Breach incident management: Providers should anticipate an OCR investigation

Jan Elezian (jan.elezian@sunhawkconsulting.com) is Director, SunHawk Consulting LLC in Denver, CO, and Nancy Lipman (nancy.lipman@cplc.org) is Vice President of Compliance at Chicanos Por La Causa Inc. in Phoenix, AZ.

With the implementation of the Breach Notification Rule under the Health Insurance Portability and Accountability Act of 1996 (HIPAA),[1] the healthcare industry has experienced an increased risk of enforcement action by the Office for Civil Rights (OCR). Separate from the Breach Notification Rule, there are two additional factors compounding this risk. The first is individuals’ ability to file a complaint directly with the OCR.[2] The OCR accepts all HIPAA violation complaints, from any source, about any covered entity or their business associate, regardless of the size or nature of the potential breach. The second is individuals’ heightened awareness about the value of their personal information and the need to protect it. The OCR, in conjunction with law enforcement, investigates incidents involving theft of HIPAA protected information and fraud. Of the 91 reported breach incidents under investigation by the OCR during the first two months of 2020, 65 involved hacking or other information technology incidents, including those with potential malintent such as malware, ransomware, and phishing schemes.[3] Given any of these risk factors, it is practical to assume that there will be an OCR complaint filed for each compliance investigation conducted in response to an alleged breach. This article will discuss some key steps in managing a breach incident response.

This document is only available to members. Please log in or become a member.
 


Would you like to read this entire article?

If you already subscribe to this publication, just log in. If not, let us send you an email with a link that will allow you to read the entire article for free. Just complete the following form.

* required field