eHealth

2012 HIPAA Violations and Audits

1 Mins read

In August, I wrote a blog post on 2011 HIPAA Violations and Audits and created an infographic representing the type of breach by percentages. Now over a year later, it’s time for an update on the distribution of breach types.

April Sage, Online Tech Director of Healthcare Vertical and Marketing compiled the following statistics from HHS’s infamous Wall of Shame (website posting of all unencrypted breaches affecting over 500 individuals):

In August, I wrote a blog post on 2011 HIPAA Violations and Audits and created an infographic representing the type of breach by percentages. Now over a year later, it’s time for an update on the distribution of breach types.

April Sage, Online Tech Director of Healthcare Vertical and Marketing compiled the following statistics from HHS’s infamous Wall of Shame (website posting of all unencrypted breaches affecting over 500 individuals):

  • 39.1% Theft
  • 36.3% Loss
  • 9.4% Unknown
  • 8.6% Hacking/IT Incident
  • 5.8% Unauthorized Access
  • 0.8% Improper Disposal
2012 HIPAA Violations Update

2012 HIPAA Violations Update


While the greatest type of breach involved theft, what type of media was involved in the breach? Somewhat surprising is the prevalence of backup tapes, ranking the highest at 32.6%.

Next up was EMRs (electronic medical record systems) at 13.9%, and close behind in third came network servers at 13.1%. Other types of media involved included:

  • 12.7% Computer
  • 10.4% Laptop
  • 8.4% Electronic Device
  • 5.3% Desktop Computer
  • 3.5% Paper

HIPAA Compliant Data Centers White Paper

The loss or theft of backup tapes can be easily avoided by employing an offsite backup solution that doesn’t involve tapes, or is encrypted.

Encryption is just one recommended best practice – get the complete list of HIPAA hosting requirements to meet HIPAA compliance, as well as what to look for in a HIPAA compliant data center by reading our white paper.

Or sign up for our upcoming webinar to find out how to balance security, compliance and healthcare mobility with cloud computing: Overcoming Cloud-Based Mobility Challenges in Healthcare

Recommended Reading:
What is a HIPAA Violation?
Sharing PHI Data? Legal Implications of BAAs & Avoiding HIPAA Pitfalls
OCR Audit Requirements Following a Self-Reported HIPAA Breach

Related posts
eHealthMobile Health

How To Develop A Telehealth App: All You Need To Know

3 Mins read
Technology as a blessing has helped many people in different forms, and due to this reason, it has become easy to get…
eHealthGlobal HealthcareHealth care

How IoT Healthcare Devices Like Wearable Devices Disrupt Healthcare

3 Mins read
We have previously written a number of blog articles about the utilization of artificial intelligence and data analytics in healthcare. Most of…
eHealth

Medical Billing Solutions Are More Critical Than Ever Before

3 Mins read
The age-old practice of medical billing in the United States health system refers to a healthcare provider following up on claims with…