HIPAA Violation Results in $65k Settlement

There was a case that settled last December that apparently slipped passed me. Because it involves a topic I get asked about regularly (HIPAA), and about which there is a lot of misinformation, I want to be sure it is mentioned here even though belatedly.

The case is a good example of what HIPAA is really focused on: ensuring EMS providers have taken adequate precautions to protect electronically stored confidential patient information – referred to as electronic protected health information (ePHI). All too often, firefighters tend to think that HIPAA is aimed at limiting what we can discuss about the patients we treat.

On December 13, 2012, an unencrypted laptop computer containing protected health information (PHI) fell off the back bumper of an ambulance belonging to West Georgia Ambulance Inc. The device was never recovered. As a result, ePHI from 500 patients was potentially compromised.

As required by the Health Insurance Portability and Accountability Act, the provider notified the United States Department of Health and Human Services (HHS) Office for Civil Rights (OCR) of the breach. OCR conducted an investigation and found that West Georgia Ambulance violated several HIPAA requirements, including:

  1. “did not conduct an accurate and thorough risk analysis of the potential risks and vulnerabilities to the confidentiality, integrity, and availability of all of its ePHI”
  2. “failed to have a HIPAA security training program, and failed to provide security training to its employees.”
  3. “failed to implement Security Rule policies or procedures.”

On December 23, 2019, OCR and West Georgia Ambulance entered into a “resolution agreement” in which the EMS provider agreed to pay OCR $65,000 as a “resolution amount” and commit to a “corrective action plan”. That plan is insightful because it outlines what EMS providers should be doing to ensure they are compliant with HIPAA.

The full corrective action plan is attached, and I urge all EMS providers to review it. Among the most important requirements are that providers:

  • conduct and complete an accurate, thorough, enterprise-wide analysis of security risks and vulnerabilities that incorporates all electronic equipment, data systems, programs and applications controlled, administered, owned, or shared by the Covered Entity or its affiliates that are owned, controlled or managed by the Covered Entity that contain, store, transmit or receive the Covered Entity ePHI.
  • develop a complete inventory of all electronic equipment, data systems, off-site data storage facilities, and applications that contain or store ePHI which will then be incorporated in its Risk Analysis.
  • develop an organization-wide risk management plan to address and mitigate any security risks and vulnerabilities identified in its risk analysis.
  • adopt and implement written policies and procedures to comply with the Privacy, Security, and Breach Notification Rules, pursuant to 45 C.F.R. Part 160 and Subparts A, C and E of Part 164.
  • Additionally, in light of HHS’ investigation, particular revision is required to the Covered Entity’s policies and procedures relating to:
    • Business Associates & Business Associate Agreements,
    • Technical access controls for any and all network/server equipment and systems to prevent impermissible access and disclosure of ePHI,
    • Technical access control and restriction for all software applications that contain ePHI to ensure authorized access is limited to the minimum amount necessary,
    • Technical mechanisms to create access and activity logs as well as administrative procedures to routinely review logs for suspicious events and respond appropriately,
    • Termination of user accounts when necessary and appropriate,
    • Required and routine password changes,
    • Password strength and safeguarding, and
    • Addressing and documenting security incidents.
  • [All policies and procedures to be approved by HHS OCR
  • [All workforce members shall be trained on the approved policies and procedures
  • [All new workforce members shall be trained on the approved policies and procedures upon hiring
  • [All workforce members shall review the training material annually
  • [Workforce members shall certify “in electronic or written form” that they received the training.]

Here is a copy of the Resolution Agreement, which includes the Corrective Action Plan as an appendix.

It should be noted that the “resolution amount” here, $65,000, is a modest one. There are health care providers who have been fined in the millions. Take a look at HIPAA News Releases.

About Curt Varone

Curt Varone has over 45 years of fire service experience and 35 as a practicing attorney licensed in both Rhode Island and Maine. His background includes 29 years as a career firefighter in Providence (retiring as a Deputy Assistant Chief), as well as volunteer and paid on call experience. He is the author of two books: Legal Considerations for Fire and Emergency Services, (2006, 2nd ed. 2011, 3rd ed. 2014, 4th ed. 2022) and Fire Officer's Legal Handbook (2007), and is a contributing editor for Firehouse Magazine writing the Fire Law column.
x

Check Also

California Utility Settles With US Forest Service for $80 Million

Southern California Edison has agreed to pay the US Forest Service $80 million in damages to settle a suit related to the Thomas Fire. The fire burned more than 280,000 acres in Ventura and Santa Barbara counties in 2017, including roughly 150,000 acres of national forests.

Arbitrator Reinstates California Firefighters

Two Rialto, California firefighters who were terminated in the aftermath of a high-profile EMS incident in 2021, have been reinstated by an arbitrator. Captain Josh Gilliam, Firefighter-Paramedic Matt Payne, and Engineer Mark Brady were accused of wrongfully refusing to enter the Rialto Post Acute Care Center on November 17, 2021 due to COVID related concerns.