August 4, 2020

Volume X, Number 217

August 03, 2020

Subscribe to Latest Legal News and Analysis

Diagnostic Medical Imaging Company Pays $3 Million to Resolve Potential HIPAA Violations Stemming from Data Breach

The Office of Civil Rights (OCR), the enforcement arm of the Department of Health & Human Services (HHS), announced that a Tennessee diagnostic medical imaging services company has agreed to pay $3 million to settle potential HIPAA violations arising from a data breach that exposed over 300,000 patients’ protected health information. As part of the settlement, the company—Touchstone Medical Imaging (Touchstone)—must also adopt a corrective action plan to address problems uncovered during OCR’s investigation.

In May 2014, Touchstone was notified by the Federal Bureau of Investigation (FBI) and OCR that one of its servers allowed uncontrolled access to its patients’ protected health information (PHI). This permitted search engines (such as Google) to index the PHI of Touchstone’s patients, which remained visible on the Internet even after the insecurely configured server was taken offline. Although Touchstone initially claimed that no patient PHI was exposed, it subsequently admitted during OCR’s investigation that the PHI of more than 300,000 patients was exposed, including names, birth dates, addresses, phone numbers, and some social security numbers.

During its investigation, OCR determined that Touchstone did not thoroughly investigate the security incident until several months after being notified of the breach, so that the company’s notification to affected individuals and the media was also untimely. OCR also found that Touchstone had failed to conduct an accurate and complete risk analysis of potential risks and vulnerabilities to its electronic PHI, and did not have HIPAA-required business associate agreements with its vendors.

The Resolution Agreement states that it is neither an admission of liability by Touchstone, nor a concession by HHS that Touchstone is not in violation of the HIPAA rules. Nevertheless, it serves as a reminder to health care companies—which are a frequent target of hackers—that they need to be proactive in assessing the security of systems (electronic and otherwise) where PHI is stored and fix any problems identified. Companies also should ensure that HIPAA-compliant business associate agreements are in place, promptly investigate any potential data breaches, and be aware of their breach notification obligations.

Copyright © 2020 Robinson & Cole LLP. All rights reserved.National Law Review, Volume IX, Number 128

TRENDING LEGAL ANALYSIS


About this Author

Jean Tomasco, Robinson Cole Law Firm, Hartford, Labor and Employment, Litigation Law Attorney
Counsel

Jean Tomasco's practice involves employer counseling and employment litigation, with an emphasis on the Employee Retirement Income Security Act (ERISA) and benefits litigation. She is a member of the firm’s Health + Benefits Litigation Team and its Labor, Employment, Benefits + Immigration Group.

Employee Benefits and Compensation Litigation

Jean has more than two decades of experience handling benefit claims litigation. She represents insurers, managed care organizations, and employers in benefit...

860-275-8323