HIPAA Violations and Compliance
Health care and data storage providers with access to private patient information are affected by HIPAA. Here’s what you need to know.
The Health Insurance Portability and Accountability Act of 1996 (HIPAA) defines the privacy standards for handling protected health information (PHI). HIPAA is a federal law that requires healthcare providers, clearinghouses, and all those who store and transmit any form of electronic data to respect the confidentiality and security of personal health information.
The three main components are:
If you are a health care provider or are a data storage provider with access to private patient information, your business will likely be affected by HIPAA standards. As such, it is essential to keep up-to-date on the latest requirements so that your business complies with the law.
The Security Rule requires safeguards for electronic protected health information (ePHI). These security standards establish the techniques for protecting this sensitive data from unauthorized access or use.
Also read: 7 Essential Compliance Regulations for Data Storage Systems
If a healthcare organization fails to comply with HIPAA regulations it can face severe penalties for its actions. For example, if there was an unintentional breach of protected health information (PHI), the following may occur:
Despite HIPAA and subsidiary regulation being around for some time now, HIPAA violations occur with surprising regularity. For example, since the April 2003 compliance date of the privacy rule, the Office for Civil Rights (OCR) has received over 267,736 HIPAA complaints, investigated and resolved over 28,959 cases by requiring changes in privacy practices and corrective actions, and settled or imposed penalties in over 100 cases amounting to more than $130 million.
Below is a look at some of the common pitfalls and the actions organizations can take to mitigate the risk.
Also read: DNA Data Storage: Could Data Files Be Stored as DNA?
There are many different impermissible uses and disclosures of PHI. For example, a healthcare data storage company can violate HIPAA by not encrypting information when it’s entered into its system or letting someone not permitted to have such information enter the PHI in the database.
Other examples of impermissible use and disclosure of PHI include:
Every organization faces the possibility of a cybersecurity breach. The loss of PHI can be a devastating blow to both the patients and healthcare organizations. A data breach can result from a sophisticated attack or something as simple as someone leaving their computer unlocked and unattended.
Data breaches can lead to financial penalties, HIPAA violations, data theft, data spills, data exposure, and compromised patient care. For this reason, the Office of the National Coordinator for Health Information Technology has provided guidelines for the privacy and security of health information. The HIPAA Security rules mandate three types of safeguards, administrative, physical, and technical.
Administrative safeguards include policies and procedures put in place by an organization to protect a patient’s PHI, such as requiring users of technology to maintain privacy standards. Subpart D of the Security Rule requires covered entities to prioritize administrative safeguards over technical safeguards when appropriate.
An example of critical administrative safeguards is the case of Cedar Springs Hospital located in Colorado Springs. In late 2020, the hospital provided an official from the Colorado Department of Public Health and Environment with a storage device that contained unencrypted PHI as part of a survey. Unfortunately, the officer misplaced the device putting the data at risk of falling into the wrong hands. The hospital had to file a notification report because the data was unencrypted.
Physical safeguards refer to physical controls on computer equipment such as doors, walls, locks, and guards. Physical safeguards restrict access to hardware and data centers where electronic protected health information is stored or transmitted. The use of biometrics is one example of a physical safeguard for encryption keys.
Technical safeguards are software security measures that include two-factor authentication (2FA). 2FA involves using another password besides your regular password when you log into an account.
In the event of a breach, organizations are required to notify those affected. Determining who should be notified and in what time frame can be tricky. The Breach Notification Rule states that a covered entity must notify “all or the majority of individuals whose unsecured protected health information has been accessed” within 60 days following the discovery of the breach. The OCR recommends that notifications are sent out as soon as possible, so those affected have ample time to take action to mitigate any harm resulting from the breach.
Legislative changes on data protection laws will continue alongside security and technology innovation; it is vital for data storage companies to stay up-to-date on these changes and remain HIPAA compliant.
A patient is entitled to a copy of their PHI within 30 days of their request. Furthermore, the data must be provided in the form and format requested. An Arizona healthcare company was recently fined $200,000 for violating this regulation.
Failure to follow these disclosure policies and give patients their information leads to a HIPAA violation.
Lastly, patients also have the right to get a copy of their PHI if requested by someone else or when there is a need for an additional copy because it was damaged. When another person’s request for PHI arises, then you may release it under specific conditions:
If you have not yet done so, it’s time to update your data policies and procedures with the latest security measures. Luckily, there are many ways that companies can remain compliant with HIPAA regulations today, such as using HIPAA compliant cloud storage, implementing technical, administrative, and physical guards, and conducting regular data assessments.
However, if a breach occurs within your system and PHI is compromised due to an impermissible disclosure or access by someone without proper authorization, fines of up to $1.5 million dollars could be imposed for each violation.
Read next: 6 Developments in Healthcare Data Storage
Enterprise Storage Forum offers practical information on data storage and protection from several different perspectives: hardware, software, on-premises services and cloud services. It also includes storage security and deep looks into various storage technologies, including object storage and modern parallel file systems. ESF is an ideal website for enterprise storage admins, CTOs and storage architects to reference in order to stay informed about the latest products, services and trends in the storage industry.
Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved
Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.