Anyone who suspects a HIPAA violation by a healthcare provider, an insurance company, or another covered entity, must report the violation to the Office for Civil Rights (OCR) within the Department of Health and Human Services or the entity's internal compliance office.
In the US, the Health Insurance Portability and Accountability Act protects the privacy and security of protected health information (PHI). A HIPAA violation is a security incident where PHI is accessed, disclosed, or exposed without patient authorization. Data breaches can occur due to cyberattacks, hacking, unauthorized access, insider threats, or even unintentional actions.
The most common HIPAA violations include:
Go deeper: Impact of data breaches on email
There are two ways to file HIPAA violations:
OCR is the federal government agency responsible for the implementation of HIPAA. According to the HHS OCR complaint portal assistant, “If you believe that a covered entity violated your (or someone else's) health information privacy rights or committed another violation under the HIPAA Privacy, Security, and Breach Notification Rules or the Patient Safety Act and Rule, you may file a complaint with OCR.”
Under the official complaint portal,
Most healthcare organizations have internal mechanisms for reporting, often through an anonymous hotline or suggestion box. These contact details are usually in the employee handbook.
When available, complainants can use an anonymous web form option from the organization's compliance website. Healthcare organizations might also have an anonymous physical suggestion box in the facility.
The HIPAA complaint should include:
Reporting HIPAA violations protects the patient's rights to privacy and holds an organization responsible for safeguarding personal health information. The OCR views these infractions seriously, imposing fines or requiring corrective action from the guilty organization. So, the OCR Complaint Portal allows complainants to check on the status of their report.
Additionally, internal reporting systems allow complainants to follow up, using only a case number, without revealing their identity. While anonymity protects your identity, doing so can impede the investigative process.
A breach occurs when an unauthorized party gains access, uses, or discloses protected health information (PHI) without permission. Breaches include hacking, losing a device containing PHI, or sharing information with unauthorized individuals.
Protected health information (PHI) is any information that can be used to identify a patient and relates to their health status, treatment, or payment for healthcare.
If individuals suspect their data has been compromised, they must monitor their accounts for suspicious activity and report any unauthorized transactions immediately.