DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Improper disclosure of research participants’ protected health information results in $3.9 million HIPAA settlement

Posted on March 18, 2016 by Dissent

There’s a follow-up to a breach I first noted on this blog in 2012 when Feinstein Institute for Medical Research issued a press release about a laptop stolen from a programmer’s car. Now HHS has issued a press release of its own:

Improper disclosure of research participants’ protected health information
results in $3.9 million HIPAA settlement

Feinstein Institute for Medical Research agreed to pay the U.S. Department of
Health and Human Services, Office for Civil Rights (OCR) $3.9 million to
settle potential violations of the Health Insurance Portability and
Accountability Act of 1996 (HIPAA) Privacy and Security Rules and will
undertake a substantial corrective action plan to bring its operations into
compliance. This case demonstrates OCR’s commitment to promoting the privacy
and security protections so critical to build and maintain trust in health
research. Feinstein is a biomedical research institute that is organized as a
New York not-for-profit corporation and is sponsored by Northwell Health,
Inc., formerly known as North Shore Long Island Jewish Health System, a large
health system headquartered in Manhasset, New York that is comprised of twenty
one hospitals and over 450 patient facilities and physician practices.

OCR’s investigation began after Feinstein filed a breach report indicating
that on September 2, 2012, a laptop computer containing the electronic
protected health information (ePHI) of approximately 13,000 patients and
research participants was stolen from an employee’s car. The ePHI stored in
the laptop included the names of research participants, dates of birth,
addresses, social security numbers, diagnoses, laboratory results,
medications, and medical information relating to potential participation in a
research study.

OCR’s investigation discovered that Feinstein’s security management process
was limited in scope, incomplete, and insufficient to address potential risks
and vulnerabilities to the confidentiality, integrity, and availability of
ePHI held by the entity. Further, Feinstein lacked policies and procedures
for authorizing access to ePHI by its workforce members, failed to implement
safeguards to restrict access to unauthorized users, and lacked policies and
procedures to govern the receipt and removal of laptops that contained ePHI
into and out of its facilities. For electronic equipment procured outside of
Feinstein’s standard acquisition process, Feinstein failed to implement proper
mechanisms for safeguarding ePHI as required by the Security Rule.

“Research institutions subject to HIPAA must be held to the same compliance
standards as all other HIPAA-covered entities,” said OCR Director Jocelyn
Samuels. “For individuals to trust in the research process and for patients
to trust in those institutions, they must have some assurance that their
information is kept private and secure.”

The resolution agreement and corrective action plan may be found on the OCR
website at
http://www.hhs.gov/hipaa/for-professionals/compliance-enforcement/agreements/Feinstein/index.html.

To learn more about non-discrimination and health information privacy laws,
your civil rights, and privacy rights in health care and human service
settings, and to find information on filing a complaint, visit us at
www.hhs.gov/hipaa<http://www.hhs.gov/hipaa/index.html

Category: Health DataOf NoteTheft

Post navigation

← NY: Centers Plan for Healthy Living Notifies Members of Stolen Laptop
NZ: Breach of doctors’ privacy alleged at Waikato District Health Board →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Ransomware Attack on ADP Partner Exposes Broadcom Employee Data
  • Anne Arundel ransomware attack compromised confidential health data, county says
  • Australian national known as “DR32” sentenced in U.S. federal court
  • Alabama Man Sentenced to 14 Months in Connection with Securities and Exchange Commission X Hack that Spiked Bitcoin Prices
  • Japan enacts new Active Cyberdefense Law allowing for offensive cyber operations
  • Breachforums Boss “Pompompurin” to Pay $700k in Healthcare Breach
  • HHS Office for Civil Rights Settles HIPAA Cybersecurity Investigation with Vision Upright MRI
  • Additional 12 Defendants Charged in RICO Conspiracy for over $263 Million Cryptocurrency Thefts, Money Laundering, Home Break-Ins
  • RIBridges firewall worked. But forensic report says hundreds of alarms went unnoticed by Deloitte.
  • Chinese Hackers Hit Drone Sector in Supply Chain Attacks

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Massachusetts Senate Committee Approves Robust Comprehensive Privacy Law
  • Montana Becomes First State to Close the Law Enforcement Data Broker Loophole
  • Privacy enforcement under Andrew Ferguson’s FTC
  • “We would be less confidential than Google” – Proton threatens to quit Switzerland over new surveillance law
  • CFPB Quietly Kills Rule to Shield Americans From Data Brokers
  • South Korea fines Temu for data protection violations
  • The BR Privacy & Security Download: May 2025

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.