Perspective Volume 10 Issue 6
1Director, Pacific Neuropsychiatric Institute and Exceptional Creative Achievement Organization, USA
2Executive Director and Distinguished Professor, Exceptional Creative Achievement Organization, USA
3Adj.Professor, Department of Neurology and Psychiatry, St. Louis University, USA
Correspondence: Vernon M Neppe, Director, Pacific Neuropsychiatric Institute and Exceptional Creative Achievement Organization, Seattle, Washington, USA
Received: December 21, 2019 | Published: December 27, 2019
Citation: Vernon MNMD, FRSSAf, DFAPA, et al. Privacy of communications: faxes are not usually HIPAA compliant. An editorial perspective. J Psychol Clin Psychiatry. 2019;10(6):249-254. DOI: 10.15406/jpcpy.2019.10.00661
Privacy of medical and psychological information is of extraordinary importance. In the USA, it is regulated by HIPAA laws. The most common method of communication between health care and mental health practitioners is via faxes. Faxes have changed from the ‘paper fax’ to electronic faxes (‘modern faxes’). There are advantages but numerous potential problems in ensuring compliance with HIPAA. This is even more so when recognizing that faxes are often delivered electronically to emails (electronic mails) which have traditionally been regarded as not complying with HIPAA. Solutions are suggested. The most obvious is delivery of private medical and psychological information by HIPAA compliant secure email. The various options are briefly outlined. Based on direct comparisons, the most logical is to use one that is usable and secure. The ZSentry technology which preceded the well-known blockchain technology fits that requirement because of the secure encryption, date and time stamps and user authentications.
Keywords: authentication, compliance, email, fax, HIPAA, ‘modern fax’, ‘paper fax’, privacy, secure electronic mail, security, usability
iVernon M. Neppe MD, PhD, Fellow Royal Society (SAf), DFAPA, DSPE, Pacific Neuropsychiatric Institute, Seattle; and Exceptional Creative Achievement Organization (Distinguished Professor) Adjunct Professor, Department of Psychiatry and Behavioral Neuroscience, St Louis University, St Louis. For perspective, Prof. Neppe is a Behavioral Neurologist, Neuropsychiatrist, Neuroscientist, Psychopharmacologist, Forensic specialist, Psychiatrist, Phenomenologist, Neuroscientist, Epileptologist, Consciousness Researcher, Philosopher, Creativity expert, and Dimensional Biopsychophysicist. His CV includes 10+ books, 2 plays, 800+ publications, 1000+ invited lectures and media interactions worldwide (http://www.vernonneppe.org/about.php).The prevailing custom in medical and psychological communications has been to send a fax.
Faxes are currently fundamental to the entire health system, certainly in the USA, where the great majority of practitioners use faxes. Similarly, in 2018, two-thirds of Canadian doctors reported that they primarily used fax machines to communicate with other doctors.1
A fax is an image of a document made by electronic scanning and transmitted as data by telecommunication links.2 The term ‘fax’ derives from the 1940s and is an abbreviation of facsimile, previously called ‘telecopying’. Essentially, faxes apply telephonic transmission of scanned-in printed material (text or images), usually to a telephone number associated with a printer or other output device.3
Faxes treat the contents (text or images) as a single fixed graphic image, converting it into a bitmap digital form, for transmission.
Companies that fax often inherently encourage all its customers and suppliers to keep faxing, too. Therefore any changes are necessarily slow.4
Many physicians and psychologists don’t have the time, expertise or resources to redesign their information workflow, and to eliminate their use of the fax: Major changes would be needed to eliminate faxes.
Practitioners think, wrongly, that faxes—older or modern— protect them. To many, these faxes are still seen as safe and secure. For many mental health practices, faxing continues because it is, convenient and comfortable. Faxes sometimes also have become relatively convenient for short written communications between mental health practitioners.
Faxes can be used in the ‘old-fashioned’ way: Linked with paper; or (what this author is calling) through the ‘modern fax’: This involves purely electronic transmissions. Modern faxes are still frequently sent to faxes that use paper so the old-fashioned problems with paper faxes receipt remains important for everyone using faxes.
Data Breach and Mandatory Notification: HIPAA compliance:5‒8
In the United States, many communications like faxes are influenced by US federal initiatives trying to make medical records systems more compatible.1 This is largely because of the Health Insurance Portability and Accountability Act (HIPAA). A focus of this article. Then, is to emphasize the United States, but the problem of security of faxes remains universal all the same.
Fax machines can be HIPAA-compliant as long as appropriate security safeguards are followed but the underlying bases are complex and might take time and effort. HIPAA regulations do not prevent covered entities (health providers, plans and clearinghouses that transmit health information electronically) from faxing Protected Health Information (PHI). However, and this is a big challenge, as the covered entity’s is responsible to ensure their fax practices comply with HIPAA privacy rules. These include the ‘minimum necessary’ rule, which limits information in the fax to the minimum amount necessary in certain instances, as well as the implementation of administrative, technical, and physical security policies to protect PHI.1
HIPAA in the United States provides detailed instructions for handling and protecting a patient's personal health information. HIPAA was developed in 1996 and became part of the ‘Social Security Act’. The primary purpose of the HIPAA rules is to protect the privacy of health care coverage for individuals who lose or change their jobs.
In effect, there are four main purposes of HIPAA9
The cost for doing business online has increased greatly in the USA. Audits and fines for HIPAA and HITECH regulatory compliance faults can result in enormous fines in the thousands of dollars and beyond. It affects health-care providers plus all business because they all handle protected health information (PHI). Data breach notification is legally mandated by U.S. State Security Breach Notification Laws. The penalties for willful neglect are increased under the HIPAA HITECH Act. These HIPAA violation penalties can extend up to $250,000, with repeat/uncorrected violations extending up to $1.5 million. Under certain conditions, HIPAA's civil and criminal penalties now extend to ‘business associates’.
US federal initiatives are trying to make medical records systems more compatible, and controlled at the ‘Centers for Medicare and Medicaid Services’ (CMS).1 These HIPAA regulations do not prevent covered entities (health providers, plans and clearinghouses that transmit health information electronically) from faxing Protected Health Information (PHI). HIPAA is therefore of critical importance to Psychologists and Psychiatrists. This is because privacy is important and so is confidentiality of medical, psychological, and other day to day records like banking (Table 1).
Penalty Tier |
Level of Culpability |
Minimum Penalty per |
Maximum Penalty per |
Old Maximum Annual |
New Maximum Annual |
1 |
No Knowledge |
$100 |
$50,000 |
$1,500,000 |
$25,000 |
2 |
Reasonable Cause |
$1,000 |
$50,000 |
$1,500,000 |
$100,000 |
3 |
Willful Neglect – |
$10,000 |
$50,000 |
$1,500,000 |
$250,000 |
4 |
Willful Neglect – No |
$50,000 |
$50,000 |
$1,500,000 |
$1,500,000 |
Table 1 2019 Interpretation of the HITECT ACT’s Penalties for HIPAA Violations.10
Direct HIPAA Problems of paper linked faxes
Problems of paper linked faxes: Not direct HIPAA problems
Solutions for paper-linked faxes
The ‘modern’ fax might help with security, but still how is the information encrypted?
The ‘modern fax’ era
Despite the fax machine gradually becoming obsolete technology superseded by computer networks, the irony is that ‘modern’ faxing appears to be actually growing in popularity.
The modern fax (now far more popular in the USA than before) has been used more commonly over the past few years. It still fundamentally involves a phone line and transmission as a ‘pict’—an image. But conveniently and in seconds, like a phone call, faxes can be sent simultaneously to many individuals and also broadcast a fax to multiple addresses. ‘Modern faxes’ being electronic alone no longer require fax machines. We can now send and receive faxes online, no matter where we are. Electronic Faxes require no hardware or software and is mobile on one’s computer.
A major breakthrough in the development of the modern facsimile system was the result of digital technology, where the analog signal from scanners was digitized and then compressed, resulting in the ability to transmit high rates of data across standard phone lines with resolutions varying from as little as 150 DPI to 9600 DPI or more.3 Moreover, even dedicated fax modems have been technologically superseded.
One technique is ‘Fax Over IP’ (FoIP). This can transmit and receive pre-digitized documents at near real-time speeds. Scanned documents are limited to the amount of time the user takes to load the document in a scanner and for the device to process a digital file. If done manually, this can be time consuming and require extra labor and checking. Nevertheless, automation helps this making the process take a few seconds only.3
Everything today is automated: Just type in the number, drag and drop the files to be faxed, and hit Send. The web interface is easy to understand and works flawlessly. We can now send faxes from anywhere (with a WIFI connection). We easily edit our custom cover pages to include logo and contact information which then is automatically included.
The Internet now allows new and cheaper ways to send faxes in some cases.
In many corporate environments, free-standing fax machines have been replaced by fax servers and other computerized systems capable of receiving and storing incoming faxes electronically, and then routing them to users on paper or via an email (which may be secured). Such systems have the advantage of reducing costs by eliminating unnecessary printouts and reducing the number of inbound analog phone lines needed by an office. 12 Remotely hosted fax-server services are widely available from Voice-over IP and email providers allowing users to send and receive faxes using their existing email accounts without the need for any hardware or dedicated fax lines. Personal computers have also long been able to handle incoming and outgoing faxes using analog modems or internet connections eliminating the need for a stand-alone fax machine.1
A number of free and commercial companies provide arrangements for using the Internet rather than the public telephone system for most or part of the path to the fax point. The receiving fax machine or fax outputs and inputs electronically reconvert the coded image. Even if a document is text only, it is treated by the computer as a scanned image and is transmitted to the receiver as a bitmap. Faxing a message online works well if the recipient wants only to read the message. Sending documents that require modification through email is more efficient but has new privacy issues (as below).
Nevertheless, the problems with paper faxes and fax machines still apply to sending ‘modern faxes’ because we don’t know what technology the recipients of our faxes have.
Ironically, faxes now have the same problems as with electronic mail (email) , possibly sometimes even worse. This is because ‘modern’ faxes are sometimes are received in individuals emails. Therefore, almost every HIPAA critique in emails now applies to modern faxes.
There is certainly a recognized lack of confidentiality in regular email, which is insecure and can be intercepted by hackers with some difficulty. Additionally, there are problems such as identity theft (e.g. phishing / spoofing), spamming, and easy transmission of viruses.
However, bizarrely the myth that faxes are HIPAA-compliant remains. Regular emails are not regarded as HIPAA compliant and are not, but because faxes commonly end up in emails, the faxes are now logically even less compliant than emails.
True fax HIPAA compliance is possible, but is rare because many factors play into this. It means there has to be layers of security going out and being received and in transmission and in maintenance.
Problems with the more modern faxes and styles
Practitioners should not innocently open patients up to potential identity theft and fraud: This is also a fineable offense by HIPAA.
Here are obvious examples in the ‘modern’ fax of potential HIPAA problems.
Solutions for the ‘modern’ faxes
Practitioners should ensure compliance.13
‘Cloud faxing’ has become a solution which some believe is adequate. It is done automatically, with encryption being used. Practitioners should ensure their cloud fax services encrypt all documents and allow enhancements from inside their secure data center, rather than on their device.11 However, though cloud faxing may be claimed to be adequate, the authors point out that this is simply not possible that it is end-to-end secure. This makes Cloud Faxing easily open to MITM (so-called “man-in-the-middle”) attacks. The ZSentry technology solves this: ZSentry users have sole control of their own passwords by storing a unique cryptographic hash on a blockchain and allowing companies to confirm it for login.vi
Some practitioners sign a ‘business associate’s agreement’ (BAA) but they are not required to do so. But if they do, it lowers the fax-senders’ risk. The HIPAA Privacy Rule requires all Covered Entities to have a signed Business Associate Agreement (BAA) with any Business Associate (BA) they hire or who may come in contact with PHI. Covered entities include physicians, health insurance, health plans and associated professionals. But they do not require a BAA between each other.14 BAAs, however, may protect the companies with the BAA and potentially make the other side more vulnerable to HIPAA penalties as a consequence.
viThe reception and transmission of fax present several points for unfettered access (e.g., cache, hard drive, transmission to other sites, future sales, and so on) that the sender does not know or cannot control, or verify. The service providers can read anything that is sent in the fax. This involves technically a MITM attack where the attacker theoretically can secretly relay and possibly alter the communications between two parties who believe that they are directly communicating with each other. Such MITMs bypass encryption fully without the sender or recipient becoming aware of it. Thus, "cloud fax services" cannot be made secure even if the receiver only accepts encrypted faxes electronically. The process is Sender --> encryption:fax receiver -- decryption (storage, future sales, etc) -- encryption:transmission --> Receiver.
Solutions
There must be a robust process in place for password creation and password changes in place
Advantages of faxes over emails
Strangely, an advantage of fax machines and multifunctional printers with a fax capability is they provide an inexpensive backup capability in case of technical problems with an Internet connection, or even a cyberattack, like the Russian attack on Estonia in 2007.4
In some countries, electronic signatures on contracts are not yet recognized by law, yet faxed contracts with copies of signatures are, fax machines enjoy continuing support in business.
Nevertheless, fax technology has faced increasing competition from Internet-based alternatives.
Changes are coming
This is not only the USA. In 2018, urged partly by the European Union’s promotion of electronic identification, the British Law Commission concluded that electronic signatures were indeed legal but needed significant promotion to increase their acceptance and use.
In December, the National Health Service decided to stop buying fax machines in 2019 and end their use by the end of 2020. That’s the same goal the Centers for Medicare and Medicaid Services’ (CMS) has for American doctors to stop faxing.
Obvious disadvantages of regular email
As indicated, because faxes are often now directed to emails, the email difficulties amplify the fax non-compliance.
Because faxes are now often received as electronic emails, the following applies:
Regular email is similar to a postcard that anyone can read and even overwrite. Therefore, regular email communication is not a secure method of communication, for various reasons.5,6,15
For example:
But the lack of security in regular email is not limited to transmission exploits.
Alternative solutions
The alternative is to send HIPAA-compliant emails: There are, in fact, several different technological engines that provide compliant, secure responses.8 Applying objective criteria, the ZSentry engine appears best.8,15 ZSentry email is the most sophisticated and might be the first that provided both security and ease of use.vii There are three other different fundamental engines that provide different levels of this -- PGP is one common example (Pretty Good Privacy) was the first released in 1991 and later followed by an S/MIME extension. PKI (Public Key Infrastructure, based on the X509).
ZSentry (ZS) provides per-message encryption, de-identification, two-factor authentication, control, auditing, data loss protection, secure archive and other services protecting information in transit and at rest. ZSentry supports the other main security technologies (PKI, PGP with later S/Mime) and one open (universal) choice. There is also IBE (Identity-Based Encryption, also marketed as Voltage and MessageGuard) because its design requires ‘key escrow’.6,8
The most obvious example, then, of secure and usable email is Zmail. This far eclipses faxes, is a light-year ahead of regular email, and appears to be better than the other engines.5‒8
Based on the available objective measures, prior to ZSentry being used , ease of use was problematic when there was great security, and vice versa, good usability and lesser absolute security.15viii
Nevertheless, often, secure emails are major hassles because people have to register and put in particular passwords which may or may not be readable. The situation is still not perfect in that continual changes to browsers and operating systems, makes for certain character symbols to be distorted (e.g. apostrophes so ‘I’m’ should be written ‘I am’). All these technological engines have costs associated and have attempted to make the limitations as few as possible. For example, Zsentry can be set up so one can use it from one’s regular email client, or from a browser such as Internet Explorer, Google, Chrome or Safari or all the common ones. It will be received as quickly as regular email. However, sometimes, companies perceive these secure emails as Spam or junk mail or the ZSentry mail is blocked by Firewalls. So this is not perfect.
Eventually, the older generation of people more comfortable with faxing than emailing will retire. Until then, however, fax machines will continue. At that point, secure email technologies should take over. They’re logical to implement in hospitals and clinics, particularly.
viiThe principal author was able to consult over years on this technology and has invested in it. See Zsentry.com. However, he has particularly recognized the value of the ZSentry technological engine because it was developed after the others, and appears to be the only technology that is both usable and secure. It is certified in that regard by the Federal Government in research and has been used also to run many elections including nationally in Sweden.
viiiZSentry transactions are not just secure, they can be trusted. Since a 2001 USPTO patent application asserting prior art, and with ZSentry in 2004. The storing of a unique cryptographic hash on a blockchain and allowing companies to confirm it for login makes ZSentry unique and even more secure than the competing technological engines. This means that users are exclusively in control of their own login and their data. There are no copies of passwords or data elsewhere, not even in the blockchain. Users do not have to trust the online service ZSentry on login, just their choice of identity management tools and themselves. Yet ZSentry remains usable.15
None.
None.
The authors have no conflicts of interest to declare.
©2019 Vernon, et al. This is an open access article distributed under the terms of the, which permits unrestricted use, distribution, and build upon your work non-commercially.