The Expensive Costs Of HIPAA Noncompliance & How To Avoid Them

promotion

Companies operating in the U.S. healthcare sector need to comply with HIPAA guidelines to protect the privacy of patient data. Failure to maintain compliance with HIPAA regulations can result in expensive financial penalties and even more extensive and long-term damage to an organization’s reputation. Noncompliance can also result in data breaches that expose sensitive patient data.

Organizations must implement safeguards designed to keep sensitive protected health information (PHI) and electronic protected health information (ePHI) secure. Patient data stored and processed digitally is considered ePHI while traditional paper records are categorized as PHI. The majority of violations we will look at concern ePHI and vulnerabilities in the IT environments and systems used to process it. For clarity, we will use the term PHI exclusively throughout this post. 

What Factors Determine the Penalties for HIPAA Violations?

The penalties for HIPAA violations are determined by taking multiple factors into account including:

  • The specific nature and severity of the violation;
  • The amount of harm caused and the number of individuals impacted by the violation;
  • If the violators knew that HIPAA rules were being violated;
  • If corrective actions have been taken to address the violation;
  • If HIPAA rules were violated with malicious intent or for personal gain;
  • If there were violations of HIPAA’s criminal provisions.

Who Determines and Enforces HIPAA Fines and Penalties?

Penalties for HIPAA violations can be determined by employers, federal regulators,  professional boards, and the Department of Justice (DOJ). Employers can take action against employees who cause violations. Federal regulators and professional boards address complaints regarding HIPAA violations. In cases of criminal liability, the DOJ also gets involved in determining the appropriate penalty.

The U.S. Department of Health and Human Services Office for Civil Rights (OCR) is the federal agency responsible for investigating HIPAA violations and assessing penalties. The OCR can enforce HIPAA rules in multiple ways.

  • The OCR investigates complaints filed with it regarding HIPAA violations.
  • The OCR may conduct compliance reviews to ascertain whether covered entities or business associates have violated HIPAA regulations. Reviews and audits are almost always carried out in the wake of a data breach involving HIPAA-regulated data.
  • The OCR provides education to promote HIPAA compliance.

If the OCR determines that a violation has occurred, they try to resolve the issue with the offending covered entity in one of the following ways.

  • The first choice is to obtain voluntary compliance from the covered entity that makes the necessary changes to address the violation.
  • The OCR can prescribe specific corrective actions that the covered entity must take to comply. 
  • A resolution agreement can be proposed that may include a fine and must be accepted by the violating covered entity.

Covered entities that do not accept the above conditions are subject to civil, and in some cases, criminal penalties.  

What are the Different Tiers of HIPAA Violation Penalties?

HIPAA violations can result in civil or criminal penalties based on the severity of the infraction. Civil penalties are levied according to the following tiered structure.

  • Tier 1 violations are for covered entities that were unaware of the HIPAA violations.  Fines range from $100 to $50,000 per violation.
  • Tier 2 violations are for instances where the covered entity knew or should have known about the violation. Fines range from $1,000 to $50,000 for each violation.
  • Tier 3 is for willful neglect of HIPAA rules, with violations corrected within 30 days of discovery. Fines are between $20,000 and $50,000 per violation, with a maximum of $250,000 annually.
  • Tier 4 is for instances of willful neglect of HIPAA rules with no effort to correct the issue within 30 days. Fines are $50,000 per violation with a maximum of $1.5 million per year.

Criminal penalties are appropriate when individuals or organizations disclose PHI without authorization. The minimum criminal fine for individuals is $50,000 with a maximum of $250,000. There are penalty tiers for jail time based on the type of violation.

  • Criminal violation due to negligence can result in a prison term of one year.
  • Obtaining PHI under false pretenses has a maximum penalty of five years in prison.
  • Disclosing PHI for personal gain or malicious intent can land the violator in prison for ten years.
  • Aggravated identity theft carries a mandatory two-year jail term.

What are the Most Common HIPAA Violations?

Failure to comply with any of the physical, technical, or administrative safeguards defined in the HIPAA Security Rule is considered a violation. While there are many ways an organization can violate HIPAA guidelines, some violations are more common than others. The most common HIPAA violations include:

  • Unauthorized viewing of PHI;
  • Lack of a viable risk management program;
  • Not performing risk analysis for the complete organization;
  • Improper disposal of PHI;
  • Inadequate access controls regarding PHI resources;
  • Not using encryption to protect PHI on mobile devices;
  • Failure to issue a breach notification within 60 days.

Physical security requirements to maintain HIPAA compliance

To maintain compliance with HIPAA regulations, organizations must develop both cybersecurity and physical security solutions. All locations used to store PHI, and devices/systems containing PHI, must be secured using managed security systems.

Access control systems:   Access control systems must be installed to prevent unauthorized persons entering locations/systems used to store PHI. Personalized credentials must be issued to all individuals authorized to access and handle PHI, with security teams able to assess, review and revoke such credentials in response to suspicious actions or behaviors.

Video security systems:   While a business surveillance system is an integral part of any physical security system, cameras must be implemented in line with HIPAA guidelines. Surveillance footage must be encrypted to prevent hackers from accessing private data, while access to video surveillance software must be secured using advanced password protections.

Recent Examples of HIPAA Fines and Their Remedies

Let’s look at some recent examples of fines for HIPAA violations and the remedies the offending covered entity or business associate could have taken to avoid them. These fines were imposed by the OCR to address previous violations. 

Banner Health:   The OCR imposed a fine of $1.25 million for violations that led to hackers gaining unauthorized access to the PHI of over 2.8 million customers. The specific violations included:

  • Not conducting a risk analysis;
  • Not monitoring and reviewing IT system activity;
  • Insufficient procedures to verify an individual’s identity;
  • Failing to protect PHI transmitted over a network.

The fine could have been avoided by following HIPAA guidelines for risk analysis and system monitoring. Encryption should have been implemented for transmitted PHI along with more stringent user authorization procedures.

iHealth Solutions:   iHealth Solutions is a business associate that performs coding, billing, and IT services to healthcare providers. They were found to be storing PHI on an unsecured server, exposing the health information of 267 patients. The company agreed to pay a $75,000 fine and implement the necessary procedures to avoid repeat violations. 

Huntington Hospital:   This is a case of potential criminal penalties being imposed on an individual for illegally accessing patients’ PHI. An employee has been charged with accessing the personal information of over 13,000 patients. The employee was terminated and faces up to a ten-year prison term if convicted of the offense. The hospital implemented additional security procedures to minimize the risk of similar violations.

Avoiding HIPAA Violations with a Trusted Hosting Solution

One of the primary measures a company must take to handle HIPAA-regulated data effectively is to process it in a compliant IT infrastructure. An organization’s IT environment has to be capable of implementing the necessary safeguards to comply with HIPAA. Its personnel must also be trained to handle HIPAA data securely. 

Organizations have two basic options when deciding on the proper IT environment to address HIPAA requirements and securely process PHI.

One choice is to construct and manage the environment themselves using on-premises resources. The alternative is to engage a third party to provide the necessary infrastructure to protect a company’s PHI resources.

In the case of small and medium-sized companies, outsourcing to a third party is often the most effective and efficient solution.

Image: Ridofranz

You Might Also Read: 

Responding To An Unintentional HIPAA Violation:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« Understanding The Threat Of QR Codes & Quishing
Electric Vehicles: The Hacking Risks  »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

USNA Center for Cyber Security Studies

USNA Center for Cyber Security Studies

The mission of the Center for Cyber Security Studies is to enhance the education of midshipmen in all areas of cyber warfare.

SQA Service

SQA Service

SQA Service provide independent software and process Quality Assurance services.

Packet Ninjas

Packet Ninjas

Packet Ninjas is a niche cyber security agency with specialized expertise in the use of digital intelligence to strengthen cyber security.

US Cyber Command (USCYBERCOM)

US Cyber Command (USCYBERCOM)

USCYBERCOM conducts activities to ensure US/Allied freedom of action in cyberspace and deny the same to our adversaries.

ComTrue Technologies

ComTrue Technologies

ComTrue Technologies provides artificial intelligence solutions and information security solutions.

Bufferzone Security

Bufferzone Security

BUFFERZONE® Safe Workspace® is a security suite based on Protection By Containment™, creating isolated virtual environments for safely accessing risky content.

SecureMe2

SecureMe2

SecureMe2 ‘s mission is to make organizations more responsive to digital threats by deploying smart technology in a highly accessible way.

DANAK

DANAK

DANAK is the national accreditation body for Denmark. The directory of members provides details of organisations offering certification services for ISO 27001.

Riddle&Code

Riddle&Code

Riddle&Code is a product-led services company specializing in onboarding industries to Web3. The team's mission is to provide a trusted connection between the digital and physical worlds.

UnderDefense

UnderDefense

UnderDefense provides cyber resiliency consulting and technology-enabled services to anticipate, manage and defend against cyber threats.

VeriClouds

VeriClouds

VeriClouds is a password verification service that helps organizations detect compromised passwords and stop account takeover attacks.

Comparitech

Comparitech

Comparitech strives to promote cyber security and privacy for all. We are committed to providing detailed information to help our readers become more cyber secure and cyber aware.

Tarlogic

Tarlogic

Tarlogic works to protect and defend your security with the highest quality technical team with next generation solutions to achieve the best protection.

V2X

V2X

V2X delivers IT support, networking, and cybersecurity solutions that ensure optimal mission support and performance.

ClearSky Cyber Security

ClearSky Cyber Security

ClearSky cyber security provides cyber solutions, focused on threat intelligence services, mainly for the financial sector, critical infrastructure, public sector and the pharma sector.

Cybercentry

Cybercentry

Cybercentry is a specialist information security, data protection and cyber security consultancy.