HIPAA Violation Results in $65k Settlement

There was a case that settled last December that apparently slipped passed me. Because it involves a topic I get asked about regularly (HIPAA), and about which there is a lot of misinformation, I want to be sure it is mentioned here even though belatedly.

The case is a good example of what HIPAA is really focused on: ensuring EMS providers have taken adequate precautions to protect electronically stored confidential patient information – referred to as electronic protected health information (ePHI). All too often, firefighters tend to think that HIPAA is aimed at limiting what we can discuss about the patients we treat.

On December 13, 2012, an unencrypted laptop computer containing protected health information (PHI) fell off the back bumper of an ambulance belonging to West Georgia Ambulance Inc. The device was never recovered. As a result, ePHI from 500 patients was potentially compromised.

As required by the Health Insurance Portability and Accountability Act, the provider notified the United States Department of Health and Human Services (HHS) Office for Civil Rights (OCR) of the breach. OCR conducted an investigation and found that West Georgia Ambulance violated several HIPAA requirements, including:

  1. “did not conduct an accurate and thorough risk analysis of the potential risks and vulnerabilities to the confidentiality, integrity, and availability of all of its ePHI”
  2. “failed to have a HIPAA security training program, and failed to provide security training to its employees.”
  3. “failed to implement Security Rule policies or procedures.”

On December 23, 2019, OCR and West Georgia Ambulance entered into a “resolution agreement” in which the EMS provider agreed to pay OCR $65,000 as a “resolution amount” and commit to a “corrective action plan”. That plan is insightful because it outlines what EMS providers should be doing to ensure they are compliant with HIPAA.

The full corrective action plan is attached, and I urge all EMS providers to review it. Among the most important requirements are that providers:

  • conduct and complete an accurate, thorough, enterprise-wide analysis of security risks and vulnerabilities that incorporates all electronic equipment, data systems, programs and applications controlled, administered, owned, or shared by the Covered Entity or its affiliates that are owned, controlled or managed by the Covered Entity that contain, store, transmit or receive the Covered Entity ePHI.
  • develop a complete inventory of all electronic equipment, data systems, off-site data storage facilities, and applications that contain or store ePHI which will then be incorporated in its Risk Analysis.
  • develop an organization-wide risk management plan to address and mitigate any security risks and vulnerabilities identified in its risk analysis.
  • adopt and implement written policies and procedures to comply with the Privacy, Security, and Breach Notification Rules, pursuant to 45 C.F.R. Part 160 and Subparts A, C and E of Part 164.
  • Additionally, in light of HHS’ investigation, particular revision is required to the Covered Entity’s policies and procedures relating to:
    • Business Associates & Business Associate Agreements,
    • Technical access controls for any and all network/server equipment and systems to prevent impermissible access and disclosure of ePHI,
    • Technical access control and restriction for all software applications that contain ePHI to ensure authorized access is limited to the minimum amount necessary,
    • Technical mechanisms to create access and activity logs as well as administrative procedures to routinely review logs for suspicious events and respond appropriately,
    • Termination of user accounts when necessary and appropriate,
    • Required and routine password changes,
    • Password strength and safeguarding, and
    • Addressing and documenting security incidents.
  • [All policies and procedures to be approved by HHS OCR
  • [All workforce members shall be trained on the approved policies and procedures
  • [All new workforce members shall be trained on the approved policies and procedures upon hiring
  • [All workforce members shall review the training material annually
  • [Workforce members shall certify “in electronic or written form” that they received the training.]

Here is a copy of the Resolution Agreement, which includes the Corrective Action Plan as an appendix.

It should be noted that the “resolution amount” here, $65,000, is a modest one. There are health care providers who have been fined in the millions. Take a look at HIPAA News Releases.

About Curt Varone

Curt Varone has over 45 years of fire service experience and 35 as a practicing attorney licensed in both Rhode Island and Maine. His background includes 29 years as a career firefighter in Providence (retiring as a Deputy Assistant Chief), as well as volunteer and paid on call experience. He is the author of two books: Legal Considerations for Fire and Emergency Services, (2006, 2nd ed. 2011, 3rd ed. 2014, 4th ed. 2022) and Fire Officer's Legal Handbook (2007), and is a contributing editor for Firehouse Magazine writing the Fire Law column.
x

Check Also

City Settles Ohio Firefighter’s Gender Discrimination Claims for $18k

A former Ohio firefighter has settled his gender discrimination lawsuit for $18,000. Ethan Boes filed suit earlier this year claiming he was forced to resign in 2022.

Court Holds FDNY Not Liable in EMS Dispatch and Transport Case

The Appellate Division of the New York Supreme Court has ruled as a matter of law, that FDNY cannot be held liable for their initial decision to dispatch a basic life support ambulance as opposed to paramedics to an incident scene, or the later decision of EMTs to await the arrival of paramedics rather than transport a patient immediately to the hospital.