
HIPAA highlights: 2 disturbing class actions, OCR risk analysis enforcement
Two class-action lawsuits targeting the University of Maryland Medical Center and the University of Kansas Health System for years-long cyberstalking and unauthorized access to protected health information spotlight massive HIPAA risk-analysis failures and underscore the urgent need for stronger health care cybersecurity safeguards.
Walt Whitman penned in The Poet in Nature, “Sane, random, negligent hours, wandering the negligent paths.” The two class actions filed within a week against different hospitals can hardly be described as “sane” and illustrate conduct that is more severe than “negligence.” It makes one stop and think “who does this” but then again, this conduct of backdooring into electronic systems housing personally identifiable information (PII), protected health information (PHI) or individually identifiable health information (IIHI) or taking pictures of nude patients who put their trust in providers is not new. I wrote about this
The potential violations stem beyond potential civil Health Insurance Portability and Accountability Act of 1996 (HIPAA) or Federal Trade Commission Act violations and into the realm of criminal liability whether through the Stored Communications Act (SCA), HIPAA or
The
By installing the keyloggers, he was able to allegedly access internet-based cameras to record videos of medical professionals pumping breast milk in closed treatment rooms in the Frenkil Building and also utilized the stolen credentials to access webcams and home security cameras to view in-home interactions of families and intimate situations between adults. Not only did he allegedly view the information, he also stored the personally identifiable information and stored the intimate images.
The
What should set off alarms for compliance officers, providers and attorneys alike is how the conduct went on for years undetected. An adequate risk analysis should have identified the gaps and the defendants should have corrected them within a timely manner by strengthening existing technical, administrative and physical safeguards and/or implementing measures, including detection software, audit logs, etc. in a timely manner.
This brings us to the recent
(2) HHS initiated an investigation of NERAD pursuant to a breach notification report filed by NERAD in March 2020. OCR’s investigation revealed that NERAD experienced a breach in its Picture Archiving and Communication Systems (PACS) server when it discovered that unauthorized individuals accessed data from NERAD’s PACS, which is used to store radiology images. The information stored in the PACS included electronic protected health information (ePHI). HHS’s investigation indicated potential violations of the following provision (“Covered Conduct”):
(a)The requirement to conduct an accurate and thorough assessment of the potential risks and vulnerabilities to the confidentiality, integrity, and availability of ePHI held by the covered entity. See 45 C.F.R. § 164.308(a)(1)(ii)(A).
As HHS-OCR stated in its
Newsletter
Optimize your practice with the Physicians Practice newsletter, offering management pearls, leadership tips, and business strategies tailored for practice administrators and physicians of any specialty.













