Health data like scans, test results, and treatment plans represent highly sensitive personally identifiable information (PII) that’s entrusted to hospitals, clinics, other care providers, and their respective service and business operations providers. Protected health information (PHI) is arguably the highest level of sensitive data, potentially leading to life-threatening circumstances if compromised or exploited.
Data breaches affect healthcare more than any other industry
Healthcare organizations have faced year-over-year increases in data breaches; the industry currently leads all industries in reported incidents in 2023. Just this year, HCA Healthcare disclosed a data breach compromising the data of more than 11 million patients that included patient names, contact information, birthdates, and patient engagement details like service dates, locations, and future appointment details. The breach now ranks as the biggest healthcare breach of all time.
The industry is highly targeted by ransomware gangs and suffers frequent instances of mishandled information; the 2023 Verizon Data Breach Investigations Report logged personal (67%), medical (54%), and credentials (36%) as the top data types compromised as a result of breach events.
Enter the Health Insurance Portability and Accessibility Act (HIPAA), one of the world’s most thorough regulatory compliance frameworks. It’s a federal US law, enacted in 1996 to introduce standards to protect sensitive patient health information from disclosure. Comparable global regulations include Personal Information Protection and Electronic Documents Act (PIPEDA) in Canada and the General Data Protection Regulation (GDPR) in Europe.
HIPAA enforcement is a serious matter
HIPAA has evolved over time to meet and mitigate the risks of digitization across healthcare organizations and the ever-evolving threat landscape. It has served as an example for other industry-based laws that have followed since its enactment—both in its guidance, and its non-compliance and breach event enforcement.
Take for example iHealth Solutions, a healthcare coding and billing services vendor who this year paid a $75,000 fine related to a data exfiltration breach due to unsecured patient information on network servers. Or Banner Health, a US-based non-profit health system that recently agreed to a $1.25 million civil monetary penalty with the Office of Civil Rights related to HIPAA violations following its 2016 data breach.
HIPAA compliance (and non-compliance) is a serious matter—if your organization handles US-citizen PII within the parameters of PHI and HIPAA requirements, your organization must comply with HIPAA data protection and data privacy measures.