Looking for a Business Associate Agreement? Download our FREE starter template.
Total HIPAA Logo

A Real World Breach – Why HIPAA Compliance Matters

Developing and implementing a HIPAA compliance plan can often seem like preparing for a tornado on a sunny day. You’ve never had a real-world breach before and you don’t foresee an OCR audit anytime in the near future. However, as one of our clients recently discovered, it pays to be prepared because tornadoes hit unexpectedly.

What Happened

One of our client’s employees recently reported a breach to the company’s Privacy Officer. The breach report stated that the company’s insurance agency (their Business Associate) accidentally sent the employee’s and his current wife’s Explanation of Benefits (EOB) to the employee’s ex-wife. Understandably, this employee wants to file a complaint. He is well within his rights to do so. The employee can file his complaint with any or all of the following:

  1. The Insurance Company – To file with them he must request a complaint form from the employer’s Privacy Officer
  2. Health & Human Services – Forms found here
  3. State Attorney General – Forms found online
  4. Insurance Commission – Forms found online

The breach was the insurance agent’s fault, however, our client hired the insurance company. So they called us with the big question:

What is their liability?

Because of the Common Law of Agency Provision, an employee reporting a matter to HHS could open the employer up to an investigation—meaning OCR could come in and do a full audit of the insurance agent (the Business Associate), and the Employer (the Covered Entity).

What is the Common Law of Agency Provision?

HIPAA’s Common Law of Agency Provision in the 2013 Omnibus ruling states that a Covered Entity is responsible for the HIPAA compliance of their Business Associates (BAs). Now, this doesn’t mean you have to follow your BAs around. After all, we contract with them to make our lives easier. What it means is that you need to do your due diligence and audit your BAs BEFORE you work with them. At a minimum, the review should include a summary of the BA’s compliance plan and employee training records.

What to do after a Real-World Breach?

If you have a breach, everyone needs to review:

  1. What happened?
  2. How did you handle the breach?
  3. Is this a systemic problem or just a onetime issue?
  4. Where was the breakdown, and how can it be mitigated going forward?

If you discover a systemic issue, the Covered Entity is responsible for terminating the relationship with the Business Associate. At that point, the Covered Entity must recover any PHI the BA is maintains, or require the information to be destroyed according to the terms of the Business Associate Agreement.

What is next?

Fortunately for our client, prior to this real-world breach, they prepared a compliance plan using our Turn-Key Compliance Solution, trained their staff using our online training, and are in the process of completing the implementation of this plan. As part of that process, they put a BA Agreement in place with the insurance agent that caused the breach. The employer is prepared for an investigation led by OCR or a State Attorney General.

Need help creating your HIPAA Compliance Plan? Contact us today!

Sharing is caring!

Documents

Looking for a Business Associate Agreement?

Download our free template to get started on your path toward HIPAA compliance.

Download Now

Let's keep in touch

Stay up to date on the latest HIPAA news, plus receive tons of free tools and info.

Navigating HIPAA Compliance in 2023

Watch the recording of this webinar to learn more about how you can become and stay HIPAA compliant!

Document

Related Posts

What is Access Control in terms of HIPAA?

What is Access Control in terms of HIPAA?

Access control, in terms of cybersecurity, refers to the practice of managing and regulating who can access specific resources, systems, or data within an organization's network or information...

Comparing HIPAA and NIST

Comparing HIPAA and NIST

In the ever-evolving landscape of data security and privacy, two key frameworks have emerged as significant players: HIPAA and NIST. Both emphasize the importance of safeguarding sensitive...

Save & Share Cart
Your Shopping Cart will be saved and you'll be given a link. You, or anyone with the link, can use it to retrieve your Cart at any time.
Back Save & Share Cart
Your Shopping Cart will be saved with Product pictures and information, and Cart Totals. Then send it to yourself, or a friend, with a link to retrieve it at any time.
Your cart email sent successfully :)