October 15, 2019

October 14, 2019

Subscribe to Latest Legal News and Analysis

Office for Civil Rights (OCR) Offers “Lessons Learned” Regarding Health Insurance Portability and Accountability Act (HIPAA) Compliance

Two recent reports issued by the HHS Office for Civil Rights (“OCR”), pursuant to the HITECH Act, reveal some interesting information about HIPAA data breaches. The Annual Report to Congress on Breaches of Unsecured Protection Information (“Breach Report”) and the Annual Report to Congress on HIPAA Privacy, Security, and Breach Notification Rule Compliance (“Compliance Report”) should remind covered entities and their business associates about the many risks associated with HIPAA and the importance of compliance.

The Breach Report describes the types and numbers of reported breaches for a two year period (2011 and 2012) and provides some cumulative data on breaches reported after the breach notification requirements went into effect. During this two year period, the OCR received reports of 458 big HIPAA breaches affecting 500 or more individuals and a staggering 46,899 small HIPAA breaches affecting less than 500 individuals. OCR investigated all of the 458 large HIPAA breaches and investigated a number of the smaller HIPAA breaches.

Interestingly, OCR imposed its first Resolution Agreement for a small breach, which affected 441 individuals, after the theft of an employee laptop at Hospice of North Idaho in December 2012. For the larger breaches, OCR has entered into Resolution Agreements with seven (7) of the covered entities. The Breach Report revealed that:

  • Under these agreements, the covered entities have agreed to pay more than $8 million.

  • Nearly two (2) million individuals were affected by these breaches;

  • Four (4) of these cases involved the theft of laptops or other electronic devices containing unsecured ePHI and the number one cause of security breaches in both years was theft; and,

  • In addition to the settlements, OCR has entered into corrective action plans (“CAPs”) that require specific corrective actions on the part of the covered entities.

Breach Report, p. 20

As the Breach Report points out, CAPs can require a variety of corrective actions, including:

  • Revising policies and procedures;

  • Training or retraining workforce members who handle PHI;

  • Conducting and documenting a risk assessment

  • Changing passwords;

  • Adopting encryption technologies; or,

  • Performing a new risk assessment, among other things.

Breach Report, p. 20-24.

Because investigations and the subsequent agreements, settlements, and corrective actions can be costly to finances and reputations, the Breach Report concludes with a “Lessons Learned” section meant to help covered entities avoid some of the more common type of breaches. To read about the “Lessons Learned” section, check back on Thursday.

© 2019 by McBrayer, McGinnis, Leslie & Kirkland, PLLC. All rights reserved.

TRENDING LEGAL ANALYSIS


About this Author

Emily M. Hord, Health Care Attorney, McBrayer Law Firm
Associate

Emily M. Hord is an Associate of McBrayer, McGinnis, Leslie & Kirkland, PLLC. Ms. Hord concentrates her practice in healthcare law and is located in the firm’s Lexington office. Ms. Hord has experience in a variety of health law issues. She has represented hospitals and healthcare networks, physicians and other medical professionals, nursing homes, and private physician practices. She provides services in the following areas: regulatory and statutory compliance, Certificate of Need and licensing, professional license defense, employment contracts for medical professionals, HIPAA...

859-231-8780