06/04/2025 | News release | Distributed by Public on 06/04/2025 12:32
On May 28, 2025, the U.S. Department of Health and Human Services' Office for Civil Rights (OCR) announced an $800,000 settlement with a large Florida-based health care provider over potential violations of the HIPAA Security Rule stemming from insider misuse of access credentials. According to the press release, the incident involved a former non-clinical employee of a physician's practice who retained access to the health system's electronic medical record (EMR) system and allegedly used that access to inappropriately view and share a patient's protected health information (PHI).
OCR's investigation found that the health system failed to implement appropriate policies and procedures to authorize and manage user access, did not reduce risks and vulnerabilities to a reasonable level, and lacked regular audit reviews of system activity - all required under the HIPAA Security Rule. These gaps made the organization vulnerable not only to an external cyberattack but also to an insider with credentials accessing information beyond their authority.
This enforcement action affects:
This case serves as a reminder: data breaches are not always the work of external actors or ransomware, insider threats - including former or low-level personnel with unlimited or lingering access - can be just as damaging. Health care organizations must remain vigilant not only against outside attackers but also against risks from within. Moreover, the amount of the settlement payment - $800,000 - for what appears to be a potential snooping case seems to indicate OCR's concern with oversight of affiliated provider groups and business associates.
The full OCR resolution agreement and corrective action plan can be found here. More guidance on securing ePHI is available via NIST's HIPAA Security Rule toolkit.
Bottom line: Insider threats are real, and regulators are watching. Privacy and security programs must account not only for outside threats like ransomware but also the risk of internal misuse or mismanagement of access to sensitive health data.
For more information or assistance on this topic, please contact Layna Cook Rush, CIPP/US, CIPP/C, Alisa L. Chestler, CIPP/US, QTE, Hannah Moore, or a member of Baker Donelson's Health Information Technology team.
Hannah Moore, a summer associate at Baker Donelson, contributed to this article.