2 min read
Why covered entities should use encryption–even if it isn’t required
Farah Amod Dec 24, 2024 9:01:41 PM
In healthcare, protecting patient information is a top priority. Many people think HIPAA requires encryption for electronic protected health information (ePHI), but that’s a misconception. While HIPAA does have strict standards, encryption is considered an ‘addressable’ safeguard, meaning it’s not mandatory for everyone. Nevertheless, encryption is one of the best ways to ensure data security, which can prevent data breaches and legal issues from arising.
What HIPAA says about encryption
According to the Department of Health and Human Services (HHS), “The final Security Rule made the use of encryption an addressable implementation specification (see 45 CFR § 164.312(a)(2)(iv) and (e)(2)(ii)). This means encryption must be implemented if, after a risk assessment, the entity determines it is a reasonable and appropriate safeguard for protecting the confidentiality, integrity, and availability of e-PHI. If encryption isn’t deemed suitable, the entity must document this decision and implement an equivalent alternative measure, as long as it effectively meets the security needs. If the standard can be met by other means, the entity may choose not to use encryption or an alternative, provided they document their rationale.”
HIPAA categorizes security measures as either “required” or “addressable.” Required measures must be followed by all covered entities and business associates. Addressable measures, such as encryption, have some flexibility. HIPAA doesn’t make encryption strictly optional, but it does allow each organization to assess whether encryption is reasonable and effective for their specific risks. If the organization decides against using encryption, it must document this choice and apply other safeguards to achieve the same level of protection.
Read more: What is encryption?
Why encryption is still a valuable safeguard
Even though HIPAA doesn’t mandate encryption, it provides significant protection. If encrypted ePHI is breached, healthcare providers typically don’t need to notify patients or the Department of Health and Human Services (HHS) because encrypted data is considered unreadable without the right key. This gives encryption a ‘safe harbor’ status, which can help reduce legal and regulatory consequences if a data breach happens. Beyond that, using encryption shows a commitment to data security, helping to build patient trust.
Read more: What is HIPAA's safe harbor provision?
The role of risk assessments in HIPAA compliance
To decide if encryption is the best choice, healthcare organizations should start with a risk assessment, which involves identifying ePHI, spotting potential security gaps, and evaluating risks like cyberattacks or accidental data exposure. Risk assessments help shape the decision on whether to use encryption or other safeguards. If encryption isn’t chosen, organizations need to document the decision, explain the alternative measures they’ll use, and ensure these options are adequate.
See more: What is a HIPAA risk assessment?
Alternative measures if encryption isn’t feasible
If encryption doesn’t fit an organization’s specific needs, HIPAA permits other protective actions. Alternatives include strict access controls to limit who can view or change ePHI, using audit trails to monitor access and modifications, and data loss prevention (DLP) tools to block unauthorized data sharing. While these measures can improve security, they may not offer the same protection level as encryption. Thoughtful planning is needed to make sure these alternatives are effective at keeping patient information secure.
The big picture
Encryption might not be required, but it remains a powerful safeguard for healthcare organizations under HIPAA. Through careful risk assessments and thoughtful planning, healthcare providers can reduce risks, stay compliant, and maintain patient trust by taking strong steps to protect sensitive data.
FAQs
Is encryption mandatory for healthcare organizations?
While HIPAA does not explicitly mandate encryption, it is a necessary safeguard for protecting ePHI. HIPAA's Security Rule requires healthcare organizations to implement security measures, including encryption, to protect the confidentiality, integrity, and availability of ePHI.
What types of data should be encrypted under HIPAA?
HIPAA recommends encrypting all ePHI, including patient health records, medical diagnoses, treatment plans, insurance information, and any other personally identifiable health information.
Is encryption enough to ensure the security of ePHI?
While encryption is an important component of ePHI security, it should be complemented with other security measures such as access controls, authentication mechanisms, regular security audits, and employee training. A multi-layered approach to security helps mitigate risks and enhances overall data protection.
Learn more: HIPAA Compliant Email: The Definitive Guide