The Expensive Costs Of HIPAA Noncompliance & How To Avoid Them

promotion

Companies operating in the U.S. healthcare sector need to comply with HIPAA guidelines to protect the privacy of patient data. Failure to maintain compliance with HIPAA regulations can result in expensive financial penalties and even more extensive and long-term damage to an organization’s reputation. Noncompliance can also result in data breaches that expose sensitive patient data.

Organizations must implement safeguards designed to keep sensitive protected health information (PHI) and electronic protected health information (ePHI) secure. Patient data stored and processed digitally is considered ePHI while traditional paper records are categorized as PHI. The majority of violations we will look at concern ePHI and vulnerabilities in the IT environments and systems used to process it. For clarity, we will use the term PHI exclusively throughout this post. 

What Factors Determine the Penalties for HIPAA Violations?

The penalties for HIPAA violations are determined by taking multiple factors into account including:

  • The specific nature and severity of the violation;
  • The amount of harm caused and the number of individuals impacted by the violation;
  • If the violators knew that HIPAA rules were being violated;
  • If corrective actions have been taken to address the violation;
  • If HIPAA rules were violated with malicious intent or for personal gain;
  • If there were violations of HIPAA’s criminal provisions.

Who Determines and Enforces HIPAA Fines and Penalties?

Penalties for HIPAA violations can be determined by employers, federal regulators,  professional boards, and the Department of Justice (DOJ). Employers can take action against employees who cause violations. Federal regulators and professional boards address complaints regarding HIPAA violations. In cases of criminal liability, the DOJ also gets involved in determining the appropriate penalty.

The U.S. Department of Health and Human Services Office for Civil Rights (OCR) is the federal agency responsible for investigating HIPAA violations and assessing penalties. The OCR can enforce HIPAA rules in multiple ways.

  • The OCR investigates complaints filed with it regarding HIPAA violations.
  • The OCR may conduct compliance reviews to ascertain whether covered entities or business associates have violated HIPAA regulations. Reviews and audits are almost always carried out in the wake of a data breach involving HIPAA-regulated data.
  • The OCR provides education to promote HIPAA compliance.

If the OCR determines that a violation has occurred, they try to resolve the issue with the offending covered entity in one of the following ways.

  • The first choice is to obtain voluntary compliance from the covered entity that makes the necessary changes to address the violation.
  • The OCR can prescribe specific corrective actions that the covered entity must take to comply. 
  • A resolution agreement can be proposed that may include a fine and must be accepted by the violating covered entity.

Covered entities that do not accept the above conditions are subject to civil, and in some cases, criminal penalties.  

What are the Different Tiers of HIPAA Violation Penalties?

HIPAA violations can result in civil or criminal penalties based on the severity of the infraction. Civil penalties are levied according to the following tiered structure.

  • Tier 1 violations are for covered entities that were unaware of the HIPAA violations.  Fines range from $100 to $50,000 per violation.
  • Tier 2 violations are for instances where the covered entity knew or should have known about the violation. Fines range from $1,000 to $50,000 for each violation.
  • Tier 3 is for willful neglect of HIPAA rules, with violations corrected within 30 days of discovery. Fines are between $20,000 and $50,000 per violation, with a maximum of $250,000 annually.
  • Tier 4 is for instances of willful neglect of HIPAA rules with no effort to correct the issue within 30 days. Fines are $50,000 per violation with a maximum of $1.5 million per year.

Criminal penalties are appropriate when individuals or organizations disclose PHI without authorization. The minimum criminal fine for individuals is $50,000 with a maximum of $250,000. There are penalty tiers for jail time based on the type of violation.

  • Criminal violation due to negligence can result in a prison term of one year.
  • Obtaining PHI under false pretenses has a maximum penalty of five years in prison.
  • Disclosing PHI for personal gain or malicious intent can land the violator in prison for ten years.
  • Aggravated identity theft carries a mandatory two-year jail term.

What are the Most Common HIPAA Violations?

Failure to comply with any of the physical, technical, or administrative safeguards defined in the HIPAA Security Rule is considered a violation. While there are many ways an organization can violate HIPAA guidelines, some violations are more common than others. The most common HIPAA violations include:

  • Unauthorized viewing of PHI;
  • Lack of a viable risk management program;
  • Not performing risk analysis for the complete organization;
  • Improper disposal of PHI;
  • Inadequate access controls regarding PHI resources;
  • Not using encryption to protect PHI on mobile devices;
  • Failure to issue a breach notification within 60 days.

Physical security requirements to maintain HIPAA compliance

To maintain compliance with HIPAA regulations, organizations must develop both cybersecurity and physical security solutions. All locations used to store PHI, and devices/systems containing PHI, must be secured using managed security systems.

Access control systems:   Access control systems must be installed to prevent unauthorized persons entering locations/systems used to store PHI. Personalized credentials must be issued to all individuals authorized to access and handle PHI, with security teams able to assess, review and revoke such credentials in response to suspicious actions or behaviors.

Video security systems:   While a business surveillance system is an integral part of any physical security system, cameras must be implemented in line with HIPAA guidelines. Surveillance footage must be encrypted to prevent hackers from accessing private data, while access to video surveillance software must be secured using advanced password protections.

Recent Examples of HIPAA Fines and Their Remedies

Let’s look at some recent examples of fines for HIPAA violations and the remedies the offending covered entity or business associate could have taken to avoid them. These fines were imposed by the OCR to address previous violations. 

Banner Health:   The OCR imposed a fine of $1.25 million for violations that led to hackers gaining unauthorized access to the PHI of over 2.8 million customers. The specific violations included:

  • Not conducting a risk analysis;
  • Not monitoring and reviewing IT system activity;
  • Insufficient procedures to verify an individual’s identity;
  • Failing to protect PHI transmitted over a network.

The fine could have been avoided by following HIPAA guidelines for risk analysis and system monitoring. Encryption should have been implemented for transmitted PHI along with more stringent user authorization procedures.

iHealth Solutions:   iHealth Solutions is a business associate that performs coding, billing, and IT services to healthcare providers. They were found to be storing PHI on an unsecured server, exposing the health information of 267 patients. The company agreed to pay a $75,000 fine and implement the necessary procedures to avoid repeat violations. 

Huntington Hospital:   This is a case of potential criminal penalties being imposed on an individual for illegally accessing patients’ PHI. An employee has been charged with accessing the personal information of over 13,000 patients. The employee was terminated and faces up to a ten-year prison term if convicted of the offense. The hospital implemented additional security procedures to minimize the risk of similar violations.

Avoiding HIPAA Violations with a Trusted Hosting Solution

One of the primary measures a company must take to handle HIPAA-regulated data effectively is to process it in a compliant IT infrastructure. An organization’s IT environment has to be capable of implementing the necessary safeguards to comply with HIPAA. Its personnel must also be trained to handle HIPAA data securely. 

Organizations have two basic options when deciding on the proper IT environment to address HIPAA requirements and securely process PHI.

One choice is to construct and manage the environment themselves using on-premises resources. The alternative is to engage a third party to provide the necessary infrastructure to protect a company’s PHI resources.

In the case of small and medium-sized companies, outsourcing to a third party is often the most effective and efficient solution.

Image: Ridofranz

You Might Also Read: 

Responding To An Unintentional HIPAA Violation:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« Understanding The Threat Of QR Codes & Quishing
Electric Vehicles: The Hacking Risks  »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

ACIS Professional Center

ACIS Professional Center

ACIS provides training and consulting services in the area of information technology, cybersecurity, IT Governance, IT Service management, information security and business continuity management.

Hitachi ID Systems

Hitachi ID Systems

Hitachi ID Systems offers comprehensive identity management and access governance, privileged access management and password management solutions.

Idemia

Idemia

Idemia is a global leader in security and identity solutions.

Towergate Insurance

Towergate Insurance

Towergate Insurance is a leading UK specialist insurance broker. Business products include Cyber Liability Insurance.

RIPS Technologies

RIPS Technologies

RIPS Technologies delivers automated security analysis for PHP applications as platform independent software or highly scalable cloud service.

Tutamantic

Tutamantic

Tutamantic develops software that reduces security risks and weaknesses during the architectural and design stages.

X-Ways Software Technology

X-Ways Software Technology

X-Ways provide software for computer forensics, electronic discovery, data recovery, low-level data processing, and IT security.

Tangible Security

Tangible Security

Tangible employs the most sophisticated cyber security tools and techniques available to protect our clients’ sensitive data, infrastructure and competitive advantage.

Cybeta

Cybeta

Cybeta's actionable cybersecurity intelligence keeps your business safe with strategic and operational security recommendations that prevent breaches.

Teleport

Teleport

Teleport is a remote-first technology company. We enable engineers to quickly access any computing resource anywhere on the planet.

META-Cyber

META-Cyber

META-cyber was founded by engineers with experience in process and control-protection to provide cyber security for industrial infrastructure.

Wing Security

Wing Security

Wing fosters a stronger security culture by engaging SaaS end-users and enabling easy communication with security teams.

Purple Team

Purple Team

Purple Team is an expert cybersecurity and managed security service provider focused on arming your IT infrastructure with both red team and blue team services.

EdgeWatch

EdgeWatch

EdgeWatch is a platform that helps information accredited security practitioners discover, monitor, and analyze devices that are accessible from the Internet.

KCS Group Europe

KCS Group Europe

KCS Group helps its clients to identify and deal with any risks, weaknesses and threats which could impact on the business financially or reputationally.

Nullify

Nullify

Nullify is your automated security sentry that continuously finds and fixes security issues across your codebase.