CDMP Fundamentals • 100 Questions • 90 Minutes
← Back to HIPAA Compliance

Top 15 HIPAA Compliance Pitfalls

1

Failure to Conduct a Comprehensive Risk Analysis

High Risk

❌ Problem: The most commonly cited HIPAA violation in OCR enforcement actions. Many organizations either skip the risk analysis entirely, conduct a superficial checklist review instead of a true analysis, or fail to update it regularly. A risk analysis is not a one-time activity — it must be updated annually and whenever significant changes occur.

✓ Solution: Conduct a thorough, documented risk analysis using a recognized methodology (NIST SP 800-30, HHS SRA Tool). Inventory all ePHI assets, identify all threats and vulnerabilities, assess current controls, and calculate risk levels. Update at least annually. Store documentation for 6+ years.

📜 Real Case: Premera Blue Cross was fined $6.85 million in 2020 after OCR found they failed to conduct an enterprise-wide risk analysis before a breach affecting 10.4 million individuals. OCR found the organization had not adequately assessed risks to ePHI.

2

No Business Associate Agreements in Place

High Risk

❌ Problem: Sharing PHI with vendors, contractors, or service providers without executed BAAs is a direct HIPAA violation. Many organizations overlook IT service providers, cloud platforms, billing companies, or even janitorial services that may have access to PHI. Since the Omnibus Rule, both the Covered Entity and the BA can be independently fined.

✓ Solution: Conduct a thorough vendor inventory. Identify every third party that accesses, stores, processes, or transmits PHI. Execute BAAs with all identified BAs before sharing any PHI. Track all BAAs in a central register and review them annually.

📜 Real Case: North Memorial Health Care paid $1.55 million in 2016 for, among other issues, failing to have a BAA in place with a major contractor that had access to PHI of nearly 300,000 individuals.

3

Inadequate Access Controls and Shared Accounts

High Risk

❌ Problem: Using shared login credentials, failing to implement role-based access control, not revoking access for terminated employees, and not implementing the Minimum Necessary standard. When everyone has access to everything, you cannot protect PHI or investigate breaches.

✓ Solution: Eliminate all shared accounts. Assign unique user IDs to every person. Implement role-based access control based on job function. Revoke access immediately upon termination. Conduct quarterly access reviews. Implement MFA for remote and privileged access.

📜 Real Case: The University of Texas MD Anderson Cancer Center was fined $4.3 million for multiple violations including insufficient security controls. The case highlighted the importance of encryption and access controls across all devices that contain ePHI.

4

Lack of Encryption on Portable Devices

High Risk

❌ Problem: Lost or stolen unencrypted laptops, USB drives, smartphones, and backup media are responsible for a significant percentage of HIPAA breaches. Without encryption, a lost device is automatically a reportable breach. With encryption, it is not — because the data is rendered unusable.

✓ Solution: Implement full disk encryption (BitLocker, FileVault) on ALL laptops and portable devices. Encrypt all USB drives and backup media. Deploy mobile device management (MDM) with encryption requirements. Use the HIPAA encryption safe harbor as a key risk mitigation strategy.

📜 Real Case: Concentra Health Services paid $1.7 million in 2014 after an unencrypted laptop was stolen from a physical therapy center. OCR found that Concentra had recognized the need for encryption but had failed to complete the implementation.

5

Insufficient Workforce Training

High Risk

❌ Problem: Failing to train all workforce members, providing inadequate training, not training new hires promptly, or not conducting annual refresher training. Human error is the leading cause of HIPAA breaches, and training is the primary countermeasure. Many organizations train once and never refresh.

✓ Solution: Implement comprehensive training at hire (within 30 days) and annually for all staff. Include role-specific content. Use practical scenarios and assessments. Track completion religiously. Train on the organization's specific policies, not just generic HIPAA overview. Conduct phishing simulations regularly.

📜 Real Case: Memorial Healthcare System paid $5.5 million in 2017 for multiple violations including failure to provide adequate training and insufficient access controls. Employees had been inappropriately accessing PHI for over a year before it was detected.

6

Ignoring Physical Security

Medium Risk

❌ Problem: Focusing exclusively on technical controls while neglecting physical security: unlocked server rooms, PHI visible on screens in public areas, paper records left in open areas, and inadequate media disposal. Physical security breaches can be just as damaging as cyber attacks.

✓ Solution: Lock all server rooms and areas where ePHI is stored. Install privacy screen filters on monitors in public areas. Implement clean desk policies. Securely dispose of all media (cross-cut shredding, certified hard drive destruction). Conduct physical security walkthroughs regularly.

📜 Real Case: Parkview Health System paid $800,000 in 2014 after paper medical records of approximately 5,000-8,000 patients were left unattended in the driveway of a retiring physician's home, accessible to the public.

7

No Incident Response Plan or Breach Notification Procedures

High Risk

❌ Problem: Not having a documented incident response plan, not knowing how to determine if an incident constitutes a breach, and not having breach notification procedures ready when a breach occurs. When a breach happens, organizations without a plan panic, waste time, miss notification deadlines, and make mistakes that increase both harm and penalties.

✓ Solution: Develop a comprehensive incident response plan with clear roles, procedures, and escalation paths. Include the 4-factor risk assessment methodology. Pre-draft notification letters. Know the HHS breach portal URL. Conduct annual tabletop exercises. Have outside counsel and a forensics firm identified in advance.

📜 Real Case: Presence Health paid $475,000 in 2017 for failing to notify affected individuals and HHS in a timely manner after a breach involving paper operating room schedules. The delay in notification was attributed to inadequate breach response procedures.

8

Treating HIPAA as a One-Time Project

High Risk

❌ Problem: Completing an initial compliance effort and then letting the program stagnate. HIPAA compliance requires ongoing attention: policies must be reviewed annually, risk analyses must be updated, training must be refreshed, new threats must be addressed, and new vendors must be onboarded with BAAs. Compliance decay is inevitable without continuous effort.

✓ Solution: Establish an annual HIPAA compliance calendar with all recurring activities. Assign owners and deadlines. Report compliance status to leadership quarterly. Budget for ongoing compliance activities. Monitor regulatory changes and enforcement trends.

📜 Real Case: Multiple OCR enforcement actions have cited organizations that conducted initial risk analyses years ago but never updated them, or that had policies that had not been reviewed since initial adoption despite significant operational and technological changes.

9

Improper Disposal of PHI-Containing Media

Medium Risk

❌ Problem: Disposing of computers, hard drives, copiers, printers, backup tapes, USB drives, and paper records without properly destroying the PHI they contain. Reformatting a hard drive is not sufficient — data can be recovered. Throwing paper records in a regular trash bin is a breach.

✓ Solution: Implement a formal media disposal policy. Use certified data destruction vendors and obtain certificates of destruction. Physically destroy hard drives (degauss, shred, or incinerate). Cross-cut shred paper records. Remember that copiers and printers have internal storage that must be wiped.

📜 Real Case: FileFax Inc. paid $100,000 in 2015 for leaving medical records of roughly 2,150 patients in an unlocked truck in the FileFax parking lot that was accessible to unauthorized persons. The company had been hired to store and maintain the records.

10

Denying or Delaying Patient Access to Records

High Risk

❌ Problem: Failing to provide patients with timely access to their medical records is one of OCR's priority enforcement areas. HIPAA requires covered entities to provide access within 30 days (one 30-day extension permitted). Many organizations charge excessive fees, impose unnecessary barriers, or simply ignore requests.

✓ Solution: Create a streamlined records request process with standardized forms and clear timelines. Train medical records staff on HIPAA access requirements. Track all requests with deadlines. Provide records in the format requested (including electronic). Charge only reasonable cost-based fees.

📜 Real Case: Cignet Health of Prince George's County was fined $4.3 million in 2011 for denying 41 patients access to their medical records. This was the first ever civil monetary penalty imposed by OCR for a HIPAA violation.

11

Snooping on Patient Records

High Risk

❌ Problem: Workforce members accessing patient records without a legitimate work-related reason. Common scenarios: looking up celebrity patients, checking on family members or neighbors, viewing records of ex-partners or co-workers. This is one of the most common HIPAA violations and can result in both organizational and individual penalties.

✓ Solution: Implement robust audit logging that captures all record access. Conduct regular audit log reviews specifically looking for suspicious access patterns. Implement break-glass alerts for VIP patients. Enforce the sanction policy consistently. Train all staff that unauthorized access is a fireable and potentially criminal offense.

📜 Real Case: UCLA Health System paid $865,500 in 2011 after employees repeatedly accessed celebrity medical records without authorization. The case highlighted that unauthorized access by insiders is a serious HIPAA violation even when the information is not further disclosed.

12

Insecure Communication of PHI

Medium Risk

❌ Problem: Sending PHI via unencrypted email, text messages, social media, or other insecure channels. Using personal email accounts or messaging apps for PHI. Faxing to wrong numbers. Discussing PHI in public areas where it can be overheard. These are everyday violations that happen frequently in healthcare settings.

✓ Solution: Implement encrypted email solutions for PHI. Prohibit PHI in text messages unless using a HIPAA-compliant secure messaging platform. Ban PHI on social media entirely. Implement safeguards for faxing (verify numbers, use cover sheets). Train staff about verbal PHI disclosure risks in elevators, cafeterias, and public areas.

📜 Real Case: Multiple enforcement actions have addressed email-related breaches. In general, OCR has emphasized that standard unencrypted email is not appropriate for transmitting PHI and that organizations must implement reasonable safeguards for electronic communications.

13

Inadequate Audit Logging and Monitoring

High Risk

❌ Problem: Not implementing audit logging on ePHI systems, or implementing logging but never reviewing the logs. Without audit trails, you cannot detect unauthorized access, investigate incidents, or prove compliance. Many breaches go undetected for months or years because no one is monitoring access logs.

✓ Solution: Enable audit logging on all systems containing ePHI. Log authentication events, data access, modifications, and administrative actions. Implement centralized log management. Review logs on a regular schedule. Set up automated alerts for high-risk events. Retain logs for at least 6 years.

📜 Real Case: Memorial Healthcare System's $5.5 million settlement in 2017 involved employees who had been inappropriately accessing PHI for years. The lack of regular audit log review allowed the unauthorized access to continue undetected for an extended period.

14

Failure to Update Policies After Regulatory Changes

Medium Risk

❌ Problem: Not updating privacy and security policies when HIPAA regulations change, when OCR issues new guidance, or when the organization's operations change. Many organizations still have policies that pre-date the 2013 Omnibus Rule and do not reflect current requirements for Business Associate liability, breach notification standards, or patient rights.

✓ Solution: Establish an annual policy review cycle. Monitor HHS/OCR guidance and enforcement trends. Subscribe to healthcare compliance newsletters and alerts. When regulations change, promptly update policies, re-train staff, and update the Notice of Privacy Practices as needed.

📜 Real Case: OCR frequently finds during audits that organizations have policies that have not been reviewed or updated in years, sometimes predating the Omnibus Rule. While this alone may not trigger a large penalty, it indicates a non-functioning compliance program and can compound findings.

15

Not Conducting Regular Vulnerability Scanning and Penetration Testing

Medium Risk

❌ Problem: Failing to regularly test technical security controls through vulnerability scanning and penetration testing. Many organizations implement security controls once and assume they continue to work. New vulnerabilities are discovered daily, configurations drift, and patches are missed.

✓ Solution: Conduct vulnerability scans at least monthly on all ePHI systems. Perform annual penetration testing by an independent third party. Patch critical vulnerabilities within 30 days of discovery. Track and remediate all findings. Include vulnerability management metrics in compliance reporting to leadership.

📜 Real Case: Multiple large healthcare breaches, including the Anthem breach (78.8 million records, $16 million settlement), involved exploitation of known vulnerabilities that could have been detected through regular vulnerability scanning and addressed through timely patching.