25% off all training courses Offer ends May 29, 2026
View HIPAA Courses
25% off all training courses
View HIPAA Courses
Offer ends May 29, 2026

The HIPAA Journal is the leading provider of HIPAA training, news, regulatory updates, and independent compliance advice.

Owen Bates

Owen Bates is an Contributing Editor and HIPAA Subject Matter Expert at The HIPAA Journal, having joined the publication in November 2024. He researches HIPAA compliance topics and writes authoritative reference articles that help readers understand complex regulatory requirements in a clear and practical way. He also reviews and updates existing content to reflect changes to HIPAA regulations, helping ensure the accuracy and relevance of published material. In addition to his editorial work, Owen contributes as a reviewer and tester of The HIPAA Journal Training courses, supporting the development of high-quality educational content. He also advises The HIPAA Journal’s clients on best practices for HIPAA implementation and enforcement. Owen is a psychology graduate of Westmont College, California.

Why Compliance Officers Use Compliance Software
Jun14

Why Compliance Officers Use Compliance Software

Healthcare compliance software is a comprehensive management tool that helps chief compliance officers to effectively oversee compliance efforts across their organization’s facilities, by proactively managing risk, streamlining workflows, improving collaboration, and demonstrating the achievement of compliance objectives to stakeholders. What Are The Benefits Of Healthcare Compliance Software? For a chief compliance officer, the benefits of using healthcare compliance software are: 1. Increased Visibility: Compliance software provides real-time visibility into compliance activities across sites, including incident management, allowing the chief compliance officer to monitor progress, track key metrics, and identify areas that require attention, on a per site and per employee basis. This increased visibility and granularity enhances the chief compliance officer’s ability to effectively oversee compliance efforts across the organization. 2. Streamlined Workflows: Compliance software automates many administrative tasks related to compliance management, such as tracking...

Read More

What Information Can Hospitals Give Over the Phone?

What information hospitals can give over the phone depends on the purpose of the phone call, the recipient of the information, and any restrictions or authorizations in force at the time. The phone system being used can also impact what information hospitals can give over the phone. The most common reasons for asking the question what information can hospitals give over the phone are: Healthcare providers want to make sure they comply with HIPAA, Patients want to know if their privacy rights have been violated, or Families want the maximum information possible about a loved one. Unfortunately, there is no A, B, and C answer to the question what information can hospitals give over the phone because patients have the right to restrict some or all disclosures and restrict who information is shared with. Additionally, patients have the right to authorize disclosures beyond those permitted by the Privacy Rule to individuals who enquire about the patient’s health. Therefore, although §164.510 of the Privacy Rule permits hospitals to disclose directory information to individuals who...

Read More
PHI vs PII: What is the Difference in Healthcare?
Apr13

PHI vs PII: What is the Difference in Healthcare?

Any analysis of PHI vs PII has to take into account there are multiple definitions of Personally Identifiable Information (PII) depending on the context of the definition and the source of the definition. For this reason, this analysis of PHI vs PII focuses on the difference between the two acronyms in the healthcare industry only. It is no exaggeration to state there are multiple definitions of PII depending on the context and the source of the definition. For example, the Department of Energy’s Office of Management has published four definitions of PII, NIST’s Computer Security Resource Center has published a further three definitions of PII, and HHS’ National Institutes of Health has adapted one of the three NIST definitions to distinguish between direct and indirect PII. In addition to direct PII and indirect PII, it is also possible to have sensitive PII and non-sensitive PII. Non-sensitive PII is sometimes referred to as public PII or quasi-PII because it can be obtained from public sources. Incredibly, this variety of PII definitions and subsets comes from only regulatory...

Read More
Who is Responsible for Enforcing the HIPAA Security Rule?
Apr09

Who is Responsible for Enforcing the HIPAA Security Rule?

Parties responsible for enforcing the HIPAA Security Rule include HHS’ Office for Civil Rights, other federal and state agencies, and organizations’ HIPAA Privacy Officers. HHS’ Centers for Medical and Medicaid Services (CMS) may also soon be indirectly responsible for enforcing the HIPAA Security Rule if compliance with HHS’ Healthcare Sector Cybersecurity Strategy becomes a condition for participation in federal health programs. Many sources discussing who is responsible for enforcing the HIPAA Security Rule state HHS’ Office for Civil Rights is the sole party responsible. Although in theory this is the case, in practice HHS’ Office for Civil Rights rarely takes enforcement action for violations of the HIPAA Security Rule. It is more often the case that enforcement actions for violations of the HIPAA Security Rule are taken by other federal agencies, State Attorneys General, and organizations’ HIPAA Privacy Officers. HHS’ Office for Civil Rights Enforcement Actions Each year, HHS’ Office for Civil Rights receives between 60,000 and 65,000 HIPAA breach notifications. Not all the...

Read More
What Does the HIPAA Security Rule Cover?
Mar12

What Does the HIPAA Security Rule Cover?

The HIPAA Security Rule covers a subset of individually identifiable health information protected by the Privacy Rule and it applies when Protected Health Information is created, received, stored, or transmitted electronically. In such circumstances, the subset of information covered by the HIPAA Security Rule is referred to as electronic Protected Health Information or ePHI. Prior to HIPAA being passed in 1996, concerns were raised that the cost of reforming the health insurance industry would be passed onto employers and employees in the form of higher premiums. As health insurance premiums are tax deductible, this would impact federal tax revenues. To help neutralize the cost of the reforms, Congress added a second title to the Act. Most of Title II of HIPAA addresses fraud and abuse against federal health programs. However, Subtitle F of Title II aims  “to improve the efficiency and effectiveness of the health care system by encouraging the development of a health information system through the establishment of standards for the electronic transmission of certain health...

Read More
x

Is Your Organization HIPAA Compliant?

Find Out With Our Free HIPAA Compliance Checklist

Get Free Checklist