November, 2024
On October 3, 2024, the Office for Civil Rights (OCR) announced Providence Medical Institute (PMI) in Southern California was ordered to pay $240,000 because of a ransomware breach investigation. What makes this announcement unique compared to other OCR investigations is that, in a rare move, the payment was the result of a Civil Monetary Penalty rather than a settlement.
Why was a penalty imposed?
After receiving the results of the OCR’s investigation in September 2023, PMI was offered the opportunity to settle the investigation but failed to do so. In January 2024, the OCR then sent PMI a Letter of Opportunity informing them that they had failed to comply with certain provisions of the HIPAA Privacy and Security Rules and failed to resolve these matters through informal means. As a result, PMI was provided with an opportunity to submit evidence of any mitigating factors or defenses against the allegations to support a waiver of Civil Monetary Penalties. While they provided arguments in February 2024, the OCR determined this information did not support an affirmative defense or waiver of Civil Monetary Penalties, and thus, after obtaining authorization from the Attorney General of the US, a Notice of Proposed Determination to impose a Civil Monetary Penalty (CMP) was issued. PMI chose to waive their right to a hearing and not contest the OCR’s proposed determination. On July 1, 2024, the OCR published a Notice of Final Determination. As a result, PMI was required to pay $240,000, in full, upon receipt of the notice.
How did we get here?
Before discussing what violations led to the CMP, let’s first discuss what happened to trigger an investigation. In July 2016, Providence Medical Institute acquired Center for Orthopaedic Specialists with an end goal to transition them into PMI’s IT environment over the next two years. During the transition period, Center for Orthopaedic Specialists (COS) was allowed to maintain their relationship with their current IT vendor. Before the transition into the PMI IT environment was completed, an employee of COS clicked on a phishing email that resulted in a ransomware attack on February 18, 2018. Systems were quickly restored using system backups; however, the same ransomware attacker was able to ransom the systems two additional times on February 25, 2018 and March 4, 2018. A breach report was submitted to the OCR on April 18, 2018 reporting that 85,000 individuals’ data, including names, had been compromised in the ransomware attacks. As a result of the report, the OCR opened an investigation into the incident in May 2018.
What did the investigation find?
During the OCR’s investigation, PMI also conducted a post-incident investigation in June 2018. That investigation found that COS:
The OCR found additional evidence during their investigation that COS had not deployed encryption on their workstations or servers, allowing ePHI to be visible and accessible during the ransomware attacks. They also found that PMI, being the owner of COS, did not have a signed Business Associate Agreement with the IT vendor providing services to COS during the transition to PMI’s systems until June 2018.
The final ruling from the OCR found PMI failed to uphold the HIPAA Security Rule by:
Takeaways
Regardless of the size of the practice, many things can be learned from this case. Here are a few helpful points:
In conclusion, the case of Providence Medical Institute underscores the critical importance of robust cybersecurity measures and compliance with HIPAA regulations. The significant financial penalty imposed by the OCR serves as a stark reminder that healthcare organizations must prioritize the security of ePHI. By implementing comprehensive security protocols, ensuring all workforce members are educated on cybersecurity best practices and maintaining up-to-date systems and agreements, healthcare practices can better protect themselves against cyber threats and avoid costly penalties. This case highlights that proactive measures and timely responses to security incidents are essential in safeguarding patient data and maintaining regulatory compliance.
If you have questions about HIPAA, cybersecurity, or access to SVMIC resources, call 800-342-2239 or email Contact@svmic.com.
If you experience a cybersecurity or other HIPAA related incident, contact SVMIC as soon as possible by calling the Claims department at 800-342-2239.
Other individuals in your organization who may benefit from these articles and resources include your administrator, privacy or security officer, or information technology professional. They can sign up for a Vantage account here.
References:
Rana McSpadden is a Medical Practice Consultant and Analyst with the Medical Practice Services Department at SVMIC. Her background includes almost 20 years in medical office experience, including physician practice administration. She obtained a Bachelor's degree in Organizational Leadership from Tennessee Tech University. She is a Board Certified Medical Practice Executive, a Fellow in the American College of Medical Practice Executives and a Certified Professional Coder. She is currently the ACMPE Forum Rep for the Tennessee MGMA.
Our team is here to answer any questions you might have or to help you fill out a quote application.