SlideShare a Scribd company logo
1 of 5
1
Anthem Inc. HIPAA Violation
June 21, 2021
Anthem Inc. HIPAA Violation
Case Analysis
Anthem, a healthcare insurance provider situated in the US, is
among some of the organizations that have violated HIPAA
laws. Based on OCR (2018) illustrations, the incorporation paid
sixteen million US Dollars and committed to take extensive
remedial measures to address alleged HIPAA breaches after a
sequence of hacks resulted to the biggest infringement of U.S.
health information in ever. An estimate of 79 million Electronic
Protected Health Information (ePHI) which included name and
medical IDs were stolen.
HIPAA Privacy and Security Rules Violated
Some of HIPAA regulations desecrated by Anthem Inc. included
hackers (unauthorized persons) accessing PHI through Anthem’s
database, failing to carry out a risk analysis as well as managing
confidentiality, integrity and availability risks of PHI and
failing to device defense mechanisms that wound ensure the
discretion, integrity and availability of PHI. Additionally, ePHI
belonging to the 79 million patients were not encrypted or
Anthem didn’t apply equivalent measures that would help in
preventing the hackers from accessing the data. The attacks
began on 2014 and were discovered in 2015 and yet Anthem
didn’t implement adequate access measures that would help in
preventing ePHI from being accessed. Information stolen by
hackers included the names of individuals and their health
insurance IDs.
Penalties Imposed
Several penalties were imposed to Anthem Inc. including paying
sixteen million Dollars to the office of civil rights (OCR) in the
2018. Also, because of the filed litigations and lawsuits
following the breach, for patients whose health information was
stolen the company had to pay one hundred and fifteen million
Dollars. The total cost paid by Anthem Inc. for violating HIPAA
privacy and security laws including HIPAA state laws was one
hundred and seventy-nine million Dollars. The sanction
included a $48.2 million cash penalty. OCR required Anthem
Inc. to include preventive measures to enhance data security
standards.
Health System Improvement Plan
Components
Subcomponents and roles
Anthem Health system leadership and governance
Responsible for electronic health information, legal and
regulatory framework, information requirements and health
system leadership and management
Anthem Health system management
Evaluating and monitoring of health system, mobilizing
resources, and continuous professional development.
ICT infrastructure
Responsible for maintaining, infrastructure and communication
networks
Interoperability of systems and data
Includes data management, network segmentation, data
encryption and surveillance of information system doings.
Quality of data
Assurance of quality data
Data usage
Strategies on how data should be used, accessed, use
proficiencies and impacts
Risk analysis strategy
Threat
Vulnerability
Asset
Consequences
Likelihood
Control
Data breach
Less protection
Data
Stealing of electronic protected health information
High
Protection of data using measures such as encryption.
Misuse of information
Less protection
Data
Misuse of stolen patient data
High
Data recovery competence
Identify threat, social engineering
Patient info isn’t protected
Patients
Violation of HIPAA privacy and security rules. Penalties.
High
Controlled access, monitoring of the account, training of
security and IT personnel, background screening
Dos, Botnets and hardware manipulation
Virus, failure to update the system
Infrastructure
Stealing of patients and company data
High
Malware defense, control of privileged access, configuring
securely and portfolio
Software manipulation, information system misuse and
installation of corrupt software
Virus, illiteracy in system use
Applications
Data theft
Medium
Protection of emails and browsers, securing configuration.
Application of learned lessons
The security breach comes at an inopportune moment for
Anthem, which has placed its reputation on employing cutting-
edge technology to help people monitor their wellness and
traverse the healthcare system. HIPAA lessons from this case
include the importance security audit, training employees,
having firewalls and encrypting patient data. Security audit
includes doing a HIPAA risk assessment regularly, while data
encryption includes putting passwords and other security
mechanisms to have patient data safe at all times. In cases
where a breach is discovered, it’s essential that the involved
organization notifies the law enforcement and related bodies.
Based on the case, it’s true to note that the health sector should
be always be more vigilant about protection of personal,
medical, and financial data in their control.
References
Morse. S. (2018). Anthem pays $16 million in record HIPAA
settlement for data breach. Healthcare Finance.
https://www.healthcarefinancenews.com/news/anthem-pays-16-
million-record-hipaa-settlement-data-breach
US Department of Health and Human Services. (2018). Anthem
pays OCR $16 million in record HIPAA settlement following
largest US health data breach in history.
https://www.hhs.gov/guidance/document/anthem-pays-ocr-16-
million-record-hipaa-settlement-following-largest-us-health-
data-breach
Vanderpool, D. (2019). HIPAA COMPLIANCE: A Common
Sense Approach. Innovations in clinical neuroscience , 16(1-2),
38. https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6450678/

More Related Content

Similar to 1Anthem Inc. HIPAA ViolationJune 21, 2021

HIPAA-Compliant App Development Guide for the Healthcare Industry.pdf
HIPAA-Compliant App Development Guide for the Healthcare Industry.pdfHIPAA-Compliant App Development Guide for the Healthcare Industry.pdf
HIPAA-Compliant App Development Guide for the Healthcare Industry.pdfSuccessiveDigital
 
Assuring regulatory compliance, ePHI protection, and secure healthcare delivery
Assuring regulatory compliance, ePHI protection, and secure healthcare deliveryAssuring regulatory compliance, ePHI protection, and secure healthcare delivery
Assuring regulatory compliance, ePHI protection, and secure healthcare deliveryTrend Micro
 
Healthcare Attorneys Feel the Healthcare Industry Is More Vulnerable to Cyber...
Healthcare Attorneys Feel the Healthcare Industry Is More Vulnerable to Cyber...Healthcare Attorneys Feel the Healthcare Industry Is More Vulnerable to Cyber...
Healthcare Attorneys Feel the Healthcare Industry Is More Vulnerable to Cyber...mosmedicalreview
 
The Importance of HIPAA Compliance in ensuring the Privacy and Security of PHI!
The Importance of HIPAA Compliance in ensuring the Privacy and Security of PHI!The Importance of HIPAA Compliance in ensuring the Privacy and Security of PHI!
The Importance of HIPAA Compliance in ensuring the Privacy and Security of PHI!Shelly Megan
 
Dental Compliance for Dentists and Business Associates
Dental Compliance for Dentists and Business AssociatesDental Compliance for Dentists and Business Associates
Dental Compliance for Dentists and Business Associatesgppcpa
 
HIPAA Compliance For Small Practices
HIPAA Compliance For Small PracticesHIPAA Compliance For Small Practices
HIPAA Compliance For Small PracticesNisos Health
 
Information Security & Compliance in Healthcare: Beyond HIPAA and HITECH
Information Security & Compliance in Healthcare: Beyond HIPAA and HITECHInformation Security & Compliance in Healthcare: Beyond HIPAA and HITECH
Information Security & Compliance in Healthcare: Beyond HIPAA and HITECHNovell
 
HIPAA-Compliant Healthcare App.pdf
HIPAA-Compliant Healthcare App.pdfHIPAA-Compliant Healthcare App.pdf
HIPAA-Compliant Healthcare App.pdfphilipthomas428223
 
Privacy and security of information Consider this scenario.docx
Privacy and security of information Consider this scenario.docxPrivacy and security of information Consider this scenario.docx
Privacy and security of information Consider this scenario.docxChantellPantoja184
 
Understanding the Importance of HIPAA Compliance in Medical Billing Software.pdf
Understanding the Importance of HIPAA Compliance in Medical Billing Software.pdfUnderstanding the Importance of HIPAA Compliance in Medical Billing Software.pdf
Understanding the Importance of HIPAA Compliance in Medical Billing Software.pdfOmniMD Healthcare
 
Article on The Electronic Health Record
Article on The Electronic Health RecordArticle on The Electronic Health Record
Article on The Electronic Health RecordAnurag Deb
 
Mbm Hipaa Hitech Ss Compliance Risk Assessment
Mbm Hipaa Hitech Ss Compliance Risk AssessmentMbm Hipaa Hitech Ss Compliance Risk Assessment
Mbm Hipaa Hitech Ss Compliance Risk AssessmentMBMeHealthCareSolutions
 
Hot Topics in Privacy and Security
Hot Topics in Privacy and SecurityHot Topics in Privacy and Security
Hot Topics in Privacy and SecurityPYA, P.C.
 
Data and Network Security: What You Need to Know
Data and Network Security: What You Need to KnowData and Network Security: What You Need to Know
Data and Network Security: What You Need to KnowPYA, P.C.
 
The Importance of HIPAA Compliance in Digital Healthcare Solutions.pptx
The Importance of HIPAA Compliance in Digital Healthcare Solutions.pptxThe Importance of HIPAA Compliance in Digital Healthcare Solutions.pptx
The Importance of HIPAA Compliance in Digital Healthcare Solutions.pptxMocDoc
 
HEALTHCARE IT: IS YOUR INFORMATION AT RISK?
HEALTHCARE IT: IS YOUR INFORMATION AT RISK? HEALTHCARE IT: IS YOUR INFORMATION AT RISK?
HEALTHCARE IT: IS YOUR INFORMATION AT RISK? IJNSA Journal
 
Navigating AI and HIPAA Compliance in Healthcare: Privacy and Security Challe...
Navigating AI and HIPAA Compliance in Healthcare: Privacy and Security Challe...Navigating AI and HIPAA Compliance in Healthcare: Privacy and Security Challe...
Navigating AI and HIPAA Compliance in Healthcare: Privacy and Security Challe...Conference Panel
 

Similar to 1Anthem Inc. HIPAA ViolationJune 21, 2021 (20)

HIPAA-Compliant App Development Guide for the Healthcare Industry.pdf
HIPAA-Compliant App Development Guide for the Healthcare Industry.pdfHIPAA-Compliant App Development Guide for the Healthcare Industry.pdf
HIPAA-Compliant App Development Guide for the Healthcare Industry.pdf
 
Assuring regulatory compliance, ePHI protection, and secure healthcare delivery
Assuring regulatory compliance, ePHI protection, and secure healthcare deliveryAssuring regulatory compliance, ePHI protection, and secure healthcare delivery
Assuring regulatory compliance, ePHI protection, and secure healthcare delivery
 
Healthcare Attorneys Feel the Healthcare Industry Is More Vulnerable to Cyber...
Healthcare Attorneys Feel the Healthcare Industry Is More Vulnerable to Cyber...Healthcare Attorneys Feel the Healthcare Industry Is More Vulnerable to Cyber...
Healthcare Attorneys Feel the Healthcare Industry Is More Vulnerable to Cyber...
 
The Importance of HIPAA Compliance in ensuring the Privacy and Security of PHI!
The Importance of HIPAA Compliance in ensuring the Privacy and Security of PHI!The Importance of HIPAA Compliance in ensuring the Privacy and Security of PHI!
The Importance of HIPAA Compliance in ensuring the Privacy and Security of PHI!
 
Dental Compliance for Dentists and Business Associates
Dental Compliance for Dentists and Business AssociatesDental Compliance for Dentists and Business Associates
Dental Compliance for Dentists and Business Associates
 
HIPAA Compliance For Small Practices
HIPAA Compliance For Small PracticesHIPAA Compliance For Small Practices
HIPAA Compliance For Small Practices
 
Data Breach: It Can Happen To You
Data Breach: It Can Happen To YouData Breach: It Can Happen To You
Data Breach: It Can Happen To You
 
Information Security & Compliance in Healthcare: Beyond HIPAA and HITECH
Information Security & Compliance in Healthcare: Beyond HIPAA and HITECHInformation Security & Compliance in Healthcare: Beyond HIPAA and HITECH
Information Security & Compliance in Healthcare: Beyond HIPAA and HITECH
 
HIPAA-Compliant Healthcare App.pdf
HIPAA-Compliant Healthcare App.pdfHIPAA-Compliant Healthcare App.pdf
HIPAA-Compliant Healthcare App.pdf
 
Privacy and security of information Consider this scenario.docx
Privacy and security of information Consider this scenario.docxPrivacy and security of information Consider this scenario.docx
Privacy and security of information Consider this scenario.docx
 
Understanding the Importance of HIPAA Compliance in Medical Billing Software.pdf
Understanding the Importance of HIPAA Compliance in Medical Billing Software.pdfUnderstanding the Importance of HIPAA Compliance in Medical Billing Software.pdf
Understanding the Importance of HIPAA Compliance in Medical Billing Software.pdf
 
Risk management in Healthcare on Cloud
Risk management in Healthcare on CloudRisk management in Healthcare on Cloud
Risk management in Healthcare on Cloud
 
Article on The Electronic Health Record
Article on The Electronic Health RecordArticle on The Electronic Health Record
Article on The Electronic Health Record
 
Healthcare and Cyber security
Healthcare and Cyber securityHealthcare and Cyber security
Healthcare and Cyber security
 
Mbm Hipaa Hitech Ss Compliance Risk Assessment
Mbm Hipaa Hitech Ss Compliance Risk AssessmentMbm Hipaa Hitech Ss Compliance Risk Assessment
Mbm Hipaa Hitech Ss Compliance Risk Assessment
 
Hot Topics in Privacy and Security
Hot Topics in Privacy and SecurityHot Topics in Privacy and Security
Hot Topics in Privacy and Security
 
Data and Network Security: What You Need to Know
Data and Network Security: What You Need to KnowData and Network Security: What You Need to Know
Data and Network Security: What You Need to Know
 
The Importance of HIPAA Compliance in Digital Healthcare Solutions.pptx
The Importance of HIPAA Compliance in Digital Healthcare Solutions.pptxThe Importance of HIPAA Compliance in Digital Healthcare Solutions.pptx
The Importance of HIPAA Compliance in Digital Healthcare Solutions.pptx
 
HEALTHCARE IT: IS YOUR INFORMATION AT RISK?
HEALTHCARE IT: IS YOUR INFORMATION AT RISK? HEALTHCARE IT: IS YOUR INFORMATION AT RISK?
HEALTHCARE IT: IS YOUR INFORMATION AT RISK?
 
Navigating AI and HIPAA Compliance in Healthcare: Privacy and Security Challe...
Navigating AI and HIPAA Compliance in Healthcare: Privacy and Security Challe...Navigating AI and HIPAA Compliance in Healthcare: Privacy and Security Challe...
Navigating AI and HIPAA Compliance in Healthcare: Privacy and Security Challe...
 

More from EttaBenton28

1Comparing Humanistic-Existential Psychotherapy with Oth
1Comparing Humanistic-Existential Psychotherapy with Oth1Comparing Humanistic-Existential Psychotherapy with Oth
1Comparing Humanistic-Existential Psychotherapy with OthEttaBenton28
 
1Comment by Perjessy, Caroline Substan
1Comment by Perjessy, Caroline Substan1Comment by Perjessy, Caroline Substan
1Comment by Perjessy, Caroline SubstanEttaBenton28
 
1College Student’s DepressionJasmin LinthicumCours
1College Student’s DepressionJasmin LinthicumCours1College Student’s DepressionJasmin LinthicumCours
1College Student’s DepressionJasmin LinthicumCoursEttaBenton28
 
1Close Looking Analysis Visual ArtArtist’s Self-Portrait Analys
1Close Looking Analysis Visual ArtArtist’s Self-Portrait Analys1Close Looking Analysis Visual ArtArtist’s Self-Portrait Analys
1Close Looking Analysis Visual ArtArtist’s Self-Portrait AnalysEttaBenton28
 
1CLA1Xueyao DongWestcliff UniversityINT 501 EF
1CLA1Xueyao DongWestcliff UniversityINT 501 EF1CLA1Xueyao DongWestcliff UniversityINT 501 EF
1CLA1Xueyao DongWestcliff UniversityINT 501 EFEttaBenton28
 
1CJ 550 2-2 Milestone One Southern New Ha
1CJ 550 2-2 Milestone One        Southern New Ha1CJ 550 2-2 Milestone One        Southern New Ha
1CJ 550 2-2 Milestone One Southern New HaEttaBenton28
 
1CLA 1Every organization aims at achieving a cer
1CLA 1Every organization aims at achieving a cer1CLA 1Every organization aims at achieving a cer
1CLA 1Every organization aims at achieving a cerEttaBenton28
 
1CHAPTER ONEThe What and Why of BudgetingAn Introduction
1CHAPTER ONEThe What and Why of BudgetingAn Introduction1CHAPTER ONEThe What and Why of BudgetingAn Introduction
1CHAPTER ONEThe What and Why of BudgetingAn IntroductionEttaBenton28
 
1Child Development Observation and Reflection
1Child Development Observation and Reflection1Child Development Observation and Reflection
1Child Development Observation and ReflectionEttaBenton28
 
1CHAPTER4BUSINESS-LEVEL STRATEGYChapter 2The Exter
1CHAPTER4BUSINESS-LEVEL STRATEGYChapter 2The Exter1CHAPTER4BUSINESS-LEVEL STRATEGYChapter 2The Exter
1CHAPTER4BUSINESS-LEVEL STRATEGYChapter 2The ExterEttaBenton28
 
1CHEMICAL, BIOLOGICAL, RADIOLOGICAL AND NUCLEAR (CBR
1CHEMICAL, BIOLOGICAL, RADIOLOGICAL AND NUCLEAR (CBR1CHEMICAL, BIOLOGICAL, RADIOLOGICAL AND NUCLEAR (CBR
1CHEMICAL, BIOLOGICAL, RADIOLOGICAL AND NUCLEAR (CBREttaBenton28
 
1CHAPTER 01G L O B A L R E P O R T O N2G
1CHAPTER 01G L O B A L  R E P O R T  O N2G1CHAPTER 01G L O B A L  R E P O R T  O N2G
1CHAPTER 01G L O B A L R E P O R T O N2GEttaBenton28
 
1Child Growth and DevelopmentYohana MangiaficoHous
1Child Growth and DevelopmentYohana MangiaficoHous1Child Growth and DevelopmentYohana MangiaficoHous
1Child Growth and DevelopmentYohana MangiaficoHousEttaBenton28
 
1CHAPTER2THE EXTERNAL ENVIRONMENTOPPORTUNITIES, THREATS
1CHAPTER2THE EXTERNAL ENVIRONMENTOPPORTUNITIES, THREATS1CHAPTER2THE EXTERNAL ENVIRONMENTOPPORTUNITIES, THREATS
1CHAPTER2THE EXTERNAL ENVIRONMENTOPPORTUNITIES, THREATSEttaBenton28
 
1Chapter Two Literature ReviewStudents NameName of the
1Chapter Two Literature ReviewStudents NameName of the1Chapter Two Literature ReviewStudents NameName of the
1Chapter Two Literature ReviewStudents NameName of theEttaBenton28
 
1CHAPTER 6 CHINAChinaBook ReferenceTerrill, R. J. (
1CHAPTER 6 CHINAChinaBook ReferenceTerrill, R. J. (1CHAPTER 6 CHINAChinaBook ReferenceTerrill, R. J. (
1CHAPTER 6 CHINAChinaBook ReferenceTerrill, R. J. (EttaBenton28
 
1Chapter 9TelevisionBroadcast and Beyond2
1Chapter 9TelevisionBroadcast and Beyond21Chapter 9TelevisionBroadcast and Beyond2
1Chapter 9TelevisionBroadcast and Beyond2EttaBenton28
 
1CHAPTER 5 RUSSIARussiaBook ReferenceTerrill, R. J.
1CHAPTER 5 RUSSIARussiaBook ReferenceTerrill, R. J.1CHAPTER 5 RUSSIARussiaBook ReferenceTerrill, R. J.
1CHAPTER 5 RUSSIARussiaBook ReferenceTerrill, R. J.EttaBenton28
 
1Chapter 6Newspapers and the NewsReflections of a
1Chapter 6Newspapers and the NewsReflections of a1Chapter 6Newspapers and the NewsReflections of a
1Chapter 6Newspapers and the NewsReflections of aEttaBenton28
 
1CHAPTER 4 SOUTH AFRICA South AfricaConcepts to Know·
1CHAPTER 4 SOUTH AFRICA South AfricaConcepts to Know·1CHAPTER 4 SOUTH AFRICA South AfricaConcepts to Know·
1CHAPTER 4 SOUTH AFRICA South AfricaConcepts to Know·EttaBenton28
 

More from EttaBenton28 (20)

1Comparing Humanistic-Existential Psychotherapy with Oth
1Comparing Humanistic-Existential Psychotherapy with Oth1Comparing Humanistic-Existential Psychotherapy with Oth
1Comparing Humanistic-Existential Psychotherapy with Oth
 
1Comment by Perjessy, Caroline Substan
1Comment by Perjessy, Caroline Substan1Comment by Perjessy, Caroline Substan
1Comment by Perjessy, Caroline Substan
 
1College Student’s DepressionJasmin LinthicumCours
1College Student’s DepressionJasmin LinthicumCours1College Student’s DepressionJasmin LinthicumCours
1College Student’s DepressionJasmin LinthicumCours
 
1Close Looking Analysis Visual ArtArtist’s Self-Portrait Analys
1Close Looking Analysis Visual ArtArtist’s Self-Portrait Analys1Close Looking Analysis Visual ArtArtist’s Self-Portrait Analys
1Close Looking Analysis Visual ArtArtist’s Self-Portrait Analys
 
1CLA1Xueyao DongWestcliff UniversityINT 501 EF
1CLA1Xueyao DongWestcliff UniversityINT 501 EF1CLA1Xueyao DongWestcliff UniversityINT 501 EF
1CLA1Xueyao DongWestcliff UniversityINT 501 EF
 
1CJ 550 2-2 Milestone One Southern New Ha
1CJ 550 2-2 Milestone One        Southern New Ha1CJ 550 2-2 Milestone One        Southern New Ha
1CJ 550 2-2 Milestone One Southern New Ha
 
1CLA 1Every organization aims at achieving a cer
1CLA 1Every organization aims at achieving a cer1CLA 1Every organization aims at achieving a cer
1CLA 1Every organization aims at achieving a cer
 
1CHAPTER ONEThe What and Why of BudgetingAn Introduction
1CHAPTER ONEThe What and Why of BudgetingAn Introduction1CHAPTER ONEThe What and Why of BudgetingAn Introduction
1CHAPTER ONEThe What and Why of BudgetingAn Introduction
 
1Child Development Observation and Reflection
1Child Development Observation and Reflection1Child Development Observation and Reflection
1Child Development Observation and Reflection
 
1CHAPTER4BUSINESS-LEVEL STRATEGYChapter 2The Exter
1CHAPTER4BUSINESS-LEVEL STRATEGYChapter 2The Exter1CHAPTER4BUSINESS-LEVEL STRATEGYChapter 2The Exter
1CHAPTER4BUSINESS-LEVEL STRATEGYChapter 2The Exter
 
1CHEMICAL, BIOLOGICAL, RADIOLOGICAL AND NUCLEAR (CBR
1CHEMICAL, BIOLOGICAL, RADIOLOGICAL AND NUCLEAR (CBR1CHEMICAL, BIOLOGICAL, RADIOLOGICAL AND NUCLEAR (CBR
1CHEMICAL, BIOLOGICAL, RADIOLOGICAL AND NUCLEAR (CBR
 
1CHAPTER 01G L O B A L R E P O R T O N2G
1CHAPTER 01G L O B A L  R E P O R T  O N2G1CHAPTER 01G L O B A L  R E P O R T  O N2G
1CHAPTER 01G L O B A L R E P O R T O N2G
 
1Child Growth and DevelopmentYohana MangiaficoHous
1Child Growth and DevelopmentYohana MangiaficoHous1Child Growth and DevelopmentYohana MangiaficoHous
1Child Growth and DevelopmentYohana MangiaficoHous
 
1CHAPTER2THE EXTERNAL ENVIRONMENTOPPORTUNITIES, THREATS
1CHAPTER2THE EXTERNAL ENVIRONMENTOPPORTUNITIES, THREATS1CHAPTER2THE EXTERNAL ENVIRONMENTOPPORTUNITIES, THREATS
1CHAPTER2THE EXTERNAL ENVIRONMENTOPPORTUNITIES, THREATS
 
1Chapter Two Literature ReviewStudents NameName of the
1Chapter Two Literature ReviewStudents NameName of the1Chapter Two Literature ReviewStudents NameName of the
1Chapter Two Literature ReviewStudents NameName of the
 
1CHAPTER 6 CHINAChinaBook ReferenceTerrill, R. J. (
1CHAPTER 6 CHINAChinaBook ReferenceTerrill, R. J. (1CHAPTER 6 CHINAChinaBook ReferenceTerrill, R. J. (
1CHAPTER 6 CHINAChinaBook ReferenceTerrill, R. J. (
 
1Chapter 9TelevisionBroadcast and Beyond2
1Chapter 9TelevisionBroadcast and Beyond21Chapter 9TelevisionBroadcast and Beyond2
1Chapter 9TelevisionBroadcast and Beyond2
 
1CHAPTER 5 RUSSIARussiaBook ReferenceTerrill, R. J.
1CHAPTER 5 RUSSIARussiaBook ReferenceTerrill, R. J.1CHAPTER 5 RUSSIARussiaBook ReferenceTerrill, R. J.
1CHAPTER 5 RUSSIARussiaBook ReferenceTerrill, R. J.
 
1Chapter 6Newspapers and the NewsReflections of a
1Chapter 6Newspapers and the NewsReflections of a1Chapter 6Newspapers and the NewsReflections of a
1Chapter 6Newspapers and the NewsReflections of a
 
1CHAPTER 4 SOUTH AFRICA South AfricaConcepts to Know·
1CHAPTER 4 SOUTH AFRICA South AfricaConcepts to Know·1CHAPTER 4 SOUTH AFRICA South AfricaConcepts to Know·
1CHAPTER 4 SOUTH AFRICA South AfricaConcepts to Know·
 

Recently uploaded

Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...fonyou31
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
The byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxThe byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxShobhayan Kirtania
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...Pooja Nehwal
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 

Recently uploaded (20)

Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
The byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxThe byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptx
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 

1Anthem Inc. HIPAA ViolationJune 21, 2021

  • 1. 1 Anthem Inc. HIPAA Violation June 21, 2021 Anthem Inc. HIPAA Violation Case Analysis Anthem, a healthcare insurance provider situated in the US, is among some of the organizations that have violated HIPAA laws. Based on OCR (2018) illustrations, the incorporation paid sixteen million US Dollars and committed to take extensive remedial measures to address alleged HIPAA breaches after a sequence of hacks resulted to the biggest infringement of U.S. health information in ever. An estimate of 79 million Electronic Protected Health Information (ePHI) which included name and medical IDs were stolen. HIPAA Privacy and Security Rules Violated Some of HIPAA regulations desecrated by Anthem Inc. included hackers (unauthorized persons) accessing PHI through Anthem’s database, failing to carry out a risk analysis as well as managing confidentiality, integrity and availability risks of PHI and failing to device defense mechanisms that wound ensure the discretion, integrity and availability of PHI. Additionally, ePHI belonging to the 79 million patients were not encrypted or
  • 2. Anthem didn’t apply equivalent measures that would help in preventing the hackers from accessing the data. The attacks began on 2014 and were discovered in 2015 and yet Anthem didn’t implement adequate access measures that would help in preventing ePHI from being accessed. Information stolen by hackers included the names of individuals and their health insurance IDs. Penalties Imposed Several penalties were imposed to Anthem Inc. including paying sixteen million Dollars to the office of civil rights (OCR) in the 2018. Also, because of the filed litigations and lawsuits following the breach, for patients whose health information was stolen the company had to pay one hundred and fifteen million Dollars. The total cost paid by Anthem Inc. for violating HIPAA privacy and security laws including HIPAA state laws was one hundred and seventy-nine million Dollars. The sanction included a $48.2 million cash penalty. OCR required Anthem Inc. to include preventive measures to enhance data security standards. Health System Improvement Plan Components Subcomponents and roles Anthem Health system leadership and governance Responsible for electronic health information, legal and regulatory framework, information requirements and health system leadership and management Anthem Health system management Evaluating and monitoring of health system, mobilizing resources, and continuous professional development. ICT infrastructure Responsible for maintaining, infrastructure and communication networks Interoperability of systems and data Includes data management, network segmentation, data encryption and surveillance of information system doings. Quality of data
  • 3. Assurance of quality data Data usage Strategies on how data should be used, accessed, use proficiencies and impacts Risk analysis strategy Threat Vulnerability Asset Consequences Likelihood Control Data breach Less protection Data Stealing of electronic protected health information High Protection of data using measures such as encryption. Misuse of information Less protection Data Misuse of stolen patient data High Data recovery competence Identify threat, social engineering Patient info isn’t protected Patients Violation of HIPAA privacy and security rules. Penalties. High Controlled access, monitoring of the account, training of security and IT personnel, background screening Dos, Botnets and hardware manipulation Virus, failure to update the system Infrastructure Stealing of patients and company data High
  • 4. Malware defense, control of privileged access, configuring securely and portfolio Software manipulation, information system misuse and installation of corrupt software Virus, illiteracy in system use Applications Data theft Medium Protection of emails and browsers, securing configuration. Application of learned lessons The security breach comes at an inopportune moment for Anthem, which has placed its reputation on employing cutting- edge technology to help people monitor their wellness and traverse the healthcare system. HIPAA lessons from this case include the importance security audit, training employees, having firewalls and encrypting patient data. Security audit includes doing a HIPAA risk assessment regularly, while data encryption includes putting passwords and other security mechanisms to have patient data safe at all times. In cases where a breach is discovered, it’s essential that the involved organization notifies the law enforcement and related bodies. Based on the case, it’s true to note that the health sector should be always be more vigilant about protection of personal, medical, and financial data in their control. References Morse. S. (2018). Anthem pays $16 million in record HIPAA settlement for data breach. Healthcare Finance. https://www.healthcarefinancenews.com/news/anthem-pays-16- million-record-hipaa-settlement-data-breach US Department of Health and Human Services. (2018). Anthem pays OCR $16 million in record HIPAA settlement following largest US health data breach in history. https://www.hhs.gov/guidance/document/anthem-pays-ocr-16-
  • 5. million-record-hipaa-settlement-following-largest-us-health- data-breach Vanderpool, D. (2019). HIPAA COMPLIANCE: A Common Sense Approach. Innovations in clinical neuroscience , 16(1-2), 38. https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6450678/