DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

So where are the breach reports on HHS?

Posted on December 18, 2009 by Dissent

The following is cross-posted from PHIprivacy.net:

Under the provisions of the HITECH Act that went into effect several months ago, covered entities are required to report breaches involving the unsecured protected health information of 500 or more individuals to the Secretary of the U.S. Department of Health & Human Services. Unfortunately, HHS watered down the law in formulating the regulations to introduce a “harm” threshold, where the risk of harm is determined by the entity who was breached. Talk about letting the fox guard the hen house. If the entity doesn’t believe that the breach poses a significant risk of financial, reputational, or other harm to the individual, then they do not need to notify the individual and they do not need to notify HHS.

I do not know if any of my readers have been checking HHS’s web site to see what entities have been reporting breaches, but I’ve been checking it, as I was delighted that they got the web site ready and available.

To date, however, there are no breaches reported on HHS’s web site.

Curious as to whether this means that there have been no breaches reported under the new disclosure requirements or whether HHS is just behind in updating its site, I called HHS on Wednesday morning. The switchboard transferred me over to my state HHS office, despite my protests that this was federal, not state. My state tried to connect me to another number, which was a non-working number. I called Washington again, this time trying the press office and telling them that this was a media inquiry. Somehow, I wound up speaking to the NHIT Coordinator’s Office, who informed me that they couldn’t answer my question and that I should call OCR, although they couldn’t tell me who or which office at OCR to call. So I called OCR’s main number, and not surprisingly, the switchboard had no idea who to transfer me to but promised to have someone call me back.

Forty-eight hours later, I had still received no callback, so I started calling again. This time, I called the press office first and told them that I was media, was tired of being bounced around and not getting a call back, and repeated my inquiry. The person I spoke to gave me the name and number of a supervisor, and lo and behold, 30 minutes later, I found myself on a speakerphone call with the supervisor and an employee who assured me that he was the right person to speak to and that he would get back to me by phone or email.

I told him he’s my new best friend. It’s now about four hours later, and I haven’t heard back from my new best friend, but I hope I’ll hear something on Monday.

Is it possible that because of the new harm threshold, there have been no reports? Or do you suspect that HHS just hasn’t updated their site? Place your bets now.

Related posts:

  • HIPAA Security Rule Facility Access Controls – What are they and how do you implement them?
Category: Commentaries and AnalysesHealth DataOf Note

Post navigation

← PA: Malware opens door to possible information exposure
UK: Shropshire Council found in breach of the Data Protection Act →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Ransomware in Italy, strike at the Diskstation gang: hacker group leader arrested in Milan
  • A year after cyber attack, Columbus could invest $23M in cybersecurity upgrades
  • Gravity Forms Breach Hits 1M WordPress Sites
  • Stormous claims to have protected health info on 600,000 patients of North Country Healthcare. The data appear fake. (1)
  • Back from the Brink: District Court Clears Air Regarding Individualized Damages Assessment in Data Breach Cases
  • Multiple lawsuits filed against Doyon Ltd over April 2024 data breach and late notification
  • Chinese hackers suspected in breach of powerful DC law firm
  • Qilin Emerged as The Most Active Group, Exploiting Unpatched Fortinet Vulnerabilities
  • CISA tags Citrix Bleed 2 as exploited, gives agencies a day to patch
  • McDonald’s McHire leak involving ‘123456’ admin password exposes 64 million applicant chat records

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Here’s What a Reproductive Police State Looks Like
  • Meta investors, Zuckerberg to square off at $8 billion trial over alleged privacy violations
  • Australian law is now clearer about clinicians’ discretion to tell our patients’ relatives about their genetic risk
  • The ICO’s AI and biometrics strategy
  • Trump Border Czar Boasts ICE Can ‘Briefly Detain’ People Based On ‘Physical Appearance’
  • DeleteMyInfo Wins 2025 Digital Privacy Excellence Award from Internet Safety Council
  • TikTok Loses First Appeal Against £12.7M ICO Fine, Faces Second Investigation by DPC

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.