Top HIPAA Violations Medical Billers Should Know and How to Avoid Them

Product Pricing
Ready to get started? Book a demo with our team
Talk to an expert

Top HIPAA Violations Medical Billers Should Know and How to Avoid Them

Kevin Henry

HIPAA

December 16, 2025

6 minutes read
Share this article
Top HIPAA Violations Medical Billers Should Know and How to Avoid Them

As a medical biller, you touch Protected Health Information (PHI) and Electronic Protected Health Information every day. Small lapses can snowball into reportable breaches, fines, and lost trust. This guide explains the top HIPAA violations medical billers should know and how to avoid them with clear workflows and controls.

Unauthorized Access to PHI

What it looks like

  • Viewing a friend’s or celebrity’s chart “out of curiosity.”
  • Using shared or generic logins to post payments or run reports.
  • Leaving workstations unlocked, exposing PHI on screens or in open queues.
  • Downloading ePHI to personal devices or unapproved cloud drives.

How to prevent it

  • Adopt written Access Control Policies: unique user IDs, strong passwords, and multi‑factor authentication for all ePHI systems.
  • Apply the “minimum necessary” standard with role‑based access; remove access upon role change or termination.
  • Enable audit logs and review them routinely; investigate “break‑glass” or after‑hours access.
  • Use automatic logoff, screen privacy filters, and secure VPN for remote work.
  • Prohibit local downloads of Electronic Protected Health Information unless explicitly approved and encrypted.

Failure to Perform Risk Analysis

The HIPAA Security Rule requires ongoing analysis of risks to the confidentiality, integrity, and availability of ePHI. Skipping or doing a one‑time checklist falls short of Risk Assessment Compliance and leaves blind spots.

A practical workflow

  • Inventory systems that create, receive, maintain, or transmit ePHI (billing platforms, EDI tools, SFTP sites, laptops, mobile devices).
  • Identify threats and vulnerabilities (phishing, weak passwords, unpatched software, lost devices, vendor exposures).
  • Rate likelihood and impact; document existing controls and gaps.
  • Create a risk management plan with owners, timelines, and budget; track through closure.
  • Reassess at least annually and whenever technology, vendors, or processes change.

Inadequate Security Measures

Even with a risk analysis, weak safeguards can put Electronic Protected Health Information at risk. The HIPAA Security Rule expects reasonable and appropriate technical, administrative, and physical protections.

Technical safeguards to implement now

  • Encrypt data in transit (TLS) and at rest; secure email or patient portals for PHI sharing.
  • Require multi‑factor authentication for billing, remote access, and cloud services.
  • Keep systems patched; use endpoint protection and device encryption on laptops and phones.
  • Centralize passwords with an approved manager; disable reused or default credentials.
  • Back up critical data, store an offline copy, and test restores on a defined schedule.

Administrative and physical safeguards

  • Document policies for incident response, Access Control Policies, vendor oversight, and change management.
  • Limit physical access to work areas; implement clean‑desk practices and locked storage.
  • Use secure faxing and scanning procedures; verify numbers and recipients before transmission.

Improper Disposal of PHI

Improper destruction of paper records, labels, drives, copiers, or backup media can trigger breaches. Data Disposal Procedures must account for every medium that may contain PHI.

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Disposal that passes audits

  • Shred paper with cross‑cut shredders or via a bonded service with secure bins and certificates of destruction.
  • Sanitize or destroy electronic media using industry‑recognized methods; simple deletion or factory reset is not sufficient.
  • Wipe or destroy hard drives in printers, copiers, and scanners before return or resale.
  • Maintain a disposal log: item, serial number (when applicable), method, date, and witness.

Pitfalls to avoid

  • Discarding PHI in regular trash or recycling.
  • Reselling or donating devices without verified sanitization.
  • Leaving boxes of records unattended during office moves or cleanouts.

Failure to Provide Timely Access to Records

Patients have Patient Record Access Rights. Delays, high fees, or restrictive formats can violate HIPAA even if your intent is good. Most requests must be fulfilled within 30 days, with one permissible 30‑day extension and written notice explaining the delay.

Workflow to stay on time

  • Log requests on the day received; verify identity promptly and note the requested format.
  • Coordinate with the provider and billing system to supply the minimum necessary data set requested.
  • Charge only reasonable, cost‑based fees when applicable; publish fee calculations.
  • Track progress, escalate near day 20, and document if an extension is needed.
  • Deliver in the requested readily producible format (portal, secure email, mail, or pickup) and record completion.

Insufficient Employee Training

Policies don’t work if people don’t know them. Insufficient training leads to clicks on phishing emails, misdirected statements, and mishandled PHI. The HIPAA Security Rule treats workforce training as a core administrative safeguard.

A role‑based training plan

  • Onboarding: HIPAA basics, minimum necessary, secure communications, and incident reporting.
  • Annual refreshers: privacy vs. security, new threats, and updated procedures.
  • Practical drills: phishing simulations, secure fax/email practice, and right‑of‑access scenarios.
  • Remote work standards: VPN use, device encryption, clear screens, and no personal cloud storage.
  • Documentation: keep attendance, curricula, and assessment results for compliance evidence.

Failure to Enter into Business Associate Agreements

Medical billers are often Business Associates and also hire vendors that handle ePHI. Sharing PHI without a signed agreement that meets Business Associate Agreement Requirements is a common and costly mistake.

What your BAA should cover

  • Permitted uses and disclosures, required safeguards, and breach reporting timelines.
  • Subcontractor flow‑down: vendors of your vendors must accept the same obligations.
  • Access, amendment, and accounting support; return or destruction of PHI at termination.
  • Right to audit or obtain security attestations and incident histories.

Vendor due diligence

  • Assess security posture before contracting; verify encryption, access controls, and backups.
  • Confirm data locations, retention limits, and incident response capabilities.
  • Keep a current inventory of all BAAs and review them annually.

Summary

Prevent violations by locking down access, completing Risk Assessment Compliance, implementing reasonable safeguards, enforcing Data Disposal Procedures, honoring Patient Record Access Rights, training your team, and executing solid BAAs. These steps align daily billing operations with the HIPAA Security Rule and reduce breach risk.

FAQs.

What are common HIPAA violations by medical billers?

Typical issues include snooping or shared logins, skipped risk analyses, weak security (no encryption or MFA), improper PHI disposal, slow responses to patient record requests, inadequate employee training, and missing or outdated Business Associate Agreements with vendors.

How can medical billers prevent unauthorized access to PHI?

Use written Access Control Policies with unique IDs and multi‑factor authentication, apply role‑based minimum necessary access, enable audit logs and periodic reviews, enforce automatic logoff and screen privacy, and prohibit local downloads of Electronic Protected Health Information unless encrypted and approved.

What are the consequences of failing to perform a HIPAA risk analysis?

Consequences can include corrective action plans, monetary penalties, mandated outside monitoring, and expanded audits. Operationally, unaddressed risks increase the chance of breaches, downtime, and reputational damage—often costing far more than conducting a thorough, documented analysis.

How should medical billers handle PHI disposal properly?

Shred paper PHI using secure methods, sanitize or destroy electronic media with industry‑recognized techniques, document each disposal event, and ensure devices like copiers or scanners have their drives wiped before return or resale. Use bonded vendors and retain certificates of destruction when outsourcing.

Share this article

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Related Articles