Skip to content
Baldwin Bulletin

Health and Human Services Office for Civil Rights Reaches Settlement for Potential HIPAA Violations

The Baldwin Group
|
Updated: June 18, 2025
|
3 minute read

June 2025

Natashia Wright, Associate Director, Benefits Compliance

The Department of Health and Human Services (“HHS”) Office of Civil Rights (“OCR”) recently reached a settlement of $600,000 with a HIPAA-covered entity related to possible HIPAA privacy, security, and breach notification violations. The investigation followed a phishing attack that affected 45 employees’ email accounts and exposed the electronic protected health information (“e-PHI”) of over 189,000 individuals, including names, contact information, Social Security numbers, medical diagnoses, lab results, pharmaceutical interventionism, treatment and claim information, and certain financial information.

Employer Action Items

The OCR press release notes that “hacking is one of the most common types of large breaches reported to [HHS’s Office for Civil Rights] every year.” This and other resolution agreements demonstrate that HHS continues to focus on ransomware attacks, as well as the performance of risk analysis and management initiatives to combat the negative consequences associated with such cybercrime incidents. In particular, initiatives to address cybercrime events include the employer/covered entity’s performance of the following activities:

  • Identify e-PHI storage and movement within and without the organization;
  • Integration of the risk analysis into business processes;
  • Implementation of audit controls to monitor system activities;
  • Utilization of dual factor authentication for granting authorized access to e-PHI;
  • Encryption of e-PHI during transmission and storage;
  • Learning from past incidents and applying the outcomes of, and risk assessment operations for, the puprose of informing the entity’s security management posture; and,
  • Providing regular and robust, job-specific training to officers, designated individuals, and HR personnel as mandated, consistent with the provision of HIPAA Privacy and Security Rules.

Summary

OCR initiated an investigation following the receipt of a breach report from PIH Health, a California healthcare network, in January of 2020. The breach report indicated that in June of 2019, a phishing attack compromised the email accounts of 45 employees. This incident resulted in the exposure of the unsecured e-PHI of 189,763 individuals. PIH Health reported that the e-PHI disclosed during the phishing attack included affected individuals’ names, addresses, dates of birth, driver’s license numbers, Social Security numbers, diagnoses, lab results, pharmaceutical interventionism, treatment and claims information, and financial information. OCR’s investigation revealed that PIH Health failed to:

  • Use or disclose protected health information  as required or allowed by the HIPAA Privacy Rule;
  • Conduct a comprehensive risk analysis to identify potential risks and vulnerabilities to the confidentiality, integrity, and availability of e-PHI held by PIH; and,
  • Notify affected individuals, the HHS Secretary, and the media within 60 days of discovering a breach of unsecured protected health information.

Under the terms of the entity’s HHS resolution agreement, PIH has agreed to implement a corrective action plan that will be monitored by OCR over a two-year period, along with the payment of a civil monetary penalty equal to $600,000. The corrective action plan includes the following steps:

  • Developing, maintaining, and revising, as necessary, written policies and procedures to ensure compliance with the HIPAA Privacy and Security Rules.
  • Providing workforce training on HIPAA policies and procedures, and submitting certification (written or electronic), along with training dates, to HHS for approval.
  • Conducting an accurate and thorough risk analysis of potential risks and vulnerabilities to the confidentiality, integrity, and availability of its e-PHI.
  • Developing and implementing a risk management plan to address and mitigate security risks and vulnerabilities, as identified in the entity’s risk analysis.
  • Reviewing and revising the entity’s Risk Analysis to identify potential risks and vulnerabilities to PIH’s data, ensuring the protection of the confidentiality, integrity, and availability of e-PHI.

More Information



Related Insights

Stay in the know

Our experts monitor your industry and global events to provide meaningful insights and help break down what you need to know, potential impacts, and how you should respond.

Upcoming Compliance Deadlines - June 2025
Employers must comply with numerous reporting and disclosure requirements in connection with their group health plans. Please note the following upcoming...
Baldwin Bulletin
Form 5500 Deadline is July 31, 2025, for Calendar Year Plans
June 2025 Caitlin Hillenbrand, Associate Director, Benefits Compliance Many organizations that are subject to the Employee Retirement Income Security Act...
Baldwin Bulletin
IRS Releases 2026 Inflation-Adjusted Amounts for HSAs, HDHPs and EBHRAs
June 2025 Stephanie Hall, Associate Director, Benefits Compliance The Internal Revenue Service (“IRS”) is required to announce annual inflation-adjusted limits...
Baldwin Bulletin
The Department of Labor Issues Guidance on Independent Contractor Misclassification
June 2025 Natashia Wright, Associate Director, Benefits Compliance On May 1, 2025, the U.S. Department of Labor (“DOL”) issued Field...
Baldwin Bulletin
ACA Section 1557 Rulemaking Notice of Non-enforcement
June 2025 Deanna Sizemore, Associate Director, Benefits Compliance On May 13, 2025, the Department of Health and Human Services (“HHS”)...
Let's make it possible

Partner with us to build solutions that align with your business, individual, or employee needs and open new possibilities for your future.

Connect with us