
How would allowing patients to inspect PHI in person impact the workflow of healthcare providers?
TLDR
Healthcare providers face significant workflow transformations with new patient PHI inspection rules. Key changes include creating private inspection spaces, implementing robust staff supervision, developing photography protocols, and investing in technological solutions to balance patient access with privacy protection. We cover what is PHI’s access update under the new 2025 HIPAA update & how it will potentially change existing workflows for healthcare professionals.
Jump directly to the section on how the 2025 HIPAA update will impact PHI access workflows for healthcare professionals.
Table Of Contents
- Understanding the HIPAA Evolution: A Journey of Patient Rights and Privacy
- What is PHI & ePHI?
- Understanding the HIPAA Evolution: A Journey of Patient Rights and Privacy
- What are Covered Entities in Healthcare?
- What is PHI - The 18 Identifiers
- Workflow Impact to PHI Sharing
- Workflow Scenarios / Examples
- What measures can healthcare providers take to ensure patients are not taking unauthorized photographs of PHI?
- How can healthcare providers educate patients about the HIPAA photography rules?
- Final thoughts
- References
Understanding the HIPAA Evolution: A Journey of Patient Rights and Privacy
The HIPAA Chronicle: Protecting Health Information in a Digital Age
Health Insurance Portability and Accountability Act (HIPAA) has been a sentinel of patient privacy since its inception in 1996. Like an architectural blueprint constantly refined, HIPAA has evolved to address emerging technological landscapes and patient rights.
Key milestones include:
- 1996: Original HIPAA legislation establishing privacy frameworks
- 2003: Privacy Rule standardizing protected health information (PHI) protection
- 2009: HITECH Act expanding digital health record protections
- 2013: Omnibus Rule strengthening patient control over medical information
- 2025: Current update that now covers in-person PHI inspection protocols in addition to 14 other changes in the new 2025 HIPAA update
Why HIPAA Matters: A Delicate Dance of Access and Protection
For Healthcare Providers:
- Legal compliance prevents substantial financial penalties
- Builds patient trust through transparent information practices
- Mitigates potential legal risks associated with data breaches
For Patients:
- Guarantees controlled access to personal health narratives
- Empowers individuals in managing their healthcare journey
- Provides mechanisms to correct potential medical record inaccuracies
What is PHI?
PHI or Protected Health Information is also referred to as HIPAA protected data. Any information within an individual’s medical record that can personally identify them and was generated, utilized, or shared during diagnosis or treatment is covered under PHI. This definition extends to various identifiers and diverse information documented throughout routine care and billing processes.
What is ePHI?
Electronic protected health information (ePHI) is any PHI that is created, stored, transmitted, or received electronically. The HIPAA Security Rule has specific guidelines in place that dictate the means involved in assessing ePHI.
What is PHI’s relation to HIPAA & how is it impacted under the 2025 HIPAA update?
The HIPAA Privacy Rule provides federal protections for PHI that’s held by Covered Entities (CEs) (explained below). It gives patients rights over that information, as well as guidance for healthcare organizations regarding how to protect the PHI (Protected Healthcare Information). PHI can be shared as a result of patient care under the HIPAA Privacy rule. However, it has strict guidelines to its access, storage & how it is processed. The new HIPAA update now aims to provide ease of access to patients seeking their PHI. For example, taking photos of their PHI to share with their nutritionist.
There are specific measures within the rule that require administrative, physical, and technical safeguards to ensure the confidentiality, integrity, and security of PHI is being properly maintained. And with this new HIPAA update, healthcare professionals will need to update their current workflows, processes & policies to cater to these changes.
What are Covered Entities in Healthcare?
Covered entities are defined in the HIPAA rules as
- health plans,
- health care clearinghouses, and
- health care providers
who electronically transmit any health information in relation to transactions for which HHS has adopted standards. These transactions generally cover billing and payment for services or insurance coverage.
The HHS standards can be found in Subparts I to S of the HIPAA Administrative Data Standards. In the context of what is considered PHI under HIPAA for qualifying healthcare providers:
- “A broken leg” is health information.
- “Mr. Jones has a broken leg” is individually identifiable health information.
- If a covered entity records “Mr. Jones has a broken leg” the identifier (“Mr. Jones”) and the health information (“broken leg”) is protected.
Health Plan – With certain exceptions, an individual or group plan that provides or pays the cost of medical care (as defined in section 2791(a)(2) of the PHS Act, 42 U.S.C. 300gg-91(a)(2)). The law specifically includes many types of organizations and government programs as health plans.
Health Care Clearinghouse – A public or private entity, including a billing service, re-pricing company, community health management information system or community health information system, and “value-added” networks and switches that either process or facilitate the processing of health information received from another entity in a nonstandard format or containing nonstandard data content into standard data elements or a standard transaction, or receive a standard transaction from another entity and process or facilitate the processing of health information into a nonstandard format or nonstandard data content for the receiving entity.
Health Care Provider – A provider of services (as defined in section 1861(u) of the Act, 42 U.S.C. 1395x(u)), a provider of medical or health services (as defined in section 1861(s) of the Act, 42 U.S.C. 1395x(s)), and any other person or organization who furnishes, bills, or is paid for health care in the normal course of business.
Health Care – Care, services, or supplies related to the health of an individual, including
- Preventive, diagnostic, therapeutic, rehabilitative, maintenance, or palliative care, and counseling, service, assessment, or procedure with respect to the physical or mental condition, or functional status, of an individual that affects the structure or function of the body; and
- Sale or dispensing of a drug, device, equipment, or other item in accordance with a prescription.
Do note that the HIPAA Privacy Rule applies only to covered entities; it does not apply to all persons or institutions that collect individually identifiable health information. It may, however, affect other types of entities that are not directly regulated by the rule if they, for instance, rely on covered entities to provide PHI.
Researchers are also considered covered entities. That is if they are also health care providers who electronically transmit health information in connection with any transaction for which HHS has adopted a standard. For example, physicians who conduct clinical studies or administer experimental therapeutics to participants during the course of a study must comply with the Privacy Rule if they meet the HIPAA definition of a covered entity.
Business Associate
A business associate is defined as any individual or organization that performs or assists with tasks involving the use or disclosure of identifiable health information, such as data analysis, claims processing, utilization review, or quality assurance. They may also provide legal, accounting, consulting, financial, or administrative services that require access to PHI. However, members of a covered entity’s workforce are not considered business associates. Additionally, one covered entity may act as a business associate for another covered entity.
The Privacy Rule also safeguards individually identifiable health information when managed or created by a business associate—an individual or organization performing certain tasks for a covered entity. A business associate is someone who is not part of the covered entity’s workforce but assists in activities regulated by the HIPAA Administrative Simplification Rules, including the Privacy Rule. These activities may involve the use or disclosure of identifiable health information or providing services that require such disclosures.
Since HIPAA Administrative Simplification Rules do not directly govern research activities, researchers or research sponsors are not required to become business associates for research purposes. However, covered entities may enlist business associates to de-identify PHI, prepare limited data sets, or conduct data aggregation.
To ensure data protection, the Privacy Rule mandates that covered entities enter into written agreements (or other approved arrangements for government entities) with their business associates. This agreement must confirm that the business associate will adequately safeguard the PHI. Except for limited exceptions, these agreements must restrict business associates from using or disclosing PHI in ways that would violate the Privacy Rule if carried out by the covered entity itself.
What is PHI - The 18 Identifiers
Below, we’ve listed the 18 identifiers of HIPAA protected health information (PHI), which qualify as PHI meaning according to guidance from the Department of Health and Human Services (HHS) Office for Civil Rights (OCR).
Examples of PHI
- Name
- Address (including subdivisions smaller than state such as street address, city, county, or zip code)
- Any dates (except years) that are directly related to an individual, including birthday, date of admission or discharge, date of death, or the exact age of individuals older than 89
- Telephone number
- Fax number
- Email address
- Social Security number
- Medical record number
- Health plan beneficiary number
- Account number
- Certificate/license number
- Vehicle identifiers, serial numbers, or license plate numbers
- Device identifiers or serial numbers
- Web URLs
- IP address
- Biometric identifiers such as fingerprints or voice prints
- Full-face photos
- Any other unique identifying numbers, characteristics, or codes
Workflow Impact to PHI sharing under the 2025 HIPAA Update
Now that we have covered the basics, let’s talk about what is PHI’s impact to the healthcare providers under the new 2025 HIPAA update. Simply put, the proposed update recommends allowing patients to inspect PHI in person and take notes or photographs of their PHI. So the question you are likely to ask is – How would allowing patients to inspect PHI in person impact the workflow of healthcare providers?
As per the update, patients are allowed to inspect PHI in person and take notes/photos. To explain it better, consider this scenario / use case – a diabetic patient takes photos of their glucose trends during an in-person chart review to share with a nutritionist.
Allowing patients to inspect PHI in person would have several significant impacts on the workflow of healthcare providers:
- Designated private spaces: Healthcare providers will need to create designated areas where patients can privately inspect their PHI. This may require reconfiguring existing spaces or allocating new areas specifically for this purpose.
- Staff supervision: Providers will need to assign staff to supervise these inspections, ensuring patients only access their own information and do not compromise the privacy of other patients’ records.
- Photography protocols: Healthcare providers must implement safeguards to ensure patients are only photographing their own PHI and not inadvertently capturing unauthorized information. This may involve developing new policies and procedures for staff to follow.
- Identity verification: While HIPAA prohibits imposing unreasonable identity verification requirements, providers will still need to establish efficient processes to verify patient identities before granting access to PHI.
- Record preparation: Staff may need to spend time preparing and organizing records for patient inspection, potentially requiring coordination between different departments if records are stored in separate systems (e.g., medical and billing records).
- Training requirements: Healthcare providers will need to train their staff on new procedures, including how to handle patient requests, supervise inspections, and manage photography of records.
- Potential bottlenecks: With the reduced timeframe for providing access (from 30 to 15 days), providers may need to prioritize urgent requests and implement more efficient processes to avoid delays.
- Technology & Cybersecurity considerations: Healthcare organizations may need to invest in technology that allows for secure, real-time access to electronic health records in designated inspection areas.
These changes will require healthcare providers to carefully balance patient rights with privacy protection, potentially leading to increased administrative workload and the need for new resource allocation.
Workflow Transformation: The Eight Pillars of PHI Inspection
- Designing Private Sanctuaries of Information
Imagine transforming a corner of your medical facility into a dedicated PHI inspection zone—part technology hub, part patient empowerment center. These spaces must balance technological access with privacy considerations.
- The Guardians of Information: Staff Supervision
Healthcare staff become information choreographers, ensuring patients access only their personal data while protecting the confidentiality of others—a nuanced ballet of access and restriction.
- Photography Protocols: Capturing Without Compromising
Implementing smart protocols that allow patients to document their records without risking unauthorized information leakage requires sophisticated technological and procedural safeguards.
- Identity Verification: The Delicate Authentication Dance
Establishing efficient yet non-invasive identity verification processes ensures that PHI remains a personal, protected narrative accessible only to its rightful owner.
- Record Preparation: The Behind-the-Scenes Symphony
Coordinating across departments to organize records demands intricate communication and potentially significant technological infrastructure investments.
- Training: Transforming Staff into PHI Ambassadors
Beyond traditional compliance training, staff must become educated facilitators of patient information access, balancing technical knowledge with empathetic communication.
- Navigating Time Constraints
With inspection timeframes condensed from 30 to 15 days, healthcare providers must develop agile, efficient processes that prioritize urgent requests without compromising thoroughness.
- Technological Integration
Investing in secure, real-time electronic health record access technologies becomes not just an option but a strategic imperative.
Real-World Workflow Scenarios / Examples
Scenario 1: The Small Clinic Transformation
Dr. Martinez’s three-person practice must:
- Convert a consultation room into a dedicated PHI inspection area
- Train reception staff on new verification protocols
- Implement digital record access solutions
Scenario 2: Mid-Size Hospital Adaptation
Community General Hospital faces:
- Redesigning multiple department workflows
- Creating centralized PHI inspection centers
- Developing comprehensive staff training programs
Potential Risks: The Cost of Non-Compliance
Financial Penalties:
- Tier 1 violations: $100-$50,000 per violation
- Severe breaches: Up to $1.5 million annually per violation category
Reputational Consequences:
- Loss of patient trust
- Potential legal challenges
- Negative media exposure
What measures can healthcare providers take to ensure patients are not taking unauthorized photographs of PHI?
Healthcare providers can implement several measures to ensure patients are not taking unauthorized photographs of PHI:
Designated inspection areas: Create specific spaces for patients to view their PHI, away from other patients’ information1.
Staff supervision: Assign personnel to monitor patients during PHI inspections, ensuring they only access and photograph their own information1.
Clear policies: Develop and communicate strict guidelines on photography within healthcare facilities, including consequences for violations13.
Signage and reminders: Post visible signs throughout the facility reminding patients and visitors about photography restrictions1.
Technology controls: Implement physical and technical safeguards to prevent unauthorized access to PHI, such as privacy screens on monitors and secure document storage34.
Training for staff: Educate healthcare workers on how to identify and prevent unauthorized photography, as well as how to respond to such incidents14.
Consent forms: Require patients to sign agreements acknowledging photography rules before allowing PHI access5.
Limited device usage: Restrict the use of personal devices in areas where PHI is visible or accessible1.
Secure electronic access: Provide patients with controlled electronic access to their records, reducing the need for physical document viewing7.
Regular audits: Conduct periodic assessments of PHI access and security measures to identify and address potential vulnerabilities36.
By implementing these measures, healthcare providers can significantly reduce the risk of unauthorized PHI photography while still allowing patients to exercise their right to inspect their health information14.
How can healthcare providers educate patients about the HIPAA photography rules?
Healthcare providers can educate patients about HIPAA photography rules through several effective methods:
Clear signage and reminders: Post visible signs throughout the facility explaining photography restrictions and patient rights regarding their medical images1.
Comprehensive consent forms: Develop detailed consent forms that explain how photos will be used, who will have access, and patients’ rights regarding their images. These forms should be written in clear, simple language38.
Verbal explanations: During patient interactions, healthcare providers should explain the basics of HIPAA as it relates to photography, including:
Educational materials: Provide patients with brochures or digital resources that outline HIPAA photography rules in an easy-to-understand format8.
Discuss social media implications: Inform patients about the risks of sharing medical photos on social media platforms, even if they took the photos themselves12.
Explain the purpose of medical photography: Help patients understand how their photos may be used for treatment, documentation, or educational purposes4.
Address privacy concerns: Discuss how the healthcare facility protects patient privacy when using clinical photographs, including de-identification processes5.
Train staff thoroughly: Ensure all healthcare workers can accurately explain HIPAA photography rules to patients and answer related questions3.
Provide examples: Use real-world scenarios to illustrate proper and improper use of medical photography under HIPAA guidelines2.
Offer opt-out options: Inform patients of their right to refuse photography or limit its use, and explain any potential impacts on their care4.
Final Thoughts On Navigating the PHI Inspection Landscape
In the intricate world of healthcare information management, compliance isn’t just a regulatory requirement—it’s a commitment to patient dignity and data integrity. The 2025 HIPAA update is intended to make access to PHI easier for patients, but while it does involve making changes to workflows, healthcare professionals should remember that at the end, it is about making the lives of our clients & staff better.
Expert Guidance: Your Compliance Compass
To ensure compliance, reduce errors & limit the possibility of reputational and financial penalties, we strongly recommend:
- Engaging HIPAA compliance consultants (to retrain & set up compliant workflows)
- Conducting comprehensive workflow audits
- Developing customized implementation strategies
Remember: Proactive adaptation is your most potent compliance tool.
References
- HIPAA Journal. (2025). HIPAA Updates and Changes. Retrieved from https://www.hipaajournal.com/hipaa-updates-hipaa-changes/
- S. Department of Health & Human Services. (2025). HIPAA Compliance Guidelines.
- National Institute of Health. https://privacyruleandresearch.nih.gov/pr_06.asp
- https://www.ipc.on.ca/en/health-organizations/unauthorized-access
- https://www.cpso.on.ca/Physicians/Policies-Guidance/Policies/Protecting-Personal-Health-Information
- https://www.cmpa-acpm.ca/en/education-events/good-practices/professionalism-ethics-and-wellness/privacy-and-confidentiality
- https://www.digitalguardian.com/blog/healthcare-cybersecurity-tips-securing-private-health-data
- https://www.ipc.on.ca/sites/default/files/legacy/Resources/Detect_Deter.pdf
- https://www.accountablehq.com/post/hipaa-and-photography
- https://rxphoto.com/resources/blog/navigating-hipaa-compliance-essential-guidelines-for-medical-photography/
- https://www.linkedin.com/advice/0/how-can-you-teach-patients-privacy-rights
- https://www.hipaajournal.com/hipaa-photography-rules/
- https://www.cmpa-acpm.ca/en/advice-publications/browse-articles/2011/using-clinical-photography-and-video-for-educational-purposes
- https://pmc.ncbi.nlm.nih.gov/articles/PMC6470317/
Disclaimer: This article provides general guidance. Always consult qualified legal and compliance professionals for specific implementation strategies.
If You Need Guidance or Immediate Assistance
Contact us at (+91 733-113-2288), or write to us at (service@friggp2c.com | friggp2c@gmail.com)
Also, check out our services like Vulnerability Assessment, Penetration Testing, Code Review, Testing as a Service, and Risk Management on our website www.friggp2c.com. We are determined to work with and for you and make your organization one of the safest business organizations for you, your customers, and all prospective clients.
About the Authors
Amit Sarkar (amit.sarkar@friggp2c.com) is the Founder of Frigg Business Solutions at Sheridan, Wyoming, USA, and Hyderabad, Telangana, India. A seasoned writer whose multiple articles have been published in HCCA and SCCE. He is a former CEO of a US Healthcare Regulatory Compliance service organization, and a senior global leader in HIPAA Compliance, IT Security, Risk Management, and Compliance Governance.
LinkedIn: Amit Sarkar | LinkedIn

A tenured business leader with over two decades of experience leading organizations across multiple domains including healthcare. He has seen the impact of security breaches first hand and has become a passionate advocate for security & compliance preparedness in organizations.
LinkedIn: Ayan Chatterjee | LinkedIn
