Resources to assist an employer in complying with the Health Insurance Portability and Accountability Act of 1996 (HIPAA). HIPAA governs the portability and continuity of health insurance coverage and sets out privacy and security standards for the use and distribution of health information.
Many of the resources in this toolkit are in the process of being updated to reflect final HIPAA regulations issued in January 2013.
In 1996, Congress passed the Health Insurance Portability and Accountability Act of 1996 (www.practicallaw.com/1-501-6222)(HIPAA) which governs the portability and continuity of health insurance coverage and also mandates the adoption of the:
HIPAA Privacy Rule, which addresses the privacy of individually identifiable health information (www.practicallaw.com/1-501-6613).
HIPAA Security Rule, which addresses the security of electronic protected health information (www.practicallaw.com/8-501-6596) (PHI).
The HIPAA Privacy Rule establishes national standards to protect individuals' medical records and other personal health information. The Privacy Rule applies to health plans and other covered entities that conduct certain health care transactions electronically. The Privacy Rule requires safeguards to protect the privacy of PHI, and imposes restrictions on the uses and disclosures of PHI without patient authorization. The Privacy Rule also gives patients rights to certain information related to their health information.
The HIPAA Security Rule establishes national standards to protect individuals’ electronic PHI that is created, received, used or maintained by a covered entity. The Security Rule requires appropriate administrative, physical and technical safeguards to ensure the confidentiality, integrity and security of electronic PHI.
Failure to comply with the HIPAA Privacy or Security Rule can result in significant consequences including civil and criminal penalties.
The HIPAA Toolkit provides several continuously maintained resources designed to help employers comply with the HIPAA Privacy and Security Rules.