4 Rules When Accepting Credit Card Payments to Ensure HIPAA Compliance (2024)

Jun 18
2015

4 Rules When Accepting Credit Card Payments to Ensure HIPAA Compliance (1)

Guest post by Rich McIver, founder, MerchantNegotiators.com.

In January of this year, Anthem, Inc. a managed care provider, learned of a cyber attack to their IT system. This attack, which occurred over several weeks beginning in December, 2014, compromised the identities over 80 million customers. The breach, in which the healthcare information of millions were compromised, constitutes a serious HIPAA violation, exposing the provider to potentially devastating legal liability.

Unfortunately, this sort of breach perpetrated against healthcare providers is becoming ever more common. The Ponemon Institute, along with ID Experts, issued a report in May this year that showcased healthcare data breaches. The Fifth Annual Benchmark Study on Privacy and Security of Healthcare Data calculates a 125 percent growth in healthcare cyber attacks over the past five years. Although employee negligence and lost or stolen devices still result in many data breaches, a shift is occurring from accidental loss to intentional targeting of data that reveals individuals’ names, Social Security numbers, and other personal information.

The reason that healthcare providers are being targeted is that the information they maintain to provide care for their patients is often substantial enough that cyber criminals can use the data from a single healthcare provider to engage in identity theft. Moreover, cyber criminals target healthcare data because they recognize that many healthcare facilities, including insurance companies, don’t have the resources or technologies to prevent or to detect attacks.

Anthem is a large corporate entity that can afford and use the technology required to protect HIPAA sensitive data, and yet the breach still occurred. What can other healthcare businesses do to prevent or detect a cyber attack on HIPAA sensitive data?

Meeting Standards, Avoiding Fines
The growing use of electronic health records and electronic protected health information (ePHI) accounts for the need to protect information contained in these records. But while these records are often well secured, an often overlooked vulnerability point is credit card processing. Payment Card Industry Data Security Standard (PCI DSS) and HIPAA rules require entities to maintain reasonable and appropriate safeguards for protecting credit card payments. What this actually translates into actionable steps, however, is less clear. To that end, here are four rules to follow when accepting credit card payments to ensure that you’re meeting HIPAA/PCI mandated or suggested compliance guidelines:

  1. Ensure Your Processor Doesn’t Send SMS Credit Card Receipts: Some credit card processors, like Square, send electronic receipts to your customers via text or SMS. Because these receipts contain “protected health information” they must only be transmitted over secure technologies, which SMS is not. Therefore, if you want to provide receipts, either make sure they are delivered via secured email, or are exclusively provided in paper form.
  2. Obtain a Business Associate Agreement With Your Processor: If your credit card processor only provides credit card processing, there is an exception in HIPAA that means you don’t need a typical Business Associate Agreement with your credit card processor. That exception, however, is very narrow and only applies to actual credit card processing. That means that if they are providing account analysis, reporting, or any of the ancillary services that processors offer like creating gift cards, etc. you likely need a Business Associate Agreement. That means you have two choices: either limit the services that your merchant account services provider gives you, or obtain a valid Business Associate Agreement with them.
  3. Any Physically Stored Card Numbers Must Be Secured: All businesses, not just healthcare entities, must comply with PCI DSS. Visa, MasterCard, Discover, American Express, and JCB mandate this compliance to protect the customer’s data against theft and fraud. One of the most basic requirements is that if you’re going to keep a written copy of a credit card authorization that lists the customer’s credit card number, that it always be secured under lock and key.
  4. Secure Your Swiping Hardware: Traditionally, credit card payments were swiped via a countertop terminal. Those come off the shelf very secure, so the only concern there is ensuring that the internet connection that terminal uses to communicate is PCI compliant. But if you’re using a new type of swiper like the Clover Station, that converts existing hardware like an iPad or your cellphone into a card accepting device, then that hardware must be made secure.

If your healthcare organization isn’t following the above guidelines, don’t feel alone. In fact, the Ponemon Institute study estimates that less than half of all healthcare organizations and their business associates fully comply with either PCI DSS or HIPAA. The fact that other healthcare providers aren’t fully compliant, however, shouldn’t discourage action on your part. Since 91 percent of healthcare operations and 59 percent of business associates experienced a data breach within the past five years, it’s not if, but when, it will happen to you and your patients.

Related

  • Dispelling the Myths about HIPAA Compliance
  • Decoding the New HIPAA Privacy and Security Rules
  • Managing Your Business Associate Agreements: Ongoing Reviews an Important Part of Compliance

4 Rules When Accepting Credit Card Payments to Ensure HIPAA Compliance (2024)

FAQs

What are the 3 important rules for HIPAA compliance? ›

The Health Insurance Portability and Accountability Act (HIPAA) lays out three rules for protecting patient health information, namely:
  • The Privacy Rule.
  • The Security Rule.
  • The Breach Notification Rule.

What are the HIPAA guidelines regarding billing? ›

HIPAA Rules for Medical Billing: Privacy Rule

HIPAA rules for medical billing states that you can only have access to a patient's medical history and conditions including treatment information. You are also allowed to view the fees the patients or their respective insurance companies paid for the treatment.

Does HIPAA apply to credit card transactions? ›

Typically, these terms state that their services should not be used for health record storage. Violating these terms can lead to non-compliance. Data security: Even though credit card payment services are not subject to HIPAA, maintain strong data security practices.

What is the HIPAA transaction rule? ›

HIPAA Transactions and Code Set Rule

The rule aims to improve the efficiency of healthcare transactions by establishing consistent formats for exchanging health information, such as claims, enrollment, eligibility inquiries, and remittance advice.

What are the four HIPAA rules? ›

The 4 most important parts of HIPAA are the Privacy Rule, the Security Rule, the Breach Notification Rule, and the HIPAA Omnibus Rule. The Privacy Rule protects the confidentiality of patient health information. It sets standards for how patient health information can be used and disclosed.

What are the 4 HIPAA safeguards? ›

The HIPAA Security Rule requires physicians to protect patients' electronically stored, protected health information (known as “ePHI”) by using appropriate administrative, physical and technical safeguards to ensure the confidentiality, integrity and security of this information.

Do payments need to be HIPAA compliant? ›

Ensuring the protection of patient information, particularly payment details, is not just a regulatory requirement under the HIPAA regulations but a cornerstone of trust between you and your clients.

What is the HIPAA privacy rule for payment activities? ›

The HIPAA Privacy Rule permits a health care provider to disclose protected health information about an individual, without the individual's authorization, to another health care provider for that provider's treatment or payment purposes, as well as to another covered entity for certain health care operations of that ...

What are the 5 code sets approved by HIPAA? ›

Code sets outlined in HIPAA regulations include:
  • ICD-10 – International Classification of Diseases, 10th edition.
  • HCPCS – Health Care Common Procedure Coding System.
  • CPT – Current Procedure Terminology.
  • CDT – Code on Dental Procedures and Nomenclature.
  • NDC – National Drug Codes.
Apr 3, 2024

Do billing records fall under HIPAA? ›

Thus, individuals have a right to a broad array of health information about themselves maintained by or for covered entities, including: medical records; billing and payment records; insurance information; clinical laboratory test results; medical images, such as X-rays; wellness and disease management program files; ...

Does HIPAA apply to private pay patients? ›

Who Is Not a Covered Entity? Providers that do not work with clearinghouses, accept only cash pay (private pay), provide superbills to patients, and do not submit or request information electronically from the patient's insurer are not subject to HIPAA regulations.

Is credit card information considered PHI? ›

PII also encompasses more than just health information. It includes information such as tax information, credit card numbers or Social Security numbers used in a context unrelated to healthcare operations and services.

What is the HIPAA Rule 3? ›

HIPAA Rule 3: The Breach Notification Rule

If a potential breach occurs, the organization must conduct a risk assessment to determine the scope and impact of the incident—and confirm whether it falls under the notification requirement.

What is the HIPAA compliance protocol? ›

How to Create a HIPAA Compliance Program
  • Implementing written policies, procedures, and standards of conduct. ...
  • Establishing a HIPAA compliance officer and compliance committee. ...
  • Performing effective training and education. ...
  • Developing open lines of communication. ...
  • Conducting internal monitoring and auditing.

What do HIPAA rules require? ›

The HIPAA Privacy Rule requires you to have policies that protect and limit how you use and disclose PHI, but you aren't expected to guarantee the privacy of PHI against all risks.

What is the standard 3 of HIPAA? ›

HIPAA Rule 3: The Breach Notification Rule

The HIPAA Breach Notification Rule requires covered entities and business associates to provide notification of a breach involving unsecured PHI. A breach is any impermissible use or disclosure of PHI under the Privacy and Security Rules.

What are the 3 phases of HIPAA compliance explain? ›

Limiting access, limiting disclosure, protecting Patient Health Information (PHI), and notifying the appropriate authorities and anyone impacted by a data breach were the three phases of HIPAA compliance process.

What are the three pillars of HIPAA? ›

Understanding HIPAA compliance involves grasping the three essential rules that form the foundation of these regulations: the Privacy Rule, the Security Rule and the Breach Notification Rule.

What are the three components of the HIPAA security Rule? ›

The Security Rule requires appropriate administrative, physical and technical safeguards to ensure the confidentiality, integrity, and security of electronic protected health information.

Top Articles
How to Sell Pi Coin? – Pi Coin Price & News in November 2023. | Forex Education
Buy Cryptocurrency with Credit or Debit Card Instantly | Currency.com
Where To Go After Howling Pit Code Vein
Skyward Sinton
Craglist Oc
Caroline Cps.powerschool.com
Hotels Near 500 W Sunshine St Springfield Mo 65807
Flights to Miami (MIA)
Mawal Gameroom Download
Evita Role Wsj Crossword Clue
Joe Gorga Zodiac Sign
Www.paystubportal.com/7-11 Login
Keurig Refillable Pods Walmart
Hope Swinimer Net Worth
About Us | TQL Careers
Mini Handy 2024: Die besten Mini Smartphones | Purdroid.de
2015 Honda Fit EX-L for sale - Seattle, WA - craigslist
Best Suv In 2010
Unlv Mid Semester Classes
24 Hour Drive Thru Car Wash Near Me
2020 Military Pay Charts – Officer & Enlisted Pay Scales (3.1% Raise)
Lehmann's Power Equipment
Royal Cuts Kentlands
Teacup Yorkie For Sale Up To $400 In South Carolina
Lisas Stamp Studio
Understanding Gestalt Principles: Definition and Examples
Drift Hunters - Play Unblocked Game Online
Barista Breast Expansion
Villano Antillano Desnuda
Ts Modesto
Does Royal Honey Work For Erectile Dysfunction - SCOBES-AR
Ff14 Sage Stat Priority
Shauna's Art Studio Laurel Mississippi
Magicseaweed Capitola
10 games with New Game Plus modes so good you simply have to play them twice
Labyrinth enchantment | PoE Wiki
„Wir sind gut positioniert“
Google Flights Orlando
Exploring the Digital Marketplace: A Guide to Craigslist Miami
Craigslist Minneapolis Com
Sound Of Freedom Showtimes Near Amc Mountainside 10
Rocket Lab hiring Integration & Test Engineer I/II in Long Beach, CA | LinkedIn
Sherwin Source Intranet
Iron Drop Cafe
300+ Unique Hair Salon Names 2024
Rocket Bot Royale Unblocked Games 66
Minecraft Enchantment Calculator - calculattor.com
The Missile Is Eepy Origin
Ff14 Palebloom Kudzu Cloth
211475039
The Love Life Of Kelsey Asbille: A Comprehensive Guide To Her Relationships
Latest Posts
Article information

Author: Sen. Emmett Berge

Last Updated:

Views: 6522

Rating: 5 / 5 (80 voted)

Reviews: 87% of readers found this page helpful

Author information

Name: Sen. Emmett Berge

Birthday: 1993-06-17

Address: 787 Elvis Divide, Port Brice, OH 24507-6802

Phone: +9779049645255

Job: Senior Healthcare Specialist

Hobby: Cycling, Model building, Kitesurfing, Origami, Lapidary, Dance, Basketball

Introduction: My name is Sen. Emmett Berge, I am a funny, vast, charming, courageous, enthusiastic, jolly, famous person who loves writing and wants to share my knowledge and understanding with you.