The weakest link in securing communications

Drew Williamsen (dwilliamsen@gmail.com), Area Compliance Program Director, Banner Wyoming Medical Center, Banner Health, Casper, Wyoming.

As compliance and privacy officers, we receive a lot of questions inquiring whether it is permissible to send protected health information (PHI) to physicians or other entities in a seemingly endless array of random situations. Many of these questions do not always fit squarely into a “yes” or “no” response. The fact that we receive these kinds of questions is a positive sign that someone is thinking about what it is they are doing and whether it is HIPAA compliant.

Ten to 15 years ago, many companies in the healthcare space did not have secure communication methods for PHI. Most companies’ methods of communication fit the definition of “unsecured.”[1] Employees would often email or text PHI without a second thought of whether it was compliant, as many were simply unaware. I responded to an issue years ago where an employee sent PHI via their personal, unencrypted email to a fellow employee’s work email. The employee didn’t think there was an issue: After all, they had been doing that for some time, and no one ever said anything about it, so how would the employee be aware?

In today’s healthcare universe, it is almost unthinkable that a company would be so rogue as to not make an effort to encrypt an email or to use secure texting. Obviously, there are nuances and one-off circumstances that can occur (e.g., a brand-new provider who doesn’t know the organization’s policies on texting PHI) that certainly keep us compliance and privacy officers busy, but overall, healthcare organizations are trying. We all realize that no one is immune to a breach or mistakes, but appropriate levels of vigilance are necessary to stave off the inevitable for as long as possible.

This document is only available to members. Please log in or become a member.
 


Would you like to read this entire article?

If you already subscribe to this publication, just log in. If not, let us send you an email with a link that will allow you to read the entire article for free. Just complete the following form.

* required field