Criminal HIPAA Enforcement: Examples, DOJ Cases, and Compliance Best Practices

Check out the new compliance progress tracker


Product Pricing Demo Video Free HIPAA Training
LATEST
video thumbnail
Admin Dashboard Walkthrough Jake guides you step-by-step through the process of achieving HIPAA compliance
Ready to get started? Book a demo with our team
Talk to an expert

Criminal HIPAA Enforcement: Examples, DOJ Cases, and Compliance Best Practices

Kevin Henry

HIPAA

September 26, 2024

7 minutes read
Share this article
Criminal HIPAA Enforcement: Examples, DOJ Cases, and Compliance Best Practices

Criminal HIPAA enforcement focuses on intentional, wrongful handling of protected health information (PHI)—not mere mistakes. When conduct involves willful misuse or unauthorized disclosure, cases can move from civil HIPAA enforcement actions by the Office for Civil Rights (OCR) to Department of Justice (DOJ) prosecution. This guide explains what triggers criminal exposure and how to reduce risk.

Criminal HIPAA Violation Examples

Common fact patterns that cross the criminal line

  • Selling or bartering PHI for cash, narcotics, or favors (willful misuse for personal gain).
  • Accessing charts “out of curiosity” and leaking PHI to media, family, or competitors (unauthorized disclosure).
  • Harvesting PHI to commit tax-refund or credit-card fraud, or to open lines of credit.
  • Stealing or exfiltrating patient rosters to solicit accident victims or divert referrals.
  • Coordinating telemedicine fraud schemes that obtain and transmit PHI without valid authorization to generate medically unnecessary orders or claims.
  • Business associate insiders copying ePHI from client systems to sell or to aid a separate venture.

Aggravating circumstances

  • Use of false pretenses to obtain PHI (impersonating staff, spoofing credentials, social engineering).
  • Commercial advantage or intent to harm a patient, rival provider, or public figure.
  • Destruction or alteration of audit logs to conceal tracks after an unauthorized disclosure.

Department of Justice Enforcement Process

From civil lead to criminal case

  • Trigger: OCR, HHS‑OIG, or FBI detects facts suggesting willful misuse or intentional disclosure.
  • Referral: OCR sends the matter to DOJ when evidence indicates criminal thresholds are met.
  • Investigation: Grand jury subpoenas, search warrants, forensics on EHR logs and devices, interviews, and financial tracing.
  • Charging: Counts may include HIPAA (wrongful disclosure/obtaining PHI), plus wire fraud, healthcare fraud, conspiracy, identity theft, and obstruction as supported by federal prosecution standards.
  • Resolution: Plea or trial; sentencing may impose imprisonment, fines, forfeiture, restitution, and compliance obligations. OCR’s civil track can proceed in parallel.

What prosecutors look for

  • Clear evidence of knowledge and intent (e.g., payment messages, instructions, fake credentials).
  • Audit trails tying the actor to specific charts, downloads, print jobs, or exports.
  • Linkage between PHI handling and downstream fraud or commercial benefit.

Notable DOJ Prosecution Cases

Illustrative case snapshots

  • Employee-to-identity-theft pipeline: A registration clerk sells patient demographics to an outside ring; defendants face HIPAA counts plus aggravated identity theft and fraud.
  • Snooping and leaking: A staffer accesses a celebrity’s records without need and shares diagnoses; the court imposes probation or custody, fines, and a career bar from PHI roles.
  • Data broker scheme: A marketer recruits insiders at clinics to feed accident-victim PHI to third parties; charges include wrongful disclosure and conspiracy.
  • Telemedicine fraud schemes: Call centers obtain PHI under sham “screenings,” transmit it to physicians to sign unnecessary DME or lab orders; HIPAA counts accompany healthcare-fraud charges.
  • Business associate misuse: A contractor with system access exports ePHI to launch a competing service, triggering HIPAA, computer-crime, and trade-secret exposure.

Penalties and Sentencing Guidelines

Statutory tiers (common maximums)

  • Knowing violation: up to 1 year imprisonment and fines.
  • Under false pretenses: up to 5 years and higher fines.
  • Intent to sell, transfer, or use PHI for commercial advantage, personal gain, or malicious harm: up to 10 years and the highest fines.

How sentences are determined

  • Loss amount, number of victims, role in the offense, abuse of position of trust, and sophistication can increase guidelines.
  • Aggravated identity theft (if charged) adds a mandatory consecutive term; obstruction may add enhancements.
  • Courts may order restitution to victims and criminal forfeiture of proceeds and facilitating property.
  • Collateral fallout: licensure discipline, exclusion from federal healthcare programs, employment bars, and corporate integrity obligations.

Compliance Risk Assessment Strategies

Build a defensible risk analysis

  • Governance: designate privacy and security officers, define decision rights, and document HIPAA enforcement actions and remediation outcomes.
  • Scope: inventory systems, apps, data stores, and vendors that create, receive, maintain, or transmit PHI (including telemedicine platforms and remote work endpoints).
  • Data mapping: trace PHI flows from intake to archival; identify over-collection and unnecessary retention.
  • Threat-vulnerability pairing: evaluate insider threats, credential abuse, misconfigurations, data exfiltration paths, and social engineering.
  • Risk scoring: estimate likelihood and impact; prioritize a remediation roadmap with owners, budgets, and deadlines.
  • Evidence: maintain a risk register, decisions, and testing artifacts that demonstrate reasonable diligence to OCR and DOJ.

Third-party and program oversight

  • Vendor due diligence: assess security posture, review BAAs, audit right-to-audit clauses, and verify data minimization.
  • Continuous monitoring: KPIs for access anomalies, export volumes, and alert-to-close times; periodic tabletop exercises.

Security Measures for PHI Protection

Identity and access controls

  • Unique IDs, multi-factor authentication, and role-based access aligned to the minimum necessary standard.
  • Just-in-time and “break-glass” access with near-real-time alerts and post-event review.

Data security and encryption

  • Encrypt PHI in transit and at rest; manage keys securely and separate duties for administrators.
  • Implement DLP for email, endpoints, and cloud; watermark and log bulk exports and print jobs.

Application, network, and endpoint safeguards

  • Centralized logging and SIEM with user and entity behavior analytics to spot anomalous PHI access.
  • Network segmentation, least-privilege service accounts, and zero-trust remote access for telemedicine workflows.
  • Harden endpoints with EDR, timely patching, full-disk encryption, MDM, and remote wipe.
  • Backup/restore testing with immutable, off-network copies to mitigate destructive events.

Physical and media controls

  • Badge-based facility access, device locks, secure disposal (shredding, degaussing), and clean-desk enforcement.

Incident response

  • 24/7 triage, forensics, law-enforcement coordination, and documentation to support breach notification and potential referrals.

Employee Training and Policy Implementation

Policy architecture

  • Codify acceptable use, access authorization, sanctions, media handling, remote work, telemedicine processes, and incident response.
  • Define “unauthorized disclosure,” reporting obligations, and patient-complaint handling.

Role-based training and reinforcement

  • Onboarding and annual refreshers, with microlearning on phishing, impersonation, and social engineering.
  • High-risk roles (registration, billing, call centers) receive targeted modules on identity verification and red flags.
  • Obtain attestations; track completion metrics and retrain promptly after policy changes or incidents.

Enforcement and culture

  • Progressive discipline for violations; confidential hotlines with non-retaliation; periodic tone‑at‑the‑top messages.
  • Vendor and contractor onboarding includes policy acknowledgement and least‑privilege provisioning from day one.

Conclusion

Criminal HIPAA enforcement turns on intent: willful misuse or unauthorized disclosure of PHI, often tied to fraud or commercial gain. By executing a rigorous risk analysis, tightening technical controls, and building a resilient training-and-policy program, you reduce exposure to DOJ action while protecting patients and your organization.

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

FAQs.

What constitutes a criminal HIPAA violation?

A criminal HIPAA violation occurs when someone knowingly obtains or discloses PHI without authorization, uses false pretenses to access PHI, or acts with intent to sell, transfer, or use PHI for commercial advantage, personal gain, or to cause harm. Willful misuse—rather than negligence—triggers criminal exposure.

How does the DOJ prosecute HIPAA offenses?

Cases typically begin with an OCR or law‑enforcement referral, followed by subpoenas, warrants, and forensic review of access logs and devices. Prosecutors charge HIPAA counts and, when supported, related offenses like healthcare fraud, wire fraud, conspiracy, or identity theft. Matters resolve by plea or trial, with sentencing based on intent, impact, and aggravating factors.

What are the common penalties for criminal HIPAA violations?

Maximum penalties range up to 1 year for knowing violations, up to 5 years for false pretenses, and up to 10 years when PHI is sold, transferred, or used for gain or harm. Courts may also impose substantial fines, restitution, asset forfeiture, exclusion from federal programs, and professional or corporate compliance conditions.

How can healthcare providers prevent criminal HIPAA breaches?

Prioritize a documented risk analysis, strong identity and access controls, encryption and DLP, vigilant logging and monitoring, and verified vendor safeguards. Pair these with role‑based training, clear sanctions, rapid incident response, and leadership messaging that reinforces the minimum necessary standard across all workflows, including telemedicine.

Share this article

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Related Articles