Ransomware Hat Trick: OCR Scores Three Major Enforcement Actions in 2024

Williams Mullen
Contact

Williams Mullen

Ransomware attacks are a growing threat in the health care sector due to the value of personal health information (PHI). In addition to being expensive, these attacks can cripple health care operations, delay patient care, and cause serious reputational damage. Moreover, ransomware attacks can trigger compliance issues with the Health Insurance Portability and Accountability Act (HIPAA) Security Rule, which can result in hefty penalties.

Here's the HIPAA hat trick: on October 3, 2024, the U.S. Department of Health and Human Services (HHS), Office for Civil Rights (OCR) announced a $240,000 monetary penalty against Providence Medical Institute in response to a ransomware attack. This was the third ransomware-related action in 2024. OCR announced a $250,000 settlement on September 26, 2024, as well as a $950,000 settlement on July 1, 2024, both of which were triggered by ransomware attacks. HAT TRICK!!!

The 2024 matters are consistent with the ever-increasing risk of ransomware attacks. In fact, 2024 has already been a watershed year, with a 264% increase in OCR ransomware enforcement actions since the first ransomware action in 2018.

Lest it appear that OCR is harshly punishing entities for being the victims of a ransomware attack, the enforcement actions pertain to the entity’s HIPAA compliance overall. The attacks trigger audits of overall compliance, the results of which trigger penalties. Specifically, all breaches must be reported, and OCR is required to investigate any breach that affects 500 or more individuals. While entities may not be able to stop ransomware attacks themselves, investigations resulting from these events may serve as a point of entry for OCR to identify other areas of noncompliance with HIPAA.

Significantly, even if an entity’s existing security measures were appropriate under the circumstance and would not have been able to prevent an attack, a post-breach audit may reveal that the entity is neglecting other aspects of HIPAA’s Privacy, Security, and Breach Notification Rules, such as failure to conduct regular and thorough risk assessments, inadequate security measures, and ineffective breach response. Because these investigations often go beyond the initial breach, enforcement actions and settlements often address multiple areas of noncompliance, resulting in financial penalties and required corrective action plans.

Thus, even if an entity could not have prevented a ransomware attack, it can be subject to substantial penalties for aspects of HIPAA compliance that it can control. OCR’s increased rate of enforcement actions serve as a warning to health care entities to diligently implement security measures, create a culture of compliance, and proactively protect PHI.

Consistent with its proactive approach to compliance, OCR recently released a video with various ransomware prevention recommendations. Spoiler alert: fundamental Security Rule compliance is, itself, ransomware prevention.

DISCLAIMER: Because of the generality of this update, the information provided herein may not be applicable in all situations and should not be acted upon without specific legal advice based on particular situations. Attorney Advertising.

© Williams Mullen

Written by:

Williams Mullen
Contact
more
less

PUBLISH YOUR CONTENT ON JD SUPRA NOW

  • Increased visibility
  • Actionable analytics
  • Ongoing guidance

Williams Mullen on:

Reporters on Deadline

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
Custom Email Digest
- hide
- hide