Stolen Laptops Lead to HIPAA Settlements for Two Healthcare Entities

Two healthcare organizations have paid the U.S. Department of Health and Human Services Office for Civil Rights (OCR) $1,975,220 collectively to resolve potential violations of the Health Insurance Portability and Accountability Act (HIPAA) Privacy and Security Rules.
April 22, 2014
2 min read

Two healthcare organizations have paid the U.S. Department of Health and Human Services Office for Civil Rights (OCR) $1,975,220 collectively to resolve potential violations of the Health Insurance Portability and Accountability Act (HIPAA) Privacy and Security Rules.

According to a notice on HHS’ website, these major enforcement actions underscore the significant risk to the security of patient information posed by unencrypted laptop computers and other mobile devices. OCR opened a compliance review of Concentra Health Services upon receiving a breach report that an unencrypted laptop was stolen from one of its facilities, the Springfield, Mo. Physical Therapy Center. 

OCR’s investigation revealed that Concentra had previously recognized in multiple risk analyses that a lack of encryption on its laptops, desktop computers, medical equipment, tablets and other devices containing electronic protected health information (ePHI) was a critical risk.  While steps were taken to begin encryption, Concentra’s efforts were incomplete and inconsistent over time leaving patient PHI vulnerable throughout the organization, the investigation found. OCR’s investigation further found Concentra had insufficient security management processes in place to safeguard patient information. Concentra has agreed to pay OCR $1,725,220 to settle potential violations and will adopt a corrective action plan to evidence their remediation of these findings. 

Additionally, OCR received a breach notice in February 2012 from QCA Health Plan of Arkansas reporting that an unencrypted laptop computer containing the ePHI of 148 individuals was stolen from a workforce member’s car.  While QCA encrypted their devices following discovery of the breach, OCR’s investigation revealed that QCA failed to comply with multiple requirements of the HIPAA Privacy and Security Rules, beginning from the compliance date of the Security Rule in April 2005 and ending in June 2012. QCA agreed to a $250,000 monetary settlement, and is required to provide HHS with an updated risk analysis and corresponding risk management plan that includes specific security measures to reduce the risks to and vulnerabilities of its ePHI.  QCA is also required to retrain its workforce and document its ongoing compliance efforts.

“Covered entities and business associates must understand that mobile device security is their obligation,” Susan McAndrew, OCR’s deputy director of health information privacy, said in the HHS announcement. “Our message to these organizations is simple: encryption is your best defense against these incidents.”

About the Author

Rajiv Leventhal

Rajiv Leventhal

Managing Editor

Rajiv Leventhal is Managing Editor of Healthcare Innovation, covering healthcare IT leadership and strategy. Since 2012, he has been covering health IT developments for the publication's CIO and CMIO-based audience, and has taken keen interest in areas such as policy and payment, patient engagement, health information exchange, mobile health, healthcare data security, and telemedicine.

He can be followed on Twitter @RajivLeventhal

Sign up for our eNewsletters
Get the latest news and updates