4 Rules When Accepting Credit Card Payments to Ensure HIPAA Compliance (2024)

Jun 18
2015

4 Rules When Accepting Credit Card Payments to Ensure HIPAA Compliance (1)

Guest post by Rich McIver, founder, MerchantNegotiators.com.

In January of this year, Anthem, Inc. a managed care provider, learned of a cyber attack to their IT system. This attack, which occurred over several weeks beginning in December, 2014, compromised the identities over 80 million customers. The breach, in which the healthcare information of millions were compromised, constitutes a serious HIPAA violation, exposing the provider to potentially devastating legal liability.

Unfortunately, this sort of breach perpetrated against healthcare providers is becoming ever more common. The Ponemon Institute, along with ID Experts, issued a report in May this year that showcased healthcare data breaches. The Fifth Annual Benchmark Study on Privacy and Security of Healthcare Data calculates a 125 percent growth in healthcare cyber attacks over the past five years. Although employee negligence and lost or stolen devices still result in many data breaches, a shift is occurring from accidental loss to intentional targeting of data that reveals individuals’ names, Social Security numbers, and other personal information.

The reason that healthcare providers are being targeted is that the information they maintain to provide care for their patients is often substantial enough that cyber criminals can use the data from a single healthcare provider to engage in identity theft. Moreover, cyber criminals target healthcare data because they recognize that many healthcare facilities, including insurance companies, don’t have the resources or technologies to prevent or to detect attacks.

Anthem is a large corporate entity that can afford and use the technology required to protect HIPAA sensitive data, and yet the breach still occurred. What can other healthcare businesses do to prevent or detect a cyber attack on HIPAA sensitive data?

Meeting Standards, Avoiding Fines
The growing use of electronic health records and electronic protected health information (ePHI) accounts for the need to protect information contained in these records. But while these records are often well secured, an often overlooked vulnerability point is credit card processing. Payment Card Industry Data Security Standard (PCI DSS) and HIPAA rules require entities to maintain reasonable and appropriate safeguards for protecting credit card payments. What this actually translates into actionable steps, however, is less clear. To that end, here are four rules to follow when accepting credit card payments to ensure that you’re meeting HIPAA/PCI mandated or suggested compliance guidelines:

  1. Ensure Your Processor Doesn’t Send SMS Credit Card Receipts: Some credit card processors, like Square, send electronic receipts to your customers via text or SMS. Because these receipts contain “protected health information” they must only be transmitted over secure technologies, which SMS is not. Therefore, if you want to provide receipts, either make sure they are delivered via secured email, or are exclusively provided in paper form.
  2. Obtain a Business Associate Agreement With Your Processor: If your credit card processor only provides credit card processing, there is an exception in HIPAA that means you don’t need a typical Business Associate Agreement with your credit card processor. That exception, however, is very narrow and only applies to actual credit card processing. That means that if they are providing account analysis, reporting, or any of the ancillary services that processors offer like creating gift cards, etc. you likely need a Business Associate Agreement. That means you have two choices: either limit the services that your merchant account services provider gives you, or obtain a valid Business Associate Agreement with them.
  3. Any Physically Stored Card Numbers Must Be Secured: All businesses, not just healthcare entities, must comply with PCI DSS. Visa, MasterCard, Discover, American Express, and JCB mandate this compliance to protect the customer’s data against theft and fraud. One of the most basic requirements is that if you’re going to keep a written copy of a credit card authorization that lists the customer’s credit card number, that it always be secured under lock and key.
  4. Secure Your Swiping Hardware: Traditionally, credit card payments were swiped via a countertop terminal. Those come off the shelf very secure, so the only concern there is ensuring that the internet connection that terminal uses to communicate is PCI compliant. But if you’re using a new type of swiper like the Clover Station, that converts existing hardware like an iPad or your cellphone into a card accepting device, then that hardware must be made secure.

If your healthcare organization isn’t following the above guidelines, don’t feel alone. In fact, the Ponemon Institute study estimates that less than half of all healthcare organizations and their business associates fully comply with either PCI DSS or HIPAA. The fact that other healthcare providers aren’t fully compliant, however, shouldn’t discourage action on your part. Since 91 percent of healthcare operations and 59 percent of business associates experienced a data breach within the past five years, it’s not if, but when, it will happen to you and your patients.

Related

  • Dispelling the Myths about HIPAA Compliance
  • Decoding the New HIPAA Privacy and Security Rules
  • Managing Your Business Associate Agreements: Ongoing Reviews an Important Part of Compliance

4 Rules When Accepting Credit Card Payments to Ensure HIPAA Compliance (2024)

FAQs

What are the 3 important rules for HIPAA compliance? ›

The Health Insurance Portability and Accountability Act (HIPAA) lays out three rules for protecting patient health information, namely:
  • The Privacy Rule.
  • The Security Rule.
  • The Breach Notification Rule.

What are the HIPAA guidelines regarding billing? ›

HIPAA Rules for Medical Billing: Privacy Rule

HIPAA rules for medical billing states that you can only have access to a patient's medical history and conditions including treatment information. You are also allowed to view the fees the patients or their respective insurance companies paid for the treatment.

Does HIPAA apply to credit card transactions? ›

Typically, these terms state that their services should not be used for health record storage. Violating these terms can lead to non-compliance. Data security: Even though credit card payment services are not subject to HIPAA, maintain strong data security practices.

What is the HIPAA transaction rule? ›

HIPAA Transactions and Code Set Rule

The rule aims to improve the efficiency of healthcare transactions by establishing consistent formats for exchanging health information, such as claims, enrollment, eligibility inquiries, and remittance advice.

What are the four HIPAA rules? ›

The 4 most important parts of HIPAA are the Privacy Rule, the Security Rule, the Breach Notification Rule, and the HIPAA Omnibus Rule. The Privacy Rule protects the confidentiality of patient health information. It sets standards for how patient health information can be used and disclosed.

What are the 4 HIPAA safeguards? ›

The HIPAA Security Rule requires physicians to protect patients' electronically stored, protected health information (known as “ePHI”) by using appropriate administrative, physical and technical safeguards to ensure the confidentiality, integrity and security of this information.

Do payments need to be HIPAA compliant? ›

Ensuring the protection of patient information, particularly payment details, is not just a regulatory requirement under the HIPAA regulations but a cornerstone of trust between you and your clients.

What is the HIPAA privacy rule for payment activities? ›

The HIPAA Privacy Rule permits a health care provider to disclose protected health information about an individual, without the individual's authorization, to another health care provider for that provider's treatment or payment purposes, as well as to another covered entity for certain health care operations of that ...

What are the 5 code sets approved by HIPAA? ›

Code sets outlined in HIPAA regulations include:
  • ICD-10 – International Classification of Diseases, 10th edition.
  • HCPCS – Health Care Common Procedure Coding System.
  • CPT – Current Procedure Terminology.
  • CDT – Code on Dental Procedures and Nomenclature.
  • NDC – National Drug Codes.
Apr 3, 2024

Do billing records fall under HIPAA? ›

Thus, individuals have a right to a broad array of health information about themselves maintained by or for covered entities, including: medical records; billing and payment records; insurance information; clinical laboratory test results; medical images, such as X-rays; wellness and disease management program files; ...

Does HIPAA apply to private pay patients? ›

Who Is Not a Covered Entity? Providers that do not work with clearinghouses, accept only cash pay (private pay), provide superbills to patients, and do not submit or request information electronically from the patient's insurer are not subject to HIPAA regulations.

Is credit card information considered PHI? ›

PII also encompasses more than just health information. It includes information such as tax information, credit card numbers or Social Security numbers used in a context unrelated to healthcare operations and services.

What is the HIPAA Rule 3? ›

HIPAA Rule 3: The Breach Notification Rule

If a potential breach occurs, the organization must conduct a risk assessment to determine the scope and impact of the incident—and confirm whether it falls under the notification requirement.

What is the HIPAA compliance protocol? ›

How to Create a HIPAA Compliance Program
  • Implementing written policies, procedures, and standards of conduct. ...
  • Establishing a HIPAA compliance officer and compliance committee. ...
  • Performing effective training and education. ...
  • Developing open lines of communication. ...
  • Conducting internal monitoring and auditing.

What do HIPAA rules require? ›

The HIPAA Privacy Rule requires you to have policies that protect and limit how you use and disclose PHI, but you aren't expected to guarantee the privacy of PHI against all risks.

What is the standard 3 of HIPAA? ›

HIPAA Rule 3: The Breach Notification Rule

The HIPAA Breach Notification Rule requires covered entities and business associates to provide notification of a breach involving unsecured PHI. A breach is any impermissible use or disclosure of PHI under the Privacy and Security Rules.

What are the 3 phases of HIPAA compliance explain? ›

Limiting access, limiting disclosure, protecting Patient Health Information (PHI), and notifying the appropriate authorities and anyone impacted by a data breach were the three phases of HIPAA compliance process.

What are the three pillars of HIPAA? ›

Understanding HIPAA compliance involves grasping the three essential rules that form the foundation of these regulations: the Privacy Rule, the Security Rule and the Breach Notification Rule.

What are the three components of the HIPAA security Rule? ›

The Security Rule requires appropriate administrative, physical and technical safeguards to ensure the confidentiality, integrity, and security of electronic protected health information.

Top Articles
SSH config file syntax and how-tos for configuring the OpenSSH client
What is sales closing, and why is it important?
Craigslist Houses For Rent In Denver Colorado
Methstreams Boxing Stream
Research Tome Neltharus
Atvs For Sale By Owner Craigslist
Seething Storm 5E
Dr Lisa Jones Dvm Married
Miles City Montana Craigslist
Words From Cactusi
Mail Healthcare Uiowa
Ou Class Nav
Oriellys St James Mn
Miami Valley Hospital Central Scheduling
Oro probablemente a duna Playa e nomber Oranjestad un 200 aña pasa, pero Playa su historia ta bay hopi mas aña atras
Radio Aleluya Dialogo Pastoral
Q33 Bus Schedule Pdf
Find Such That The Following Matrix Is Singular.
Kürtçe Doğum Günü Sözleri
Lazarillo De Tormes Summary and Study Guide | SuperSummary
Missouri Highway Patrol Crash
St. Petersburg, FL - Bombay. Meet Malia a Pet for Adoption - AdoptaPet.com
Georgia Cash 3 Midday-Lottery Results & Winning Numbers
Why do rebates take so long to process?
Homeaccess.stopandshop
All Breed Database
Yugen Manga Jinx Cap 19
پنل کاربری سایت همسریابی هلو
Gma' Deals & Steals Today
Waters Funeral Home Vandalia Obituaries
Marlene2295
Wisconsin Volleyball Team Leaked Uncovered
Indiana Jones 5 Showtimes Near Jamaica Multiplex Cinemas
The Menu Showtimes Near Amc Classic Pekin 14
Family Fare Ad Allendale Mi
Philadelphia Inquirer Obituaries This Week
Latest Nigerian Music (Next 2020)
Encompass.myisolved
My Locker Ausd
Best Restaurants Minocqua
Craigs List Hartford
Emily Tosta Butt
Frontier Internet Outage Davenport Fl
The Largest Banks - ​​How to Transfer Money With Only Card Number and CVV (2024)
Lesson 5 Homework 4.5 Answer Key
Deshuesadero El Pulpo
Diablo Spawns Blox Fruits
De Donde Es El Area +63
Best brow shaping and sculpting specialists near me in Toronto | Fresha
Duffield Regional Jail Mugshots 2023
Latest Posts
Article information

Author: Sen. Emmett Berge

Last Updated:

Views: 6522

Rating: 5 / 5 (80 voted)

Reviews: 87% of readers found this page helpful

Author information

Name: Sen. Emmett Berge

Birthday: 1993-06-17

Address: 787 Elvis Divide, Port Brice, OH 24507-6802

Phone: +9779049645255

Job: Senior Healthcare Specialist

Hobby: Cycling, Model building, Kitesurfing, Origami, Lapidary, Dance, Basketball

Introduction: My name is Sen. Emmett Berge, I am a funny, vast, charming, courageous, enthusiastic, jolly, famous person who loves writing and wants to share my knowledge and understanding with you.