Press TechRound interviews Secure.com CEO on the future of AI security
Read

HIPAA Violation Examples: What Actually Gets Organizations Fined

Most HIPAA violations do not start with a cyberattack. They start with a bad habit nobody caught in time.

Key Takeaways

  • OCR has received over 374,000 HIPAA complaints since 2003, and 21 enforcement actions with financial penalties were closed in 2024 alone
  • Inadequate risk analysis appeared in 13 of OCR’s 20 enforcement matters in 2024, making it the single most cited violation
  • 53% of healthcare data breaches trace back to employee negligence, not external hackers
  • Penalties range from $145 per violation for unknowing breaches up to $2.19 million per violation for willful neglect that goes uncorrected
  • 24% of healthcare employees still had not received security awareness training as of 2021, and the problem has not fully gone away

Introduction

A psychiatric practice in New Jersey responded to a negative online review by posting the patient’s protected health information. The organization believed it was defending itself. The Office for Civil Rights saw it differently. That single decision triggered a HIPAA investigation and a formal corrective action plan.

HIPAA violations rarely look like what people imagine. Most do not start with a sophisticated breach or a hacking group. They start with a staff member, a shortcut, or a process that was never set up correctly.

HIPAA VIOLATION EXAMPLES
Most HIPAA violations begin with ordinary behavior nobody monitored in time
OCR investigations repeatedly trace violations back to missing risk analysis, unrestricted PHI access, weak audit visibility, and operational shortcuts.
OCR Complaints
374K+
HIPAA complaints received since 2003
Top Violation
13/20
Cases tied to missing risk analysis
Human Error
53%
Breaches caused by employee negligence
Training Gap
24%
Healthcare staff lacking awareness training

The HIPAA Violations That Show Up in Almost Every Enforcement Case

OCR tracks the compliance issues alleged in every complaint it receives. The same categories keep appearing at the top of that list.

Missing or Incomplete Risk Analysis

This is the single most frequently cited violation in OCR enforcement actions. In 2024, OCR even launched a formal enforcement initiative specifically targeting failure to complete risk analysis under the HIPAA Security Rule. That initiative showed up in 13 of OCR’s 20 enforcement matters that year.

A HIPAA-compliant risk analysis means reviewing your entire environment, not just the systems someone remembered to include. Organizations often conduct partial assessments, fail to update them after system changes, or never do one at all. OCR will find this in nearly every investigation that follows a breach.

What a compliant risk analysis covers:

  • All systems and locations where electronic protected health information (ePHI) is stored, received, or transmitted
  • Threats to that data, both internal and external
  • Current controls and whether they actually reduce risk
  • A documented plan for addressing gaps

Unauthorized Access to Patient Records

Healthcare workers accessing records without a legitimate reason is one of the most common HIPAA violations OCR sees. This includes employees checking on family members, snooping on coworkers, and looking up celebrity health records out of curiosity.

UCLA Health paid $865,000 after a physician was found to have accessed the medical records of celebrities and other patients without authorization. The organization had failed to restrict access appropriately.

In 2023, five former hospital employees pled guilty to unlawfully obtaining patient information from accident victims and selling it to personal injury attorneys and chiropractors. Criminal fines ranged from $1,000 to $50,000, plus probation.

Access logs are not optional under HIPAA’s Security Rule (§164.312(b)). They are your first line of detection for unauthorized access and a critical component of your audit trail.

Impermissible Disclosure of PHI

This is the top violation category on HHS’s cumulative complaint list. It covers any situation where PHI is shared with someone who should not have it, without proper authorization.

Examples include:

  • Leaving a voicemail for a patient that a family member overhears, with details about their diagnosis and treatment
  • Faxing records to the wrong recipient
  • Sending patient data via personal email to finish work from home
  • Responding to a negative online review with identifying patient details

All of these have resulted in OCR investigations.

Real Enforcement Cases From 2024 and 2025

Looking at actual enforcement actions gives a clearer picture than any checklist. These are not hypothetical scenarios.

REAL HIPAA ENFORCEMENT ACTIONS
What OCR actually investigates
$600K
PIH Health Settlement
Phishing campaign exposure
OCR identified missing enterprise-wide risk analysis, weak monitoring, and delayed breach notification following compromised employee accounts.
$1.5M
Warby Parker Penalty
Cybersecurity investigation
HIPAA enforcement extended beyond hospitals to any covered entity handling protected health data.
OCR
Public Disclosure Case
Online review response
A provider disclosed patient information while responding to a negative review, triggering enforcement action.

When a Phishing Email Becomes a $600,000 Fine

PIH Health settled with OCR in April 2025 for $600,000 after a 2019 phishing campaign compromised 45 employee email accounts and exposed the protected health information of 189,763 individuals.

The data included names, addresses, Social Security numbers, clinical records, and financial details. OCR’s investigation found that PIH had no enterprise-wide risk analysis, inadequate email monitoring, and limited safeguards on employee accounts. The organization also failed to provide timely breach notifications after reporting the incident more than six months after it occurred.

The phishing email was the trigger. The lack of enterprise-wide risk analysis, inadequate email monitoring, and missing safeguards made the $600,000 fine inevitable.

Responding to a Negative Online Review With Patient Information

A psychiatric services provider in New Jersey responded to a critical online review by disclosing the patient’s protected health information in the response. OCR investigated and found the organization had violated the HIPAA Privacy Rule and lacked proper policies around public disclosures.

This happens more often than people realize. OCR Director Melanie Fontes Rainer stated: “OCR continues to receive complaints about health care providers disclosing their patients’ protected health information on social media or the internet in response to negative reviews. Simply put, this is not allowed.”

No exceptions exist for defending your reputation online.

Warby Parker: $1.5 Million for a Hacking Investigation

In February 2025, HHS imposed a $1.5 million civil money penalty against Warby Parker following a cybersecurity investigation. While not a traditional healthcare provider, the company handled health-related customer data covered by HIPAA through its vision care services.

The case reinforced that HIPAA applies beyond hospitals and clinics. Any organization that qualifies as a covered entity or business associate is subject to the same rules and the same enforcement.

The HIPAA Violations You Would Not Expect

Some violations catch organizations off guard precisely because they do not look like compliance failures in the moment.

Texting Patient Information Over a Personal Phone

A staff member texts a colleague a photo of a patient’s chart to get a quick second opinion before heading out. No harm meant. Completely against HIPAA.

Personal devices are not covered by your organization’s security controls. They do not have audit trails. They may sync to personal cloud accounts. The moment PHI hits a personal device, you have a potential violation, regardless of intent.

Social Media Posts That Seem Harmless

In 2025, a registered practical nurse live-streamed a TikTok video of herself at work during a medication pass. Even without directly naming a patient, any image or footage that could be used to identify a patient in a clinical setting can qualify as a violation.

Healthcare workers with large followings sometimes post “day in my life” content without realizing what is visible in the background. Equipment, room numbers, whiteboards, even staff names visible on screens have triggered complaints.

Skipping a Business Associate Agreement

Any vendor, contractor, or third party that touches PHI needs a signed business associate agreement (BAA) that meets HIPAA requirements. Many organizations sign agreements but forget to update them after the 2013 Omnibus Rule, which changed what BAAs must include.

Health Fitness Corporation settled for $227,816 in 2025 after a misconfigured server exposed protected health information online for nearly three years. The investigation confirmed no HIPAA-compliant risk analysis was completed until years after the incident began.

The contract requirement protects you when a vendor is responsible for the breach. Without it, the liability falls back on you.

What HIPAA Penalties Actually Look Like

People often assume HIPAA fines are enormous by default. The reality is more nuanced, and that makes it more important to understand.

HIPAA Civil Penalty Tiers
HIPAA civil penalties follow a structured four-tier system based on intent, awareness, and corrective action after a violation.
Tier Situation Penalty Range Annual Cap
Tier 1 No knowledge of the violation $145 – $73,011 per violation $2.19M
Tier 2 Reasonable cause $1,461 – $73,011 per violation $2.19M
Tier 3 Willful neglect (corrected) $10,000 – $50,000 per violation $250K
Tier 4 Willful neglect (not corrected) $50,000 per violation $1.5M

The key word in Tier 4 is “not corrected.” Organizations that find a problem and fix it promptly tend to resolve cases in settlements well below the maximum. Organizations that ignore OCR or fail to act face the steepest outcomes.

Criminal Penalties Are Real

Most HIPAA violations result in civil proceedings. But when violations involve knowing disclosure, false pretenses, or intent to profit, the Department of Justice handles criminal prosecution.

Criminal tiers carry:

  • Up to 1 year in jail and a $50,000 fine for knowingly obtaining or disclosing PHI
  • Up to 5 years and $100,000 for obtaining PHI under false pretenses
  • Up to 10 years and $250,000 for obtaining PHI for commercial gain or to cause harm

Individual employees, not just organizations, can face these consequences.

How Secure.com’s Compliance Teammate Helps You Catch Problems Before OCR Does

The pattern across most HIPAA enforcement cases is consistent. Something broke, nobody detected it, and months or years passed before anyone acted. By then, the exposure is large and the documentation trail is thin.

Secure.com’s Compliance Teammate helps organizations close exactly that gap through continuous monitoring and automated evidence collection.

SECURE.COM COMPLIANCE TEAMMATE
Continuous HIPAA monitoring without blind spots
Real-time detection, automated evidence collection, and continuously updated risk analysis.
👁️
PHI Access Monitoring
Detect unusual patient record access instantly before it becomes a compliance incident.
Live
Real-time anomaly detection
🛡️
Automated Audit Trails
Every action is logged automatically for audit-ready compliance evidence.
90%
Reduction in audit preparation effort
Live Risk Analysis
Continuous visibility across 200+ integrated systems.
200+
Integrated systems

Continuous Monitoring of PHI Access

Unauthorized access to patient records is one of the most common HIPAA violations, and it is also one of the hardest to catch without automated monitoring. The Compliance Teammate monitors access patterns continuously, flagging anomalies in real time rather than waiting for a complaint or an annual audit.

When an employee accesses records without a legitimate business reason, the system flags the anomaly in real time. Early detection enables internal remediation before a violation becomes an OCR investigation.

An Audit Trail That Builds Itself

Every action the Compliance Teammate takes is logged, timestamped, and fully explainable. This means that if OCR opens an investigation, your documentation is already there and already organized.

No scrambling to reconstruct six months of activity. No inconsistent formats across systems. The evidence trail builds as the work happens.

Organizations using Secure.com’s Compliance Teammate have reduced audit preparation time by over 90%, with 2,000+ analyst hours saved annually.

Risk Analysis That Stays Current

Inadequate risk analysis is the number one cited violation in OCR enforcement actions. It shows up in investigations because most organizations do risk assessments once and let them sit.

Secure.com’s Compliance Teammate keeps your risk picture current. It integrates with 200+ security and cloud tools, including CrowdStrike, Splunk, SentinelOne, AWS, GCP, and Azure, pulling live data rather than relying on annual snapshots. When a new system comes online, when a configuration changes, or when a vendor relationship shifts, the risk analysis updates to reflect it.

This provides the kind of current, comprehensive documentation OCR expects during investigations—documentation that most organizations struggle to produce under pressure.

FAQs

What is the most common HIPAA violation?
According to HHS, impermissible uses and disclosures of protected health information top the list of compliance issues alleged in complaints. Right behind it are lack of safeguards, failure to give patients access to their own records, and lack of administrative safeguards for electronic PHI. In terms of what OCR cites most in formal enforcement actions, inadequate risk analysis appears more consistently than anything else.
Can a HIPAA violation happen by accident?
Yes, and it still counts as a violation. Sending PHI to the wrong fax number, leaving a medical record on a screen while stepping away, or including too much information in a voicemail all qualify as violations even if no harm was intended. Intent affects which penalty tier applies and how OCR resolves the case, but it does not eliminate the violation itself.
How long does an OCR HIPAA investigation take?
OCR investigations vary widely depending on complexity, the size of the breach, and the organization's cooperation. Straightforward complaints can resolve in months. Cases involving large data breaches, incomplete risk analyses, or unresponsive organizations can take several years. The HHS OCR case log includes settlements for incidents that occurred years before the penalty was issued, including PHI exposure that went undetected for nearly three years before a settlement was reached.
What triggers an OCR investigation?
OCR opens investigations following formal complaints from patients, employees, or third parties. Covered entities and business associates are also required to report breaches affecting 500 or more individuals to OCR within 60 days of discovery. Breaches affecting fewer than 500 individuals must be reported annually. Once a report is filed, OCR determines whether to investigate. Larger breaches and patterns of noncompliance draw the most scrutiny.

Conclusion

HIPAA violations are not rare events that happen to other organizations. They happen in daily workflows. A nurse texting a photo of a chart. A staff member pulling up a colleague’s record out of curiosity. A provider responding defensively to a patient review. A vendor agreement that was never updated.

The organizations that end up in OCR enforcement actions are not usually doing something dramatically wrong. They are operating without the controls, documentation, and monitoring that HIPAA requires, and something eventually surfaces the gap.

The answer is not another policy document or annual compliance training that employees click through without retaining. It is continuous monitoring, clean audit trails, and risk analysis that stays current as the environment changes. That is what separates organizations that catch problems internally from the ones that find out through an investigation.

Secure.com’s Compliance Teammate automates continuous monitoring, evidence collection, and risk analysis—so your team can demonstrate compliance proactively rather than reactively during an OCR investigation.