[firm] blog logo

$4.3 Million in Civil Monetary Penalties Awarded for Encryption Failures under HIPAA

An administrative law judge for HHS upheld an award of $4.3 million in civil monetary penalties (the “Penalties”) against a Texas-based healthcare provider for violations of the HIPAA privacy and security rules (the “HIPAA Rules”). The provider is a “covered entity” under HIPAA (“CE”), and the Penalties are the fourth largest ever awarded to the Office of Civil Rights (“OCR”), the HHS agency that enforces the HIPAA Rules, by an administrative law judge or secured via a settlement for HIPAA violations. The Penalties stemmed from an OCR investigation of the CE in response to three separate HIPAA breach reports the CE filed with OCR during 2012 and 2013 involving the theft of an unencrypted laptop computer and the loss of two unencrypted thumb drives, which resulted in the impermissible disclosure of electronic protected health information (“EPHI”) of over 33,500 individuals. OCR’s investigation found that, although the CE had written encryption… Continue Reading

Settlement of HIPAA Privacy and Security Rule Violations Costs Covered Entities $3.5 Million

HHS recently entered into a $3.5 million settlement agreement with a health care provider (the “Provider”) on behalf of five entities under its common ownership and control for violations of the HIPAA privacy and security rules. Each of the five entities constituted a “covered entity” under HIPAA. In 2013, the Provider filed five breach reports with HHS, each of which pertained to a separate incident that implicated the “electronic protected health information” (“EPHI“) of one of those covered entities. HHS’s subsequent investigation of the breaches revealed a number of violations of the HIPAA privacy and security rules, including that certain of the covered entities: Failed to conduct an accurate and thorough risk analysis of potential risks and vulnerabilities to the confidentiality, integrity, and availability of EPHI; Provided unauthorized access to EPHI for a purpose not permitted by the HIPAA privacy rules; Failed to implement policies and procedures to address security… Continue Reading

Court Requires EEOC to Reconsider Wellness Program Regulations

Generally, the Americans with Disabilities Act (the “ADA“) and the Genetic Information Non-Discrimination Act (“GINA“) permit employers to offer certain wellness programs if they are “voluntary.” The EEOC issued regulations in 2016, which we discussed here, permitting wellness programs to have incentives of up to 30 percent of the cost of health plan coverage in order to align with permitted incentives under the Health Insurance Portability and Accountability Act (“HIPAA“). The AARP sued the EEOC claiming that this 30 percent limit was still coercive and was contrary to the “voluntary” requirement under the ADA and GINA. The U.S. District Court for the District of Columbia granted AARP’s motion for summary judgment, concluding that the EEOC failed to adequately explain its decision to interpret “voluntary” as permitting a 30 percent incentive level. Although governmental agencies are generally given deference, the “EEOC does not appear to have considered any factor that actually… Continue Reading

HHS Settlement with HIPAA Covered Entity Exacts $2.5 Million Penalty for Non-compliance

The U.S. Department of Health and Human Services’ Office for Civil Rights (“OCR”) recently announced a $2.5 million HIPAA privacy and security settlement with CardioNet, a wireless health services provider and covered entity under HIPAA, based on CardioNet’s impermissible disclosure of unsecured electronic protected health information (“EPHI”). The disclosure occurred when a laptop computer belonging to a member of CardioNet’s workforce, which contained the unsecured EPHI of 1,391 individuals, was stolen from a parked vehicle outside of the workforce member’s home. CardioNet reported the breach to OCR and an investigation ensued, pursuant to which OCR determined that (i) CardioNet did not have a sufficient risk analysis and risk management process in place at the time of the theft, (ii) CardioNet had never actually implemented its draft policies and procedures for compliance with HIPAA’s security rules, and (iii) CardioNet was unable to produce any final policies or procedures regarding the implementation… Continue Reading

No Business Associate Agreement is Enough to Result in a $31,000 Settlement

On April 17, 2017, the Center for Children’s Digestive Health in Illinois (“CCDH”) entered into a resolution agreement with HHS pursuant to which CCDH agreed to pay $31,000 to settle potential HIPAA privacy rule violations. The primary basis for the settlement was the lack of a business associate agreement between CCDH and one of its business associates, which HHS determined demonstrated a lack of effective control and review of CCDH’s HIPAA policies and procedures. FileFax, Inc. (“FileFax”) is an Illinois record storage and disposal company. FileFax’s clients included healthcare providers, such as CCDH. FileFax’s services to those providers included the storage and disposal of medical records. A whistleblower led to a 2015 investigation of FileFax by the Illinois Attorney General. HHS then discovered that FileFax was discarding medical records in an unlocked dumpster adjacent to its building and had also shipped a large volume of other medical records to a… Continue Reading

Civil Monetary Penalties Increased for Violations of HIPAA Privacy and Security Rules

The U.S. Department of Health and Human Services (“HHS”) recently issued an interim final rule (the “HHS Rule”), which sets out inflation adjustments to the civil monetary penalty (“CMP”) amounts that HHS is authorized to assess or enforce, including for violations of the HIPAA privacy and security rules. The HHS Rule was issued for compliance with the Federal Civil Penalties Inflation Adjustment Act Improvements Act of 2015, which was enacted on November 2, 2015 (the “2015 Act”). The 2015 Act requires federal agencies to (i) adjust the level of CMP amounts with an initial “catch up” adjustment and (ii) make subsequent annual adjustments for inflation. The HIPAA CMP amounts had not been adjusted since 2009. Under the HHS Rule, HIPAA CMP amounts are increased by 10.2% for violations of the HIPAA privacy or security rules by a covered entity or a business associate, as follows:       Prior $$… Continue Reading

Reminder to Send Out HIPAA Privacy Notice Reminders

A HIPAA Notice of Privacy Practices must be provided to new group health plan participants at the time of enrollment and within 60 days of a material revision. In addition, participants must be notified of the availability of the notice at least once every three years. This requirement can be satisfied by distributing either a copy of the notice or a reminder of the availability of the notice. A reminder of the availability of the notice can be included in annual enrollment materials or other plan publications sent to all participants. For example, group health plans that distributed a new Notice of Privacy Practices in 2013 when the final HIPAA regulations were issued should ensure they have satisfied this reminder requirement in 2016.

OCR To Investigate HIPAA Breaches of Less Than 500 Individuals

The HHS Office for Civil Rights (“OCR“) recently announced an initiative to more widely investigate HIPAA privacy breaches affecting fewer than 500 individuals. Generally, all reported breaches involving 500 or more individuals are automatically investigated by OCR. Breaches involving less than 500 individuals will not automatically be investigated, but Regional Offices will increase efforts to investigate smaller breaches based on (1) the size of the breach, (2) theft or improper disposal of unencrypted protected health information (“PHI“), (3) breaches involving hacking, (4) the sensitive nature of the PHI involved, and (5) where numerous breach reports from the same entity raise similar issues. View additional information on OCR’s enforcement of HIPAA.

HHS Fact Sheet Provides Helpful Information in Addressing Ransomware Attacks under HIPAA

The U.S. Department of Health and Human Services (“HHS”) recently issued a “Fact Sheet” which discusses ransomware attack prevention and recovery under HIPAA, as well as the management of HIPAA breach notification procedures in response to a ransomware attack.  According to the Fact Sheet, “ransomware” is a type of malicious software by which a hacker gains access to electronic data and then encrypts it with a key known only to the hacker, such that the data owner is denied access to it. The Fact Sheet provides helpful descriptions and specific examples of how the requirements of the security regulations under HIPAA (the “Security Rules”), which govern the confidentiality of a HIPAA covered entity’s electronic protected health information (“EPHI”), may be applied to prevent, detect, and recover from infections of EPHI by ransomware.  Importantly, the Fact Sheet also explains HHS’s view that a ransomware infection of unsecured EPHI on a computer… Continue Reading

Additional HIPAA Compliance Guidance Issued

The OCR recently issued three guidance documents in response to questions received from covered entities currently under audit: (1) a list of all Q&As received from audited entities; (2) a table showing the documents OCR requested for each audit protocol and the Q&As associated with that audit protocol; and (3) slides from an OCR webinar for audited entities. The OCR is currently auditing covered entities, such as employer-sponsored group health plans, for compliance with HIPAA’s privacy and security rules. This new guidance should be helpful to plan sponsors, as well as to HIPAA Privacy and Security Officials, in their ongoing HIPAA compliance efforts. View the three guidance documents.

August 2018
S M T W T F S
« Jul    
 1234
567891011
12131415161718
19202122232425
262728293031  

Archives