eHealth

2012 HIPAA Violations and Audits

1 Mins read

In August, I wrote a blog post on 2011 HIPAA Violations and Audits and created an infographic representing the type of breach by percentages. Now over a year later, it’s time for an update on the distribution of breach types.

April Sage, Online Tech Director of Healthcare Vertical and Marketing compiled the following statistics from HHS’s infamous Wall of Shame (website posting of all unencrypted breaches affecting over 500 individuals):

In August, I wrote a blog post on 2011 HIPAA Violations and Audits and created an infographic representing the type of breach by percentages. Now over a year later, it’s time for an update on the distribution of breach types.

April Sage, Online Tech Director of Healthcare Vertical and Marketing compiled the following statistics from HHS’s infamous Wall of Shame (website posting of all unencrypted breaches affecting over 500 individuals):

  • 39.1% Theft
  • 36.3% Loss
  • 9.4% Unknown
  • 8.6% Hacking/IT Incident
  • 5.8% Unauthorized Access
  • 0.8% Improper Disposal
2012 HIPAA Violations Update

2012 HIPAA Violations Update


While the greatest type of breach involved theft, what type of media was involved in the breach? Somewhat surprising is the prevalence of backup tapes, ranking the highest at 32.6%.

Next up was EMRs (electronic medical record systems) at 13.9%, and close behind in third came network servers at 13.1%. Other types of media involved included:

  • 12.7% Computer
  • 10.4% Laptop
  • 8.4% Electronic Device
  • 5.3% Desktop Computer
  • 3.5% Paper

HIPAA Compliant Data Centers White Paper

The loss or theft of backup tapes can be easily avoided by employing an offsite backup solution that doesn’t involve tapes, or is encrypted.

Encryption is just one recommended best practice – get the complete list of HIPAA hosting requirements to meet HIPAA compliance, as well as what to look for in a HIPAA compliant data center by reading our white paper.

Or sign up for our upcoming webinar to find out how to balance security, compliance and healthcare mobility with cloud computing: Overcoming Cloud-Based Mobility Challenges in Healthcare

Recommended Reading:
What is a HIPAA Violation?
Sharing PHI Data? Legal Implications of BAAs & Avoiding HIPAA Pitfalls
OCR Audit Requirements Following a Self-Reported HIPAA Breach

Related posts
Artificial IntelligenceeHealth

The Most Significant Applications of Machine Learning in Healthcare

2 Mins read
Machine learning is an aspect of artificial intelligence that has been aiding in predictive analysis in many different industries, with healthcare being…
eHealthSocial Media

7 Notable Entrepreneurs in the Health and Beauty Sectors

4 Mins read
With the help of top entrepreneurs in the health and beauty sectors, we’ve witnessed unprecedented growth in both industries. The business leaders…
eHealthTechnology

How RFID Solutions Can Improve Patient and Doctors Experience

4 Mins read
The request for RFID implementation becomes more and more popular in custom healthcare software development. Radio-frequency identification is a relatively simple technology…