Risk
7/8/2011
12:59 PM
50%
50%

UCLA Health System Pays $865,000 Over Privacy Charges

Employees allegedly looked at personal health records of celebrities such as Tom Cruise and Farrah Fawcett.

17 Leading EHR Vendors
(click image for larger view)
Slideshow: 17 Leading EHR Vendors
UCLA Health System has agreed to pay $865,500 to settle potential federal violations of the Health Insurance Portability and Accountability Act of 1996 (HIPAA). Announced Thursday, the settlement follows an investigation that alleged UCLA Health System employees violated privacy rules when they examined the electronic protected health information of celebrity patients.

The investigation by the U.S. Department of Health and Human Services' (HHS') Office for Civil Rights (OCR) was sparked by two separate complaints filed with OCR on behalf of two celebrity patients who received care at UCLA Health System.

The complaints alleged that hospital employees repeatedly and without permission examined the electronic protected health information of these patients. OCR's investigation into the complaints revealed that from 2005-2008, unauthorized employees repeatedly looked at the electronic protected health information of numerous other UCLA Health System patients.

"Covered entities are responsible for the actions of their employees. This is why it is vital that trainings and meaningful policies and procedures, including audit trails, become part of the everyday operations of any health care provider," OCR director, Georgina Verdugo, said in a statement. "Employees must clearly understand that casual review for personal interest of patients' protected health information is unacceptable and against the law."

Through policies and procedures, entities covered under HIPAA must reasonably restrict access to patient information to only those employees with a valid reason to view the information and must sanction any employee who is found to have violated these policies.

While HHS did not disclose the names of the celebrity patients who filed the complaints, the hospital disclosed in 2008 that employees were snooping on the personal health records of celebrities such as Tom Cruise and Farrah Fawcett.

In 2008, former hospital administrative specialist, Lawanda Jackson, pleaded guilty to selling information to the National Enquirer from the files of Britney Spears, Farrah Fawcett, and other high-profile celebrities. She died from complications of breast cancer before she could be sentenced.

In 2010, Huping Zhou, a former medical school researcher at the hospital, was sentenced to four months in federal prison and fined $2,000 for reading the confidential medical files of co-workers and celebrities such as Drew Barrymore, Arnold Schwarzenegger, and Tom Hanks.

In the meantime, the hospital said it will commit to a corrective action plan and implement measures that will bring its systems into greater compliance with patient privacy rules.

The plan requires the hospital to implement privacy and security policies and procedures approved by OCR, to conduct regular and robust trainings for all UCLA Health System employees who use protected health information, to sanction offending employees, and to designate an independent monitor who will assess UCLA Health System compliance with the plan over three years.

In a statement issued by the hospital, Dr. David Feinberg, CEO of the UCLA Hospital System and associate vice chancellor for health sciences, said patients' privacy is of paramount importance.

"We appreciate the involvement and recommendations made by OCR in this matter and will fully comply with the plan of correction it has formulated. We remain vigilant and proactive to ensure that our patients' rights continue to be protected at all times," Feinberg said.

The Healthcare IT Leadership Forum is a day-long venue where senior IT leaders in healthcare come together to discuss how they're using technology to improve clinical care. It happens in New York City on July 12. Find out more.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading Tech Digest, Dec. 19, 2014
Software-defined networking can be a net plus for security. The key: Work with the network team to implement gradually, test as you go, and take the opportunity to overhaul your security strategy.
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-8148
Published: 2015-01-26
The default D-Bus access control rule in Midgard2 10.05.7.1 allows local users to send arbitrary method calls or signals to any process on the system bus and possibly execute arbitrary code with root privileges.

CVE-2014-8157
Published: 2015-01-26
Off-by-one error in the jpc_dec_process_sot function in JasPer 1.900.1 and earlier allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted JPEG 2000 image, which triggers a heap-based buffer overflow.

CVE-2014-8158
Published: 2015-01-26
Multiple stack-based buffer overflows in jpc_qmfb.c in JasPer 1.900.1 and earlier allow remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted JPEG 2000 image.

CVE-2014-9571
Published: 2015-01-26
Cross-site scripting (XSS) vulnerability in admin/install.php in MantisBT before 1.2.19 and 1.3.x before 1.3.0-beta.2 allows remote attackers to inject arbitrary web script or HTML via the (1) admin_username or (2) admin_password parameter.

CVE-2014-9572
Published: 2015-01-26
MantisBT before 1.2.19 and 1.3.x before 1.3.0-beta.2 does not properly restrict access to /*/install.php, which allows remote attackers to obtain database credentials via the install parameter with the value 4.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
If you’re a security professional, you’ve probably been asked many questions about the December attack on Sony. On Jan. 21 at 1pm eastern, you can join a special, one-hour Dark Reading Radio discussion devoted to the Sony hack and the issues that may arise from it.