HIPAA privacy actions seen as warning
HHS hits Cignet with $4.3M penalty; Mass. General settles for $1M
Computerworld - Two separate enforcement actions taken this week by the U.S. Department of Health and Human Services for HIPAA privacy violations should serve as a warning to all healthcare entities, say privacy analysts.
The agency announced on Thursday that it had imposed a civil monetary penalty of $4.3 million on health insurer Cignet Health for violating the Health Insurance Portability and Accountability Act's privacy provisions.
This week's other enforcement action involved Massachusetts General Hospital, which agreed to pay HHS a total of $1 million to settle potential HIPAA privacy violations.
The action against Cignet represented the first time since HIPAA became law that such a fine has been imposed on an organization in the healthcare field over a privacy violation.
HHS said the fine was levied on Cignet for two reasons: It did not give 41 patients access to their medical records when they asked for it, and it did not subsequently cooperate with an investigation into the matter by HHS's Office for Civil Rights (OCR).
HIPAA's privacy rules require covered entities to provide patients with copies of their medical records no later than 60 days after they request the records, HHS noted.
Cignet's failure to do so earned it a $1.3 million penalty under HIPAA rules. An additional $3 million penalty was assessed against Cignet for its failure to cooperate with OCR investigations and for its repeated refusal to produce records in response to HHS demands.
The HHS settlement with Massachusetts General Hospital stems from a March 2009 incident in which documents containing protected health information on 192 patients were lost when an employee inadvertently left them on a subway train.
The actions could be a sign that HHS is getting serious about enforcing HIPAA's privacy requirements more stringently, said Deborah Peel, founder and chairwoman of the Patient Privacy Rights Foundation.
These actions are among "the most significant things that the administration has done for patient privacy," Peel said.
Both HIPAA and the Health Information Technology for Economic and Clinical Health (HITECH) Act, which was passed as part of the 2009 stimulus package, contain provisions for protecting the privacy and security of patient data.
"But nobody has been paying attention to them. It's like mass civil disobedience by industry," Peel said. "So this is incredibly welcome for patients."
The penalties indicate that HHS is taking a hard look at business process failures that can result in privacy violations, said Peter MacKoul, president of consulting firm HIPAA Solutions LC.
Both of this week's actions stemmed from business process issues and not technology failures, MacKoul said. Weak business processes -- such as a failure to ensure that data on laptops is encrypted, or a failure to protect against the use of USB flash drives, or the improper handling of hard copies -- often result in privacy breaches, he said.
"That is the kind of violation that happens a lot," he said.
Entities that fall under HIPAA's jurisdiction need to pay attention to such issues but often do not, MacKoul said. "It is interesting that HHS is using the privacy rule" to go after such violations, he said.
Importantly, the fine against Cignet also shows that HHS is prepared to come down hard on healthcare companies that show willful neglect in protecting patient data, he said.
"To me it is very significant that they are willing to apply willful neglect [against Cignet] to the tune of $3 million," MacKoul said. "It's one thing when they write it into law. It's a totally different story when they actually enforce it."
"Covered entities should take note," he said.
The latest HIPAA enforcement actions follow news this week that the number of people whose healthcare data is lost or stolen continues to soar.
A report released earlier this week by the accounting firm Kaufman, Rossin & Co. showed that in the first year since the HITECH Act was passed, about 5 million people had their personal health information compromised, either as a result of theft or because the data was lost.
A total of 166 data breach incidents (each involving more than 500 individuals) had been reported to HHS as of Sept. 10, 2010. The largest incident involved a lost laptop containing unencrypted protected health information on 1,222.000 individuals, the report said.
In a statement, Massachusetts General Hospital said it will be issuing new or revised polices on issues such as the removal and transportation of material containing protected health data, laptop encryption and USB drive encryption. "After these policies and procedures are issued, we will be providing mandatory training on them. All members of our workforce must participate in the training and certify that they have completed it," the hospital said in a statement.
Jaikumar Vijayan covers data security and privacy issues, financial services security and e-voting for Computerworld. Follow Jaikumar on Twitter at @jaivijayan, or subscribe to Jaikumar's RSS feed . His e-mail address is email@example.com.
- Franken presses Ford on location data collection practices
- Justices let stand appeals court decision on border searches of laptops
- California lawmakers move to bar state help to NSA
- Appeals court again nixes Google's bid to overturn Street View case
- Older Mac webcams can spy without activating warning light
- Update: Judge rules NSA spy efforts may be unconstitutional
- Perspective: Privacy concerns could keep Amazon delivery drones grounded
- NSA collects data from millions of cellphones daily
- Perspective: Curbing data use is key to reining in NSA
- Lavabit-DOJ dispute zeroes in on encryption key ownership
Read more about Privacy in Computerworld's Privacy Topic Center.
- Best iPhone, iPad Business Apps for 2014
- 14 Tech Conventions You Should Attend in 2014
- 10 Desktop Apps to Power Your Windows PC
- How to Add New Job Skills Without Going Back to School
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
Red Hat Enterprise Linux - The Original Cloud Operating System
Linux adoption is growing against a number of measures, such as the
number of supercomputers that run Linux and the size of the contributing...
- OpenStack Hype vs. Reality: CIO Quick Pulse Open-source architecture can enable IT departments to build infrastructure-as-a-service (IaaS) clouds running on standard hardware.
- Building a Bridge to the Next Generation Data Center Selecting a widely adopted operating system is a foundational component of a standardization strategy.
- OpenStack and Red Hat: IDC White paper Most OpenStack deployments are by public cloud providers that are early adopters of technology and use OpenStack in a do-it-yourself deployment and support...
- Data Protection and Disaster Recovery with iSCSI and VMware Get this on demand webcast now
- Webinar: Building a Big Data solution that's production-ready Big data solutions are no longer just a nice-to-have. All Privacy White Papers | Webcasts