DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Improper disclosure of research participants’ protected health information results in $3.9 million HIPAA settlement

Posted on March 18, 2016 by Dissent

There’s a follow-up to a breach I first noted on this blog in 2012 when Feinstein Institute for Medical Research issued a press release about a laptop stolen from a programmer’s car. Now HHS has issued a press release of its own:

Improper disclosure of research participants’ protected health information
results in $3.9 million HIPAA settlement

Feinstein Institute for Medical Research agreed to pay the U.S. Department of
Health and Human Services, Office for Civil Rights (OCR) $3.9 million to
settle potential violations of the Health Insurance Portability and
Accountability Act of 1996 (HIPAA) Privacy and Security Rules and will
undertake a substantial corrective action plan to bring its operations into
compliance. This case demonstrates OCR’s commitment to promoting the privacy
and security protections so critical to build and maintain trust in health
research. Feinstein is a biomedical research institute that is organized as a
New York not-for-profit corporation and is sponsored by Northwell Health,
Inc., formerly known as North Shore Long Island Jewish Health System, a large
health system headquartered in Manhasset, New York that is comprised of twenty
one hospitals and over 450 patient facilities and physician practices.

OCR’s investigation began after Feinstein filed a breach report indicating
that on September 2, 2012, a laptop computer containing the electronic
protected health information (ePHI) of approximately 13,000 patients and
research participants was stolen from an employee’s car. The ePHI stored in
the laptop included the names of research participants, dates of birth,
addresses, social security numbers, diagnoses, laboratory results,
medications, and medical information relating to potential participation in a
research study.

OCR’s investigation discovered that Feinstein’s security management process
was limited in scope, incomplete, and insufficient to address potential risks
and vulnerabilities to the confidentiality, integrity, and availability of
ePHI held by the entity. Further, Feinstein lacked policies and procedures
for authorizing access to ePHI by its workforce members, failed to implement
safeguards to restrict access to unauthorized users, and lacked policies and
procedures to govern the receipt and removal of laptops that contained ePHI
into and out of its facilities. For electronic equipment procured outside of
Feinstein’s standard acquisition process, Feinstein failed to implement proper
mechanisms for safeguarding ePHI as required by the Security Rule.

“Research institutions subject to HIPAA must be held to the same compliance
standards as all other HIPAA-covered entities,” said OCR Director Jocelyn
Samuels. “For individuals to trust in the research process and for patients
to trust in those institutions, they must have some assurance that their
information is kept private and secure.”

The resolution agreement and corrective action plan may be found on the OCR
website at
http://www.hhs.gov/hipaa/for-professionals/compliance-enforcement/agreements/Feinstein/index.html.

To learn more about non-discrimination and health information privacy laws,
your civil rights, and privacy rights in health care and human service
settings, and to find information on filing a complaint, visit us at
www.hhs.gov/hipaa<http://www.hhs.gov/hipaa/index.html

Category: Health DataOf NoteTheft

Post navigation

← NY: Centers Plan for Healthy Living Notifies Members of Stolen Laptop
NZ: Breach of doctors’ privacy alleged at Waikato District Health Board →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Nigerian National Sentenced To More Than Five Years For Hacking, Fraud, And Identity Theft Scheme
  • Data breach of patient info ends in firing of Miami hospital employee
  • Texas DOT investigates breach of crash report records, sends notification letters
  • PowerSchool hacker pleads guilty, released on personal recognizance bond
  • Rewards for Justice offers $10M reward for info on RedLine developer or RedLine’s use by foreign governments
  • New evidence links long-running hacking group to Indian government
  • Zaporizhzhia Cyber ​​Police Exposes Hacker Who Caused Millions in Losses to Victims by Mining Cryptocurrency
  • Germany fines Vodafone $51 million for privacy, security breaches
  • Google: Hackers target Salesforce accounts in data extortion attacks
  • The US Grid Attack Looming on the Horizon

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • California county accused of using drones to spy on residents
  • How the FBI Sought a Warrant to Search Instagram of Columbia Student Protesters
  • Germany fines Vodafone $51 million for privacy, security breaches
  • Malaysia enacts data sharing rules for public sector
  • U.S. Enacts Take It Down Act
  • 23andMe Bankruptcy Judge Ponders Trump Bill’s Injunction Impact
  • Hell No: The ODNI Wants to Make it Easier for the Government to Buy Your Data Without Warrant

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.