HIPAA Risk Analysis Tip – What Captures OCR’s Attention?

here’s pain in the voices of CISOs who haven’t been able to persuade their executive team to invest in an accurate, thorough enterprise-wide HIPAA risk analysis and risk management plan.

CEOs too often are willing to take on risk to increase revenue rather than mitigate existing risk to avoid cost.  The story goes something like: “We’ll never be chosen for an audit, less than 200 organizations have been selected.  Even if we do have a breach, it’s unlikely they’ll ever decide to investigate us.  There’s 1800 organizations listed on OCR’s wall of shame, in an industry that has over 10,000,000 organizations responsible for protecting PHI.  What are the chances?!”

OCR investigations and resulting resolution agreements / corrective action plans have increasingly larger $ settlement amounts, broad exposure, reputational damage and on-going incremental operational costs and distraction.  And those enforcement actions often result from circumstances about which OCR wants to highlight to make a specific point.

OCR has demonstrated that all types of organizations are subject to enforcement actions.  Examples include:

  • State Universities – Idaho State University and the University of Mass-Amherst
  • County government – Skagit County Public Health Department
  • Community Services – Anchorage Community Mental Health Services
  • State Government – Alaska Department for Health and Human Services
  • Private Physician Practices – Cancer Care Group and Phoenix Cardiac Surgery
  • Specialty Services – Massachusetts Eye and Ear Infirmary
  • Research institutions – Feinstein Institute for Medical Research

OCR has demonstrated that all types of regulatory violations are subject to enforcement actions.  Examples include:

  • For a breach under 500 Records – Hospice of North Idaho
  • For not filing a required breach report – 1st one following the HITECH Act -BCBST
  • For not reporting breaches in timely manner – Presence Health
  • For lack of institutional oversight – University of Mississippi Medical Center
  • For failure to erase photocopier hard drive – Affinity Health Plan
  • For failure to cooperate – CIGNET
  • Referral from OIG, for marketing without permission – Management Services Organization

OCR has demonstrated that varying trigger events may result in enforcement actions:

  • Nine (9) of the fifty (50) investigations that led to settlement agreements were initiated by complaints?
  • Another four (4) were initiated following news reported in the media.
  • Five (5) others focused on business associates and business associate agreements.
  • Lately, since OCR has fixed their tracking system (thanks to OIG’s recommendation), the reporting of multiple breach reports has stimulated investigative activities and resulted in settlement agreements with six (6) more organizations.
  • Successful hacks have prompted OCR to look into the policies, procedures and evidence of monitoring access, implementing patches, and social engineering training of five (5) organizations, in addition to another five (5) dinged for not having encrypted laptops, thumb drives or mobile devices.

Good news – all the OCR Resolution Agreements / Corrective Action Plans are available for review and learning.

So the short story is that it doesn’t have to be a big breach, or a complex situation, or even a blatant failure for OCR to decide an enforcement action and ultimately a resolution agreement and corrective action plan is in order.

Once they are in, if the case involves ePHI, you can be 100% certain that they will be looking for that risk analysis that would have identified the vulnerability that was exploited by the threat, because controls and safeguards were insufficient to protect the information.  And when that isn’t done, or it isn’t done right, the fines and disruption will follow.

Newsletter

Sign up for our monthly newsletter discussing hot topics and access to invaluable resources.


Related Blogs

Navigating the HIPAA Privacy Rule for Reproductive Healthcare: Compliance Essentials Before the December 2024 Deadline

Navigating the HIPAA Privacy Rule for Reproductive Healthcare: Compliance Essentials Before the December 2024 Deadline

In an era where the privacy of reproductive healthcare has become a topic for debate, healthcare organizations face growing fears and challenges over the potential misuse of sensitive patient data. Recent legal developments, coupled with the shifts following the Dobbs v. Jackson decision, have shown the urgent need for robust safeguards. Notably, the December 23, 2024 compliance deadline for the HIPAA Privacy Rule Final Rule to Support Reproductive Health Care Privacy offers a pivotal moment to address these concerns.
The Health Care Cybersecurity and Resiliency Act of 2024: Key Takeaways and Implications

The Health Care Cybersecurity and Resiliency Act of 2024: Key Takeaways and Implications

The Cybersecurity and Resiliency Act (HCCRA) of 2024 is yet another proposed bill aimed at strengthening the healthcare sector’s cybersecurity posture and resilience. It focuses on improving coordination between government organizations, updating cybersecurity standards, increasing breach reporting requirements, and providing grants to rural healthcare organizations that lack both financial and human resources needed to address growing cybersecurity vulnerabilities and increasing threats.

Connect
With Us