HIPAA Breach News

Lawnmower Engine Manufacturer Reports HIPAA Breach

Briggs Stratton Corporation, a manufacturer of lawnmower engines, may not appear to be a HIPAA covered entity since the firm is not in the healthcare industry and does not provide services to healthcare organizations as a business associate. However, the company is required to comply with HIPAA Rules.

When the company experienced a potential breach of employee information, the incident was a reportable security breach, OCR required notification, and notification letters had to be issued to its employees. Just because a company does not operate in the healthcare industry does not mean that HIPAA does not apply.

Briggs Stratton was required to comply with HIPAA Rules due to its self-insured group health plan. Employers and health plan sponsors are required to ensure that HIPAA policies are put in place for their group health plans, that any ePHI created, accessed, stored, or transmitted is safeguarded to the standards required by the HIPAA Security Rule and all HIPAA Rules are followed. That includes entering into business associate agreements with any entity that has access to the ePHI of its employees, is provided with ePHI, or has access to systems containing ePHI.

When there is a breach of that information, the HIPAA Breach Notification Rule applies. In the case of Briggs Stratton, the breach was a hacking/IT incident resulting a potential unauthorized disclosure of ePHI. Malware was discovered on its systems which potentially gave unauthorized individuals access to the system where ePHI was stored. Access to the system was possible between July 25 and July 28, 2017. Briggs Stratton became aware of the incident on July 25, and took steps to contain the attack. Notifications were delayed until September 30, 2017 due to a law enforcement investigation into the malware attack.

The breach impacted 12,789 of its employees and potentially resulted in the exposure of names, addresses, dates of birth, driver’s license numbers, Social Security numbers, health plan IDs, insurance information, passport numbers, work-related evaluations, and login details to its work systems. No evidence of misuse of any health plan data has been uncovered, although employees impacted by the breach have been offered credit monitoring and identity theft protection services for 12 months without charge. Steps have also been taken to improve security to prevent similar incidents from occurring in the future.

The incident serves as a reminder that not all HIPAA covered entities fall under the standard classification of healthcare providers, health plans or business associates, and even firms not involved in healthcare may still be required to comply with HIPAA Rules and can face penalties for non-compliance with HIPAA Rules.

In the case of Briggs Stratton, the firm was well aware of its responsibilities, had implemented a HIPAA compliance program, and acted accordingly when a potential data breach occurred.

The post Lawnmower Engine Manufacturer Reports HIPAA Breach appeared first on HIPAA Journal.

Tips for Reducing Mobile Device Security Risks

An essential part of HIPAA compliance is reducing mobile device security risks to a reasonable and acceptable level.

As healthcare organizations turn to mobiles devices such as laptop computers, mobile phones, and tablets to improve efficiency and productivity, many are introducing risks that could all too easily result in a data breach and the exposure of protected health information (PHI).

As the breach reports submitted to the HHS’ Office for Civil Rights show, mobile devices are commonly involved in data breaches. Between January 2015 and the end of October 2017, 71 breaches have been reported to OCR that have involved mobile devices such as laptops, smartphones, tablets, and portable storage devices. Those breaches have resulted in the exposure of 1,303,760 patients and plan member records.

17 of those breaches have resulted in the exposure of more than 10,000 records, with the largest breach exposing 697,800 records. The majority of those breaches could have easily been avoided.
The Health Insurance Portability and Accountability Act (HIPAA) Security Rule does not demand encryption for mobile devices, yet such a security measure could have prevented a high percentage of the 71 data breaches reported to OCR.

When a mobile device containing ePHI is lost or stolen, the HIPAA Breach Notification Rule requires the breach to be reported and notifications to be sent to affected individuals. If PHI has been encrypted and a device containing ePHI is lost or stolen, notifications need not be sent as it would not be a HIPAA data breach. A breach report and patient notifications are only required for breaches of unencrypted PHI, unless the key to decrypt data is also obtained.

Even though HIPAA does not demand the use of encryption, it must be considered. If the decision is taken not to encrypt data, the decision must be documented and an alternative safeguard – or safeguards – must be employed to ensure the confidentiality, integrity, and availability of ePHI. That alternative safeguard(s) must provide a level of protection equivalent to encryption.

Before the decision about whether or not to encrypt data can be made, HIPAA covered entities must conduct an organization-wide risk analysis, which must include all mobile devices. All risks associated with the use of mobile devices must be assessed and mitigated – see 45 C.F.R. § 164.308(a)(1)(ii)(A)–(B).

OCR Reminds Covered Entities of Need to Address Risks Associated with Mobile Devices

In its October 2017 Cybersecurity Newsletter, OCR reminded covered entities of the risks associated with mobile devices that are used to create, receive, maintain, or transmit ePHI. HIPAA covered entities were reminded of the need to conduct an organization-wide risk assessment and develop a risk management plan to address all mobile device security risks identified during the risk analysis and reduce them to an appropriate and acceptable level.

While many covered entities allow the use of mobile devices, some prohibit the use of those devices to create, receive, maintain, or transmit ePHI. OCR reminds covered entities that if such a policy exists, it must be communicated to all staff and the policy must be enforced.

When mobile devices can be used to create, receive, maintain, or transmit ePHI, appropriate safeguards must be implemented to reduce risks to an appropriate and acceptable level. While loss or theft of mobile devices is an obvious risk, OCR draws attention to other risks associated with the devices, such as using them to access or send ePHI over unsecured Wi-Fi networks, viewing ePHI stored in the cloud, or accessing or sharing ePHI via file sharing services.

OCR also remined covered entities to ensure default settings on the devices are changed and how healthcare employees must be informed of mobile device security risks, taught best practices, and the correct way to uses the device to access, store, and transmit ePHI.

OCR offers the following advice to covered entities address mobile security risks and keep ePHI secure at all times.

To access OCR’s guidance – Click here.

OCR’s Tips for Reducing Mobile Device Security Risks

  • Implement policies and procedures regarding the use of mobile devices in the work place – especially when used to create, receive, maintain, or transmit ePHI.
  • Consider using Mobile Device Management (MDM) software to manage and secure mobile devices.
  • Install or enable automatic lock/logoff functionality.
  • Require authentication to use or unlock mobile devices.
  • Regularly install security patches and updates.
  • Install or enable encryption, anti-virus/anti-malware software, and remote wipe capabilities.
  • Use a privacy screen to prevent people close by from reading information on your screen.
  • Use only secure Wi-Fi connections.
  • Use a secure Virtual Private Network (VPN).
  • Reduce risks posed by third-party apps by prohibiting the downloading of third-party apps, using whitelisting to allow installation of only approved apps, securely separating ePHI from apps, and verifying that apps only have the minimum necessary permissions required.
  • Securely delete all PHI stored on a mobile device before discarding or reusing the mobile device.
  • Include training on how to securely use mobile devices in workforce training programs.

Penalties for Failing to Address Mobile Security Risks

The failure to address mobile device security risks could result in a data breach and a penalty for noncompliance with HIPAA Rules. Over the past few years there have been several settlements reached between OCR and HIPAA covered entities for the failure to address mobile device security risks.

These include:

Covered Entity HIPAA Violation Individuals Impacted Penalty
Children’s Medical Center of Dallas Theft of unencrypted devices 6,262 $3.2 million
Oregon Health & Science University Loss of unencrypted laptop / Storage on cloud server without BAA 4,361 $2,700,000
Cardionet Theft of an unencrypted laptop computer 1,391 $2.5 million
Catholic Health Care Services of the Archdiocese of Philadelphia Theft of mobile device 412 $650,000

Addressing Mobile Device Security Risks

Mobile device security risks must be reduced to a reasonable and appropriate level.  Some of the mobile device security risks, together with mitigations, have been summarized in the infographic below. (Click image to enlarge)

mobile device security risks

The post Tips for Reducing Mobile Device Security Risks appeared first on HIPAA Journal.

8,000 Patients Notified of PHI Exposure After Office Burglary

A limited amount of protected health information (PHI) of almost 8,000 patients of Brevard Physician Associates has been exposed after a desktop computer was stolen in a burglary.

The incident occurred on September 4, 2017 – Labor Day – when the offices were closed. In the early morning, thieves broke in and stole three desktop computers.

The burglary triggered the alarm system and police responded to the incident, although not in time to apprehend the criminals. A forensic analysis of the office was performed, although to date the individuals responsible have not been apprehended and the computers not recovered.

Two of the computers did not contain any protected health information, but the third computer had five audit files saved to the hard drive. The information in those audit files was limited, although there was sufficient information to warrant the issuing of breach notifications to patients.

Brevard Physician Associates acted quickly and dispatched breach notification letters to affected patients well within the timeframe allowed by the HIPAA Breach Notification Rule. In total, 7,976 patients were potentially impacted and had the following information exposed: Names, names of insurance providers, CPT codes for the services provided, and the amounts charged for services.

The HIPAA Security Rule does not demand the use of encryption, although if the decision is taken not to encrypt data, an alternative, equivalent control must be employed to safeguard the confidentiality, integrity, and availability of PHI. While the computers were not encrypted, they were protected with passwords and strong passwords had been used. Brevard Physician Associates also reports that the devices can be remotely wiped of all data, and that safeguard has been triggered. If the devices are connected to the Internet, data will be remotely wiped.

Brevard Physician Associates believes the risk – and future risk – of identity theft and fraud as a result of the incident is minimal. Even though addresses, dates of birth, telephone numbers, Social Security numbers, financial information and insurance ID numbers were not exposed and could not be accessed by the thieves, the decision has been taken to offer all affected patients 12 months of complimentary credit monitoring services.

Brevard Physician Associates should be commended for its rapid breach response, prompt issuing of notifications, and for the steps taken to mitigate risk.

The post 8,000 Patients Notified of PHI Exposure After Office Burglary appeared first on HIPAA Journal.

932 Texas Children’s Health Plan Members’ PHI Emailed to Personal Account by Employee

The protected health information (PHI) of 932 members of the Texas Children’s Health Plan has been discovered to have been emailed to the personal email account of a former employee.

The incident was discovered on September 21, 2017, although the former employee emailed the data late last year in November and December 2016. The emails were discovered during a routine review.

Texas Children’s Health Plan responded to the breach promptly and has taken action to mitigate risk. The health insurance plan has also implemented additional safeguards to prevent similar incidents from occurring in the future and employees have been re-trained on hospital policies and HIPAA Rules.

While the reason for the PHI being emailed to the personal email account has not been disclosed, the breach report uploaded to the insurance plan website explains no evidence has been uncovered to suggest any plan member information has been used inappropriately. However, the incident has been reported to law enforcement.

As is required by the HIPAA Breach Notification Rule, the incident has been reported to the Department of Health and Human Services’ Office for Civil Rights and all patients impacted by the incident have been notified by mail. Breach notification letters were dispatched to patients on Friday, October 27, well inside the maximum deadline allowed by the HIPAA Breach Notification Rule.

The types of data included in the emails varied for each patient, but typically included: Names, telephone numbers, addresses, dates of birth, Medicaid numbers, waiver type, STAR kids manager’s name and group, and information detailed in a budget worksheet. No financial information nor Social Security numbers were included in the emails, although for a small number of patients, the following information was also included: Medical record numbers, medical diagnoses, and clinical information.

This type of incident is relatively common. Several HIPAA-covered entities have discovered similar incidents in recent months. Oftentimes, PHI is taken to provide to a new employer to recruit patients to a new practice and some cases have seen PHI emailed to friends and relatives for assistance with data processing tasks. Some healthcare employees have stolen data with a view to committing identity theft and fraud.

HIPAA-covered entities should be monitoring for PHI theft via email. Ideally, restrictions should be put in place to prevent PHI from being emailed outside the organization.

The post 932 Texas Children’s Health Plan Members’ PHI Emailed to Personal Account by Employee appeared first on HIPAA Journal.

Data Breach Highlights Danger of Using USB Drives to Store PHI

The Man-Grandstaff VA Medical Center in Spokane, WA has discovered two USB drives containing the protected health information of almost 2,000 veterans have been stolen.

The two devices were being used to store data from a standalone, non-networked server that was being decommissioned. One of the devices was the master drive used to move the medical center’s Anesthesia Record Keeper database to its virtual archive server. According to a statement issued by the medical center, that transfer had taken place in January. It is unclear why the database was still on the drive.

The devices were stolen on July 18, 2017 from a contract employee while on a service call to a VA hospital in Oklahoma City.

Man-Grandstaff VA Medical Center was not able to determine exactly what information was stored on the USB drives, although the database on the virtual archive server was checked and found to contain full names, addresses, phone numbers, surgical information, insurance information, and Social Security numbers.

1,915 individuals who have potentially been affected are being notified of the breach by mail and have been offered credit monitoring services for 12 months without charge.

In September, the same medical center announced another data breach had occurred. An unencrypted laptop computer that was used as an interface with a hematology analyzer was discovered to be missing. The data on the laptop included names, dates of birth, and the Social Security numbers of approximately 3,200 veterans. Following that breach, the medical center implemented a system that allows devices to be remotely sanitized in the event of loss or theft.

HIPAA Compliant Alternatives to USB Drives

While transporting or storing data on small portable devices such as USB, pen, or zip drives is convenient, the devices are easily misplaced, lost, or stolen. The loss of a USB drive containing PHI is a reportable breach and one that could potentially result in a significant regulatory fine.

There are now many cloud-based storage options that allow data to be easily accessed and shared. Covered entities still using these small portable devices to store PHI should consider banning the use of the devices and switching to HIPAA-compliant cloud-storage.

Prior to using any cloud storage service, HIPAA covered entities should obtain a signed, HIPAA-compliant business associate agreement and train employees on the correct use of the storage platform. Alternatively, secure, HIPAA-compliant text messaging platforms can be used to share PHI securely.

If the use of USB drives is unavoidable, any PHI stored on the devices should be encrypted to prevent unauthorized access in the event of loss or theft, or an alternative security measure that provides an equivalent level of protection.

The post Data Breach Highlights Danger of Using USB Drives to Store PHI appeared first on HIPAA Journal.

The 10 Most Common HIPAA Violations You Should Avoid

HIPAA violations most often occur when covered entities, business associates, or members of either’s workforces fail to comply with the Privacy, Security, or Breach Notification Rules. There are many different types of HIPAA violations, and the ten most common HIPAA violations that have resulted in financial penalties are:

  • Snooping on Healthcare Records
  • Failure to Perform an Organization-Wide Risk Analysis
  • Failure to Manage Security Risks / Lack of a Risk Management Process
  • Denying Patients’ Access to Health Records/Exceeding Timescale for Providing Access
  • Failure to Enter into a HIPAA-Compliant Business Associate Agreement
  • Insufficient ePHI Access Controls
  • Failure to Use Encryption or an Equivalent Measure to Safeguard ePHI on Portable Devices
  • Exceeding the 60-Day Deadline for Issuing Breach Notifications
  • Impermissible Disclosures of Protected Health Information
  • Improper Disposal of PHI

In this article we outline how you can avoid these common HIPAA violations.Ten Most Common HIPAA Violations

You can also use the article in conjunction with our free HIPAA Violations Checklist to understand what is required to ensure full compliance. Use any form on this page to arrange for your copy of the checklist.

What are the 10 Most Common HIPAA Violations?

Listed below are 10 of the most common HIPAA violations, together with examples of HIPAA-covered entities and business associates that have been discovered to be in violation of HIPAA Rules.

These example cases have had to settle those violations with the Department of Health and Human Services’ Office for Civil Rights (OCR) and state attorneys general. In many cases, investigations have uncovered multiple HIPAA violations.

The settlements pursued by OCR are for egregious violations of HIPAA Rules. Settlements are also pursued to highlight common HIPAA violations to raise awareness of the need to comply with specific aspects of HIPAA Rules.

The settlement amounts reflect the seriousness of the violation, the length of time the violation has been allowed to persist, the number of violations identified, and the financial position of the covered entity/business associate.

1. Snooping on Healthcare Records

What are the ten most common HIPAA violationsAccessing the health records of patients for reasons other than those permitted by the Privacy Rule is a violation of patient privacy. Snooping on healthcare records of family, friends, neighbors, co-workers, and celebrities is one of the most common HIPAA violations committed by employees. When discovered, these violations can result in termination of employment but could also result in criminal charges for the employee concerned. Financial penalties for healthcare organizations that have failed to prevent snooping are relatively uncommon, but they are possible – as the University of California Los Angeles Health System discovered.

University of California Los Angeles Health System was fined $865,000 for failing to restrict access to medical records. The healthcare provider was investigated following the discovery that a physician had accessed the medical records of celebrities and other patients without authorization. Dr. Huping Zhou accessed the records of patients without authorization 323 times after learning that he would soon be dismissed.  Dr. Zhou became the first healthcare employee to be jailed for a HIPAA violation and was sentenced to four months in federal prison.

2. Failure to Perform an Organization-Wide Risk Analysis

The failure to perform an organization-wide risk analysis is one of the most common HIPAA violations to result in a financial penalty. If the risk analysis is not performed regularly, organizations will not be able to determine whether any vulnerabilities to the confidentiality, integrity, and availability of PHI exist. Risks are likely to remain unaddressed, leaving the door wide open for violations to occur.

HIPAA settlements with covered entities for the failure to conduct an organization-wide risk assessment include:

3. Failure to Manage Security Risks / Lack of a Risk Management Process

Performing a risk analysis is essential, but it is not just a checkbox item for compliance. Risks that are identified must then be subjected to a risk management process. They should be prioritized and addressed in a reasonable time frame. Knowing about risks to PHI and failing to address them is one of the most common HIPAA violations penalized by the Office for Civil Rights.

HIPAA settlements with covered entities for the failure to manage identified risks include:

4. Denying Patients Access to Health Records/Exceeding Timescale for Providing Access

The HIPAA Privacy Rule gives patients the right to access their medical records and obtain copies on request. This allows patients to check their records for errors and share them with other entities and individuals. Denying patients access to health records, overcharging for copies, or failing to provide records within 30 days is a violation of HIPAA. OCR made HIPAA Right of Access violations one of its key enforcement objectives in late 2019.

HIPAA settlements with covered entities for denying patients access to their records or unnecessary delays in providing access include:

5. Failure to Enter into a HIPAA-Compliant Business Associate Agreement

The failure to enter into a HIPAA-compliant business associate agreement with all vendors that are provided with or given access to PHI is another of the most common HIPAA violations. Even when business associate agreements are held for all vendors, they may not be HIPAA compliant, especially if they have not been revised after the Omnibus Final Rule.

Notable settlements for these common HIPAA violations include:

6. Insufficient ePHI Access Controls

The HIPAA Security Rule requires covered entities and their business associates to limit access to ePHI to authorized individuals. The failure to implement appropriate ePHI access controls is also one of the most common HIPAA violations and one that has attracted several financial penalties.

Financial penalties issued to covered entities for ePHI access control failures include:

7. Failure to Use Encryption or an Equivalent Measure to Safeguard ePHI on Portable Devices

One of the most effective methods of preventing data breaches is to encrypt PHI. Breaches of encrypted PHI are not reportable security incidents unless the key to decrypt data is also accessed. Encryption is not mandatory under HIPAA Rules, but it cannot be ignored. If the decision is taken not to use encryption, an alternative, equivalent security measure must be used in its place.

Recent settlements for the failure to safeguard PHI include:

8. Exceeding the 60-Day Deadline for Issuing Breach Notifications

The HIPAA Breach Notification Rule requires covered entities to issue notifications of breaches without unnecessary delay, and certainly no later than 60 days following the discovery of a data breach. Exceeding that time frame is one of the most common HIPAA violations, which has seen several recent penalties issued:

9. Impermissible Disclosures of Protected Health Information

Any disclosure of protected health information that is not permitted under the HIPAA Privacy Rule can attract a financial penalty. This violation category includes disclosing PHI to a patient’s employer for a purpose not permitted by the Privacy Rule, potential disclosures following the theft or loss of unencrypted laptop computers, careless handling of PHI, disclosing PHI unnecessarily, not adhering to the ‘minimum necessary’ standard, and disclosures of PHI after patient authorizations have expired.

Settlements for impermissible disclosures of PHI include:

10. Improper Disposal of PHI

When physical PHI and ePHI are no longer required and retention periods have expired, HIPAA Rules require the information to be securely and permanently destroyed. For paper records this could involve shredding or pulping and for ePHI, degaussing, securely wiping, or destroying the electronic devices on which the ePHI is stored to prevent impermissible disclosures.

Financial penalties issued to covered entities for improper disposal of PHI/ePHI include:

Non-Financial HIPAA Violation Examples

HIPAA violations do not always result in financial penalties. Many violations of HIPAA investigated by OCR are resolved by guidance, technical assistance, and/or a corrective action plan depending on the nature of the violation and the harm caused, the covered entity’s previous history of violations, and their willingness to cooperate with an OCR investigation.

Because violations resolved by guidance, technical assistance, and/or a corrective action plan rarely attract headlines, some of the work done by OCR to promote compliance with HIPAA can be overlooked. However, as of March 2022, OCR has investigated and resolved 29,478 cases without issuing a financial penalty. Non-financial HIPAA violation examples include:

  • A hospital was required to implement new minimum necessary policies for telephone messages after an employee left a telephone message with the daughter of a patient that detailed both her medical condition and treatment plan.
  • A mental health center was required to correct its process for providing Notices of Privacy Practices prior to an intake assessment after the center failed to provide the father of a minor patient with an NPP prior to a mental health evaluation.
  • A covered entity was required to withdraw a $100 “records review fee” charged to a patient for providing the patient with copies of his medical records. Under the Privacy Rule, covered entities are only allowed to charge a reasonable cost-based fee.
  • A private practice was required to implement policies on the verbal communication of PHI after a staff member discussed HIV testing procedures with a patient in the practice´s waiting room – thereby disclosing PHI to others in the waiting room.
  • A radiology practice was required to revise its processes for workers´ compensation disclosures after a patient´s imaging tests were sent to the patient´s employer to support a claim for which the employer´s program was not responsible for payment.
  • A health plan was required to correct a flaw in its computer system, review transactions for a six-month period, and correct corrupted patient information after PHI was included in an explanation of benefits letter mailed to an unauthorized family member.

Examples of HIPAA Violations by Healthcare Employees

Snooping on healthcare records is a fairly obvious HIPAA violation and one that all healthcare employees who have received HIPAA training should know is a violation of their employer’s policies and HIPAA Rules.

Other examples of HIPAA violations often come about as a result of misunderstandings about HIPAA requirements. While each of these common HIPAA violations affect far fewer numbers of patients than the above violations, they can still cause a significant amount of harm to the patient(s) involved and their employer. They can also result in disciplinary action against the employee responsible – including termination.

Listed below are some of the common HIPAA violations committed by healthcare employees. These common HIPAA violations should be covered as part of the HIPAA training given to employees to raise awareness of these frequent areas of noncompliance.

Emailing ePHI to Personal Email Accounts and Removing PHI from a Healthcare Facility

It can be difficult to find the time to complete all the necessary tasks within working hours and it can be tempting to take work home to complete. Removing protected health information from a healthcare facility places that information at risk of exposure. This is a common employee HIPAA violation and may even be routine practice at a healthcare facility that is understaffed. That does not mean it is an acceptable practice.

The same applies to emailing ePHI to personal email accounts. Regardless of the intentions, whether it is to get help with spreadsheets, complete work at home to get ahead for the next day, or to catch up on a backlog, it is a violation of HIPAA Rules.  Further, any emailing of ePHI to a personal email account could be considered theft – the repercussions of which could be far more severe than the termination of an employment contract.

Leaving Portable Electronic Devices and Paperwork Unattended

The HIPAA Security Rule requires PHI and ePHI to be secured at all times. If paperwork is left unattended it could be viewed by an unauthorized individual, be that a member of staff, patient, or visitor to the healthcare facility. Were that to happen it would be considered an impermissible disclosure of PHI.

Electronic devices that contain ePHI must similarly be secured at all times. Electronic devices are portable and valuable. Opportunistic thieves could easily steal an unattended device and gain access to ePHI. There have been many cases of healthcare employees removing unencrypted devices from healthcare facilities, only for them to be stolen from vehicles or homes. Theft can also easily occur within a healthcare facility if devices are not secured. Healthcare employees must ensure that their employer’s policies are followed, and HIPAA Rules are not violated by leaving devices and paperwork unattended.

Releasing Patient Information to an Unauthorized Individual

An authorization form must be obtained from a patient before any of their PHI can be disclosed to a third party for a purpose other than one expressly permitted by the HIPAA Privacy Rule. Disclosing PHI for purposes other than treatment, payment for healthcare, or healthcare operations (and limited other cases) is a HIPAA violation if authorization has not been received from the patient in advance.

Healthcare employees must ensure that, prior to disclosing PHI to a third party, authorization has been obtained from the patient, and information is not disclosed to any individual or company not included on the authorization form. Authorization forms are only valid if they have been signed by the patient or their nominated representative.

Releasing Patient Information Without Authorization

In a similar vein to the previous point, healthcare employees must also exercise caution about the types of information that are released to third parties, even if an authorization form has been received allowing a specific individual, company, or organization to receive PHI.

The authorization form should include what types of information have been authorized to be released. Any information not detailed on the authorization form must remain private and confidential and should not be shared. The disclosure of additional information would violate the HIPAA Privacy Rule.

Disclosures of PHI to Third Parties After the Expiry of an Authorization

All HIPAA authorization forms must include the names or classes of individuals who are being authorized to receive PHI, the types of PHI that will be disclosed, and the reasons for the disclosures. They must also include an expiry date for the authorization.

PHI must not be disclosed to any individual listed on the authorization form after the expiry date has passed, even if authorization has previously been given to that entity to receive PHI. A new authorization form is required before any further disclosure takes place. It should also be noted that an authorization form without an expiry date is not HIPAA compliant.

Impermissible Disclosures of Patient Health Records

The HIPAA Privacy Rule permits patients to obtain a copy of their health records on request or have their records provided to a nominated third party such as a personal representative or other individual. If not collected in person by the patient, the third party must have been given authorization by the patient – on a HIPAA authorization form – to receive the records before they can be released.

Prior to providing copies of patient health records, healthcare employees must verify the identity of the patient or the person collecting the records and must ensure records are only released to an individual authorized to receive them. Care must also be taken to ensure that the correct patient records are released.

Downloading PHI onto Unauthorized Devices

It can be difficult for healthcare IT departments to keep track of all devices that connect to the network, given how many different devices have network access. Ensuring those devices are secured can be an even bigger problem, yet this is a requirement for HIPAA compliance.

Employees need to be aware that there are privacy and security risks associated with downloading ePHI to unauthorized portable electronic devices. Not only does this increase the risk of the accidental disclosure of ePHI – in the event that the device is lost or stolen – it could also be viewed as theft and a HIPAA violation.

Providing Unauthorized Access to Medical Records

It is the responsibility of the covered entity to ensure that access to patient health information and medical records is only given to authorized individuals. This is achieved by implementing access controls via unique logins.

Employees have a responsibility to ensure that they do not give access to health information to co-workers who may not have the same access rights. The sharing of login credentials could not only result in an impermissible disclosure of ePHI but any actions taken by that employee would also be attributed to the individual whose login credentials were used to gain access.

Actual Examples of HIPAA Violations by Employees

There are not very many examples of HIPAA violations by employees because most are dealt with internally according to the organization´s sanction policy. However, in a few cases, employees´ contracts are terminated and examples of HIPAA violations by employees are brought to the attention of the outside world. The following is a small selection of those we have reported on:

In May 2013, Dianna Hereford was terminated from her position as a staff nurse at the Norton Audubon Hospital for improperly disclosing the condition of a patient with Hepatitis C. Hereford claimed she was wrongfully dismissed for an incidental disclosure; but her claim was dismissed by Jefferson Circuit Court and by Kentucky´s Court of Appeals when she appealed the decision.

In March 2017, an employee of New Jersey-based BioReference Laboratories was terminated from their position for failing to securely dispose of documents containing the PHI of 1,772 patients. Rather than following the company´s policy for disposing of PHI, which involved shredding the documents before disposing of them, the employee threw the documents into a dumpster.

Also in 2017, an employee of Lowell General Hospital in Massachusetts was fired for snooping on the healthcare records of 769 patients. As mentioned above, snooping on healthcare records is one of the most common HIPAA violations; but whereas it normally impacts patients who are known to the employee, this was an extreme example of a HIPAA violation by an employee.

Uncommon HIPAA Violations

The common HIPAA violations described above are frequently cited in OCR’s enforcement actions and are common root causes of data breaches; however, there are many types of HIPAA violations. The violations listed below are less common, and in some cases, harder to detect, and do not get reported so frequently.

 

Uncommon HIPAA Violations

Description

Filming Patients without Consent

Filming patients without their consent is a HIPAA violation if it results in the unauthorized disclosure of protected health information, compromising patient privacy and failing to adhere to HIPAA’s requirements for patient consent and privacy protection.

New York Presbyterian Hospital – $2,200,000 penalty for filming patients without consent.

Massachusetts General Hospital– $515,000 penalty for filming patients without consent.

Brigham and Women’s Hospital– $384,000 penalty for filming patients without consent.

Boston Medical Center – $100,000 penalty for filming patients without consent.

Impermissible Data Sharing During Medical Research

Inadequate protection of patient data during collaborative medical research, potentially exposing sensitive information. Researchers must ensure that data sharing adheres to strict privacy safeguards and obtain proper patient consent, when required, to avoid HIPAA violations. Effective safeguards are essential when conducting research that involves patient data that has not been de-identified to prevent unintended exposure.

Huntington Medical Research Institutes Discovers Two HIPAA Breaches

Hospital Researchers Jailed for Stealing and Selling Research Data to China

Non-Secure File Sharing

Sharing patient records through non-secure methods such as personal email accounts or unencrypted file-sharing services is a HIPAA violation. This can occur if proper policies and procedures are not in place and is often the result of insufficient training. Using secure (encrypted) communications tools is necessary to prevent these breaches, and there must be a business associate agreement in place with the provider of a communication platform.

11K Dental Patients’ PHI Uploaded to File Sharing Website

Exposure of Patient Data in Home-Based Care

Lack of adequate data security measures in home-based healthcare settings can lead to unauthorized access to patient records in private residences. Ensuring patient data privacy is essential, even in non-traditional care settings. Secure practices must be used for accessing and transmitting patient information.

Data Issue Arises From Home Diabetes Test

Data Exposure when Working from Home

Exposure of patient data to unauthorized individuals when working from home. When taking paperwork home or working on portable devices, PHI must be protected. While family members and other individuals in the same household may be trusted, they are not authorized to view any patient data. Care must be taken not to leave devices or paperwork unattended with patient data visible.

Potential PHI Disclosure After Employee Works from Home with Hospital Data

Medical Records Sent to Incorrect Patients

Sending medical records to incorrect patients is a HIPAA violation as it constitutes an unauthorized disclosure of protected health information (PHI), compromising patient privacy and failing to safeguard their confidential medical information.

Mailing Error Affects 19,570 Missouri Care Members

Mailing Correspondence with PHI Visible

When PHI is visible on the outside of an envelope or package, it can be easily seen by unauthorized individuals who handle or come into contact with the mail, leading to an unauthorized disclosure of sensitive health information. Patients have the right to expect that their health information will be kept private. Mailing correspondence with visible PHI breaches patient privacy and can cause distress and concern for patients who discover that their sensitive information is exposed. HIPAA mandates that appropriate safeguards, such as physical and administrative safeguards, be in place to protect PHI from unauthorized access or disclosure. Mailing correspondence with visible PHI demonstrates a lack of these safeguards.

Amida Care Mailing Potentially Revealed HIV Status of its Members

Third-Party Mailing Error Sees Aetna Plan Members’ HIV Status Disclosed

Unauthorized Photographs/Sharing of Photographs

Taking photographs of patients without authorization and unauthorized sharing of images is a HIPAA violation. It is not permitted to share photographs of patients with unauthorized individuals, even with other healthcare professionals if the file is shared for reasons other than for treatment, payment, or healthcare operations purposes.

Hospital Staff Shared Photographs of Patient’s Genital Injury

Scrub Nurse Fired for Photographing Employee-Patient’s Genitals

Workplace Sabotage

Deliberate sabotage of healthcare systems, data alteration, or introduction of malware by disgruntled employees is a HIPAA violation. Robust security measures must be implemented, employees should be monitored, and access to data and systems should be promptly revoked when employees are terminated or otherwise leave employment.

Former IT Consultant Charged with Intentionally Causing Damage to Healthcare Company’s Server

Providing Family Members, Friends, and Partners with Access to PHI

Allowing family members, friends, and partners to access a patient’s medical records without proper authorization or accessing records on their behalf and disclosing PHI. Individuals requesting access to patient data must be authorized to access that information, and PHI may only be disclosed to individuals authorized to receive it. Employees must be made aware of their responsibilities under HIPAA.

Criminal HIPAA Violation Case Sees Healthcare Worker Arraigned on 430 Counts

$853,000 Awarded to Patient Whose PHI Was Impermissibly Disclosed to Former Boyfriend

Data Exposure During Telehealth Visits

Inadequate protection of patient data when conducting telehealth visits. While OCR issued a Notice of Enforcement Discretion covering the good faith provision of telehealth services during the pandemic and allowed non-public-facing communication tools for telehealth, the period of enforcement discretion is over. Only HIPAA-compliant communications tools can be used, that encrypt or otherwise secure communications, and there must be a business associate agreement in place.

OCR’s COVID-19 Telehealth Enforcement Discretion Transition Period Ends

Unauthorized Use of Medical Illustrations

Unauthorized use of medical illustrations or images containing patient information in presentations, publications, or websites. Consent must be obtained before any images that have not been de-identified according to HIPAA standards can be used in presentations, publications, or for training purposes.

Student Sues Hospital for Unauthorized Use of PHI as Teaching Tool

Radiology Groups Issue Warning About PHI Exposure in Online Medical Presentations

Medical Students Tracking Patients on EHRs

Medical students tracking former patients on EHRs to view outcomes and progress is a HIPAA violation unless patient consent has been obtained. Accessing the medical records of former patients on EHRs out of curiosity violates patient privacy.

Med Students Violating HIPAA by Tracking Patients on EHRs

Examples of Unintentional HIPAA Violations

Unintentional HIPAA violations can occur when healthcare professionals or organizations inadvertently access or disclose protected health information (PHI) without proper authorization, or when the HIPAA Rules are violated due to a lack of training.

Unintentional HIPAA Violation Description of HIPAA Violation
Accidental Disclosure in Conversation Healthcare professionals may inadvertently discuss patient information in public areas, like elevators or cafeterias, without realizing that others can overhear, potentially violating HIPAA confidentiality rules. Such disclosures may occur due to a lack of awareness or caution in maintaining patient privacy.

Careless Talk Sees University of Iowa Worker Fired for HIPAA Privacy Violation

Email Errors Sending an email containing protected health information (PHI) to the wrong recipient due to an email address autocomplete mistake or selecting the incorrect recipient. This can lead to unauthorized access to sensitive patient data when the email recipient is not authorized to view the information.

Email Error Exposed the PHI of 8,000 Members of FirstCare Health Plans

Email Error Results in Impermissible Disclosure of the PHI of 900 Campbell County Health Patients

Email Error Impacts 6,500 Saliba’s Extended Care Pharmacy Patients

Dermatologist Email Error Exposes 14,910 Patients’ SSNs

University of Cincinnati Email Errors Result in 1,064-Patient Data Breach

Email Error Exposed the PHI of 8,000 Members of FirstCare Health Plans

Faxing Errors Mistakenly sending a fax with PHI to the wrong fax number or faxing PHI when it may be viewed by unauthorized individuals. Such errors can result in unintended access to patient information by individuals who should not have access to it.

Even HHS Involvement Did Not Stop Months of Fax Privacy Breaches

Faxing Error Sees PHI Sent to Local Media Outlet

Protected Health Information Sent to Incorrect Fax Recipient Over Several Months

New York Hospital Sued for Disclosing Patient’s HIV Status to Employer

Lost or Stolen Devices Losing electronic devices, such as laptops, smartphones, or tablets, that contain unencrypted patient data, or leaving them in areas where they can easily be stolen. If these devices are lost or stolen, it can inadvertently expose PHI to unauthorized individuals who may gain access to the device’s contents.

Lost Blackberry Device Results in $3.2 Million HIPAA Civil Monetary Penalty for Children’s Medical Center of Dallas

CardioNet Fined $2.5 Million for Laptop Theft and Data Breach

Lack of Encryption Leads to $3 Million HIPAA Penalty for New York Medical Center

Conn. OIG Reaches $90K Settlement with Hartford Hospital and BA Over 2012 Laptop Theft

Lifespan Laptop Theft Exposes ePHI of 20,000 Patients

Improper Disposal of Records Incorrectly disposing of paper records, like medical charts or billing documents, by placing them in regular trash bins without shredding or using other secure methods to render PHI unreadable, or disposing of electronic devices without securely wiping them. This can lead to unauthorized individuals accessing patient data by retrieving discarded records.

Kaiser Pays $49 Million to Settle Improper Disposal Investigation

Improper Disposal of PHI Results in $300,640 HIPAA Penalty

Improper Disposal Nets Small Pharmacy $125K OCR HIPAA Penalty

HealthReach Community Health Centers Reports Improper Disposal Incident Affecting Almost 117,000 Patients

Improper Disposal Incident at Smith’s Food & Drug Affects Almost 58,000 Patients

Misdirected Mail Mailing patient records or billing statements to the wrong address due to clerical errors or inaccuracies in patient information. Such mistakes can inadvertently share sensitive patient information with individuals who should not have access to it.

Kaiser Permanente Fined $450,000 for Mailing Error

Mailing Error Sees Inmediata Breach Notification Letters Sent to Incorrect Addresses

Email Error Exposed the PHI of 8,000 Members of FirstCare Health Plans

Mailing Error at CMS Vendor Affects 10,000 Medicare Beneficiaries

Mailing Error by State of Colorado Affects 12,230 Individuals

St. Vincent Breast Center Breaches HIPAA with 63K-Patient Mailing

Access by Unauthorized Personnel Allowing healthcare employees without the necessary access permissions to view or handle patient records, and failing to terminate access rights when employees are terminated or leave the company. This oversight can result in unintentional breaches of patient confidentiality.

Failure to Terminate Former Employee’s Access Rights Results in $202,400 HIPAA Fine for New Haven, CT

Failure to Terminate Former Employee’s PHI Access Costs Colorado Hospital $111,400

Pharma Sales Rep Pleads Guilty to Healthcare Fraud and Criminal HIPAA Violations

Survey Reveals Sharing EHR Passwords is Commonplace

Accessing PHI Out of Curiosity Healthcare professionals accessing patient records out of curiosity or without a legitimate medical reason. This action violates patient privacy and confidentiality unintentionally when healthcare workers access PHI without a valid need for patient care or treatment.

$240,000 HIPAA Penalty After Security Guards Access Medical Records

Med Students Violating HIPAA by Tracking Patients on EHRs

Ohio Hospital Worker Snooped on 7,300 Patient Records over 12 Years

Medical Center FacingLegal Action Over Snooping on George Floyd’s Medical Records

Dozens of Northwestern Memorial Hospital Employees Fired for Accessing Jussie Smollett’s Medical Records

Henry Mayo Newhall Hospital Fires Employees for Snooping on Medical Records

Hawaii Pacific Health Discovers 5-Year Insider Data Breach

Are Data Breaches HIPAA Violations?

Data breaches are now a fact of life. Even with multi-layered cybersecurity defenses, data breaches are still likely to occur from time to time. OCR understands that healthcare organizations are being targeted by cybercriminals and that it is not possible to implement impregnable security defenses.

Being HIPAA compliant is not about making sure that data breaches never happen. HIPAA compliance is about reducing risk to an appropriate and acceptable level. Just because an organization experiences a data breach, it does not mean the breach was the result of a HIPAA violation.

The OCR breach portal now reflects this more clearly. Many data breaches are investigated by OCR and are found not to involve any violations of HIPAA Rules. When this happens, the investigations are closed without any action being taken.

How are Common HIPAA Violations Discovered?

Common HIPAA violations can continue for many months, or even years before they are discovered. The longer they are allowed to persist, the greater the penalty will be when they are eventually discovered. It is important for HIPAA-covered entities to conduct regular HIPAA compliance reviews (this is required by the HIPAA law) to make sure common HIPAA violations are discovered and corrected before they are identified by regulators.

There are three main ways that common HIPAA violations are discovered:

  1. Investigations into a data breach by OCR (or state attorneys general)
  2. Investigations into complaints about covered entities and business associates
  3. HIPAA compliance audits

Even when a data breach does not involve a HIPAA violation, or a complaint proves to be unfounded, OCR may uncover unrelated HIPAA violations that could warrant a financial penalty.

FAQs

What does it mean to “reduce risk to an appropriate and acceptable level”?

What reducing risk to an appropriate and acceptable level means is that, when potential risks and vulnerabilities are identified, Covered Entities and Business Associates have to decide what measures are reasonable to implement according to the size, complexity, and capabilities of the organization, the existing measures already in place, and the cost of implementing further measures in relation to the likelihood of a data breach and the scale of injury it could cause.

How is it possible to prevent employees from snooping on healthcare records?

To prevent employees from snooping on healthcare records, Covered Entities should implement a program of training, ensure access privileges comply with the Minimum Necessary Standard, activate audit logs, and enforce sanctions. It is also important that employees are made aware during HIPAA training that, although many cases of healthcare snooping are attributable to curiosity rather than malicious intent, all cases of healthcare snooping are HIPAA violations.

If encryption is not mandatory, how can it be a HIPAA violation if records are unencrypted?

Although encryption is not mandatory, it can be a HIPAA violation if records are unencrypted and no other measure that is equally as effective has been implemented. Encryption is an addressable implementation specification of the Security Rule. This means organizations can only avoid implementing the requirement if it is not reasonable and appropriate in the circumstances, or if an alternative security measure is equally as effective. If organizations fail to encrypt records, they have to document the reasons why.

Why was the fine for denying patients access to health records so high?

The fine for denying patients access to health records was so high in the event mentioned in the article because, in this particular case, the non-cooperation of the Covered Entity contributed to the size of the fine (you can read about the case here). Since this case, the CMS´ Meaningful Use program has evolved into the Promoting Interoperability program, and – in addition to being sanctioned for a HIPAA violation – any covered entity failing to provide health records in a timely manner could now also lose a percentage of their Medicare payments.

What are the consequences of accessing a patient chart without reason?

The consequences of accessing a patient chart without reason vary depending on the reason for the impermissible access and the organization´s sanctions policy. If it was an employee’s first violation and no harm was caused by the violation, it is likely the employee will receive a warning and have to undergo additional training. If the violation was a repeat offense, caused harm to the patient or organization, and was done with malicious intent, the likely consequences are termination of contract, a report to a licensing authority, and the possible involvement of law enforcement.

Are HIPAA violations common?

Nobody knows if HIPAA violations are common because, although HHS´ Office for Civil Rights publishes an “Enforcement Highlights” webpage, the statistics on this page only relate to reports and complaints received by the agency. HIPAA violations can also be reported to the Centers for Medicare and Medicaid (CMS), the Federal Trade Commission (FTC), State Attorneys General, the Covered Entity at which the HIPAA violation occurred, or not reported at all.

How do HIPAA violations affect patients?

HIPAA violations affect patients in different ways depending on the nature of the violation. If a hospital has failed to enter into a Business Associate Agreement with a company that provides data analysis services, the violation will not affect patients at all. Conversely, if a HIPAA violation results in the exposure of patients’ personal information, which is then used to conduct identity theft, this will significantly affect patients. For these reasons, there is no one-size-fits-all answer to this question.

What are examples of HIPAA violations?

In addition to the examples of HIPAA violations listed above, Covered Entities can violate HIPAA by failing to comply with the Administrative Requirements of HIPAA. These include the Transaction, Code Sets, and Identifier Standards published by the Department of Health and Human Services; and although Covered Entities are not fined for violations of this nature, they can be excluded from the Medicare program by CMS – which will substantially affect their income.

What is considered a HIPAA violation by the Federal Trade Commission?

An event considered a HIPAA violation by the Federal Trade Commission (FTC) is a failure to comply with the Breach Notification Rule by an organization that has access to PHI, but which does not qualify as a Covered Entity or Business Associate – for example, vendors of Personal Health Records.

Organizations that are not Covered Entities or Business Associates do not have to comply with the Privacy or Security Rule, but they do have to comply with the Breach Notification Rule, and the failure to notify individuals and the FTC of a data breach is considered a HIPAA violation by the FTC – which has the authority to issue substantial fines for non-compliance.

What counts as a HIPAA violation by employees?

What counts as a HIPAA violation by employees is the failure to comply with employers’ HIPAA-related policies and procedures – provided employees have received adequate training on the policies and procedures. In such cases, the employee will be subject to the sanctions listed in their employer’s sanctions policy (verbal warning, written warning, suspension, termination, etc.).

Employees can also violate HIPAA by knowingly and wrongfully disclosing PHI. In such cases, employers are required to notify HHS´ Office for Civil Rights, who will refer the case to the Department of Justice. If there is evidence of criminal wrongdoing, the Department of Justice can pursue fines of up to $250,000 for HIPAA violations by employees and custodial sentences of up to ten years.

What constitutes a HIPAA violation by Business Associates?

What constitutes a HIPAA violation by Business Associates is the failure to comply with any parts of the Security Rule, the requirement to notify Covered Entities of any security incident (not only breaches of unsecured ePHI), or any other requirement stipulated in a Business Associate Agreement.

Generally, Business Associates are required to comply with all provisions of the HIPAA Security Rule and several sections of the Breach Notification Rule. Additionally, depending on the service they provide for or on behalf of a Covered Entity – and the content of Business Associate Agreements – Business Associates may also be required to comply with parts of the Administrative Requirements and the Privacy Rule.

What are the 3 types of HIPAA violations?

There are many “3 types of HIPAA violations”. For example, there are criminal, civil, and accidental violations of HIPAA; Privacy Rule, Security Rule, and Breach Notification Rule violations of HIPAA; and violations of HIPAA reportable to the Centers for Medicare and Medicaid (CMS), HHS´ Office for Civil Rights, and the Federal Trade Commission.

Is it possible for there to be an intentional but acceptable HIPAA violation?

It is possible for there to be an intentional but acceptable HIPAA violation, but only when HHS’ Office for Civil Rights issues a Notice of Enforcement Discretion. These Notices allow Covered Entities to intentionally violate certain HIPAA provisions in certain circumstances for the period of time a Notice of Enforcement Discretion is in force.

It is important to be aware that disclosing PHI in an emergency situation to a Covered Entity with whom no treatment relationship exists is not an intentional but acceptable HIPAA violation. This scenario is permitted by §164.510 of the Privacy Rule provided that any PHI disclosed is limited and relevant to an individual´s care.

Who is responsible for the most common HIPAA violations?

It is not known who is responsible for most common HIPAA violations because it is highly likely most common HIPAA violations are reported to the organization where the violation occurred and this information is not released into the public domain. Additionally, Business Associates are required to report “security incidents” to Covered Entities who then notify affected individuals and HHS’ Office for Civil Rights if the security incident constitutes a breach of unsecured PHI.

Why are there no examples of HIPAA violations by employers?

There are no examples of HIPAA violations by employers because employers are not Covered Entities under HIPAA. Even if a healthcare organization qualifies as a Covered Entity, it is not required to comply with HIPAA in its role as an employer – just in its role as a healthcare organization.

An exception to this explanation exists if an employer administers a self-sponsored health plan. However, because this is a rare scenario – and because employers in this situation are only subject to partial compliance – there are no examples of HIPAA violations by employers publicly reported.

What are the consequences of accessing a patient chart without reason?

The consequences of accessing a patient chart without reason depend on multiple factors. If the person who accessed the chart was a member of a Covered Entity’s workforce, if they did not have the authorization to access the chart, and if they had received training on the Covered Entity’s policies, the event is a violation of the Covered Entity’s policies.

Therefore, the consequences of accessing a patient chart without reason depend on the content of the Covered Entity’s sanctions policy. This may mean the person is given a verbal warning and required to undergo refresher training; or, if the person has received previous verbal warnings, the consequences could be a written warning, final warning, or termination of a contract.

What are HIPAA violations?

HIPAA violations are the failure to comply with the provisions and implementation specifications of the HIPAA Administrative Simplification provisions (45 CFR Parts 160,162, and 164). Most HIPAA violations are civil incidents committed by Covered Entities and Business Associates. It is rare that an individual violates HIPAA because individuals are most often members of a Covered Entity’s or Business Associate’s workforce and subject to their employer’s policies.

Are all violations of HIPAA resolved by financial penalties?

Very few violations of HIPAA are resolved by financial penalties. In most cases, violations of HIPAA are resolved by voluntary compliance, technical assistance, or corrective action plans. However, these “secondary” resolutions also have a financial cost in terms of revising policies and procedures, implementing safeguards, retraining members of the workforce, and other business disruptions.

Are lost medical records a HIPAA violation?

Lost medical records are a HIPAA violation – even if the records are subsequently found – because there has been a failure to ensure the availability of PHI when the records were lost. Additionally, while the medical records were lost, they may have been viewed or altered by an unauthorized person, so there has also been a failure to ensure the confidentiality and integrity of PHI.

What is considered a HIPAA violation punishable by a custodial sentence?

A HIPAA violation punishable by a custodial sentence is considered to be when a person knowingly and wrongfully obtains or discloses individually identifiable health information without authorization. Depending on the motive and whether the act was committed under false pretenses, the person can be fined up to $250,000 and given a custodial sentence of up to ten years.

Who can violate HIPAA?

Who can violate HIPAA is limited to Covered Entities, Business Associates, and members of their workforces. If an organization is not a Covered Entity or Business Associate, or an individual is not a member of either’s workforce, it is not possible to violate HIPAA because HIPAA will not apply to the organization/individual.

What is a HIPAA violation of the Breach Notification Rule?

A HIPAA violation of the Breach Notification Rule is the failure to comply with any provision of 45 CFR 164 Subpart D when Protected Health Information has been acquired, accessed, used, or disclosed in a manner not permitted by the Privacy Rule, and the impermissible acquisition, access, use, or disclosure compromises the security or privacy of the Protected Health Information.

Is it a HIPAA violation to say someone is in the hospital?

It can be a HIPAA violation to say someone is in the hospital, but only in a limited number of circumstances. For example, the person making the statement must be a member of a Covered Entity’s workforce, the statement must be made to somebody with whom there is no direct treatment or familial relationship, and when the subject of the statement has not been given an opportunity to object to the statement being made.

Is inappropriate access to medical records a HIPAA violation example or a HIPAA breach example?

Inappropriate access to medical records is certainly a HIPAA violation example regardless of who the individual accessing the medical records is. Whether or not it constitutes a HIPAA breach example depends on whether the inappropriate access compromises the security or privacy of the Protected Health Information maintained in the medical records.

Is there a list of HIPAA violations?

There is no list of HIPAA violations because many HIPAA violations are reported to the organization at which they occurred, and they never become public knowledge. What you can find a list of is a list of HIPAA data breaches affecting more than 500 individuals that have been reported to HHS’ Office for Civil Rights. This list can be found on the HHS’ Breach Report web page.

Can you sue someone for disclosing medical information?

You cannot sue someone for disclosing medical information under HIPAA because HIPAA has no private right of action. However, if you believe someone has disclosed your medical information – and because of the disclosure you have suffered harm – you may be able to file a civil action under a state law. Because some states have privacy and security laws that include a private right or action and others don´t, it is best to seek legal advice from a local attorney.

How can I find out who has accessed my medical records?

You can find out who has accessed your medical records by requesting an Accounting of Disclosures from your healthcare provider. The healthcare provider has to reply to your request within 30 days and provide you with a list of every time you’re your medical records have been accessed for uses other than those permitted by the Privacy Rule (i.e., treatments, payments, etc.).

Who can access my medical records without my permission?

Your medical records can be accessed without your permission by any member of a Covered Entity’s or Business Associate’s workforce provided they have the authority to access your records and the reason why they are accessing your medical records is permitted by the Privacy Rule. If your medical records are accessed by somebody without the authority to do so, or for a reason not permitted by the Privacy Rule, this would be a violation of HIPAA.

Can a family member violate HIPAA?

A family member can violate HIPAA if, for example, they are also your dentist and they disclose your health information impermissibly. However, if the family member is not a member of the medical profession – or a member of a Covered Entity´s or Business Associate’s workforce – it is not possible for them to violate HIPAA because only Covered Entities, Business Associates, and members of their workforces are required to comply with HIPAA

 

HIPAA Compliance Infographics

The post The 10 Most Common HIPAA Violations You Should Avoid appeared first on HIPAA Journal.

FirstHealth Attacked with New WannaCry Ransomware Variant

FirstHealth of the Carolinas, a Pinehurst, SC-based not for profit health network, has been attacked with a new WannaCry ransomware variant.

WannaCry ransomware was used in global attacks in May this year. More than 230,000 computers were infected within 24 hours of the global attacks commencing. The ransomware variant had wormlike properties and was capable of spreading rapidly and affecting all vulnerable networked devices. The campaign was blocked when a kill switch was identified and activated, preventing file encryption.  However, FirstHealth has identified the malware used in its attack and believes it is a new WarnnaCry ransomware variant.

The FirstHealth ransomware attack occurred on October 17, 2017. The ransomware is believed to have been introduced via a non-clinical device, although investigations into the initial entry point are ongoing to determine exactly how the virus was introduced.

FirstHealth reports that its information system team detected the attack immediately and implemented security protocols to prevent the spread of the malware to other networked devices. While the attack was detected rapidly, the ransomware did spread to other devices in the same work areas.

FirstHealth has issued a statement confirming the ransomware attack did not involve the encryption of patient information, and reports that its Epic EHR was unaffected. However, access to its Epic system has been blocked as part of its security protocol to prevent the encryption of patient data and the system is still inaccessible. The MyChart service is online, but no information has been uploaded to the system since the attack occurred.

Even though the attack was limited it has caused considerable disruption. FirstHealth has the arduous task of individually checking 4,000 devices spread across 100 locations to confirm they have not been infected with the virus – a process that will take a considerable amount of time.

FirstHealth is continuing to provide medical services to patients, although the health network has had to cancel some appointments and patients are experiencing delays due to the lack of access to its systems. FirstHealth said, “Our team is working tirelessly to remediate the virus and get our system back up to be fully operational.”

FirstHealth says a patch to address the vulnerability exploited by the new Wannacry ransomware variant has been developed and the patch is being applied on all vulnerable devices. FirstHealth said, “This patch will be added to anti-virus software available for others in the industry to apply to their systems,” suggesting it is not the same patch (MS17-010) that was made available by Microsoft in March to block the SMB flaw that the May 2017 WannaCry attacks exploited.

The post FirstHealth Attacked with New WannaCry Ransomware Variant appeared first on HIPAA Journal.

Beazley Publishes 2017 Healthcare Data Breach Report

Beazley, a provider of data breach insurance and response services, has published a special report on healthcare data breaches covering the first nine months of 2017.

While hacking and malware attacks are common, by far the biggest cause of healthcare data breaches in 2017 was unintended disclosures. Hacking and malware accounted for 19% of breaches, while unintended disclosures accounted for 41% of incidents. The figures show healthcare organizations are still struggling to prevent human error from resulting in the exposure of health data.

As Beazley explains in its report, it is easier to control and mitigate internal breaches than it is to block cyberattacks by outsiders, yet many healthcare organizations are failing to address the problem effectively. “We urge organizations not to ignore this significant risk and to invest time and resources towards employee training.”

Beazley notes that the number of cases of employee snooping on records and other insider incidents is getting worse. This time last year, 12% of healthcare data breaches were insider incidents, but in 2017 the percentage has increased to 15%.

While it is not possible to eliminate the risk of healthcare employees improperly accessing patient records, it is straightforward to ensure that when incidents occur they are detected quickly. As the Protenus Breach Barometer reports clearly show, many healthcare employees have been discovered to have been improperly accessing patient health data for months or even years before the unauthorized access is detected. As Beazley points out in the report, the failure to detect insider incidents promptly and take action increases the risk of regulatory action.

Phishing and social engineering attacks also increased significantly in 2017. There has been a 9-fold increase in social engineering scams in 2017. Beazley reports that two types of social engineering attacks in particular have increased in 2017 – Fraudulent instruction incidents and W-2 Form phishing scams.

Fraudulent instruction incidents are a type of Business Email Compromise (BEC) scam where the attacker pretends to be a company executive and sends a request to make a bank transfer. W-2 Form phishing scams similarly involve the spoofing of a company email address. In this case a request is made to send the W-2 forms of all employees that have worked in the previous fiscal year. The information is then used to submit fraudulent tax returns. Healthcare organizations can reduce risk by teaching employees how to recognize these types of email scams.

Along with an increase in data breaches, there has also been an increase in HIPAA enforcement actions by the Department of Health and Human Services’ Office for Civil Rights (OCR). The report notes that there have been nine settlements announced so far in 2017 on top of 13 HIPAA settlements in 2016. In 2014 and 2015 there were 13 settlements.

There has also been a notable increase in settlement amounts. In 2014/2015, the average settlement amount was around $1,000,000. In 2016/2017, the average settlement was $1.8 million.

As Beazley explained in the report, experiencing a breach opens the door to OCR investigators. Part of the OCR breach investigation involves a review of basic HIPAA compliance. When noncompliance is discovered, financial penalties may be deemed appropriate.

Beazley explains there are two main reasons for the increase in settlements for noncompliance with HIPAA Rules: OCR’s growing frustration with covered entities that are still failing to comply with the HIPAA Privacy and Security Rules, and more available resources to devote to pursuing settlements.

The post Beazley Publishes 2017 Healthcare Data Breach Report appeared first on HIPAA Journal.

RiverMend Health Email Breach Impacts 1300 Patients

Augusta, GA-based RiverMend Health, a provider of specialty behavioral health services including services for drug and alcohol addiction, has discovered an unauthorized individual has gained access to the email account of one of its employees.

The unauthorized access was detected on August 10, 2017, when suspicious emails were identified being sent from the employee’s account. The suspicious email activity was investigated and access to the account was blocked on August 11, 2017. The investigation revealed access to the account was first gained two weeks previously on July 27.

During the two weeks that the email account was accessible, it is possible that the employee’s emails were accessed by the attacker. Those emails contained a range of protected health information of 1,300 current and former patients.  RiverMend Health has retained the services of a leading computer forensics firm to assist with the investigation and determine the full nature of the breach and the extent of the attack. RiverMend Health has not disclosed how access to the email account was gained, but has said steps have been taken to prevent further breaches of this nature from occurring.

The investigation has not uncovered any evidence to suggest emails – and PHI – were accessed, stolen, or misused, nor that the theft of protected health information was the reason for the attack. However, it was not possible to rule out PHI access with a high degree of certainty.

Patients have now been notified of the breach by mail and have been advised that the following information was potentially accessed: names, age or date of birth, address, referral source, RiverMend facility used, services rendered, demographic information, insurance and/or billing details, and diagnostic information.

All patients impacted by the breach have been encouraged to exercise caution and check their credit reports, accounts, and explanation of benefits statements for any sign of suspicious activity and to report any suspicious activity to RiverMend immediately.

The post RiverMend Health Email Breach Impacts 1300 Patients appeared first on HIPAA Journal.