Risk
7/8/2011
12:59 PM
50%
50%

UCLA Health System Pays $865,000 Over Privacy Charges

Employees allegedly looked at personal health records of celebrities such as Tom Cruise and Farrah Fawcett.

17 Leading EHR Vendors
(click image for larger view)
Slideshow: 17 Leading EHR Vendors
UCLA Health System has agreed to pay $865,500 to settle potential federal violations of the Health Insurance Portability and Accountability Act of 1996 (HIPAA). Announced Thursday, the settlement follows an investigation that alleged UCLA Health System employees violated privacy rules when they examined the electronic protected health information of celebrity patients.

The investigation by the U.S. Department of Health and Human Services' (HHS') Office for Civil Rights (OCR) was sparked by two separate complaints filed with OCR on behalf of two celebrity patients who received care at UCLA Health System.

The complaints alleged that hospital employees repeatedly and without permission examined the electronic protected health information of these patients. OCR's investigation into the complaints revealed that from 2005-2008, unauthorized employees repeatedly looked at the electronic protected health information of numerous other UCLA Health System patients.

"Covered entities are responsible for the actions of their employees. This is why it is vital that trainings and meaningful policies and procedures, including audit trails, become part of the everyday operations of any health care provider," OCR director, Georgina Verdugo, said in a statement. "Employees must clearly understand that casual review for personal interest of patients' protected health information is unacceptable and against the law."

Through policies and procedures, entities covered under HIPAA must reasonably restrict access to patient information to only those employees with a valid reason to view the information and must sanction any employee who is found to have violated these policies.

While HHS did not disclose the names of the celebrity patients who filed the complaints, the hospital disclosed in 2008 that employees were snooping on the personal health records of celebrities such as Tom Cruise and Farrah Fawcett.

In 2008, former hospital administrative specialist, Lawanda Jackson, pleaded guilty to selling information to the National Enquirer from the files of Britney Spears, Farrah Fawcett, and other high-profile celebrities. She died from complications of breast cancer before she could be sentenced.

In 2010, Huping Zhou, a former medical school researcher at the hospital, was sentenced to four months in federal prison and fined $2,000 for reading the confidential medical files of co-workers and celebrities such as Drew Barrymore, Arnold Schwarzenegger, and Tom Hanks.

In the meantime, the hospital said it will commit to a corrective action plan and implement measures that will bring its systems into greater compliance with patient privacy rules.

The plan requires the hospital to implement privacy and security policies and procedures approved by OCR, to conduct regular and robust trainings for all UCLA Health System employees who use protected health information, to sanction offending employees, and to designate an independent monitor who will assess UCLA Health System compliance with the plan over three years.

In a statement issued by the hospital, Dr. David Feinberg, CEO of the UCLA Hospital System and associate vice chancellor for health sciences, said patients' privacy is of paramount importance.

"We appreciate the involvement and recommendations made by OCR in this matter and will fully comply with the plan of correction it has formulated. We remain vigilant and proactive to ensure that our patients' rights continue to be protected at all times," Feinberg said.

The Healthcare IT Leadership Forum is a day-long venue where senior IT leaders in healthcare come together to discuss how they're using technology to improve clinical care. It happens in New York City on July 12. Find out more.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-6501
Published: 2015-03-30
The default soap.wsdl_cache_dir setting in (1) php.ini-production and (2) php.ini-development in PHP through 5.6.7 specifies the /tmp directory, which makes it easier for local users to conduct WSDL injection attacks by creating a file under /tmp with a predictable filename that is used by the get_s...

CVE-2014-9652
Published: 2015-03-30
The mconvert function in softmagic.c in file before 5.21, as used in the Fileinfo component in PHP before 5.4.37, 5.5.x before 5.5.21, and 5.6.x before 5.6.5, does not properly handle a certain string-length field during a copy of a truncated version of a Pascal string, which might allow remote atta...

CVE-2014-9653
Published: 2015-03-30
readelf.c in file before 5.22, as used in the Fileinfo component in PHP before 5.4.37, 5.5.x before 5.5.21, and 5.6.x before 5.6.5, does not consider that pread calls sometimes read only a subset of the available data, which allows remote attackers to cause a denial of service (uninitialized memory ...

CVE-2014-9705
Published: 2015-03-30
Heap-based buffer overflow in the enchant_broker_request_dict function in ext/enchant/enchant.c in PHP before 5.4.38, 5.5.x before 5.5.22, and 5.6.x before 5.6.6 allows remote attackers to execute arbitrary code via vectors that trigger creation of multiple dictionaries.

CVE-2014-9709
Published: 2015-03-30
The GetCode_ function in gd_gif_in.c in GD 2.1.1 and earlier, as used in PHP before 5.5.21 and 5.6.x before 5.6.5, allows remote attackers to cause a denial of service (buffer over-read and application crash) via a crafted GIF image that is improperly handled by the gdImageCreateFromGif function.

Dark Reading Radio
Archived Dark Reading Radio
Good hackers--aka security researchers--are worried about the possible legal and professional ramifications of President Obama's new proposed crackdown on cyber criminals.