Risk
7/8/2011
12:59 PM
Connect Directly
RSS
E-Mail
50%
50%

UCLA Health System Pays $865,000 Over Privacy Charges

Employees allegedly looked at personal health records of celebrities such as Tom Cruise and Farrah Fawcett.

17 Leading EHR Vendors
(click image for larger view)
Slideshow: 17 Leading EHR Vendors
UCLA Health System has agreed to pay $865,500 to settle potential federal violations of the Health Insurance Portability and Accountability Act of 1996 (HIPAA). Announced Thursday, the settlement follows an investigation that alleged UCLA Health System employees violated privacy rules when they examined the electronic protected health information of celebrity patients.

The investigation by the U.S. Department of Health and Human Services' (HHS') Office for Civil Rights (OCR) was sparked by two separate complaints filed with OCR on behalf of two celebrity patients who received care at UCLA Health System.

The complaints alleged that hospital employees repeatedly and without permission examined the electronic protected health information of these patients. OCR's investigation into the complaints revealed that from 2005-2008, unauthorized employees repeatedly looked at the electronic protected health information of numerous other UCLA Health System patients.

"Covered entities are responsible for the actions of their employees. This is why it is vital that trainings and meaningful policies and procedures, including audit trails, become part of the everyday operations of any health care provider," OCR director, Georgina Verdugo, said in a statement. "Employees must clearly understand that casual review for personal interest of patients' protected health information is unacceptable and against the law."

Through policies and procedures, entities covered under HIPAA must reasonably restrict access to patient information to only those employees with a valid reason to view the information and must sanction any employee who is found to have violated these policies.

While HHS did not disclose the names of the celebrity patients who filed the complaints, the hospital disclosed in 2008 that employees were snooping on the personal health records of celebrities such as Tom Cruise and Farrah Fawcett.

In 2008, former hospital administrative specialist, Lawanda Jackson, pleaded guilty to selling information to the National Enquirer from the files of Britney Spears, Farrah Fawcett, and other high-profile celebrities. She died from complications of breast cancer before she could be sentenced.

In 2010, Huping Zhou, a former medical school researcher at the hospital, was sentenced to four months in federal prison and fined $2,000 for reading the confidential medical files of co-workers and celebrities such as Drew Barrymore, Arnold Schwarzenegger, and Tom Hanks.

In the meantime, the hospital said it will commit to a corrective action plan and implement measures that will bring its systems into greater compliance with patient privacy rules.

The plan requires the hospital to implement privacy and security policies and procedures approved by OCR, to conduct regular and robust trainings for all UCLA Health System employees who use protected health information, to sanction offending employees, and to designate an independent monitor who will assess UCLA Health System compliance with the plan over three years.

In a statement issued by the hospital, Dr. David Feinberg, CEO of the UCLA Hospital System and associate vice chancellor for health sciences, said patients' privacy is of paramount importance.

"We appreciate the involvement and recommendations made by OCR in this matter and will fully comply with the plan of correction it has formulated. We remain vigilant and proactive to ensure that our patients' rights continue to be protected at all times," Feinberg said.

The Healthcare IT Leadership Forum is a day-long venue where senior IT leaders in healthcare come together to discuss how they're using technology to improve clinical care. It happens in New York City on July 12. Find out more.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
Partner Perspectives
What's This?
In a digital world inundated with advanced security threats, Intel Security seeks to transform how we live and work to keep our information secure. Through hardware and software development, Intel Security delivers robust solutions that integrate security into every layer of every digital device. In combining the security expertise of McAfee with the innovation, performance, and trust of Intel, this vision becomes a reality.

As we rely on technology to enhance our everyday and business life, we must too consider the security of the intellectual property and confidential data that is housed on these devices. As we increase the number of devices we use, we increase the number of gateways and opportunity for security threats. Intel Security takes the “security connected” approach to ensure that every device is secure, and that all security solutions are seamlessly integrated.
Featured Writers
White Papers
Cartoon
Current Issue
Dark Reading's October Tech Digest
Fast data analysis can stymie attacks and strengthen enterprise security. Does your team have the data smarts?
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-0334
Published: 2014-10-31
Bundler before 1.7, when multiple top-level source lines are used, allows remote attackers to install arbitrary gems by creating a gem with the same name as another gem in a different source.

CVE-2014-2334
Published: 2014-10-31
Multiple cross-site scripting (XSS) vulnerabilities in the Web User Interface in Fortinet FortiAnalyzer before 5.0.7 allow remote attackers to inject arbitrary web script or HTML via unspecified vectors, a different vulnerability than CVE-2014-2336.

CVE-2014-2335
Published: 2014-10-31
Multiple cross-site scripting (XSS) vulnerabilities in the Web User Interface in Fortinet FortiManager before 5.0.7 allow remote attackers to inject arbitrary web script or HTML via unspecified vectors, a different vulnerability than CVE-2014-2336.

CVE-2014-2336
Published: 2014-10-31
Multiple cross-site scripting (XSS) vulnerabilities in the Web User Interface in Fortinet FortiManager before 5.0.7 and FortiAnalyzer before 5.0.7 allow remote attackers to inject arbitrary web script or HTML via unspecified vectors, a different vulnerability than CVE-2014-2334 and CVE-2014-2335.

CVE-2014-3366
Published: 2014-10-31
SQL injection vulnerability in the administrative web interface in Cisco Unified Communications Manager allows remote authenticated users to execute arbitrary SQL commands via a crafted response, aka Bug ID CSCup88089.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Follow Dark Reading editors into the field as they talk with noted experts from the security world.