Understanding the 5 Main HIPAA RulesGreg Garner
What does HIPAA stand for? HIPAA stands for the Health Insurance Portability and Accountability Act (HIPAA) and is the HIPAA law enacted to improve how healthcare entities protect sensitive patient health information (PHI) and patient privacy. Since enacted by the U.S. Congress in 1996, new rules have been added to HIPAA rules to enhance the current levels of protection. It is vitally important for organizations to keep up to date with these changes and understand what HIPAA means to your business practices.
The HIPAA Laws and Regulations are five specific rules that your entire team should be aware of. Keep reading for an in-depth look at each rule and how it should apply.
5 Main HIPAA Rules
Your organization’s strategy for HIPAA compliance depends on you knowing, understanding, and staying up-to-date with the latest HIPAA rules. This will ensure that your HIPAA training and documentation protocols are error-free and consistent with the outlined standards.
1. HIPAA Privacy Rule (45 CFR §164.530) – more detailed information is provided later in this article
The Privacy Rule protects the Personal Health Information (PHI) and medical records of individuals. It places limits and conditions on the various uses and disclosures that can and cannot be made without patient authorization. This rule also gives every patient the right to inspect and obtain a copy of their records and request corrections to their file.
There are specific forms that coincide with this rule:
- Request of Access to Protected Health Information (PHI)
- Notice of Privacy Practices (NPP) Form
- Request for Accounting Disclosures Form
- Request for Restriction of Patient Health Care Information
- Authorization for Use or Disclosure Form
- Privacy Complaint Form
2. HIPAA Security Rule (45 CFR §164.308) – more detailed information is provided later in this article
The security rule defines and regulates the standards, methods, and procedures related to the protection of electronic PHI on storage, accessibility, and transmission.
There are three safeguard levels of security:
Administrative safeguards deal with the assignment of a HIPAA security compliance team
Technical safeguards deal with the encryption and authentication methods used to have control over data access
Physical safeguards deal with the protection of any electronic system, data, or equipment within your facility and organization. The risk analysis and risk management protocols for hardware, software, and transmission fall under this rule.
3. Transactions Rule – more detailed information is provided later in this article
This rule deals with the transactions and code sets used in HIPAA transactions, including:
- NDC codes
Correct use of these codes ensures the safety, accuracy, and security of medical records and PHI.
4. Identifiers Rule – more detailed information is provided later in this article
HIPAA uses three unique identifiers for covered entities who use HIPAA-regulated administrative and financial transactions. These identifiers are:
- National Provider Identifier (NPI): a 10-digit number used for covered healthcare providers in every HIPAA administrative and financial transaction
- National Health Plan Identifier (NHI): an identifier used to identify health plans and payers under the Center for Medicare & Medicaid Services (CMS)
- Standard Unique Employer Identifier: identifies an employer entity in HIPAA transactions and is considered the same as the federal Employer Identification Number (EIN).
5. Enforcement Rule – more detailed information is provided later in this article
Derived from the ARRA HITECH ACT provisions for violations that occurred before, on, or after the February 18, 2015 compliance date, this rule expands those under HIPAA Privacy and Security. It increases the penalties for any violations.
The enforcement rule addresses five main areas in regards to covered entities and business associates:
- Application of HIPAA security and privacy requirements.
- Establishment of mandatory federal privacy and security breach reporting requirements.
- Creation of new privacy requirements and accounting disclosure requirements, and restrictions on sales and marketing.
- Establishment of new criminal and civil penalties and enforcement methods for HIPAA non-compliance.
- A stipulation that all new security requirements must be included in all Business Associate contracts.
Essential HIPAA Compliance Courses
An organization’s strategy for HIPAA compliance depends on employers and key staff knowing, understanding and staying up-to-date with the latest rules of the system. This will ensure that your HIPAA training and documentation protocols are error-free and consistent with the outlined standards.
Institutions found in violation of HIPAA can face extensive fines.
HIPAA stands for the Health Insurance Portability and Accountability Act of 1996. HIPAA’s original intent was to ensure health insurance coverage for individuals who had left their employment. Since 1996, HIPAA has gone through modifications and grown in scope.
The HIPAA Privacy Rule is the specific rule within HIPAA Law that focuses on protecting Personal Health Information (PHI). It established national standards on how covered entities, health care clearinghouses, and business associates share and store PHI. It established rules to protect patient’s information used during health care services.
HIPAA Rules and Regulations are enforced by the Office of Civil Rights (OCR) within the Health and Human Services (HHS) division of the federal government. Enforcement is ongoing, and fines of $2 million-plus have been issued to organizations found to be in violation of HIPAA.
HIPAA, or the Health Insurance Portability and Accountability Act of 1996, is a federal regulation established to strengthen how Personal Health Information (PHI) is stored and shared by Covered Entities and Business Associates.
HIPAA regulation covers several categories, including HIPAA Privacy Rule, HIPAA Security Rule, HITECH and OMNIBUS Rules, and the Enforcement Rule. All Covered Entities and Business Associates must follow all HIPAA rules and regulations.
2021 HIPAA Changes You Need To Know
There are two rules, issued by the HHS Office of the National Coordinator for Health Information Technology (ONC) and Centers for Medicare & Medicaid Services (CMS), which implement interoperability and provides patient access provisions.
These were issues as part of the bipartisan 21st Century Cures Act (Cures Act) and supported by President Trump’s MyHealthEData initiative. MyHealthEData gives every American access to their medical information so they can make better healthcare decisions.
Privacy Rule – What Is Right of Access?
Right of access covers access to one’s Protected Health Information (PHI). The HIPAA Privacy Rule explains that patients may ask for access to their PHI from their providers. Specifically, it guarantees that patients can access records for a reasonable price and in a timely manner.
These records can include:
- Medical records from a medical office
- Billing records from a medical office
- Health plan information
- Any other data to make decisions about an individual
The right of access initiative also gives priority enforcement when providers or health plans deny access to information. Providers don’t have to develop new information, but they do have to provide information to patients that request it.
Patients should request this information from their provider. They can request specific information, so patients can get the information they need.
What Isn’t Covered Under Right of Access?
The HIPAA Privacy Rule omits some types of PHI from coverage under the right of access initiative. While most PHI is accessible, any information that isn’t used to make decisions directly about people isn’t covered.
Possible reasons information would fall under this category include:
- Business planning
- Patient safety activity records
- Quality assessment and improvement
As long as the provider isn’t using the data to make medical decisions, it won’t be part of an individual’s right to access. Other types of information are also exempt from the right to access.
If a provider needs to organize information for a civil or criminal proceeding, that won’t fall under the first category. The same is true of information used for administrative actions or proceedings.
Another exemption is when a mental health care provider documents or reviews the contents of an appointment. As long as they keep those records separate from a patient’s file, they won’t fall under the right of access.
Who Does Right of Access Affect?
Right of access affects a few groups of people. When you fall into one of these groups, you should understand how the right of access works. That way, you can avoid right-of-access violations.
Consider the different types of people that the right of access initiative can affect.
Of course, patients have the right to access their medical records and other files that the law allows. A patient will need to ask their health care provider for the information they want.
This applies to patients of all ages and regardless of medical history. Patients can grant access to other people in certain cases, so they aren’t the only recipients of PHI.
Sometimes, a patient may not want to be the one to access PHI, so a representative can do so. The most common example of this is parents or guardians of patients under 18 years old.
However, adults can also designate someone else to make their medical decisions. This could be a power of attorney or a health care proxy. While not common, a representative can be useful if a patient becomes unable to make decisions for themself.
Covered entities include a few groups of people, and they’re the group that will provide access to medical records. Examples of covered entities are:
- Other providers
- Health insurance plans
- Government health plans
Other covered entities include health care clearinghouses and health care business associates. However, odds are, they won’t be the ones dealing with patient requests for medical records. Still, it’s important for these entities to follow HIPAA.
Be Pro-Active – Avoid Right of Access Violations
There are a few different types of right of access violations. Like other HIPAA meaning violations, these are serious. As a health care provider, you can avoid violations by:
- Conducting risk analyses
- Offering security awareness training to employees
- Controlling device and media access
- Encrypting electronic PHI (ePHI)
- Using a business associate agreement
- Implementing policies and procedures
Not doing these things can increase your risk of right of access violations and HIPAA violations in general. Even if you and your employees have HIPAA certification, avoiding violations is an ongoing task.
Who Is at Risk Of Violating Right of Access?
Any covered entity might violate right of access, either when granting access or by denying it. Entities that have violated right of access include private practitioners, university clinics, and psychiatric offices.
A violation can occur if a provider without access to PHI tries to gain access to help a patient. Someone may also violate right to access if they give information to an unauthorized party, such as someone claiming to be a representative.
Denying access to information that a patient can access is another violation. While there are some occasions where providers can deny access, those cases aren’t as common as those where a patient can access their records.
Steps to Prevent HIPAA Right of Access Violations
Fortunately, medical providers and other covered entities can take steps to reduce the risk of or prevent HIPAA right of access violations. Whether you work in a hospital, medical clinic, or for a health insurance company, you should follow these steps.
That way, you can protect yourself and anyone else involved. The steps to prevent violations are simple, so there’s no reason not to implement at least some of them.
Step 1 – Get Your Team HIPAA Certified
HIPAA certification proves a covered entity or business associate understands the law. The certification can cover the Privacy, Security, and Omnibus Rules.
While having a team go through HIPAA certification won’t guarantee no violations will occur, it can help prevent violations. Sometimes, employees need to know the rules and regulations to follow them.
HIPAA certification is available for your entire office, so everyone can receive the training they need. You can enroll people in the best course for them based on their job title.
Providers can learn how HIPAA affects them, while business associates can learn about their relationship with HIPAA. With the courses offered through HIPPA Exams, you don’t have to provide the training.
Step 2 – Implement Safeguards
Another great way to help reduce right of access violations is to implement certain safeguards. The HIPAA Security Rule outlines safeguards you can use to protect PHI and restrict access to authorized individuals.
Safeguards can be physical, technical, or administrative
A physical safeguard is to use keys or cards to limit access to a physical space with records
A technical safeguard might be using usernames and passwords to restrict access to electronic information
Administrative safeguards can include staff training or creating and using a security policy
Step 3 – Verify Right of Access
Before granting access to a patient or their representative, you need to verify the person’s identity. HIPAA doesn’t have any specific methods for verifying access, so you can select a method that works for your office.
Consider asking for a driver’s license or another photo ID. When using the phone, ask the patient to verify their personal information, such as their address.
Whatever you choose, make sure it’s consistent across the whole team. That way, you can verify someone’s right to access their records and avoid confusion amongst your team.
Step 4 – Use the Proper Format
When you grant access to someone, you need to provide the PHI in the format that the patient requests. They may request an electronic file or a paper file.
However, HIPAA recognizes that you may not be able to provide certain formats. In that case, you will need to agree with the patient on another format, such as a paper copy.
You don’t need to have or use specific software to provide access to records. However, you do need to be able to produce print or electronic files for patients, and the delivery needs to be safe and secure.
Step 5 – Know When to Deny
While not common, there may be times when you can deny access, even to the patient directly. For example, you can deny records that will be in a legal proceeding or when a research study is in progress.
If revealing the information may endanger the life of the patient or another individual, you can deny the request. The same is true if granting access could cause harm, even if it isn’t life-threatening.
When a federal agency controls records, complying with the Privacy Act requires denying access. And if a third party gives information to a provider confidentially, the provider can deny access to the information.
Understanding HIPAA Violations
With its passage in 1996, the Health Insurance Portability and Accountability Act (HIPAA) changed the face of medicine. The law has had far-reaching effects. What’s more, it’s transformed the way that many health care providers operate.
The most important part of the HIPAA Act states that you must keep personally identifiable patient information secure and private. This provision has made electronic health records safer for patients.
However, it’s also imposed several, sometimes burdensome, rules on health care providers. It’s estimated that compliance with HIPAA rules costs companies about $8.3 billion every year.
The various sections of the HIPAA Act are called titles. Titles I and II are the most relevant sections of the act.
Title I of the HIPAA Act
This encompasses the portability HIPAA rules of the HIPAA Act. It ensures that insurers can’t deny people moving from one plan to another due to pre-existing health conditions. This is the part of the HIPAA Act that has had the most impact on consumers’ lives.
Title II of the HIPAA Act
Title II states that covered entities must maintain reasonable and appropriate safeguards to protect patient information. These safeguards must include:
- Administrative measures – workforce training and risk analyses
- Physical safeguards – measures such as access control and HIPAA form
- Technical deployments – cybersecurity software
In general, Title II says that organizations must ensure the confidentiality, integrity, and availability of all patient information.
Top Causes Of HIPAA Violations
Occasionally, the Office for Civil Rights conducts HIPAA compliance audits. Recently, for instance, the OCR audited 166 health care providers and 41 business associates. The purpose of the audits is to check for compliance with HIPAA rules.
There are a few common types of HIPAA violations that arise during audits. For instance, the OCR may find that an organization allowed unauthorized access to patient health information.
HIPAA violations might occur due to ignorance or negligence. In either case, a resulting violation can accompany massive fines.
A health care provider may also face an OCR fine for failing to encrypt patient information stored on mobile devices.
Audits also frequently reveal that organizations do not dispose of patient information properly.
Alternatively, the office may learn that an organization is not performing organization-wide risk analyses.
The OCR may also find that a health care provider does not participate in HIPAA compliant business associate agreements as required.
Other HIPAA violations come to light after a cyber breach.
HIPAA Violation Fines
It’s important to provide HIPAA training for medical employees. Without it, your organization is at risk of being fined.
The fines can range from hundreds of thousands of dollars to millions of dollars. The OCR establishes the fine amount based on the severity of the infraction.
The smallest fine for an intentional violation is $50,000. In a worst-case scenario, the OCR could levy a fine on an individual for $250,000 for a criminal offense. Furthermore, the court could find your organization liable for paying restitution to the victim of the crime.
The OCR may impose fines per violation. Alternatively, they may apply a single fine for a series of violations. The fines might also accompany corrective action plans.
Types of HIPAA Breaches
There are two primary classifications of HIPAA breaches. If a violation doesn’t result in the use or disclosure of patient information, the OCR ranks it as “not a breach.”
Even so, the OCR must make another assessment when a violation involves patient information. They must define whether the violation was intentional or unintentional.
Accidental disclosure is still a breach. However, it comes with much less severe penalties.
Alternatively, the OCR considers a deliberate disclosure very serious. Resultantly, they levy much heavier fines for this kind of breach.
After a breach, the OCR typically finds that the breach occurred in one of several common areas.
Lack of a Valid Risk Assessment
Risk analysis is an important element of the HIPAA Act. The purpose of this assessment is to identify risks to patient information. It’s the first step that a health care provider should take in meeting compliance.
Sharing Patient Information
Here, a health care provider might share information intentionally or unintentionally. In either case, a health care provider should never provide patient information to an unauthorized recipient. An unauthorized recipient could include coworkers, the media, or a patient’s unauthorized family member.
Unauthorized Viewing of Patient Information
Reviewing patient information for administrative purposes or delivering care is acceptable. However, it’s a violation of the HIPAA Act to view patient records outside of these two purposes. Personnel cannot view patient records unless doing so for a specific reason that’s related to the delivery of treatment.
Improper Disposal of Patient Information
The HIPAA Act mandates the secure disposal of patient information. Complying with this rule might include the appropriate destruction of data, hard disk, or backups.
It also includes destroying data on stolen devices. In addition, it covers the destruction of hardcopy patient information.
Lack of Patient Access Controls
According to HIPAA rules, health care providers must control access to patient information. For example, your organization could deploy multi-factor authentication. Multi-factor authentication is an excellent place to start if you want to ensure that only authorized personnel accesses patient records.
Lack of Encryption
This violation usually occurs when a care provider doesn’t encrypt patient information that’s shared over a network. Tools such as VPNs, TSL certificates, and security ciphers enable you to encrypt patient information digitally. It’s also a good idea to encrypt patient information that you’re not transmitting.
Breach Notification Compliance
Failure to notify the OCR of a breach is a violation of HIPAA policy. Furthermore, you must do so within 60 days of the breach. If not, you’ve violated this part of the HIPAA Act.
Improper Handling of Patient Information
Care providers must share patient information using official channels. Staff members cannot email patient information using personal accounts.
They also shouldn’t print patient information and take it off-site. Either act is a HIPAA offense.
Unauthorized Information Disclosure
Your staff members should never release patient information to unauthorized individuals. Doing so is considered a breach. However, the OCR did relax this part of the HIPAA regulations during the pandemic.
Limited Access Logging
Organizations must maintain detailed records of who accesses patient information. They must also track changes and updates to patient information.
You never know when your practice or organization could face an audit. If so, the OCR will want to see information about who accesses what patient information on specific dates. If you cannot provide this information, the OCR will consider you in violation of HIPAA rules.
Here, however, the OCR has also relaxed the rules. They’re offering some leniency in the data logging of COVID test stations.
How Obtaining HIPAA Certification Can Reduce Violations
There are many ways to violate HIPAA regulations. Fortunately, your organization can stay clear of violations with the right HIPAA training.
Health care professionals must have HIPAA training. The HIPAA Act requires training for doctors, nurses, and anyone who comes in contact with sensitive patient information.
Understanding the many HIPAA laws can prove challenging. In many cases, they’re vague and confusing.
HIPAA training is a critical part of compliance for this reason. Proper training will ensure that all employees are up-to-date on what it takes to maintain the privacy and security of patient information.
With training, your staff will learn the many details of complying with the HIPAA Act. More importantly, they’ll understand their role in HIPAA compliance. They will learn how to deal with patient information and access requests in a way that doesn’t break the law.
What is HIPAA Certification?
With HIPAA certification, you can prove that your staff members know how to comply with HIPAA regulations. Today, earning HIPAA certification is a part of due diligence.
HIPAA compliance rules change continually. As a result, there’s no official path to HIPAA certification. If a training provider advertises that their course is endorsed by the Department of Health & Human Services, it’s a falsehood.
Nevertheless, you can claim that your organization is certified HIPAA compliant. The statement simply means that you’ve completed third-party HIPAA compliance training.
It also means that you’ve taken measures to comply with HIPAA regulations. Here, however, it’s vital to find a trusted HIPAA training partner.
What Is Considered Protected Health Information (PHI)?
Protected health information (PHI) is the information that identifies an individual patient or client.
Examples of protected health information include a name, social security number, or phone number. It can also include a home address or credit card information as well.
Health-related data falls under PHI if it includes those records used or disclosed during the course of medical care. Health data regulated by HIPAA can range from MRI scans to blood test results.
When this information is available in digital format, it’s called “electronically protected health information” or ePHI. Any form of ePHI that’s stored, accessed, or transmitted falls under HIPAA guidelines.
HIPAA is designed to protect not only electronic records themselves but the equipment that’s used to store these records. HIPAA applies to personal computers, internal hard drives, and USB drives used to store ePHI. HIPAA regulations also apply to smartphones or PDA’s that store or read ePHI as well.
Who Must Comply With HIPAA?
HIPAA’s protection for health information rests on the shoulders of two different kinds of organizations. HIPAA refers to these groups as a business associate or a covered entity. Here’s a closer look at these two groups:
A covered entity is an organization that collects, creates, and sends PHI records. Covered entities are businesses that have direct contact with the patient. Covered entities include primary health care providers (i.e., dentists, therapists, doctors, etc.)
Covered entities must comply with HIPAA when they send a patient’s health information in any format. The patient’s PHI might be sent as referrals to other specialists. It could also be sent to an insurance provider for payment.
Business associates don’t see patients directly. Instead, they create, receive, or transmit a patient’s PHI. Examples of business associates can range from medical transcription companies to attorneys.
Other examples of a business associate include the following:
- Cloud storage businesses
- Email hosting providers
- Faxing service companies
- Medical billing firms
- A monolithic power system
- Physical storage companies
- Professional shredding companies
Rules of HIPAA
HIPAA regulations require the US Department of Health and Human Services (HHS) to develop rules to protect this confidential health data. The HHS published these main HIPAA rules:
HIPAA Breach Notification Rule
The HIPAA Breach Notification Rule establishes the national standard to follow when a data breach has compromised a patient’s record. The rule also addresses two other kinds of breaches. The other breaches are Minor and Meaningful breaches.
All business associates and covered entities must report any breaches of their PHI, regardless of size, to HHS. The specific procedures for reporting will depend on the type of breach that took place.
HIPAA Privacy Rule
The HIPAA Privacy Rule sets the federal standard for protecting patient PHI. These access standards apply to both the health care provider and the patient as well. These privacy standards include the following:
The patient’s right to access their PHI.
The health care provider’s right to access patient PHI.
The health care provider’s right to refuse access to patient PHI.
Minimum required standards for an individual company’s HIPAA policies and release forms.
HIPAA Identifiers Rule
HIPAA has different identifiers for a covered entity that uses HIPAA financial and administrative transactions. HIPAA mandates health care providers have a National Provider Identifier (NPI) number that identifies them on their administrative transactions.
HIPAA Security Rule
The HIPAA Security Rule sets the federal standard for managing a patient’s ePHI. It also applies to sending ePHI as well. The Security Rule addresses the physical, technical, and administrative protections for patient ePHI.
HIPAA Enforcement Rule
The HIPAA enforcement rules address the penalties for any violations by business associates or covered entities. This rule addresses violations in some of the following areas:
Application of HIPAA privacy and security rules
Establishing mandatory security breach reporting requirements
Accounting disclosure requirements
Restrictions on marketing and sales
Restrictions that apply to any business associate or covered entity contracts (These contracts must be implemented before they can transfer or share any PHI or ePHI)
Why Breached PHI Is Valuable
It’s a common newspaper headline all around the world. Hacking and other cyber threats cause a majority of today’s PHI breaches. But why is PHI so attractive to today’s data thieves?
One way to understand this draw is to compare stolen PHI data to stolen banking data. Stolen banking or financial data is worth a little over $5.00 on today’s black market. Compromised PHI records are worth more than $250 on today’s black market.
Stolen banking data must be used quickly by cybercriminals. Victims will usually notice if their bank or credit cards are missing immediately. When this happens, the victim can cancel their card right away, leaving the criminals very little time to make their illegal purchases.
PHI data has a higher value due to its longevity and limited ability to change over long periods of time. PHI data breaches take longer to detect, and victims usually can’t change their stored medical information.
Other valuable information such as addresses, dates of birth, and social security numbers are vulnerable to identity theft. Sometimes cybercriminals will use this information to get buy prescription drugs or receive medical attention using the victim’s name. All of these perks make it more attractive to cyber vandals to pirate PHI data.
Best Way To Protect PHI
Perhaps the best way to head of breaches to your ePHI and PHI is to have a rock-solid HIPAA compliance in place. Some components of your HIPAA compliance program should include:
Written Procedures for Policies, Standards, and Conduct
HIPAA protection begins when business associates or covered entities compile their own written policies and practices. These policies can range from records employee conduct to disaster recovery efforts.
Any policies you create should be focused on the future. Invite your staff to provide their input on any changes. When you request their feedback, your team will have more buy-in while your company grows.
Identify a Compliance Body
Hire a compliance professional to be in charge of your protection program. You can choose to either assign responsibility to an individual or a committee.
Access to Information, Resources, and Training
HIPAA protection doesn’t mean a thing if your team doesn’t know anything about it. When new employees join the company, have your compliance manager train them on HIPPA concerns.
Give your team access to the policies and forms they’ll need to keep your ePHI and PHI data safe. Team training should be a continuous process that ensures employees are always updated.
Audit and Monitor
Compare these tasks to the same way you address your own personal vehicle’s ongoing maintenance. Your car needs regular maintenance. So does your HIPAA compliance program. Regular program review helps make sure it’s relevant and effective.
Decide what frequency you want to audit your worksite. Then you can create a follow-up plan that details your next steps after your audit.
Automated systems can also help you plan for updates further down the road. You can use automated notifications to remind you that you need to update or renew your policies. Allow your compliance officer or compliance group to access these same systems.
HIPAA requires organizations to identify specific steps to enforce their compliance program. Let your employees know how you will distribute your company’s appropriate policies. Tell them when training is coming available for any procedures.
Send automatic notifications to team members when your business publishes a new policy. That’s the perfect time to ask for their input on the new policy.
Quick Response and Corrective Action Plan
A comprehensive HIPAA compliance program should also address your corrective actions that can correct any HIPAA violations.
Your company’s action plan should spell out how you identify, address, and handle any compliance violations. Who do you need to contact? What are the disciplinary actions we need to follow?
The primary purpose of this exercise is to correct the problem. Fix your current strategy where it’s necessary so that more problems don’t occur further down the road.
A Case Study of HIPAA Violation
Public disclosure of a HIPAA violation is unnerving. It can harm the standing of your organization. What’s more—it can prove costly.
Still, a financial penalty can serve as the least of your burdens if you’re found in violation of HIPAA rules. A HIPAA Corrective Action Plan (CAP) can cost your organization even more.
June, the Office of Civil Rights (OCR) fined a small medical practice, The Diabetes, Endocrinology & Biology Center Inc. of West Virginia.
As previously noted, in June of 2021, the HHS Office for Civil Rights (OCR) fined a health care provider $5,000 for HIPAA violations. The medical practice has agreed to pay the fine as well as comply with the OCR’s CAP.
The fine was the office’s response to the care provider’s failure to provide a parent with timely access to the medical records of her child. In the end, the OCR issued a financial fine and recommended a supervised corrective action plan.
According to the OCR, the case began with a complaint filed in August 2019. It alleged that the center failed to respond to a parent’s record access request in July 2019.
In response to the complaint, the OCR launched an investigation. The investigation determined that, indeed, the center failed to comply with the timely access provision. As a result, it made a ruling that the Diabetes, Endocrinology & Biology Center was in violation of HIPAA policies.
This was the OCR’s 19th action involving a patient’s right to access. The Center agreed to the OCR’s terms. The care provider will pay the $5,000 fine. They’ll also comply with the OCR’s corrective action plan to prevent future violations of HIPAA regulations.