DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

If HHS doesn't take stronger action against insider data theft cases for tax refund fraud, will the FTC?

Posted on October 19, 2014 by Dissent

Last month, PHIprivacy.net raised the question as to why we have seen no monetary penalties or strong enforcement actions by either OCR or the FTC when it came to cases of insider data theft for tax refund fraud schemes.

As I commented in that post:

Insider data theft is a serious problem with serious consequences to patients. Isn’t it about time OCR and/or FTC sent a strong message to covered entities that failure to prevent and/or detect insider data theft will lead to hefty penalties? Actually, isn’t it long past the time that they should have started doing this?

As I also noted in that post, I reached out to HHS for confirmation or denial of my observation of lack of monetary penalties or enforcement.

In response, Rachel Seeger of HHS wrote:

OCR refers these types of cases to the Department of Justice for criminal enforcement. As such, you will see them counted under DOJ referrals in our monthly statistics.

But DOJ only prosecutes the criminals. But what does OCR do about enforcing HIPAA in terms of the covered entity? How many insider breaches can a covered entity have and still not incur any monetary penalty or significant consequences from HHS/OCR for failure to prevent and/or quickly detect insider breaches under the HIPAA Security Rule?

On September 22, I wrote back to HHS, seeking clarification and writing, in part:

… does your previous answer means that OCR has never – and never will – impose a monetary penalty on a CE for that type of situation because the cases will just get referred to DOJ with no further investigation/action by OCR?

HHS never responded to that follow-up inquiry.

Obviously, it’s appropriate for OCR to refer cases for criminal prosecution. But that doesn’t explain why we haven’t seen strong enforcement action by OCR that sends a message to covered entities about preventing and quickly detecting insider data theft for tax refund fraud schemes.

If HHS/OCR won’t send a strong message by imposing a monetary penalty, will FTC get involved to protect patients by taking on one of these cases and putting a covered entity under 20 years of monitoring for data security?  When I think about the FTC’s enforcement cases on data security and the risk of harm to consumers from data theft for tax refund fraud, would this be a good use of their resources?

Related posts:

  • HHS Office for Civil Rights Imposes a $240,000 Civil Monetary Penalty Against Providence Medical Institute in HIPAA Ransomware Cybersecurity Investigation
  • HIPAA Security Rule Facility Access Controls – What are they and how do you implement them?
Category: Uncategorized

Post navigation

← Ebola Presents Significant Workplace Challenges
Pacific Grove police commander allowed wife to use police database to access identity information for ID theft →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Air Force Employee Pleads Guilty to Conspiracy to Disclose Unlawfully Classified National Defense Information
  • UK police arrest four in connection with M&S, Co-op and Harrods cyberattacks (1)
  • At U.S. request, France jails Russian basketball player Daniil Kasatkin on suspicion of ransomware conspiracy
  • Avantic Medical Lab hacked; patient data leaked by Everest Group
  • Integrated Oncology Network victim of phishing attack; multiple locations affected (2)
  • HHS’ Office for Civil Rights Settles HIPAA Privacy and Security Rule Investigation with Deer Oaks Behavioral Health for $225k and a Corrective Action Plan
  • HB1127 Explained: North Dakota’s New InfoSec Requirements for Financial Corporations
  • Credit reports among personal data of 190,000 breached, put for sale on Dark Web; IT vendor fined
  • Five youths arrested on suspicion of phishing
  • Russia Jailed Hacker Who Worked for Ukrainian Intelligence to Launch Cyberattacks on Critical Infrastructure

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • How to Build on Washington’s “My Health, My Data” Act
  • Department of Justice Subpoenas Doctors and Clinics Involved in Performing Transgender Medical Procedures on Children
  • Google Settles Privacy Class Action Over Period Tracking App
  • ICE Is Searching a Massive Insurance and Medical Bill Database to Find Deportation Targets
  • Franklin, Tennessee Resident Sentenced to 30 Months in Federal Prison on Multiple Cyber Stalking Charges
  • On July 7, Gemini AI will access your WhatsApp and more. Learn how to disable it on Android.
  • German court awards Facebook user €5,000 for data protection violations

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.