Northeast Surgical Group recently settled with the HHS, agreeing to pay $10,000 and comply with a corrective action plan due to violations of HIPAA.
Beginning in March 2023, the U.S. Department of Health and Human Services (HHS) Office for Civil Rights (OCR) received a breach report concerning a ransomware attack on the Northeast Surgical Group (NESG) information system. The cyberattack resulted in the encryption and exfiltration of the protected health information (PHI) of 15,298 patients. Following the breach, OCR initiated an investigation and found that NESG had failed to conduct a compliant risk analysis to identify and address the potential risks and vulnerabilities to electronic PHI (ePHI) in its systems, as required by the HIPAA Security Rule.
In response to OCR’s findings, NESG agreed to resolve the matter by implementing a corrective action plan and paying $10,000 to OCR as part of the settlement. The corrective action plan includes specific measures, such as conducting a thorough risk analysis, developing a risk management plan, updating HIPAA policies and procedures, and providing workforce training on HIPAA compliance. OCR announced the settlement publicly on January 15, 2025.
The initiative began as a result of covered entities and business associates historically failing to comply with the HIPAA Security Rule’s risk analysis requirement. The OCR’s emphasis on risk analysis was solidified following audits conducted in 2016 and 2017 that revealed significant deficiencies in how organizations assess and manage risks related to ePHI. In response, the OCR launched a new enforcement initiative in 2023 focused on compliance with these provisions.
Here are the primary terms of the corrective action plan:
Cybersecurity risk analysis is the process of identifying, evaluating, and prioritizing potential threats and vulnerabilities to an organization's information systems to mitigate risks effectively.
A cybersecurity risk assessment helps organizations understand their vulnerabilities, evaluate the likelihood and impact of cyber threats, and develop strategies to protect sensitive information and assets.
Steps typically include determining the scope of the assessment, identifying critical assets, analyzing potential threats and vulnerabilities, evaluating risks, and developing mitigation strategies.