DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

HHS OCR comments on its 2026 priorities (1)

Posted on January 15, 2026January 15, 2026 by Dissent

In a recent interview with Rachel Klugman Seeger of North Country Communications, she raised the question of how the current administration’s closures of six HHS regional offices would affect HHS OCR’s investigations into HIPAA breaches.  It was a great question, so DataBreaches put the following questions to HHS OCR:  (1) How many breach investigators have been furloughed or terminated by the government in recent months? (2) What are the administration’s current priorities in terms of investigating breaches of the HIPAA Security and Breach Notification rules? (3) Will the government investigate fewer data breaches this coming year due to layoffs?

They responded:

  1. OCR continues to execute its enforcement mission under its statutory and regulatory authorities regarding civil rights, exercise of conscience, and health information privacy and security, and breach notification. OCR continues to investigate complaints filed, to conduct compliance reviews, and to review breaches of unsecured protected health information.
  2. OCR will be responsive to the HIPAA trends and compliance issues within OCR’s jurisdiction that are affecting the public and the regulated industry. That said, there are four areas worth highlighting as priorities in OCR’s health information privacy and security portfolio, in no particular order.
    1. Continuing of the HIPAA Privacy Rule Right of Access Enforcement Initiative, with several new compliance reviews on parental access to minor children’s records.
    2. Building upon the HIPAA Security Rule Risk Analysis Initiative with an expansion to risk management.
    3. Emphasizing hacking and ransomware enforcement actions, as it is the main type of large breach reported to OCR.
    4. Preparing to begin receiving breach reports and complaints in February 2026 for a new enforcement program for the confidentiality of substance use disorder treatment records under 42 C.F.R. Part 2.
  3. In terms of investigations for breaches of unsecured protected health information, the following website lists all breaches of unsecured protected health information that affect 500 or more individuals reported within the last 24 months that are currently under investigation by the Office for Civil Rights. https://ocrportal.hhs.gov/ocr/breach/breach_report.jsf.

So they didn’t directly answer the first and third questions, but have responded by outlining some priorities for this year.

It does not sound like they are specifically making timely breach disclosure and notification a priority, but those issues may be part of hacking and ransomware enforcement actions, especially when a ransomware incident is not disclosed to HHS or to affected patients for many months.

It also sounds like they will be diving into entities’ risk analysis and risk management more in 2026 than in previous years. Hopefully, their investigations of risk analysis and risk management will include provisions and auditing of business associates, because as this site has previously reported, business associate breaches account for the greatest percentage of breached records (although not the greatest percentage of reports to HHS OCR).

Update: Following publication, Theresa Defino informed me that she had published a December interview with Paula Stannard, Director of HHS OCR. Stannard’s statements about risk analysis and management are consistent with what I expected based on HHS OCR’s email to me about their priorities. You can read Defino’s interview report from Report on Patient Privacy at JDSupra.

 


Related:

  • HIPAA Compliance and Breach Communications: Helpful Tips for SMBs
  • Insider Threat Research by Binghamton University: Are mass layoffs and data breaches connected?
  • Small-Scale Violations of Medical Privacy Often Cause the Most Harm
  • ANNOUNCE: A new resource to help small and mid-sized HIPAA-regulated entities
Category: Breach LawsCommentaries and AnalysesHIPAA

Post navigation

← JPMorgan Claims Ex-Advisor In Fla. Stole Trade Secrets To Poach Clients For LPL
Website that leaked thousands of ICE agents’ personal information is down after DDoS attack →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • 45,000 malicious IP addresses taken down in international cyber operation
  • The Broken Records: tracing the human cost of the 2022 British MoD leak
  • Telus Digital confirms breach after ShinyHunters claims 1 petabyte data theft
  • China’s CERT warns OpenClaw can inflict nasty wounds
  • Bell Ambulance data breach impacted over 238,000 people
  • Lotte Card fined 9.6 billion won for leaking users’ social registration numbers
  • Handala claims responsibility for attack on medical device maker Stryker
  • Police Scotland fined £66k for extracting and sharing mobile phone data
  • The rise of teen hackers ‘makes for a good headline’, but cyber crime activities peak later in life
  • Viral ‘Quittr’ Porn Addiction App Exposed the Masturbation Habits of Hundreds of Thousands of Users

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • New data shows increase in FBI searches of Americans’ data last year
  • CalPrivacy Fines PlayOn Sports $1.1 Million for CCPA Violations Involving Student Privacy
  • 17 States Sues Trump Administration Over Unlawful Data Demands Targeting Colleges
  • Privacy watchdogs sound alarm over US bid to get travellers’ social media
  • Petition filed over misuse of protesters’ data by Kenyan government and telcos

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: Dissent.73

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: Dissent.73
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.