Data Breaches Announced by Three Oral Healthcare Practices

Data breaches have been announced by the Washington dental practice 32 Pearls, West Texas Oral Facial Surgery, and the Indiana dental and general healthcare services provider Mid America Health.

32 Pearls, Washington

Dr. Michael Bilikas and Associates, doing business as 32 Pearls, a dental practice with locations in Seattle and Tacoma in Washington state, has recently disclosed a security incident that was detected on May 22, 2025. Ransomware was used to encrypt files on its systems, and third-party cybersecurity experts were engaged to determine the scope of the incident.  They concluded that the ransomware actor had access to certain systems between May 19, 2025, and May 22, 2025, and may have viewed or acquired files containing patient data.

The file review has recently been completed, and notifications are being sent to 23,517 current and former patients, who have been offered complimentary credit monitoring and identity theft protection services. Information exposed in the incident included full names, addresses, driver’s license numbers, Social Security numbers, and medical information. At the time of issuing notifications, the practice was unaware of any misuse of patient information as a result of the incident. Internal processes are being reviewed, and security measures have been enhanced to prevent similar incidents in the future.

West Texas Oral Facial Surgery

West Texas Oral Facial Surgery in Lubbock, Texas, has notified 11,151 patients about a security incident in which some of their protected health information may have been compromised. The practice experienced network disruption on May 29, 2025, and engaged third-party cybersecurity experts to investigate and determine the nature and scope of any unauthorized activity.

The investigation confirmed that there had been unauthorized access to its network, and patient data may have been compromised. The substitute breach notice does not state when the unauthorized access occurred. The file review was completed on July 18, 2025, and confirmed that the exposed data included first and last names, imaging files, which in some cases included birth dates, and the reason given for seeking treatment. The electronic medical record system was not accessed, and Social Security numbers and financial information were not involved. Cybersecurity experts are conducting a review of systems, security, and practices, and measures will be taken to improve security. The Inc Ransom ransomware group claimed responsibility for the attack and added West Texas Oral Facial Surgery to its data leak site on June 18, 2025.

Mid America Health, Indiana

Mid America Health, a Greenwood, IN-based provider of dental and general healthcare services to state and federal government agencies, has notified the Massachusetts Attorney General about a data incident that involved unauthorized access to personal information. The notification provides no information about the nature of the data incident, such as when it occurred, or what happened, only stating that the breached information included first and last names, Social Security numbers, and financial account information, and that the affected individuals have been offered complimentary credit monitoring services for 24 months.

Individual notification letters were mailed to the affected individuals on July 31, 2025. There is currently no listing on the HHS’ Office for Civil Rights breach portal, so it is unclear how many individuals have been affected.

The post Data Breaches Announced by Three Oral Healthcare Practices appeared first on The HIPAA Journal.

The Top HIPAA Threats Are Not What You Think

The top HIPAA threats are threats from insiders who, either due to a lack of HIPAA training or a lack of security awareness, violate HIPAA standards or make mistakes that allow cybercriminals to access healthcare networks. While more training could help mitigate these top HIPAA threats, a fairly enforced sanctions policy will likely be more effective.

Many articles listing the top HIPAA threats pretty much follow a similar theme. Protect devices against theft, protect data against cybercriminals, and protect yourself against unauthorized third party disclosures by signing a Business Associate Agreement. Unfortunately these articles are way off the mark.

Inasmuch as the recommendations are sensible, and indeed should be followed, they fail to address the top HIPAA threats – employees. According to the recently-published IBM X-Force Threat Intelligence Report, 71% of recorded data breaches in the healthcare industry are attributable to employee actions. Employees responsible for data breaches are divided into two categories – “malicious Insiders” (25%) and “inadvertent actors” (46%).

A Quarter of Healthcare Data Breaches Attributable to Malicious Insiders?

Although IBM´s Intelligence Report focuses on the number of breaches – rather than the number of records breached – the percentage of data breaches attributed to malicious insiders appears high. However, it is not the case that a quarter of the medical profession is stealing Protected Health Information for personal gain. A closer inspection of the data reveals the “malicious insiders” category includes employees snooping on the medical records of friends, colleagues, and celebrity patients.

Snooping was identified as the largest single cause of data breaches in the healthcare industry in a 2013 study conducted by Veriphyr Identity and Access Intelligence. As snooping constitutes an unauthorized disclosure of Protected Health Information, it is classified as a violation of HIPAA and therefore – by the number of violations alone – is one of the top HIPAA threats covered entities should be aware of. It is certainly a threat OCR would expect a covered entity to address in a HIPAA risk assessment.

Other Data Breaches Attributable to Malicious Insiders Tend to Attract Headlines

Whereas snooping can be the biggest cause of employee HIPAA violations by number, the biggest cause of employee HIPAA violations by records breached is insider data theft. In a recent high-profile case, a secretary employed by the Jackson Health System in Florida was charged with accessing more than 24,000 computerized patient records and selling the data to criminals, who subsequently used it to file fraudulent tax returns with the Internal Revenue Service.

A spate of high-volume data breaches around the same time prompted the HHS´ Office for Civil Rights to issue a reminder to covered entities to take action to prevent insider data theft. Unfortunately many covered entities appear not to have responded to the reminder. A survey conducted in late 2016 revealed half of healthcare IT professionals were more concerned about insider data theft than external data theft, but were not given the resources to deal with the threat.

Are Inadvertent Actors Really More of a HIPAA Threat than Cybercriminals?

According to the basic data it would appear so. However, the category of “inadvertent actors” includes victims of phishing attacks and IT professionals who fail to configure their security mechanisms properly; so it may be more accurate to rename this category “employees who inadvertently invited cybercriminals to steal data”. Nonetheless, the percentage of reported data breaches attributable to inadvertent actors is nearly twice that of external hacks.

This would imply another of the top HIPAA threats is a lack of employee awareness. Phishing is a massive threat to HIPAA compliance, but it is one that can mitigated with phishing simulation training. Similarly, errors made by IT security can be reduced by implementing procedures to review the configuration of security mechanisms on a regular basis – which should be part of an annual risk assessment in any case. Basically, data breaches due to inadvertent actors are mostly avoidable.

The Top HIPAA Threats and How to Defend Against Them

At HIPAA Journal we strongly recommend covered entities encrypt data, implement two-factor authentication and conduct due diligence on business associates. These practices – and others provided by HIPAA threat-style articles- will help defend against some HIPAA threats, but not the top HIPAA threats. In order to defend against the top HIPAA threats of snooping, insider data theft and a lack of employee awareness, covered entities need to:

  • Implement strong policies relating to employee conduct and enforce them with an equally strong sanctions policy.
  • Implement effective access controls that monitor who accesses PHI when and where, and what happens to it afterwards.
  • Implement a comprehensive HIPAA training program to raise employee awareness – particularly in the area of Internet security.

More than anything, covered entities need to allocate more resources to eliminating data breaches attributable to employee actions. If the data provided in the IBM X-Force Threat Intelligence Report is taken at face value, covered entities should allocate three times as many resources to defending against the top HIPAA threats that come from within than they allocate to external threats.

The post The Top HIPAA Threats Are Not What You Think appeared first on The HIPAA Journal.

Cencora & The Lash Group Settle Data Breach Litigation for $40 Million

Cencora & The Lash Group have agreed to pay $40 million to settle class action data breach litigation over a February 2024 data breach that affected more than 1.43 million individuals.

Cencora, Inc., formerly AmerisourceBergen, is an American drug wholesale company and a contract research organization, and The Lash Group is a pharmaceutical solutions organization. Cencora disclosed the data breach in a February 21, 2024, filing with the U.S. Securities and Exchange Commission (SEC), stating that on February 21, 2024, the company learned that data had been exfiltrated from its information systems.

On July 31, 2024, an updated SEC filing confirmed that more data had been stolen than initially thought. At least 27 pharmaceutical companies were affected, and the stolen personal and protected health information included names, addresses, dates of birth, Social Security Numbers, health and insurance information, financial information, transactional information, consumer profile information, racial/ethnic identity, political opinions, sexual orientation/identity, criminal history, IP addresses, other electronic identifiers, biometric information, genetic information, trade union membership information, and driver’s license and passport information.

Since the breach has been reported separately by several different entities, the total number of affected individuals is not known. TechCrunch tracked breach reports submitted to state Attorneys General and reports that at least 1.43 million individuals have been notified that their data was compromised in the February security incident. Only a few states publish breach report data that includes the number of affected individuals, so the total is likely to be significantly higher than 1.43 million.

Several class action lawsuits were filed against Cencora, the Lash Group, and the affected pharmaceutical firms (see the list below). The lawsuits were consolidated in a single action – Anaya et Al. v. Cencora, Inc., et al. – in the U.S District Court for the Eastern District of Pennsylvania. The defendants were alleged to have been negligent by failing to implement reasonable and appropriate safeguards to protect sensitive data, and as a result of that negligence, sensitive data was stolen.

The defendants chose to settle the lawsuit with no admission of wrongdoing or liability and will establish a $40 million settlement fund to cover attorneys’ fees (up to $13,333,333.33), attorneys’ expenses (up to $300,000), service awards to the 28 class representatives (total $42,000), and settlement administration costs (yet to be determined).

The remainder of the settlement fund will be used to pay benefits to class members. Class members may choose to submit a claim for reimbursement of documented, unreimbursed out-of-pocket losses fairly traceable to the data breach, which were incurred on or after September 1, 2023. Claims have been capped at $5,000 per class member, and the total loss payments are capped at $5,000,000. If that total is exceeded, claims will be paid pro rata. Alternatively, class members may claim a cash fund payment, the value of which will depend on the number of valid claims received.

The dates for exclusion from and objection to the settlement will be 150 days from the date the settlement receives preliminary approval from the court. The deadline for submitting a claim will be 180 days from the date of preliminary approval, and the final approval hearing will be scheduled for 230 days after the preliminary approval date. Claims will be paid between 306 and 311 days after the preliminary approval date. Further information can be found on the settlement website, which is not yet live – cencoraincidentsettlement.com

August 2, 2024: Cencora: Additional Data Exfiltrated in February 2024 Cyberattack

On July 31, 2024, in an updated filing with the Securities and Exchange Commission (SEC), the pharmaceutical firm Cencora explained that more data was exfiltrated from its network in its February 2024 cyberattack than was initially thought, including personally identifiable information (PII) and protected health information (PHI). The majority of the additional data was maintained by one of its subsidiaries that provides patient support services.

The review of the exfiltrated data is still ongoing, and notifications will be issued to the affected individuals in due course. Cencora did not state how many individuals have been affected, the name of the subsidiary company, or the types of data that were compromised in the incident.

Three HIPAA breach reports have previously been filed with the HHS Office for Civil Rights as a result of the Cencora cyberattack, two by AmerisourceBergen Specialty Group which affected 252,214 individuals and 3,102 individuals, and one by The Lash Group, which affected 15,196 individuals. Many of the affected companies have also filed breach reports with state attorneys general, as detailed in previous reporting by the HIPAA Journal (see below).

While data has been stolen, Cencora is unaware of any actual or attempted misuse of the affected data and does not believe any of the stolen data has been published online. Cencora believes the incident has been contained; however, the remediation efforts and file review are ongoing. Cencora has engaged cybersecurity experts to assist with reinforcing cybersecurity measures and strengthening cyber threat monitoring.

May 27, 2024: 2 Dozen Pharmaceutical Companies Affected by Cencora Cyberattack

Cencora, Inc. (formerly AmerisourceBergen), and its Lash Group affiliate have been affected by a cyberattack. Cencora announced the attack in a February 2024 filing with the Securities and Exchange Commission (SEC); however, at that point, the extent of the data breach had yet to be determined, although Cencora did confirm in the SEC filing that data was exfiltrated in the attack.

Cencora is a Conshohocken, PA-based company that partners with pharmaceutical firms, healthcare providers, and pharmacies and offers drug distribution, patient support and services, business analytics and technology, and other services. Around 20% of pharmaceutical products sold and distributed in the United States are handled by Cencora.

Last week, clients of Cencora and The Lash Group started notifying state Attorneys General about the data breach. The total number of affected clients has not yet been confirmed, but the breach is known to have affected at least 27 pharmaceutical and biotechnology companies and involved the theft of the personal data of hundreds of thousands of individuals. Based on the notifications sent to state Attorneys General so far, the following pharmaceutical and biotechnology companies have been affected:

  • Abbot
  • AbbVie Inc.
  • Acadia Pharmaceuticals Inc.
  • Acrotech Biopharma Inc.
  • Amgen Inc.
  • Bausch Health Companies Inc.
  • Bayer Corporation
  • Bristol Myers Squibb Company and Bristol Myers Squibb Patient Assistance Foundation
  • CareDx, Inc
  • Dendreon Pharmaceuticals LLC
  • Endo Pharmaceuticals Inc.
  • Genentech, Inc.
  • GlaxoSmithKline Group of Companies and the GlaxoSmithKline Patient Access Programs Foundation
  • Heron Therapeutics, Inc.
  • Incyte Corporation
  • Johnson & Johnson Services, Inc.& Johnson & Johnson Patient Assistance Foundation, Inc.
  • Marathon Pharmaceuticals, LLC/PTC Therapeutics, Inc.
  • Novartis Pharmaceuticals Corporation
  • Otsuka America Pharmaceutical, Inc.
  • Pfizer Inc.
  • Pharming Healthcare, Inc.
  • Rayner Surgical Inc.
  • Regeneron Pharmaceuticals, Inc
  • Sandoz Inc.
  • Sumitomo Pharma America, Inc. / Sunovion Pharmaceuticals Inc.
  • Takeda Pharmaceuticals U.S.A., Inc.
  • Tolmar

While State Attorneys general often publish notices of data breaches, they do not always state how many individuals have been affected, so the scale of the breach is unknown at this stage. Cencora detected the cyberattack on February 21, 2024, and took immediate action to contain the attack and prevent further unauthorized access. The forensic investigation confirmed that a threat actor had exfiltrated data from its systems, including patient data provided by its clients for its patient support programs. AmerisourceBergen Specialty Group (ABSG), a unit of Cencora, said the breach involved data of a prescription supply program run by the now defunct subsidiary, Medical Initiatives Inc. AmerisourceBergen Specialty Group has filed two separate breach reports with the Office for Civil Rights affecting 252,214 and 3,102 patients. The Lash Group has reported the breach to OCR separately as affecting 15,003 individuals

On April 10, 2024, Cencora confirmed that the stolen data included first names, last names, addresses, dates of birth, health diagnoses, and/or medications and prescriptions. Cencora’s investigation found no connection with other major healthcare cyberattacks such as the attacks on Change Healthcare and Ascension; and at the time of issuing notifications, Cencora/LashGroup said they were unaware of any actual or attempted misuse of the stolen data and had not detected any public disclosure of the stolen data. While data misuse has not been identified, the affected individuals have been offered 24 months of credit monitoring and identity theft remediation services at no cost. Steps have also been taken to harden defenses to prevent similar security breaches in the future. At the time of publication, no cybercriminal group appears to have claimed responsibility for the attack.

The post Cencora & The Lash Group Settle Data Breach Litigation for $40 Million appeared first on The HIPAA Journal.

Building a Stronger Compliance Program With Software

Healthcare compliance software is a comprehensive management tool that helps professional compliance officers to effectively oversee compliance efforts across their organization’s facilities, by proactively managing risk, streamlining workflows, improving collaboration, and demonstrating the achievement of compliance objectives to stakeholders.

What Are The Benefits Of Healthcare Compliance Software?

For a compliance pro, the benefits of compliance software are:

1. Increased Visibility: Compliance software provides real-time visibility into compliance activities across sites, including incident management, allowing the chief compliance officer to monitor progress, track key metrics, and identify areas that require attention, on  a per site and per employee basis. This increased visibility and granularity enhances the chief compliance officer’s ability to effectively oversee compliance efforts across the organization.

2. Streamlined Workflows: Compliance software automates many administrative tasks related to compliance management, such as tracking compliance activities, scheduling self-audits, and managing documentation. This saves time and reduces manual effort for all compliance team members.

3. Enhanced Reporting: Customizable reporting and analytics allow compliance officers to generate detailed reports on compliance activities, performance metrics, and audit findings. These reports help communicate compliance efforts to senior management, regulators, and other stakeholders, showcasing a commitment to compliance excellence. They also make evidence tracking simple so that this can be provided for an audit.

4. Centralized Documentation: By providing a centralized repository for storing and managing compliance-related documents, such as policies, procedures, training materials, and audit reports, healthcare compliance software ensures that all relevant documentation is organized, up-to-date, and easily accessible when needed.

5. Improved Collaboration: Facilitating collaboration and communication among compliance team members, stakeholders, and other departments, compliance software for healthcare organizations improves coordination and alignment on compliance initiatives. This enhances the chief compliance officer’s ability to create an exemplary compliance culture across the organization.

6. Reduced Risk: By automating compliance processes, providing real-time visibility into compliance activities, and facilitating proactive risk management, healthcare regulatory compliance software helps compliance officers minimize risk and mitigate potential compliance failures.

What To Consider When Purchasing Healthcare Compliance Software?

There are three aspects to consider when purchasing healthcare compliance software:

Healthcare Compliance Software For Compliance Managers1. Essential Functionality

2. Software Specifications

3. Business Considerations

The following buyer’s framework has been designed to guide you to find the most suitable solution for your organization’s compliance objectives, through a comprehensive and objective assessment of available options.

1. What Essential Functionality Is Required For Healthcare Compliance Software?

The best healthcare compliance software solution is a flexible all-in-one healthcare compliance system that follows a recognized framework like the OIG-HHS Seven Fundamental Elements Of An Effective Compliance Program. It should offer real-time visibility of compliance objectives across all the organization’s facilities, and because all organizations are different, it should have both prebuilt and fully customizable options.

The following is the essential functionality for your organization’s healthcare regulatory compliance requirements:

1. All In One Compliance

  • Does the software cover all healthcare regulatory areas such as HIPAA, OSHA, and SOC 2 compliance?
  • Does the software allow you to customize your own compliance standards?
  • Does it include OIG exclusion screening and monitoring?

2. Risk Management

  • Self-audit and external audit management
  • Risk scoring
  • Gap identification
  • Remediation planning
  • Evidence tracking

3. Incident Response & Management

  • Anonymous incident reporting for employees
  • Breach incident reporting
  • Breach management tools for internal and external incidents

4. Policies & Procedures

  • Templated and customizable policies and procedures
  • Policy and procedure management
  • Central storage of policies and procedures
  • Employee attestation management
  • Employee portal for easy access to review policies

5. Employee Training

  • Train, track, and manage compliance training for employees
  • Up-to-date compliance training modules
  • Personalized, individual employee training certificates
  • Training beyond HIPAA covering other HR needs such as OSHA and Fraud Waste & Abuse

6. Vendor Management

  • Identify and track business associates
  • Customizable business associate agreement templates
  • Store and track business associate agreements
  • Vendor due diligence and risk scoring
  • Contract management and vendor exclusion screening

7. Multi-Site Management

  • Manage the compliance levels at each site in an organization separately

8. Reporting

  • Customizable reporting templates including reports to demonstrate compliance with stakeholders or regulators
  • Centralized documentation storage
  • Audit logging and reports

8. Employee Screening

  • Ability to check the HHS OIG Exclusions list
  • Sanction screening 
  • Employee conformance scoring
  • HRIS integrations

2. What Are The Software Specifications To Consider For Compliance Solutions?

Software specifications are aspects of a solution, such as usability or scalability, that are not about specific functionality but describe the broader qualities of the software. Specifications can help inform your decision when comparing healthcare compliance management software options.

1. Ease Of Use

  • Assess the software’s overall user experience, including the user interface and navigation menus.
  • Does the software have an intuitive interface that includes workflows for conducting compliance activities?
  • Do dashboards demonstrate at a glance the overall compliance state of the organization, while also showing individual tasks, messages, and alerts like in our example below?

Healthcare Compliance Software Dashboards

  • How user-friendly are the training modules that employees will be required to take as part of the organization’s compliance?

2. Customization

  • Are workspaces customizable?
  • Are documents such as policies customizable?
  • Are reports customizable?

3. Scalability & Flexibility

  • Can the software accommodate your organization’s current scale, for example, to manage multiple locations?
  • Can it scale up and adapt to your organization’s evolving future needs?

4. Integration Capabilities

  • How will the software integrate with your existing IT infrastructure and the other third-party applications used within your organization?
  • Cloud-based solutions are the easiest to implement, and have the advantage that ongoing infrastructure maintenance is the responsibility of the software vendor.

5. Future Proofing

  • How will the software vendor address regulatory changes and updates to ensure ongoing compliance in a timely manner?

3. What Are The Business Considerations When Choosing Software?

Often when evaluating functionality and specifications, a favored vendor will quickly emerge. Nevertheless, it is recommended that you fully examine the commercial and business considerations before a final decision is made.

1. Vendor Reputation

  • Is the software endorsed by any medical associations?
  • Does the vendor have up-to-date case studies and testimonials from other similarly sized healthcare organizations that have successfully implemented the solution?
  • It is always a good idea to speak directly with existing customers about their experiences with both the software and the vendor.
  • It is better to speak to “random” customers than those provided by the vendor because it is highly unlikely they will provide a reference for an organization with a poor experience.
  • If you have compliance department contacts across the healthcare industry consider reaching out to ask if anyone has direct experience with your favored vendor.

2. Vendor Training & Support

  • Does the vendor offer live support throughout the initial implementation phase?
  • What training is offered for your compliance team?
  • After setup what ongoing support is offered? Is it 24 x 7?

3. Costs 

  • Look for a transparent breakdown of pricing structures, including initial setup costs, licensing fees, and any additional charges for support or updates.
  • Is there a one-time purchase cost or is it a subscription-based model? Subscriptions have become the most common way to purchase cloud-based software.
  • If fees are charged on a per-seat subscription basis then how will they change as the organization grows?
  • If cost is an issue and it appears that the solutions on your shortlist are similar, ensure you create a price comparison table taking all factors into account, such as extra costs for training or support.
  • You can also do the same comparison exercise based on growth scenarios. You don’t want to choose a cheaper solution now that turns into a far more expensive solution later on.
  • Does the vendor offer discounts? For example, they may offer a group discount for an association you may already be a member of. It’s always worth asking as often this can be 15% or more off the list price annually.

4. Free Trial Or Money Back Guarantee

  • A full demonstration may be enough to help you make your decision, but sometimes a short trial period can be helpful if you have any doubts. It also allows you to ask your colleagues to take a look at their convenience before a final decision is made.
  • Not all software is suitable for a free trial because of the effort required for the setup by both the vendor and the healthcare organization. In this scenario, you could ask for a guarantee that if you are not satisfied you have the option to back out of the agreement within a certain period.

5. Software Licence Period

  • What is the commitment period you are signing up for? Is it month-by-month or year-by-year? Is there a minimum period such as three or five years? Read the small print on any agreement before you send it to your legal department.
  • The advantage of shorter periods is that the onus is on the software vendor to ensure you are kept happy because they won’t want you to cancel. Alternatively, if you are willing to sign up for a longer period then you may be able to negotiate a lower annual cost.

Buyers Guide Best HIPAA Compliance SoftwareFree Buyer’s Guide

We have compiled a free buyer’s guide to choosing the best healthcare regulatory compliance software. This includes a checklist for the three aspects discussed in this article where you can rate up to three different solutions and compare your results. This guide to choosing healthcare compliance software can be downloaded by filling in the form on this page.

The post Building a Stronger Compliance Program With Software appeared first on The HIPAA Journal.

Why HIPAA Compliance Software Is Perfect For Small Medical Practices

For most small medical practices HIPAA compliance software is a very helpful and inexpensive tool that makes navigating the complexities of HIPAA simple, while also fostering peace of mind through a comprehensive risk management processes.

Best HIPAA Compliance Software For HIPAA OfficersAt smaller organizations with under 100 employees, responsibility for HIPAA compliance normally falls to an administrator or practice manager who usually won’t have deep knowledge of compliance matters. For these multitasking individuals, HIPAA compliance software reduces the administrative burden and lessens the likelihood of an expensive HIPAA breach.

What Are The Benefits Of HIPAA Compliance Software?

The benefits of using HIPAA compliance software for an administrator or practice manager are as follows:

  • Reduced Administrative Burden: HIPAA compliance software automates many administrative tasks related to compliance management, such as tracking training requirements, managing documentation, and scheduling audits. This frees up time and reduces the administrative burden.
  • Effective Risk Management: HIPAA compliance solutions provide tools for conducting risk assessments, identifying vulnerabilities, and implementing risk mitigation strategies.
  • Confidence In Role: The best HIPAA compliance software offers built-in guidance, templates, and best practices to support compliance efforts. This helps the compliance officer feel more confident in their ability to fulfil their responsibilities, even without specialized training or expertise in compliance matters.
  • Reduced Stress: By using HIPAA compliance tracking software, individuals can feel reassured that they are taking all necessary steps to protect patient information and maintain compliance with HIPAA. This peace of mind reduces the stress and uncertainty associated with compliance management.

What To Consider When Purchasing HIPAA Compliance Software?

By following our buyer’s guide framework, you can make a thorough assessment of the best HIPAA compliance software options and select the most suitable solution to support your organization’s requirements. There are three aspects to consider when purchasing HIPAA compliance software which are discussed in detail below:

1. Essential Functionality

2. Software Specifications

3. Business Considerations

1. What Essential Functionality Is Required For HIPAA Compliance Software?

The best HIPAA compliance software should be a flexible system that follows a recognized framework like the HHS’s Seven Fundamental Elements Of An Effective Compliance Program. It should offer both a prebuilt approach and customizable options.

The solution needs to ultimately provide proof of compliance for patients, clients, and auditors, and ideally offer a certification process for this.

For compliance officers with little experience, the initial setup of the software is key. The best HIPAA compliance solutions offer some form of live compliance coaching to guide you through each step of setting up your HIPAA compliance program. 

The following essential functionality will allow you to confidently address your organization’s compliance requirements:

1. Risk Assessment

  • Risk assessment tools
  • Risk scoring
  • Gap identification
  • Remediation planning
  • Evidence tracking (for inspections)
  • Guidance wizards to help set-up and identify action plan

2. Incident Response

  • Anonymous incident reporting for employees
  • Breach incident reporting
  • Breach management tools

3. Policies & Procedures

  • Templated and customizable policies and procedures
  • Policy and procedure management
  • Central storage of policies and procedures
  • Employee attestation management
  • Employee portal for easy access to review policies

4. Employee Training

  • Train, track, and manage HIPAA compliance training for employees
  • Up-to-date HIPAA compliance training modules
  • Personalized, individual employee training certificates
  • Training beyond HIPAA covering other HR needs such as OSHA and Fraud Waste & Abuse

5. Vendor/ Business Associate Management

  • Identify and track business associates
  • Customizable business associate agreement templates
  • Store and track business associate agreements
  • Vendor due diligence and risk scoring
  • Contract management and vendor exclusion screening

6. Multi-Site Management

  • Manage the compliance levels at each site in an organization separately

7. Reporting

  • Customizable reporting templates including reports to demonstrate compliance to stakeholders or regulators
  • Centralized documentation storage
  • Audit logging and reports

8. Employee Screening (not essential)

  • Ability to check the HHS OIG Exclusions list
  • Sanction screening 
  • Employee conformance scoring
  • HRIS integrations

Healthcare Compliance CategorieWhat other features should you consider for your HIPAA compliance solution?

  • Consider if you also need OSHA (Dental or Medical) and SOC 2 compliance, and if so, ensure your chosen software can provide this as an all-in-one healthcare compliance solution.
  • Does the software allow you to customize your own compliance standards?

2. What Are The Software Specifications To Consider For HIPAA Compliance Solutions?

Software specifications are aspects of a solution, such as usability or scalability, that are not about specific functionality but describe the broader qualities of the software. Specifications will help inform your decision when comparing HIPAA compliance software solutions.

1. Ease Of Use

  • Assess the software’s overall user experience, including the user interface and navigation around the solution.
  • Does it have an intuitive interface that includes guided workflows for conducting compliance activities? This is vital to make it easier for individuals without deep compliance expertise to navigate the compliance process.
  • How user-friendly are the training modules that employees will be required to take as part of the organization’s compliance?

Best HIPAA Compliance Software Dashboard

2. Scalability & Flexibility

  • Can the software accommodate your organization’s current scale, for example, to manage multiple locations?
  • Can it scale up and adapt to your organization’s evolving future needs?

3. Integration Capabilities

  • How will the software integrate with your existing IT infrastructure and the other third-party applications used within your organization?
  • Cloud-based solutions are the easiest to implement, and have the advantage that ongoing infrastructure maintenance is the responsibility of the software vendor.

4. Future Proofing

  • How will the software vendor address regulatory changes and updates to ensure ongoing compliance in a timely manner?

3. What Are The Business Considerations When Choosing Software?

You may find that when evaluating functionality and specifications, a favored vendor will emerge and you feel ready to award them the business right away. It is highly recommended that you don’t allow yourself to be pressured into a fast decision before fully examining the commercial and business considerations.

1. Vendor Reputation

  • Is the software endorsed by any medical associations?
  • Do they have current case studies and testimonials from other healthcare organizations that have successfully implemented the software?
  • It is always a good idea to request references i.e. to directly speak with existing customers about their experiences with both the software and the vendor.

2. Vendor Training & Support

  • Does the vendor offer live support to guide you through the setup of their HIPAA compliance software solution?
  • Is there a separate cost for this, or is it included in the price?
  • After setup what ongoing support is offered and it is this included in the vendor’s annual charges?

3. Costs

  • Look for a transparent breakdown of pricing structures, including initial setup costs, licensing fees, and any additional charges for support or updates.
  • Is there a one-time purchase cost or is it a subscription-based model? Subscriptions have become the most common way to purchase cloud-based software.
  • If cost is an issue and it appears that the solutions on your shortlist are similar, ensure you create a price comparison table taking all factors into account, such as extra costs for training or support. For example, whether HIPAA training is included or not.
  • Does the vendor offer discounts? For example, they may offer a group discount for an association you may already be a member of. It’s always worth asking as often this can be 15% or more off the list price annually.

4. Free Trial Or Money Back Guarantee

  • A full demonstration may be enough to help you make your decision, but sometimes a short trial period can be helpful if you have any doubts. It also allows you to ask your colleagues to take a look before a final decision is made.
  • Not all software is suitable for a free trial because of the effort required for the setup by both the vendor and the customer. In this scenario, you could ask for a guarantee that if you are not satisfied you have the option to back out of the agreement within a certain timeframe, like 30 days.

5. Software License Period

  • What is the commitment period you are signing up for? Is it month-by-month or year-by-year? Is there a minimum period such as three or five years? Read the small print on any agreement.
  • The advantage of shorter periods is that the onus is on the software vendor to ensure you are kept happy because they won’t want you to cancel. Alternatively, if you are willing to sign up for a longer period, or pay for a year in advance, then the annual costs may be reduced.

Free Buyer’s Guide

We have compiled a free buyer’s guide to choosing HIPAA compliance software. This includes a checklist for the three aspects discussed in this article where you can rate up to three different solutions and compare your results.

This guide to choosing the best HIPAA compliance software can be downloaded by filling in the form on this page.

 

The post Why HIPAA Compliance Software Is Perfect For Small Medical Practices appeared first on The HIPAA Journal.