A version of this article was first published on HIPAA Vault’s
As smartphones and the internet increasingly impact the way we communicate, the demand for sharing sensitive, electronic protected health information (e-PHI) through email and instant messaging continues to grow. While these innovations are clearly attractive to many healthcare providers (and their patients), shouldering the underlying burden of IT concerns to support them is not. Issues of security (safe transmission of data, and whether to trust a third-party service with patient information) are paramount. And concerns over maintaining a secure, complex cloud infrastructure that can withstand vulnerabilities, while keeping IT capital expenditures to a minimum can seriously detract from the provider’s primary focus on patient care. Additionally, all transmission of personal medical data must sufficiently meet the standards required by HIPAA compliance, to “restrict access to, protect the integrity of, and guard against unauthorized access to e-PHI.” (§ 164.312(e)(1)) Typically, this is not something that the average email service provides. Thankfully, there are compliant, “Trusted Data Stewards” – like HIPAA Vault – with the security and IT expertise to help. While there is still no one official HIPAA or HITECH certification, these stewards have undergone careful audits by accredited, independent auditors, and so can meet the burden of HIPAA regulations while offering affordable, IT solutions, including compliant email. This can greatly ease provider’s minds, and keep them focused on what they do best – treating patients. We’ll cover how some of the more popular email services, like GMail and Outlook, can be configured for HIPAA compliance, but first we need to understand how the process works.Encryption
A vital aspect of what makes email HIPAA compliant is encryption. Essentially, encryption is the process of “disguising” email content to make it unreadable, not only in transit, but all the way to the recipients inbox. Once received, the recipient can open and decrypt the email to make it readable only for the intended parties. This involves an encrypted network connection to make it secure, and encrypting the email message itself before it leaves the sender’s inbox. This guarantees that if the email should be intercepted by an unauthorized user or hacker, the contents will be unreadable. In addition, stored or backed-up email messages are also encrypted, in the event that someone manages to gain unauthorized access to password protected accounts.
