[{"@context":"https:\/\/schema.org\/","@type":"Article","@id":"https:\/\/www.protondata.com\/blog\/data-security\/hipaa-handles-data-destruction-phi\/#Article","mainEntityOfPage":"https:\/\/www.protondata.com\/blog\/data-security\/hipaa-handles-data-destruction-phi\/","headline":"How HIPAA handles the data destruction of PHI","name":"How HIPAA handles the data destruction of PHI","description":"Protected health information\u00a0has a set of unique rules to ensure its confidentiality.","datePublished":"2017-12-12","dateModified":"2020-05-13","author":{"@type":"Person","@id":"https:\/\/www.protondata.com\/blog\/author\/datadestructionblogger\/#Person","name":"Proton Data Security","url":"https:\/\/www.protondata.com\/blog\/author\/datadestructionblogger\/","identifier":7,"image":{"@type":"ImageObject","@id":"https:\/\/secure.gravatar.com\/avatar\/fd2e28f9d09f9b7e450d32e1b8ed5ac63ee6a1d855a61074efccf4153dba931b?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/fd2e28f9d09f9b7e450d32e1b8ed5ac63ee6a1d855a61074efccf4153dba931b?s=96&d=mm&r=g","height":96,"width":96}},"publisher":{"@type":"Organization","name":"Proton Data Security","logo":{"@type":"ImageObject","@id":"https:\/\/www.protondata.com\/wp-content\/uploads\/2015\/05\/wh-logo-02-schema-correct-size.png","url":"https:\/\/www.protondata.com\/wp-content\/uploads\/2015\/05\/wh-logo-02-schema-correct-size.png","width":600,"height":60}},"image":{"@type":"ImageObject","@id":"https:\/\/www.protondata.com\/wp-content\/uploads\/2017\/11\/PHI-has-a-set-of-unique-rules-to-ensure-its-confidentiality_2410_40167087_0_14117479_500.jpg","url":"https:\/\/www.protondata.com\/wp-content\/uploads\/2017\/11\/PHI-has-a-set-of-unique-rules-to-ensure-its-confidentiality_2410_40167087_0_14117479_500.jpg","height":357,"width":500},"url":"https:\/\/www.protondata.com\/blog\/data-security\/hipaa-handles-data-destruction-phi\/","about":["Data Security","Regulations &amp; Compliance"],"wordCount":1163},{"@context":"https:\/\/schema.org\/","@type":"BreadcrumbList","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.protondata.com\/blog\/#breadcrumbitem"},{"@type":"ListItem","position":2,"name":"Data Security","item":"https:\/\/www.protondata.com\/blog\/\/data-security\/#breadcrumbitem"},{"@type":"ListItem","position":3,"name":"How HIPAA handles the data destruction of PHI","item":"https:\/\/www.protondata.com\/blog\/data-security\/hipaa-handles-data-destruction-phi\/#breadcrumbitem"}]}]