First of all, there is no &#8220;cloud&#8221;; it&#8217;s just <a href=\"https:\/\/www.chriswatterston.com\/blog\/my-there-no-cloud-sticker\">somebody else&#8217;s computer<\/a>. When data is stored &#8220;in the cloud,&#8221; it is simply being stored on a remote computer. This can be convenient, letting you\u00a0access your email, contacts, photos, and other information\u00a0from all sorts of different devices, but it unfortunately comes with\u00a0enormous security and HIPAA implications.<\/p>\n<p>For better or worse, mobile devices have moved strongly toward\u00a0using &#8220;cloud&#8221; technologies by default, and this is what is most dangerous if you&#8217;re\u00a0subject to\u00a0HIPAA. You can design a HIPAA-compliant process to take and store PHI-containing photographs on your phone, for example, but if your camera roll is automatically backing up to a cloud service, this can undermine all of your careful work. Many cloud services do not have security that is acceptable\u00a0for HIPAA purposes, and even if they do, you likely\u00a0don&#8217;t have the necessary\u00a0signed business associate agreement (BAA) in place\u00a0to keep\u00a0the HIPAA chain intact.<\/p>\n<p><strong>How to Fix It:<\/strong>\u00a0Identify all points\u00a0of PHI storage or access on your phone and determine if a\u00a0cloud service is set to back up any of them (e.g., iCloud backing up\u00a0photos on an iPhone). Turn off any such cloud service that you find unless it is\u00a0specifically built to be HIPAA-compliant and you also have a BAA in place with the organization supplying it.<\/p>\n<h1>7) Your Risk Analysis is Nonexistent<\/h1>\n<p>For the third time in this article, I&#8217;m going to say that HIPAA is about processes and systems. There is no such thing as a &#8220;HIPAA-compliant&#8221; phone, just like there is no such thing as a phone that is non-HIPAA-compliant. Everything depends on the processes that you have designed and your policies surrounding them. And when it comes to electronic PHI, the most important of these may be the &#8220;risk analysis&#8221; process.<\/p>\n<p>If you don&#8217;t want your phone to be a permanent HIPAA violation, you have to follow the <a href=\"http:\/\/www.hhs.gov\/hipaa\/for-professionals\/security\/guidance\/guidance-risk-analysis\/index.html\">governmental guidelines<\/a> for ongoing risk analysis. In a nutshell, this means that\u00a0you have to:<\/p>\n<ul style=\"list-style-type: disc;\">\n<li>Evaluate the likelihood and impact of potential risks to electronic PHI<\/li>\n<li>Implement appropriate security measures to address the risks identified<\/li>\n<li>Document the chosen security measures and the rationale for adopting those measures<\/li>\n<li>Maintain continuous, reasonable, and appropriate security protections<\/li>\n<\/ul>\n<p>Have you done this? If not, it doesn&#8217;t matter how much encryption you&#8217;re using; you can never be HIPAA compliant. If you&#8217;re part of an organization, it&#8217;s also likely that somebody in your group has already\u00a0done this and has created specific policies for mobile devices. You should find them, read them, and follow them. When it comes to HIPAA, the last thing you want is to be on the wrong side of a documented policy.<\/p>\n<p><strong>How to Fix It:<\/strong>\u00a0Get yourself right with risk analysis for electronic PHI. If your organization isn&#8217;t doing it, then start. If you already are, then learn about your group&#8217;s policies and follow them.<\/p>\n<hr \/>\n<p>That&#8217;s it for now. Again, this\u00a0list isn&#8217;t meant to\u00a0cover every possible pitfall inherent to\u00a0cell phones and HIPAA, since there are literally infinite ways for your smartphone to help you break the law. But it&#8217;s a good start, and it&#8217;ll help you avoid\u00a0some of the most common\u00a0and dangerous mistakes, allowing you to\u00a0protect both yourself\u00a0and your patients.<\/p>\n<p><em>This article is part of a series of posts relating to HIPAA law and regulation. The information provided is\u00a0meant as general guidance only and is not intended to be legal advice.<\/em><\/p>\n<hr \/>\n<p>References:<\/p>\n<ol>\n<li>Google\/Manhattan Research. <i>Screen to Script: The Doctor\u2019s Digital Path to Treatment<\/i>. (Google, 2012).<\/li>\n<li>http:\/\/www.hhs.gov\/about\/news\/2015\/09\/02\/750,000-dollar-hipaa-settlement-emphasizes-the-importance-of-risk-analysis-and-device-and-media-control-policies.html<\/li>\n<\/ol>\n","protected":false},"excerpt":{"rendered":"<p>You use your cell phone. A lot. You use your cell phone somewhere in your medical practice, also a lot. You know it. We know it. The U.S. Department of Health and Human Services (HHS), which administers HIPAA, knows it, and so does the Office for Civil Rights (OCR), which hands out penalties for HIPAA violations.<\/p>\n","protected":false},"author":1,"featured_media":467,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"slim_seo":{"title":"Seven Ways Your Phone Could Be Making You a Mobile HIPAA Violation - Spruce Blog","description":"You use your cell phone. A lot. You use your cell phone somewhere in your medical practice, also a lot. You know it. We know it. The U.S. Department of Health a"},"footnotes":""},"categories":[14],"tags":[15],"different-template":[],"class_list":["post-281","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-hipaa","tag-hipaa"],"acf":[],"_links":{"self":[{"href":"https:\/\/sprucehealth.com\/blog\/wp-json\/wp\/v2\/posts\/281","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sprucehealth.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sprucehealth.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sprucehealth.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/sprucehealth.com\/blog\/wp-json\/wp\/v2\/comments?post=281"}],"version-history":[{"count":0,"href":"https:\/\/sprucehealth.com\/blog\/wp-json\/wp\/v2\/posts\/281\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/sprucehealth.com\/blog\/wp-json\/wp\/v2\/media\/467"}],"wp:attachment":[{"href":"https:\/\/sprucehealth.com\/blog\/wp-json\/wp\/v2\/media?parent=281"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sprucehealth.com\/blog\/wp-json\/wp\/v2\/categories?post=281"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sprucehealth.com\/blog\/wp-json\/wp\/v2\/tags?post=281"},{"taxonomy":"different-template","embeddable":true,"href":"https:\/\/sprucehealth.com\/blog\/wp-json\/wp\/v2\/different-template?post=281"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}