{"id":2500,"date":"2011-12-12T10:24:49","date_gmt":"2011-12-12T15:24:49","guid":{"rendered":"http:\/\/www.healthit.gov\/buzz-blog\/?p=2500"},"modified":"2025-07-16T16:12:23","modified_gmt":"2025-07-16T16:12:23","slug":"privacy-security-electronic-health-records","status":"publish","type":"post","link":"https:\/\/healthit.gov\/blog\/privacy-and-security\/privacy-security-electronic-health-records\/","title":{"rendered":"Privacy, Security, and Electronic Health Records"},"content":{"rendered":"\n<p>Health care is changing and so are the tools used to coordinate better care for patients like you and me. During your most recent visit to the doctor, you may have noticed your physician entering notes on a computer or laptop into an electronic health record (EHR). With EHRs comes the opportunity for patients to receive improved coordinated care from providers and easier access to their health information. It\u2019s a way to make it easier for everyone to be better informed and more involved in the patient\u2019s health care. However for many of us, EHRs also come with questions and concerns about the privacy and security of our health information. Who can access the information on my EHR? How can I see the information in my record and make sure it\u2019s correct? How is it protected from loss, theft and hacking? What should I do if I think my information has been compromised?<\/p>\n\n\n\n<p>Many of you have heard of HIPAA&#8211; the Health Insurance Portability and Accountability Act. The HHS Office for Civil Rights (OCR) enforces the HIPAA Privacy and Security Rules, which help keep <a href=\"http:\/\/www.hhs.gov\/ocr\/privacy\/hipaa\/understanding\/coveredentities\/index.html\">entities covered under HIPAA<\/a> accountable for the privacy and security of patients\u2019 health information. As a former health care lawyer, I know that many health care providers understand and abide by their obligations under the Privacy and Security Rules. Although EHRs allow providers to use information more effectively to improve the quality and efficiency of your care, they do not change the obligations providers have to keep your protected health information private and secure.<\/p>\n\n\n\n<p>Following my recent appointment as OCR\u2019s Director, I had a number of conversations that made it apparent to me that many patients recognize some of the health privacy jargon such as \u201cHIPAA\u201d or \u201cthe Notice of Privacy Practices,\u201d but often do not know their rights under the HIPAA Privacy and Security Rules &nbsp;&#8212; especially in terms of how these rules relate to EHRs.<\/p>\n\n\n\n<p>The HIPAA Privacy Rule gives you rights over your own health information, regardless of its form. Whether your record is in paper or electronic form, under the Privacy Rule you have the right:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>To see or get a copy of your medical record;<\/li>\n\n\n\n<li>To request to have any mistakes corrected;<\/li>\n\n\n\n<li>To get a notice about how your health information is used and shared;<\/li>\n\n\n\n<li>To say how and where you want to be contacted by your health care provider; and<\/li>\n\n\n\n<li>To file a complaint if you think any of these rights have been violated. One way to do this is through OCR\u2019s website: <a href=\"http:\/\/www.hhs.gov\/ocr\">www.hhs.gov\/ocr<\/a>.<\/li>\n<\/ul>\n\n\n\n<p>These rights are spelled out in the Notice of Privacy Practices that is given to you at your doctor\u2019s office or hospital. Your health plan may also send this notice to you in the mail.<\/p>\n\n\n\n<p>Specific to protecting the information stored in EHRs, the HIPAA Security Rule requires that health care providers set up physical, administrative, and technical safeguards to protect your electronic health information. Some safety measures that may be built in to EHR systems include:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>\u201cAccess controls\u201d like passwords and PIN numbers, to help limit access to your information;<\/li>\n\n\n\n<li>\u201cEncrypting\u201d your stored information. This means your health information cannot be read or understood except by someone who can \u201cdecrypt\u201d it, using a special \u201ckey\u201d made available only to authorized individuals;<\/li>\n\n\n\n<li>An \u201caudit trail,\u201d which records who accessed your information, what changes were made and when.<\/li>\n<\/ul>\n\n\n\n<p>In certain circumstances, if your data is seen by someone who should not see it, federal law requires doctors, hospitals, and other health care providers to notify you of a \u201cbreach\u201d of your health information.&nbsp; This requirement helps patients know if something has gone wrong with the protection of their information and helps keep providers accountable.<\/p>\n\n\n\n<p>OCR works to help make sure your health information is kept private and secure by your health professionals.&nbsp; We are here to help you understand these rights, how you can take action if your rights are violated and how your health information is required to be safeguarded under the law. The first step is to know your rights. OCR\u2019s website has a wealth of information about your health information privacy rights and I encourage you to visit and explore our website: <a href=\"http:\/\/www.hhs.gov\/ocr\/privacy\/\">www.hhs.gov\/ocr\/privacy<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Health care is changing and so are the tools used to coordinate better care for [&hellip;]<\/p>\n","protected":false},"author":619,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_selected_menu":"","_show_breadcrumbs":"true","_blog_show_featured_image":false,"footnotes":""},"categories":[45],"archived-category":[],"featured":[],"topics":[438,425,436,437,435],"class_list":["post-2500","post","type-post","status-publish","format-standard","hentry","category-privacy-and-security","topics-hipaa-compliance","topics-hit-policy","topics-privacy","topics-security","topics-security-privacy"],"acf":{"blog_authors":[{"blog_author_profiles":"198485"}],"hp_news_hide":false},"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v24.3 (Yoast SEO v24.8.1) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Privacy, Security, and Electronic Health Records - ONC Blog<\/title>\n<meta name=\"description\" content=\"How do HIPAA Privacy and Security Rules apply to Health IT and EHRs? Learn how OCR works to ensure your health information is kept private and secure.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/healthit.gov\/blog\/privacy-and-security\/privacy-security-electronic-health-records\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Privacy, Security, and Electronic Health Records\" \/>\n<meta property=\"og:description\" content=\"How do HIPAA Privacy and Security Rules apply to Health IT and EHRs? Learn how OCR works to ensure your health information is kept private and secure.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/healthit.gov\/blog\/privacy-and-security\/privacy-security-electronic-health-records\/\" \/>\n<meta property=\"og:site_name\" content=\"ONC Blog\" \/>\n<meta property=\"article:published_time\" content=\"2011-12-12T15:24:49+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-07-16T16:12:23+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/healthit.gov\/blog\/wp-content\/uploads\/sites\/4\/2025\/08\/ONC.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"628\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"sleigh\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"sleigh\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/healthit.gov\/blog\/privacy-and-security\/privacy-security-electronic-health-records\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/healthit.gov\/blog\/privacy-and-security\/privacy-security-electronic-health-records\/\"},\"author\":{\"name\":\"sleigh\",\"@id\":\"https:\/\/healthit.gov\/blog\/#\/schema\/person\/0719592fcc77f0e269f191216da0aae7\"},\"headline\":\"Privacy, Security, and Electronic Health Records\",\"datePublished\":\"2011-12-12T15:24:49+00:00\",\"dateModified\":\"2025-07-16T16:12:23+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/healthit.gov\/blog\/privacy-and-security\/privacy-security-electronic-health-records\/\"},\"wordCount\":722,\"commentCount\":2,\"publisher\":{\"@id\":\"https:\/\/healthit.gov\/blog\/#organization\"},\"articleSection\":[\"Privacy &amp; Security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/healthit.gov\/blog\/privacy-and-security\/privacy-security-electronic-health-records\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/healthit.gov\/blog\/privacy-and-security\/privacy-security-electronic-health-records\/\",\"url\":\"https:\/\/healthit.gov\/blog\/privacy-and-security\/privacy-security-electronic-health-records\/\",\"name\":\"Privacy, Security, and Electronic Health Records - ONC Blog\",\"isPartOf\":{\"@id\":\"https:\/\/healthit.gov\/blog\/#website\"},\"datePublished\":\"2011-12-12T15:24:49+00:00\",\"dateModified\":\"2025-07-16T16:12:23+00:00\",\"description\":\"How do HIPAA Privacy and Security Rules apply to Health IT and EHRs? Learn how OCR works to ensure your health information is kept private and secure.\",\"breadcrumb\":{\"@id\":\"https:\/\/healthit.gov\/blog\/privacy-and-security\/privacy-security-electronic-health-records\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/healthit.gov\/blog\/privacy-and-security\/privacy-security-electronic-health-records\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/healthit.gov\/blog\/privacy-and-security\/privacy-security-electronic-health-records\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/healthit.gov\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Privacy, Security, and Electronic Health Records\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/healthit.gov\/blog\/#website\",\"url\":\"https:\/\/healthit.gov\/blog\/\",\"name\":\"ONC - Office of the National Coordinator for Health IT\",\"description\":\"Better health enabled by data\",\"publisher\":{\"@id\":\"https:\/\/healthit.gov\/blog\/#organization\"},\"alternateName\":\"ONC\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/healthit.gov\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/healthit.gov\/blog\/#organization\",\"name\":\"ONC - Office of the National Coordinator for Health IT\",\"alternateName\":\"ONC\",\"url\":\"https:\/\/healthit.gov\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/healthit.gov\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/healthit.gov\/blog\/wp-content\/uploads\/sites\/4\/2025\/08\/Logo-ONC-Transparent.png\",\"contentUrl\":\"https:\/\/healthit.gov\/blog\/wp-content\/uploads\/sites\/4\/2025\/08\/Logo-ONC-Transparent.png\",\"width\":800,\"height\":176,\"caption\":\"ONC - Office of the National Coordinator for Health IT\"},\"image\":{\"@id\":\"https:\/\/healthit.gov\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/healthit.gov\/blog\/#\/schema\/person\/0719592fcc77f0e269f191216da0aae7\",\"name\":\"sleigh\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/healthit.gov\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/afb1f0138c0c71ff7a91448bb10269ef95df9b5a5cceb7a5aabd43dd26e1a978?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/afb1f0138c0c71ff7a91448bb10269ef95df9b5a5cceb7a5aabd43dd26e1a978?s=96&d=mm&r=g\",\"caption\":\"sleigh\"},\"url\":\"https:\/\/healthit.gov\/blog\/author\/sleigh\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Privacy, Security, and Electronic Health Records - ONC Blog","description":"How do HIPAA Privacy and Security Rules apply to Health IT and EHRs? Learn how OCR works to ensure your health information is kept private and secure.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/healthit.gov\/blog\/privacy-and-security\/privacy-security-electronic-health-records\/","og_locale":"en_US","og_type":"article","og_title":"Privacy, Security, and Electronic Health Records","og_description":"How do HIPAA Privacy and Security Rules apply to Health IT and EHRs? Learn how OCR works to ensure your health information is kept private and secure.","og_url":"https:\/\/healthit.gov\/blog\/privacy-and-security\/privacy-security-electronic-health-records\/","og_site_name":"ONC Blog","article_published_time":"2011-12-12T15:24:49+00:00","article_modified_time":"2025-07-16T16:12:23+00:00","og_image":[{"width":1200,"height":628,"url":"https:\/\/healthit.gov\/blog\/wp-content\/uploads\/sites\/4\/2025\/08\/ONC.jpg","type":"image\/jpeg"}],"author":"sleigh","twitter_card":"summary_large_image","twitter_misc":{"Written by":"sleigh","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/healthit.gov\/blog\/privacy-and-security\/privacy-security-electronic-health-records\/#article","isPartOf":{"@id":"https:\/\/healthit.gov\/blog\/privacy-and-security\/privacy-security-electronic-health-records\/"},"author":{"name":"sleigh","@id":"https:\/\/healthit.gov\/blog\/#\/schema\/person\/0719592fcc77f0e269f191216da0aae7"},"headline":"Privacy, Security, and Electronic Health Records","datePublished":"2011-12-12T15:24:49+00:00","dateModified":"2025-07-16T16:12:23+00:00","mainEntityOfPage":{"@id":"https:\/\/healthit.gov\/blog\/privacy-and-security\/privacy-security-electronic-health-records\/"},"wordCount":722,"commentCount":2,"publisher":{"@id":"https:\/\/healthit.gov\/blog\/#organization"},"articleSection":["Privacy &amp; Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/healthit.gov\/blog\/privacy-and-security\/privacy-security-electronic-health-records\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/healthit.gov\/blog\/privacy-and-security\/privacy-security-electronic-health-records\/","url":"https:\/\/healthit.gov\/blog\/privacy-and-security\/privacy-security-electronic-health-records\/","name":"Privacy, Security, and Electronic Health Records - ONC Blog","isPartOf":{"@id":"https:\/\/healthit.gov\/blog\/#website"},"datePublished":"2011-12-12T15:24:49+00:00","dateModified":"2025-07-16T16:12:23+00:00","description":"How do HIPAA Privacy and Security Rules apply to Health IT and EHRs? Learn how OCR works to ensure your health information is kept private and secure.","breadcrumb":{"@id":"https:\/\/healthit.gov\/blog\/privacy-and-security\/privacy-security-electronic-health-records\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/healthit.gov\/blog\/privacy-and-security\/privacy-security-electronic-health-records\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/healthit.gov\/blog\/privacy-and-security\/privacy-security-electronic-health-records\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/healthit.gov\/blog\/"},{"@type":"ListItem","position":2,"name":"Privacy, Security, and Electronic Health Records"}]},{"@type":"WebSite","@id":"https:\/\/healthit.gov\/blog\/#website","url":"https:\/\/healthit.gov\/blog\/","name":"ONC - Office of the National Coordinator for Health IT","description":"Better health enabled by data","publisher":{"@id":"https:\/\/healthit.gov\/blog\/#organization"},"alternateName":"ONC","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/healthit.gov\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/healthit.gov\/blog\/#organization","name":"ONC - Office of the National Coordinator for Health IT","alternateName":"ONC","url":"https:\/\/healthit.gov\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/healthit.gov\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/healthit.gov\/blog\/wp-content\/uploads\/sites\/4\/2025\/08\/Logo-ONC-Transparent.png","contentUrl":"https:\/\/healthit.gov\/blog\/wp-content\/uploads\/sites\/4\/2025\/08\/Logo-ONC-Transparent.png","width":800,"height":176,"caption":"ONC - Office of the National Coordinator for Health IT"},"image":{"@id":"https:\/\/healthit.gov\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/healthit.gov\/blog\/#\/schema\/person\/0719592fcc77f0e269f191216da0aae7","name":"sleigh","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/healthit.gov\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/afb1f0138c0c71ff7a91448bb10269ef95df9b5a5cceb7a5aabd43dd26e1a978?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/afb1f0138c0c71ff7a91448bb10269ef95df9b5a5cceb7a5aabd43dd26e1a978?s=96&d=mm&r=g","caption":"sleigh"},"url":"https:\/\/healthit.gov\/blog\/author\/sleigh\/"}]}},"parsely":{"version":"1.1.0","canonical_url":"https:\/\/healthit.gov\/blog\/privacy-and-security\/privacy-security-electronic-health-records\/","smart_links":{"inbound":0,"outbound":0},"traffic_boost_suggestions_count":0,"meta":{"@context":"https:\/\/schema.org","@type":"NewsArticle","headline":"Privacy, Security, and Electronic Health Records","url":"http:\/\/healthit.gov\/blog\/privacy-and-security\/privacy-security-electronic-health-records\/","mainEntityOfPage":{"@type":"WebPage","@id":"http:\/\/healthit.gov\/blog\/privacy-and-security\/privacy-security-electronic-health-records\/"},"thumbnailUrl":"","image":{"@type":"ImageObject","url":""},"articleSection":"Privacy &amp; Security","author":[{"@type":"Person","name":"sleigh"}],"creator":["sleigh"],"publisher":{"@type":"Organization","name":"ONC Blog","logo":""},"keywords":[],"dateCreated":"2011-12-12T15:24:49Z","datePublished":"2011-12-12T15:24:49Z","dateModified":"2025-07-16T16:12:23Z"},"rendered":"<script type=\"application\/ld+json\" class=\"wp-parsely-metadata\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@type\":\"NewsArticle\",\"headline\":\"Privacy, Security, and Electronic Health Records\",\"url\":\"http:\\\/\\\/healthit.gov\\\/blog\\\/privacy-and-security\\\/privacy-security-electronic-health-records\\\/\",\"mainEntityOfPage\":{\"@type\":\"WebPage\",\"@id\":\"http:\\\/\\\/healthit.gov\\\/blog\\\/privacy-and-security\\\/privacy-security-electronic-health-records\\\/\"},\"thumbnailUrl\":\"\",\"image\":{\"@type\":\"ImageObject\",\"url\":\"\"},\"articleSection\":\"Privacy &amp; Security\",\"author\":[{\"@type\":\"Person\",\"name\":\"sleigh\"}],\"creator\":[\"sleigh\"],\"publisher\":{\"@type\":\"Organization\",\"name\":\"ONC Blog\",\"logo\":\"\"},\"keywords\":[],\"dateCreated\":\"2011-12-12T15:24:49Z\",\"datePublished\":\"2011-12-12T15:24:49Z\",\"dateModified\":\"2025-07-16T16:12:23Z\"}<\/script>","tracker_url":"https:\/\/cdn.parsely.com\/keys\/healthit.gov\/p.js"},"_links":{"self":[{"href":"https:\/\/healthit.gov\/blog\/wp-json\/wp\/v2\/posts\/2500","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/healthit.gov\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/healthit.gov\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/healthit.gov\/blog\/wp-json\/wp\/v2\/users\/619"}],"replies":[{"embeddable":true,"href":"https:\/\/healthit.gov\/blog\/wp-json\/wp\/v2\/comments?post=2500"}],"version-history":[{"count":8,"href":"https:\/\/healthit.gov\/blog\/wp-json\/wp\/v2\/posts\/2500\/revisions"}],"predecessor-version":[{"id":177531,"href":"https:\/\/healthit.gov\/blog\/wp-json\/wp\/v2\/posts\/2500\/revisions\/177531"}],"wp:attachment":[{"href":"https:\/\/healthit.gov\/blog\/wp-json\/wp\/v2\/media?parent=2500"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/healthit.gov\/blog\/wp-json\/wp\/v2\/categories?post=2500"},{"taxonomy":"archived-category","embeddable":true,"href":"https:\/\/healthit.gov\/blog\/wp-json\/wp\/v2\/archived-category?post=2500"},{"taxonomy":"featured","embeddable":true,"href":"https:\/\/healthit.gov\/blog\/wp-json\/wp\/v2\/featured?post=2500"},{"taxonomy":"topics","embeddable":true,"href":"https:\/\/healthit.gov\/blog\/wp-json\/wp\/v2\/topics?post=2500"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}