Allied Journal of Medical Research

All submissions of the EM system will be redirected to Online Manuscript Submission System. Authors are requested to submit articles directly to Online Manuscript Submission System of respective journal.
Reach Us +1 (202) 780-3397

Mini Review - Allied Journal of Medical Research (2022) Volume 6, Issue 2

A Brief note on protected health information.

Harish Nayak*

Department of Nursing, University of Ruhuna, Matara, Sri Lanka

*Corresponding Author:
Harish Nayak
Department of Nursing
University of Ruhuna
Matara, Sri Lanka

Received: 26-Jan-2022, Manuscript No. AAAJMR-22-109; Editor assigned: 28-Jan-2022, PreQC No. AAAJMR-22-109(PQ); Reviewed: 11-Feb-2022, QC No AAAJMR-22-109; Revised: 16-Feb-2022, Manuscript No. AAAJMR-22-109(R); Published: 23-Feb-2022, DOI:10.35841/aaajmr-6.2.109

Citation: Nayak H. A Brief note on protected health information. Allied J Med Res. 2022; 6(2):109

Visit for more related articles at Allied Journal of Medical Research


As per the Health Insurance Portability and Accountability Act (HIPAA), safeguarded wellbeing data (PHI) is any wellbeing data that can recognize a person that is in control of or sent by a "covered substance" or its business relates that connects with a patient's past, present, or future wellbeing. This information incorporates segment data. It likewise incorporates, yet isn't restricted, to electronic and paper transmission. The expression "covered element" eludes, however isn't restricted to, medical care suppliers, insurance agency, and clinics. PHI incorporates segment identifiers, in clinical records, similar to names, telephone numbers, messages, and biometric data like fingerprints, voiceprints, hereditary data, and facial pictures [1].

It is basic that safeguarded wellbeing data stays classified in light of the fact that revealing it to unapproved beneficiaries, regardless of whether deliberately or unintentionally, can have pernicious ramifications for patients. For example, in remedial offices, the inappropriate revelation of safeguarded wellbeing data might conceivably bring about detainees attacking different prisoners with ailments that convey a critical social shame. Indeed, even upon their delivery, these people can confront unfair treatment by the overall people that hampers their reintegration into public life [2]. While sending PHI for the most part requires the patient's unequivocal assent, there are special cases where it is communicable without assent. For instance, in a remedial office setting, PHI can be uncovered without assent for installment purposes, legal procedures. Assuming there is a not kidding danger to an individual's wellbeing or prosperity that must be turned away through exposure. Different conditions when safeguarded wellbeing data is communicable without assent incorporate general wellbeing purposes, similar to infectious prevention, kid misuse, and logical exploration.

Clinical significance

Safeguarded wellbeing data is clinically significant on the grounds that the conditions encompassing its revelation shape the associations among patients and medical services suppliers. For example, when a patient turns out to be a big name, medical care suppliers should adjust the patient's protection needs with the general population's "right" to know [3]. The inexorably far reaching utilization of new clinical innovation further muddles cooperation's among patients and medical services suppliers concerning PHI. For example, regardless of the ascent of 3D imprinting in clinical consideration, there are no legitimate arrangements in HIPAA connecting with the potential protection ramifications of 3D printing. There are additionally no HIPAA guidelines that enough cover the transmission of Protected Health Information through instant message [4].

There are numerous ways that medical care suppliers can avoid potential risk to guarantee that safeguarded wellbeing data remains appropriately secured, to improve patient consideration, and protect patient wellbeing, especially concerning electronic capacity and transmission of PHI. A few standard strategies incorporate information covering, encryption, and identification. Encryption is what might be compared to securing information a vault and forestalling anybody without the important computerized key or declaration from getting to it. Information covering is the supplanting of delicate information values with adjusted values that regardless protect the utility of the informational index as a kind of perspective source. Encryption is more valuable while endeavoring to safeguard information during transmission, while information covering is most helpful while imparting information to an outside association. Identification is the orderly evacuation of eighteen bits of recognizing data, going from names and phone numbers to biometric identifiers like finger and voice prints. Web correspondences can be gotten through conventions like Secure Socket Layer (SSL) and Transport Layer Security (TLS). Wi-Fi areas of interest can be gotten utilizing virtual private organizations (VPN) to safeguard information. Keeping up with sufficient protections against the unapproved spread of PHI is of vital significance, considering that the outcomes of neglecting to do as such go from monetary punishments to detainment.


  1. Burkle CM, Cascino GD Medicine and the media: balancing the public's right to know with the privacy of the patient. Mayo Clin Proc. 2011;86(12):1192-6.
  2. Indexed at, Google Scholar, Cross Ref

  3. Goldstein MM, Pewen WF The HIPAA Omnibus Rule: implications for public health policy and practice. Public Health Rep. 2013;128(6):554-8.
  4. Indexed at, Google Scholar, Cross Ref

  5. Bowman MA, Maxwell RA. A beginner's guide to avoiding Protected Health Information (PHI) issues in clinical research - With how-to's in REDCap Data Management Software. J Biomed Inform. 2018;85:49-55.
  6. Indexed at, Google Scholar, Cross Ref

  7. Goldstein MM. Health information privacy and health information technology in the US correctional setting. Am J Public Health. 2014;104(5):803-9.
  8. Indexed at, Google Scholar, Cross Ref

Get the App