07-05-12 | Blog Post

2012 HIPAA Violations and Audits

Blog Posts

In August, I wrote a blog post on 2011 HIPAA Violations and Audits and created an infographic representing the type of breach by percentages. Now over a year later, it’s time for an update on the distribution of breach types.

April Sage, Online Tech Director of Healthcare Vertical and Marketing compiled the following statistics from HHS’s infamous Wall of Shame (website posting of all unencrypted breaches affecting over 500 individuals):

  • 39.1% Theft
  • 36.3% Loss
  • 9.4% Unknown
  • 8.6% Hacking/IT Incident
  • 5.8% Unauthorized Access
  • 0.8% Improper Disposal
2012 HIPAA Violations Update
2012 HIPAA Violations Update

 

While the greatest type of breach involved theft, what type of media was involved in the breach? Somewhat surprising is the prevalence of backup tapes, ranking the highest at 32.6%.

Next up was EMRs (electronic medical record systems) at 13.9%, and close behind in third came network servers at 13.1%. Other types of media involved included:

  • 12.7% Computer
  • 10.4% Laptop
  • 8.4% Electronic Device
  • 5.3% Desktop Computer
  • 3.5% Paper

HIPAA Compliant Data Centers White Paper

The loss or theft of backup tapes can be easily avoided by employing an offsite backup solution that doesn’t involve tapes, or is encrypted.

Encryption is just one recommended best practice – get the complete list of HIPAA hosting requirements to meet HIPAA compliance, as well as what to look for in a HIPAA compliant data center by reading our white paper.

Or sign up for our upcoming webinar to find out how to balance security, compliance and healthcare mobility with cloud computing: Overcoming Cloud-Based Mobility Challenges in Healthcare

Recommended Reading:
What is a HIPAA Violation?
Sharing PHI Data? Legal Implications of BAAs & Avoiding HIPAA Pitfalls
OCR Audit Requirements Following a Self-Reported HIPAA Breach

In August, I wrote a blog post on 2011 HIPAA Violations and Audits and created an infographic representing the type of breach by percentages. Now over a year later, it’s time for an update on the distribution of breach types.

April Sage, Online Tech Director of Healthcare Vertical and Marketing compiled the following statistics from HHS’s infamous Wall of Shame (website posting of all unencrypted breaches affecting over 500 individuals):

  • 39.1% Theft
  • 36.3% Loss
  • 9.4% Unknown
  • 8.6% Hacking/IT Incident
  • 5.8% Unauthorized Access
  • 0.8% Improper Disposal
2012 HIPAA Violations Update
2012 HIPAA Violations Update

 

While the greatest type of breach involved theft, what type of media was involved in the breach? Somewhat surprising is the prevalence of backup tapes, ranking the highest at 32.6%.

Next up was EMRs (electronic medical record systems) at 13.9%, and close behind in third came network servers at 13.1%. Other types of media involved included:

  • 12.7% Computer
  • 10.4% Laptop
  • 8.4% Electronic Device
  • 5.3% Desktop Computer
  • 3.5% Paper

The loss or theft of backup tapes can be easily avoided by employing an offsite backup solution that doesn’t involve tapes, or is encrypted.

Encryption is just one recommended best practice – get the complete list of HIPAA hosting requirements to meet HIPAA compliance, as well as what to look for in a HIPAA compliant data center by reading our white paper.

Or sign up for our upcoming webinar to find out how to balance security, compliance and healthcare mobility with cloud computing: Overcoming Cloud-Based Mobility Challenges in Healthcare

Recommended Reading:
What is a HIPAA Violation?
Sharing PHI Data? Legal Implications of BAAs & Avoiding HIPAA Pitfalls
OCR Audit Requirements Following a Self-Reported HIPAA Breach

Overwhelmed by cloud chaos?
We’re cloud experts, so you don’t have to be.

© 2024 OTAVA® All Rights Reserved