[BreachExchange] HHS Office of Civil Rights and $15 Million in HIPAA Settlement Payments in 2016

Inga Goddijn inga at riskbasedsecurity.com
Wed Jul 27 19:55:40 EDT 2016


http://www.natlawreview.com/article/hhs-office-civil-rights-and-15-million-hipaasettlement-payments-2016

For years, many questioned whether the *HIPAA* privacy and security rules
would be enforced. The agency responsible for enforcement, *Health and
Human Services’ Office for Civil Rights (OCR)*, promised it would enforce
the rules, but just after a period “soft” enforcement and compliance
assistance. That period appears to be ending. During the first seven months
of 2016, OCR has announced <http://www.hhs.gov/hipaa/newsroom/index.html>
nearly $15,000,000 in settlement payments to the agency relating to a wide
range of compliance failures alleged against covered entities and business
associates. At the same time, OCR is conducting audits of covered entities
around the country, and plans similar audits of business associates later
this year. If you have been waiting to tackle HIPAA compliance, it is
probably a good time to get it done.

Below is a summary of the circumstances that led to some of the settlements
and civil monetary penalties:

   -

   *Stolen laptop, vulnerable wireless access*. Following notification to
   OCR of a breach involving a stolen laptop (not an uncommon occurrence!),
   OCR investigated and reported discovering that electronic protected health
   information (ePHI) on the covered entity’s network drive was vulnerable to
   unauthorized access via its wireless network – users could access 67,000
   files after entering a generic username and password. OCR also cited among
   other things failures to implement policies and procedures to prevent,
   detect, contain, and correct security violations, to implement certain
   physical safeguards. Settlement $2.75M
   -

   *Vulnerabilities identified must be timely addressed*. In another case,
   a covered entity had conducted a number of risk analyses since 2003, but
   the OCR claimed these analyses did not cover all ePHI at the entity. OCR
   also reported that the covered entity did not act timely to implement
   measures to address documented risks and vulnerabilities, nor did it
   implement a mechanism to encrypt and decrypt ePHI or an equivalent
   alternative measure, despite having identified this lack of encryption as a
   risk. Settlement $2.7M.
   -

   *Not-for-profits serving underserved communities not immune. *A data
   breach affecting just over 400 persons caused by the theft of a
   company-issued iPhone triggered an OCR investigation. The iPhone was
   unencrypted and was not password protected, and contained extensive ePHI
   including SSNs, medical diagnosis, and names of family members and legal
   guardians. According to OCR, among other things, the covered entity had no
   policies addressing the removal of mobile devices containing PHI from its
   facility or what to do in the event of a security incident. In its public
   announcement, OCR acknowledged that the $650,000 settlement was *after*
   considering that the covered entity provides unique and much-needed
   services to elderly, developmentally disabled individuals, young adults
   aging out of foster care, and individuals living with HIV/AIDS.
   -

   *No business associate agreement*. When a covered entity’s business
   associate experienced a breach affecting over 17,000 patients, OCR again
   investigated. It claimed no business associate agreement was in place,
   leaving PHI without safeguards and vulnerable to misuse or improper
   disclosure. Settlement $750,000.
   -

   *Civil monetary penalties against home care provider. *In only the
   second time OCR has sought civil penalties under HIPAA, a judge awarded
   $239,800 in penalties due to privacy and security compliance failures. In
   this case, a patient complaint led to an OCR investigation – the patient
   complained that an employee of the covered entity left PHI in places where
   an unauthorized persons had access and in some cases abandoned the
   information altogether. Other compliance issues included covered entity’s
   maintaining inadequate policies and procedures to safeguard PHI taken
   offsite, and storing PHI in employee vehicles for extended periods of time.

It is true that these are only a handful of cases with large settlement
amounts. But the agency does seem to be sending a message – that is, it
wants to see compliance and it is not afraid to seek significant settlement
amounts from covered entities or business associates, large or small. In
some cases, relatively simple steps such as making sure to have business
associate agreements in place, can help avoid these kinds of enforcement
actions.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.riskbasedsecurity.com/pipermail/breachexchange/attachments/20160727/254e6d1e/attachment.html>


More information about the BreachExchange mailing list