HHS Nets Over $5 Million in HIPAA Settlements Involving Stolen Laptops | Practical Law

HHS Nets Over $5 Million in HIPAA Settlements Involving Stolen Laptops | Practical Law

The Department of Health and Human Services (HHS) has announced a settlement of potential violations of the Health Insurance Portability and Accountability Act (HIPAA) involving a nonprofit health care provider. The provider will pay $1,550,000 to settle the potential violations and must take corrective measures that include developing an organization-wide risk analysis and risk management plan. HHS also announced a $3.9 million HIPAA settlement involving potential HIPAA violations resulting from a stolen laptop.

HHS Nets Over $5 Million in HIPAA Settlements Involving Stolen Laptops

Practical Law Legal Update w-001-6362 (Approx. 6 pages)

HHS Nets Over $5 Million in HIPAA Settlements Involving Stolen Laptops

by Practical Law Employee Benefits & Executive Compensation
Published on 18 Mar 2016USA (National/Federal)
The Department of Health and Human Services (HHS) has announced a settlement of potential violations of the Health Insurance Portability and Accountability Act (HIPAA) involving a nonprofit health care provider. The provider will pay $1,550,000 to settle the potential violations and must take corrective measures that include developing an organization-wide risk analysis and risk management plan. HHS also announced a $3.9 million HIPAA settlement involving potential HIPAA violations resulting from a stolen laptop.
On March 16, 2016, HHS issued a resolution agreement and related press release announcing a settlement with a nonprofit health care provider in Minnesota (serving the Twin Cities), a HIPAA covered entity, for potential violations of the Health Insurance Portability and Accountability Act of 1996 (HIPAA) privacy and security rules (see Practice Notes, HIPAA Privacy Rule and HIPAA Security Rule). (For a second settlement, involving a $3.9 million HIPAA settlement resulting from a stolen unencrypted laptop, see Practical Impact.)
HHS began its investigation after the provider submitted a breach notification to the government involving the theft of an unencrypted laptop containing electronic protected health information (ePHI) from the locked vehicle of one of the provider's major contractors (see Practice Notes, HIPAA Breach Notification Rules for Group Health Plans and HIPAA Enforcement and Group Health Plans: Penalties and Investigations, and the HIPAA Privacy, Security, and Breach Notification Toolkit). The provider will pay $1,550,000 to settle the potential violations and must adopt a corrective action plan (CAP) that includes developing an organization-wide risk analysis and risk management plan.
According to HHS, the provider's breach report indicated that the electronic PHI of nearly 9,500 individuals was accessed when a password-protected but unencrypted laptop was stolen from the locked vehicle of an employee of the provider's contractor. At the time of the breach, the provider and the contractor had not yet entered into a BA agreement, though they did so a few months after the theft (see Standard Document, HIPAA Business Associate Agreement). As a result, at the time of the theft, the provider had made available access to its database, which stored the electronic PHI of nearly 290,000 individuals, without obtaining satisfactory assurances from its contractor under a BA agreement that the provider's PHI would be protected. According to HHS, the provider also failed to conduct a thorough risk analysis that incorporated all of its technology equipment, applications, and data systems using electronic PHI.
Under its resolution agreement with HHS, in addition to the $1,550,000 payment, the provider must:
  • Comply with the CAP (see Corrective Action Plan), and retain all documents and records relating to CAP compliance for six years.
  • Submit annual reports detailing its compliance with the CAP for each reporting period.

Corrective Action Plan

The CAP requires the provider to develop policies and procedures related to its BA relationships, including:
  • Designating one or more individuals to ensure that it enters into BA agreements with all its BAs before disclosing PHI to them.
  • Creating a process for determining when a business relationship requires a BA agreement.
  • Creating a process for negotiating and entering into BA agreements and maintaining documentation of the agreements for at least six years.
  • Limiting disclosures of PHI to BAs to the minimum necessary for the BAs to perform their duties.
The CAP also requires the provider to:
  • Complete, for approval by HHS, a comprehensive risk analysis of security risks and vulnerabilities that reflects all electronic equipment, data systems, and applications that contain, store, transmit, or receive electronic PHI.
  • Develop a complete inventory of all electronic equipment, data systems, and applications that contain or store electronic PHI, which will be incorporated in the risk analysis.
  • Develop, also for approval by HHS, an organization-wide risk management plan to address and mitigate any security risk and vulnerabilities identified in the risk analysis.
Additionally, the provider must:
  • Provide training to all appropriate workforce members on its BAs and risk management policies and procedures newly developed or revised pursuant to the CAP (see Standard Document, HIPAA Training for Group Health Plans: Presentation Materials).
  • Promptly investigate potential violations of its compliance policies and procedures and, if it determines a violation has occurred, notify HHS in writing within 30 days.

Practical Impact

This settlement is but the latest in a steady drumbeat of expensive (and public) resolution agreements between HHS and HIPAA covered entities, including several within the past few months. Just a day after this settlement, in fact, HHS announced a $3.9 million settlement with a research institute, which also involved the theft of an unencrypted laptop computer containing individuals' ePHI from an employee's car.
Although HIPAA's BA agreement provisions have been in place for many years (see Standard Document, HIPAA Business Associate Agreement), the requirement regarding enterprise-wide risk analyses is a more recent focus of the agency's aggressive enforcement activities (see Legal Updates, Malicious Malware Leads to $750,000 HIPAA Settlement, $3.5 Million HIPAA Settlement Highlights Need for Training and Stolen Laptop Bag Leads to $750,000 HIPAA Settlement). An entity's risk analysis should therefore address all facets of its IT infrastructure, including software, servers, databases, and workstations – and laptops, the portable technology at the center of so many recent settlement agreements.