Risk

7/8/2011
12:59 PM
50%
50%

UCLA Health System Pays $865,000 Over Privacy Charges

Employees allegedly looked at personal health records of celebrities such as Tom Cruise and Farrah Fawcett.

17 Leading EHR Vendors
(click image for larger view)
Slideshow: 17 Leading EHR Vendors
UCLA Health System has agreed to pay $865,500 to settle potential federal violations of the Health Insurance Portability and Accountability Act of 1996 (HIPAA). Announced Thursday, the settlement follows an investigation that alleged UCLA Health System employees violated privacy rules when they examined the electronic protected health information of celebrity patients.

The investigation by the U.S. Department of Health and Human Services' (HHS') Office for Civil Rights (OCR) was sparked by two separate complaints filed with OCR on behalf of two celebrity patients who received care at UCLA Health System.

The complaints alleged that hospital employees repeatedly and without permission examined the electronic protected health information of these patients. OCR's investigation into the complaints revealed that from 2005-2008, unauthorized employees repeatedly looked at the electronic protected health information of numerous other UCLA Health System patients.

"Covered entities are responsible for the actions of their employees. This is why it is vital that trainings and meaningful policies and procedures, including audit trails, become part of the everyday operations of any health care provider," OCR director, Georgina Verdugo, said in a statement. "Employees must clearly understand that casual review for personal interest of patients' protected health information is unacceptable and against the law."

Through policies and procedures, entities covered under HIPAA must reasonably restrict access to patient information to only those employees with a valid reason to view the information and must sanction any employee who is found to have violated these policies.

While HHS did not disclose the names of the celebrity patients who filed the complaints, the hospital disclosed in 2008 that employees were snooping on the personal health records of celebrities such as Tom Cruise and Farrah Fawcett.

In 2008, former hospital administrative specialist, Lawanda Jackson, pleaded guilty to selling information to the National Enquirer from the files of Britney Spears, Farrah Fawcett, and other high-profile celebrities. She died from complications of breast cancer before she could be sentenced.

In 2010, Huping Zhou, a former medical school researcher at the hospital, was sentenced to four months in federal prison and fined $2,000 for reading the confidential medical files of co-workers and celebrities such as Drew Barrymore, Arnold Schwarzenegger, and Tom Hanks.

In the meantime, the hospital said it will commit to a corrective action plan and implement measures that will bring its systems into greater compliance with patient privacy rules.

The plan requires the hospital to implement privacy and security policies and procedures approved by OCR, to conduct regular and robust trainings for all UCLA Health System employees who use protected health information, to sanction offending employees, and to designate an independent monitor who will assess UCLA Health System compliance with the plan over three years.

In a statement issued by the hospital, Dr. David Feinberg, CEO of the UCLA Hospital System and associate vice chancellor for health sciences, said patients' privacy is of paramount importance.

"We appreciate the involvement and recommendations made by OCR in this matter and will fully comply with the plan of correction it has formulated. We remain vigilant and proactive to ensure that our patients' rights continue to be protected at all times," Feinberg said.

The Healthcare IT Leadership Forum is a day-long venue where senior IT leaders in healthcare come together to discuss how they're using technology to improve clinical care. It happens in New York City on July 12. Find out more.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Want Your Daughter to Succeed in Cyber? Call Her John
John De Santis, CEO, HyTrust,  5/16/2018
Don't Roll the Dice When Prioritizing Vulnerability Fixes
Ericka Chickowski, Contributing Writer, Dark Reading,  5/15/2018
Why Enterprises Can't Ignore Third-Party IoT-Related Risks
Charlie Miller, Senior Vice President, The Santa Fe Group,  5/14/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: "Security through obscurity"
Current Issue
How to Cope with the IT Security Skills Shortage
Most enterprises don't have all the in-house skills they need to meet the rising threat from online attackers. Here are some tips on ways to beat the shortage.
Flash Poll
[Strategic Security Report] Navigating the Threat Intelligence Maze
[Strategic Security Report] Navigating the Threat Intelligence Maze
Most enterprises are using threat intel services, but many are still figuring out how to use the data they're collecting. In this Dark Reading survey we give you a look at what they're doing today - and where they hope to go.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-11232
PUBLISHED: 2018-05-18
The etm_setup_aux function in drivers/hwtracing/coresight/coresight-etm-perf.c in the Linux kernel before 4.10.2 allows attackers to cause a denial of service (panic) because a parameter is incorrectly used as a local variable.
CVE-2017-15855
PUBLISHED: 2018-05-17
In Qualcomm Android for MSM, Firefox OS for MSM, and QRD Android with all Android releases from CAF using the Linux kernel, the camera application triggers "user-memory-access" issue as the Camera CPP module Linux driver directly accesses the application provided buffer, which resides in u...
CVE-2018-3567
PUBLISHED: 2018-05-17
In Qualcomm Android for MSM, Firefox OS for MSM, and QRD Android with all Android releases from CAF using the Linux kernel, a buffer overflow vulnerability exists in WLAN while processing the HTT_T2H_MSG_TYPE_PEER_MAP or HTT_T2H_MSG_TYPE_PEER_UNMAP messages.
CVE-2018-3568
PUBLISHED: 2018-05-17
In Qualcomm Android for MSM, Firefox OS for MSM, and QRD Android with all Android releases from CAF using the Linux kernel, in __wlan_hdd_cfg80211_vendor_scan(), a buffer overwrite can potentially occur.
CVE-2018-5827
PUBLISHED: 2018-05-17
In Qualcomm Android for MSM, Firefox OS for MSM, and QRD Android with all Android releases from CAF using the Linux kernel, a buffer overflow vulnerability exists in WLAN while processing an extscan hotlist event.