HIPAA Omnibus Rule: Practical Examples, Risks, and Enforcement Penalties Explained

Check out the new compliance progress tracker


Product Pricing Demo Video Free HIPAA Training
LATEST
video thumbnail
Admin Dashboard Walkthrough Jake guides you step-by-step through the process of achieving HIPAA compliance
Ready to get started? Book a demo with our team
Talk to an expert

HIPAA Omnibus Rule: Practical Examples, Risks, and Enforcement Penalties Explained

Kevin Henry

HIPAA

August 20, 2024

8 minutes read
Share this article
HIPAA Omnibus Rule: Practical Examples, Risks, and Enforcement Penalties Explained

HIPAA Omnibus Rule Overview

The HIPAA Omnibus Rule modernized the Privacy, Security, Breach Notification, and Enforcement Rules and extended direct liability to business associates and their subcontractors. It tightened how you handle protected health information (PHI) and clarified business associates compliance obligations across the data lifecycle.

  • Covered entities: health plans, health care clearinghouses, and most health care providers.
  • Business associates: vendors that create, receive, maintain, or transmit PHI for a covered entity (for example, cloud hosts, billing services, EHR support, and eFax providers).
  • Subcontractors: downstream vendors of business associates that also touch PHI are held to the same standards.

Example: A medical practice uses a billing company and a cloud storage provider. Both are business associates that must sign business associate agreements (BAAs), implement electronic PHI safeguards, and comply with the Security Rule—no exceptions.

Expanded Privacy Protections

The Omnibus Rule strengthened how you use and disclose PHI. It refined marketing and fundraising limits, tightened sale-of-PHI restrictions, expanded patient rights, and required Notices of Privacy Practices (NPPs) to explain new rights and uses.

Key changes you must operationalize

  • Marketing and sale of PHI: Most marketing needs a protected health information authorization, especially when financial remuneration is involved. Sale of PHI is largely prohibited without explicit authorization.
  • Fundraising: You may use limited data elements for fundraising but must offer a clear, easy opt-out that does not affect care.
  • Patient rights: Patients can request electronic copies of PHI and restrict disclosures to health plans for services they pay for in full out of pocket.
  • Genetic information: Treated as PHI and restricted for underwriting purposes.
  • NPP updates: Your NPP must reflect these changes, including new rights and authorization requirements.

Practical examples

  • If you accept cash payment in full for a service and the patient requests it, you must not disclose that item to the health plan.
  • A vendor wants to email patients about a third-party product. Unless a narrow exception applies, obtain a signed protected health information authorization before sending targeted marketing.
  • Provide ePHI in the form and format requested if readily producible (for example, PDF via secure portal).

Privacy risks to watch

  • Staff using PHI for marketing without checking authorization scope.
  • Fundraising teams failing to honor opt-outs.
  • Front desk workflows that ignore plan-restriction requests for self-paid services.

Strengthened Security Requirements

The Omnibus Rule made business associates directly liable for Security Rule violations and emphasized implementing electronic PHI safeguards end to end. You must maintain administrative, physical, and technical controls proportional to your risks.

Core safeguards to implement

  • Administrative: documented policies, workforce training, sanctions, vendor due diligence, and incident response.
  • Physical: device/media controls, secure facilities, and workstation security.
  • Technical: unique user IDs, role-based access, audit logs, encryption in transit and at rest, and automatic logoff.

Risk analysis requirements

  • Inventory systems that create, receive, maintain, or transmit ePHI (including mobile and cloud).
  • Identify threats and vulnerabilities, evaluate likelihood and impact, and map controls to gaps.
  • Prioritize remediation with timelines, owners, and acceptance criteria; reassess after major changes.

Example: A practice issues laptops with full-disk encryption, disables local data caching for EHRs, logs access attempts, and reviews audit trails monthly. These electronic PHI safeguards reduce the chance that a lost device triggers a reportable breach.

Breach Notification Requirements

The Omnibus Rule presumes an impermissible use or disclosure of PHI is a breach unless you demonstrate a low probability of compromise. You must assess at least four factors and follow breach notification regulations when the probability of compromise is not low.

  • Nature and extent of PHI involved (sensitivity, identifiers, and likelihood of re-identification).
  • Unauthorized person who used the PHI or to whom the disclosure was made.
  • Whether the PHI was actually acquired or viewed.
  • The extent to which risks were mitigated (for example, confirmed destruction or robust containment).

If a breach occurs, notify affected individuals without unreasonable delay and no later than 60 days from discovery. Report to HHS, and if 500 or more residents of a state or jurisdiction are affected, notify prominent media. Log smaller breaches for annual submission.

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Practical examples

  • Misdirected email with unencrypted PHI to the wrong recipient: if the recipient confirms deletion but could have viewed identifiers, your risk analysis determines whether notification is required.
  • Ransomware encrypts an EHR server: unless you can show a low probability of compromise through a documented assessment (for example, strong containment and no exfiltration), you likely must notify.
  • Lost encrypted thumb drive: strong encryption can support a low probability of compromise, often meaning no breach notification is required.

Increased Penalties for Non-Compliance

The Omnibus Rule implemented HIPAA penalty tiers that scale with culpability and remediation. Penalties apply per violation, per year, with annual caps by category adjusted for inflation.

  • Tier 1 – No knowledge: you did not know and, with reasonable diligence, could not have known.
  • Tier 2 – Reasonable cause: you should have known, but not due to willful neglect.
  • Tier 3 – Willful neglect, corrected: violation due to willful neglect but corrected within the required period.
  • Tier 4 – Willful neglect, not corrected: violation due to willful neglect and not timely corrected.

Amounts rise from lower hundreds to tens of thousands of dollars per violation, with potential yearly totals reaching into the millions across categories. Early containment, strong documentation, and swift corrective action can materially reduce exposure.

Factors that influence penalty outcomes

  • Number of individuals affected, duration of the issue, and actual or likely harm.
  • History of compliance and prior investigations.
  • Timeliness of breach reporting and corrective measures.
  • Financial condition and the feasibility of compliance steps.

Enforcement Actions and Penalties

OCR enforces HIPAA through complaint investigations, compliance reviews, and audits. OCR enforcement actions range from technical assistance and voluntary compliance to resolution agreements with corrective action plans and monetary settlements, and—in serious cases—civil monetary penalties.

  • Intake and investigation: OCR requests policies, risk analyses, training records, system logs, and breach documentation.
  • Findings: gaps in risk analysis, access controls, BAAs, or breach notification often drive outcomes.
  • Resolution: technical assistance, corrective action plans with monitoring, settlements, or formal penalties. Criminal referrals can occur for knowingly wrongful disclosures.

Patterns behind high-risk cases

  • Missing or outdated risk analysis requirements and risk management plans.
  • Absent or insufficient BAAs for vendors handling ePHI.
  • Poor access governance, weak audit logging, or lack of encryption on mobile devices.
  • Delayed or incomplete breach notifications that violate breach notification regulations.

Common HIPAA Violations

  • No enterprise-wide risk analysis or failure to act on findings.
  • Using vendors without BAAs or insufficient business associates compliance oversight.
  • Impermissible uses/disclosures (marketing without a protected health information authorization, oversharing beyond minimum necessary).
  • Unencrypted laptops and portable media containing ePHI.
  • Workforce snooping or improper access due to weak role-based controls.
  • Misdirected emails, faxes, or mail with PHI.
  • Failure to provide timely access to records or to honor plan-restriction requests.
  • Insecure disposal of paper or electronic media.

Practical prevention moves

  • Complete and update your risk analysis; implement prioritized, time-bound remediation.
  • Harden electronic PHI safeguards: encryption, MFA, logging, and regular access reviews.
  • Standardize BA due diligence, BAAs, and downstream subcontractor oversight.
  • Embed privacy-by-design in workflows for marketing, fundraising, and records access.
  • Drill incident response with breach risk assessment and notification decision trees.

Conclusion

The HIPAA Omnibus Rule tightened privacy, elevated security, clarified breach response, and strengthened penalties and oversight. By executing rigorous risk analysis requirements, governing vendors, and documenting decisions, you reduce breach likelihood, contain incidents, and withstand OCR enforcement actions.

FAQs.

What entities are covered under the HIPAA Omnibus Rule?

Covered entities include health plans, clearinghouses, and most providers. Business associates—such as billing services, IT vendors, cloud hosts, and e-prescribing networks—and their subcontractors are also covered when they create, receive, maintain, or transmit PHI on behalf of a covered entity or another business associate.

How does the Omnibus Rule affect business associates?

Business associates are directly liable for Security Rule compliance, certain Privacy Rule provisions, and timely breach notifications to covered entities. They must conduct risk analyses, implement electronic PHI safeguards, maintain BAAs with subcontractors, train staff, and document incidents as part of business associates compliance.

What are the penalties for HIPAA Omnibus Rule violations?

Penalties follow HIPAA penalty tiers, ranging from lower amounts for violations you could not reasonably have known about to significantly higher amounts for willful neglect, especially if uncorrected. Outcomes can include corrective action plans, settlements, civil monetary penalties, and, in egregious cases, criminal consequences.

What constitutes a breach under the HIPAA Omnibus Rule?

A breach is an impermissible use or disclosure of PHI that is presumed to compromise privacy or security unless you can show a low probability of compromise after a documented assessment of four factors: the PHI involved, the unauthorized recipient, whether it was actually acquired or viewed, and the effectiveness of mitigation.

Share this article

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Related Articles