Glossary of Compliance

Compliance Glossary

Our list of curated compliance glossary offers everything you to know about compliance in one place.

Glossary » HIPAA » HIPAA Confidentiality

HIPAA Confidentiality

The HIPAA Privacy Rule sets standards for safeguarding individuals’ medical records and identifiable health information, commonly known as PHI. 

For example, discussions between doctors and patients should occur privately, and patients may prefer to be contacted on their cell phones rather than at home. Even well-meaning family members may not necessarily access a loved one’s medical information.

Ethical healthcare practices have traditionally emphasized keeping patients’ medical data confidential. HIPAA has formalized this responsibility for covered entities, including healthcare providers, health plans, healthcare clearinghouses, and business associates who transmit health information electronically.

Confidential communication

Healthcare practitioners should ensure confidential communication with patients in line with their preferences. While medical discussions should be private, practitioners can share medical information with a patient’s immediate family or close friends if related to the patient’s care payment by limiting information exchange to what’s necessary. 

Personal representatives authorized by the patient have the same access and confidentiality rights, although practitioners may restrict information if there are concerns about domestic violence, abuse, or neglect.

Certain situations may require disclosure by law, typically when a patient’s condition poses a risk to others. 

For example, infectious diseases like COVID-19, HIV, syphilis, and tuberculosis must be reported to public health agencies. Signs of abuse or neglect, including child, adult, or elder abuse, are generally reported to protective services. 

Conditions affecting a patient’s ability to drive, such as dementia or recent seizures, may need to be reported to the Department of Motor Vehicles in some states.

Additional reading

ISO 27001 incident management

What is Incident Management in ISO 27001 [ Download Template ]

The rapid increase in cyberattacks and security breaches constantly raises the bar for an acceptable information security posture globally. As an organization dealing with sensitive data,  you always aim to prevent a breach and protect organizational assets from misuse. But, eventually, bad actors find a way to access your weak spots before you are able…
Best incident response software

What is Incident Response Software: How to Choose one?

Oct 2021: a printer in a hospital in Tokushima, Japan, started printing out papers on its own after their systems were compromised by ransomware. Attackers demanded money in exchange for decrypting the encrypted patient data of 85,000 patients. They recovered eventually but could have avoided the situation had they deployed incident response software.  The security…
iso 27001 asset management

ISO 27001 Annex A.8: Asset Management Explained

As per the definition and application of ISO 27001 asset management is a set of processes to identify and apply security measures to an organization’s assets. Seems straightforward, isn’t it? In the real world, it is pretty tricky. Often organizations forget to identify and secure chunks of confidential Information stored at multiple sources. The cost…

Sprinto: Your growth superpower

Use Sprinto to centralize security compliance management – so nothing
gets in the way of your moving up and winning big.