Your lunch break takes an unexpected turn in the bustling long-term care facility where you are employed as an occupational therapist. While enjoying your meal in the cafeteria, you overhear a troubling conversation among some employees from the housekeeping office. They seem to be discussing how they gained access to a neighbor's medical records through the facility's online system, which immediately raises red flags.
You are aware that as a covered entity, your long-term care facility is subject to HIPAA security rules (HHS, 2005). You recall that security rules must be reasonable and appropriate (HHS, 2019c). You remember that access controls must ensure authorized users only have access to the minimum necessary information to perform job functions.
As someone who has received training on HIPAA regulations, you understand the gravity of such breaches in patient confidentiality. HIPAA rules dictate that access to protected health information (PHI) should be restricted to only those individuals who genuinely require it for specific job-related purposes, referred to as “need to know,” such as treatment or operations. Information technology systems and security must be in place to ensure that housekeeping employees cannot access PHI or ePHI.
Given the situation, you are confronted with a dilemma:
- Approach the housekeeping staff discreetly and inform them of their violation of HIPAA rules.
- Report the incident to the company’s HIPAA privacy officer for further investigation (Alder, 2018).
- Bring the issue to the attention of the housekeeping manager and direct her to take disciplinary action against the staff involved.
- Disregard the matter and resume your lunch as if nothing happened.
Options 1, 3, and 4 are not appropriate. As an occupational therapist, you cannot direct housekeeping staff.
Ignoring the situation is not an option, as it significantly risks exposing the organization to potential fines and penalties for HIPAA non-compliance. As a covered entity, the case long-term care facility must adhere to the minimum necessary standard by law, allowing employees access only to the data they "need to know" for their roles (HHS, 2019d). This necessitates implementing information technology and security measures to prevent unauthorized access to Protected Health Information (PHI) or electronic PHI by non-essential personnel, such as housekeeping staff (HHS, 2019d).
Option 2 - By escalating the matter to the company's HIPAA privacy officer, you ensure a thorough investigation and implementation of measures to prevent future breaches, reflecting a commitment to stringent access controls(HIPAA, 2019c).
Implementation measures maintain the organization's integrity and compliance with HIPAA. These include creating unique usernames for each employee’s entry into the computer systems, limiting access based on job roles, and employing encryption to protect patient information.
The investigation process outlines the specific access needs of various organizational roles. For instance, while physicians, nurses, rehabilitation professionals, and case managers might require comprehensive access to medical records, access should be restricted for those whose roles do not necessitate viewing patient records.
Learning from the resolution agreements of companies that have breached HIPAA rules helps us comprehend the critical nature of compliance. The case of Fresenius Medical Care of North America, which was fined $3.5 million for failing to secure patients' PHI, highlights the consequences of non-compliance. The Office for Civil Rights (OCR) required Fresenius to conduct a risk analysis, implement a risk management plan, revise access control policies, enhance encryption, and provide employee education on HIPAA policies and procedures, addressing issues of unauthorized access, data tampering, and theft (HSS, 2018c).
The Security Rule mandates Access Control Standards to prevent similar violations, including creating unique usernames to monitor access, adjusting visibility settings to limit access to necessary PHI, and establishing emergency access procedures. These standards, alongside automatic logoff features and encryption/decryption processes, are designed to minimize unauthorized PHI access and ensure digital protection of sensitive information (HSS, 2018c).
In 2023, the U.S. Department of Health and Human Services’ Office for Civil Rights (OCR) announced a settlement with iHealth Solutions addressing potential HIPAA violations following a data breach involving an unsecured network server containing the PHI and IIHI of 267 individuals. The breach highlighted the need for stringent cybersecurity measures to protect ePHI from unauthorized access.
The resolution agreement between HHS, OCR, and iHealth Solutions involves a payment of $75,000 by iHealth Solutions to OCR and implementing a corrective action plan (CAP). This plan requires iHealth Solutions to conduct a comprehensive risk analysis, develop and implement a risk management plan to address and mitigate identified security risks, evaluate environmental and operational changes affecting ePHI security, and update their written HIPAA policies and procedures accordingly. The CAP also requires iHealth Solutions to submit regular reports to OCR. It will subject iHealth Solutions to two years of monitoring by OCR to ensure compliance with the HIPAA Security Rule (HSS, 2023a).
This settlement underscores the critical responsibility of HIPAA business associates in maintaining the privacy and security of health information. It highlights the consequences of failing to implement adequate security measures, the importance of conducting thorough risk analyses, and management plans to protect ePHI from potential breaches.