Common HIPAA Violations Sonographers Should Know (and How to Avoid Them)

Product Pricing Demo Video Free HIPAA Training
LATEST
video thumbnail
Admin Dashboard Walkthrough Jake guides you step-by-step through the process of achieving HIPAA compliance
Ready to get started? Book a demo with our team
Talk to an expert

Common HIPAA Violations Sonographers Should Know (and How to Avoid Them)

Kevin Henry

HIPAA

February 25, 2026

6 minutes read
Share this article
Common HIPAA Violations Sonographers Should Know (and How to Avoid Them)

HIPAA compliance is inseparable from safe‑high‑quality ultrasound care. This guide walks you through the Common HIPAA Violations Sonographers Should Know (and How to Avoid Them), translating policy into daily practice you can apply at the bedside, on consoles, and when communicating about cases.

Throughout, you’ll see practical steps for protecting Electronic Protected Health Information, from Data Encryption and Multi-Factor Authentication to Physical Safeguards, plus how the HIPAA Omnibus Rule and Business Associate Agreement requirements affect your tools and workflows.

Unauthorized Access to Patient Records

What this violation looks like

  • Opening charts for curiosity, a friend, or a public figure not under your care.
  • Using a shared or borrowed login, or failing to log out of a workstation or ultrasound console.
  • Accessing images or reports “just to check something” without a job‑related need.

How to avoid it

  • Apply the minimum‑necessary standard: access only what you need to perform your role for that encounter.
  • Use unique credentials and enable Multi-Factor Authentication wherever available; never share passwords or tokens.
  • Log out or lock screens before leaving a station; enable automatic timeouts on consoles and PACS viewers.
  • Follow “break‑the‑glass” procedures only for legitimate emergencies and document the reason.
  • Review audit logs when prompted and report suspected snooping immediately—ePHI access is traceable.

Common pitfalls

  • Texting identifiers or images to coworkers via personal messaging apps.
  • Discussing findings with family members or visitors without patient authorization.
  • Posting “de‑identified” images on social media that still contain unique marks or metadata.

Safe communication practices

  • Use approved, encrypted messaging tools for treatment purposes; avoid SMS, personal email, and consumer cloud drives.
  • Confirm that any third‑party platform has a signed Business Associate Agreement; the HIPAA Omnibus Rule extends liability to business associates.
  • Share only the minimum necessary details and verify recipient identity before sending.
  • Obtain written patient authorization for disclosures outside treatment, payment, or healthcare operations.

Inadequate Security Measures Leading to Data Breaches

Where gaps arise

  • Unencrypted portable media, locally cached study images, or outdated ultrasound console software.
  • Weak passwords, reused credentials, or disabled audit logs on PACS workstations.
  • Unmanaged mobile devices used to capture or transmit images of Electronic Protected Health Information.

Security controls that work

  • Enforce Data Encryption in transit and at rest for imaging systems, archives, and backups.
  • Require Multi-Factor Authentication for remote access, VPNs, and cloud portals.
  • Patch consoles and viewer workstations regularly; restrict local data storage and enable automatic logoff.
  • Use mobile device management for any device accessing ePHI; ban personal device storage of studies.
  • Combine Physical Safeguards (locked rooms, cable locks, privacy screens) with administrative and technical controls.

Improper Disposal of Medical Records

Risky disposal scenarios

  • Throwing patient labels, worksheets, or printed images into regular trash.
  • Reselling or returning ultrasound equipment without securely wiping internal drives.
  • Discarding CDs, USB drives, or gel‑room notes containing identifiers.

Disposal done right

  • Use secure shred bins for paper and labeled media; never leave items unattended on carts or counters.
  • Sanitize or destroy storage in retired consoles and workstations; obtain certificates of destruction from vendors.
  • Ensure any disposal or recycling vendor signs a Business Associate Agreement and follows documented procedures.
  • Maintain chain‑of‑custody logs for ePHI media from collection to destruction.

Discussing Patient Details in Public Areas

How incidental talk becomes a breach

  • Case discussions in hallways, elevators, cafeterias, or waiting areas where others can overhear.
  • Whiteboards or transport notes visible to visitors with full names and conditions.

Low‑risk communication habits

  • Move conversations to private spaces or speak softly; use initials or unit identifiers when appropriate.
  • Position monitors away from public view and apply privacy filters.
  • Limit details to the minimum necessary; avoid discussing sensitive findings until you’re in a secure area.

Neglecting Employee Training on HIPAA Compliance

Training gaps that cause violations

  • One‑time orientation with no annual refreshers or role‑specific scenarios for sonography.
  • Unawareness of secure messaging, device handling, or how to report a suspected breach.
  • No understanding of the HIPAA Omnibus Rule or Business Associate Agreement implications.

What effective training includes

  • Initial and annual modules covering privacy, security, and the minimum‑necessary standard—using sonography‑specific cases.
  • Hands‑on drills: locking consoles, redacting teaching images, verifying patient identity, and phishing awareness.
  • Clear incident‑reporting steps with timelines; document attendance and competency checks.

Failure to Perform Organization-Wide Risk Analysis

Why it matters

A comprehensive Risk Analysis is required under the HIPAA Security Rule. Without it, organizations miss vulnerabilities across ultrasound consoles, PACS, cloud viewers, and mobile workflows, increasing the chance of breaches and penalties.

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

How sonography teams contribute

  • Map data flows for scheduling, scanning, exporting, archiving, teaching, and device servicing.
  • Identify assets (consoles, probes with memory, workstations, portable devices) and who touches ePHI at each step.
  • Flag risks like unsecured storage, removable media, or shared logins; propose controls such as Data Encryption, Multi-Factor Authentication, and Physical Safeguards.

Action checklist

  • Maintain an asset inventory and risk register covering imaging systems and third parties with a Business Associate Agreement.
  • Prioritize risks by likelihood and impact; assign owners and deadlines.
  • Review after major changes (new equipment, software, vendors) and at least annually.

Key takeaways

  • Limit access to what you need, use MFA, and log out every time.
  • Communicate over approved, encrypted channels and ensure BAAs are in place.
  • Encrypt data, patch systems, and pair technical controls with strong Physical Safeguards.
  • Dispose of records and devices securely, with proof of destruction.
  • Train routinely and participate in organization‑wide Risk Analysis to keep workflows resilient.

FAQs

What are the most common HIPAA violations among sonographers?

Typical issues include unauthorized chart access, unsecure texting or emailing of images, conversations about patients in public areas, unlocked workstations or consoles, improper disposal of labeled materials, inadequate training, and skipped or incomplete Risk Analysis activities.

How can sonographers prevent unauthorized access to patient records?

Access only the records tied to your assigned patients, use unique logins with Multi-Factor Authentication, lock or log out of devices when stepping away, avoid shared credentials, and follow documented “break‑the‑glass” procedures for emergencies with proper justification and audit review.

What training is required for HIPAA compliance in sonography?

You should complete role‑specific onboarding and annual refreshers that cover privacy, security, minimum‑necessary use, secure messaging, device handling, breach reporting, and scenario practice at the scanner and PACS. Training should also explain the HIPAA Omnibus Rule and how Business Associate Agreement obligations affect everyday tools.

How should sonographers handle electronic protected health information securely?

Capture, view, and share ePHI only on approved systems with Data Encryption; avoid personal devices and consumer apps; use secure messaging; verify BAAs for any third‑party platforms; strip identifiers from teaching images; lock screens; and report lost devices or suspected exposures immediately.

Share this article

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Related Articles