Changeflow GovPing Healthcare & Life Sciences OCR Announces HIPAA Enforcement Action Against ...
Routine Notice Added Final

OCR Announces HIPAA Enforcement Action Against Self-Funded Group Health Plan, $245k

Favicon for www.jdsupra.com JD Supra Healthcare
Published
Detected
Email

Summary

OCR announced a HIPAA enforcement action against an employer-sponsored self-funded group health plan resulting in a $245,000 payment to HHS and a two-year corrective action plan. The enforcement centered on allegations that the plan failed to conduct an adequate risk analysis as required under the HIPAA Security Rule. The 2021 security incident involved ransomware and unauthorized access to ePHI including names, Social Security numbers, dates of birth, health insurance information, and claims data. This action is part of OCR's ongoing Risk Analysis Initiative targeting organizations that fail to identify where ePHI resides, assess vulnerabilities, or document risk analysis processes.

“OCR's resolution agreement centers on a familiar but critical theme: allegations of a failure to conduct an adequate risk analysis, as required under the HIPAA Security Rule.”

Why this matters

Employer-sponsored self-funded health plans are directly in scope for HIPAA enforcement, and the plan itself—not the employer in its employment capacity—is the covered entity. Plan sponsors should treat HIPAA risk analysis as both a regulatory requirement and a fiduciary obligation under ERISA: the risk analysis is not merely a compliance checkbox but part of prudently selecting and monitoring service providers and protecting participant data.

AI-drafted from the source document, validated against GovPing's analyst note standards . For the primary regulatory language, read the source document .
Published by Jackson Lewis on jdsupra.com . Detected, standardized, and enriched by GovPing. Review our methodology and editorial standards .

About this source

JD Supra is the legal industry's open library where US law firms publish client alerts and regulatory analysis. The Healthcare section aggregates everything from partners covering CMS reimbursement, HIPAA enforcement, FDA compliance, healthcare M&A, fraud and abuse, payer-provider disputes, telehealth, and the fast-moving state regulation of healthcare AI. Around 250 alerts a month. Watch this if you run a hospital legal department, advise digital health startups, manage payer compliance, or track how state Medicaid agencies and HHS-OIG actually enforce the rules they publish. The signal-to-noise ratio is genuinely good because firms only publish when they have something concrete to say to their clients. GovPing pulls each alert with the firm name, author, and topic.

What changed

OCR announced a HIPAA enforcement action against an employer-sponsored self-funded group health plan, resulting in a $245,000 payment and two-year corrective action plan. The enforcement focused on alleged failures to conduct an adequate risk analysis as required under the HIPAA Security Rule, part of OCR's broader Risk Analysis Initiative.

For plan sponsors and employers maintaining self-funded group health plans, this case signals that OCR will hold ERISA plan structures accountable under HIPAA, not just traditional healthcare providers and insurers. Plan sponsors should ensure their risk analysis includes comprehensive data mapping across internal systems, third-party administrators, and cloud platforms; threat and vulnerability assessments for external and internal risks; likelihood and impact analysis; vendor risk integration; and documented, repeatable processes updated regularly.

Penalties

$245,000 payment to HHS and a two-year corrective action plan

Archived snapshot

Apr 27, 2026

GovPing captured this document from the original source. If the source has since changed or been removed, this is the text as it existed at that time.

April 27, 2026

OCR Announces HIPAA Enforcement Action Against Self-Funded Group Health Plan

LinkedIn Facebook X ;) Embed The U.S. Department of Health and Human Services (HHS) Office for Civil Rights (OCR) recently announced a HIPAA enforcement action against an employer-sponsored group health plan. The action resulted in a payment to HHS of $245,000 and a two-year corrective action plan. While HIPAA enforcement is common in the healthcare sector, actions directly against employer-sponsored group health plans are not as common. This case, coupled with DOL guidance for ERISA fiduciaries concerning cybersecurity, underscores a growing regulatory focus not only on traditional healthcare entities, but also on the plans and ecosystems maintained by employers under ERISA.

The Incident: Ransomware, Unauthorized Access, and Plan Data

According to the breach notification sent to affected individuals, the plan sponsor experienced a security incident back in 2021 involving encryption of systems and unauthorized access to sensitive data. The data included names and Social Security numbers, along with dates of birth, health insurance and plan-related information, and claims data. Notably, the compromised data included group health plan information, not merely employment records—placing the incident squarely within HIPAA’s scope.

OCR’s Enforcement: A Focus on Risk Analysis Failures

OCR’s resolution agreement centers on a familiar but critical theme: allegations of a failure to conduct an adequate risk analysis, as required under the HIPAA Security Rule. Importantly, this enforcement action is part of OCR’s broader Risk Analysis Initiative, which has produced many enforcement actions targeting organizations the OCR alleges:

  • Failed to identify where ePHI resides
  • Did not assess vulnerabilities to that data
  • Lacked documented risk analysis processes OCR has repeatedly emphasized that risk analysis is the foundation of HIPAA compliance—and this enforcement action confirms that this expectation applies equally to employer-sponsored health plans.

Why This Case Matters

Being one of the few taken by the OCR against employer sponsored group health plans, this case signals a willingness by OCR to look beyond providers and insurers and into ERISA plan structures. For plan sponsors, this case is a reminder that the plan—not the employer in its employment capacity—is the HIPAA covered entity, and regulators will not hesitate to hold the plan accountable.

This case also intersects with the Department of Labor’s (DOL) cybersecurity guidance for ERISA plans. DOL has made clear that plan fiduciaries have an obligation to:

  • Prudently select and monitor service providers, including their cybersecurity practices
  • Ensure protection of plan data
  • Assess risks to participant information and plan assets
    In practical terms, this means:

  • A HIPAA risk analysis is not just a compliance exercise

  • It is also part of a fiduciary obligation under ERISA
    Key Takeaways: Conducting an Effective HIPAA Risk Analysis

OCR enforcement trends—including this case—point to consistent gaps in how organizations approach risk analysis. Plan sponsors should ensure their process includes:

  1. Data Mapping. To understand the threats and vulnerabilities to plan data, plans need to know where the data resides. This could be accomplished through a mapping exercise that identifies all locations of ePHI, including:
    • Internal systems
    • Third-party administrators (TPAs)
    • Cloud platforms and other vendors
  2. Threat and Vulnerability Assessment. Once the plan knows the kind of data it maintains and where it is, it can assess threats and vulnerabilities. This includes evaluating:
    • External threats (e.g., ransomware, phishing)
    • Internal risks (e.g., access controls, workforce practices)
  3. Likelihood and Impact Analysis. Not all threats and vulnerabilities are the same, and plans can analyze them by looking at:
    • Probability of exploitation (Likelihood of a threat materializing)
    • Potential harm to participants and the plan (Impact on individuals and the plan, if it does)
  4. Vendor Risk Integration. Risk resides not only with the plan and plan sponsor, but also with the vendors that provide services to the plan – third party claims administrators, brokers, wellness programs, claims advocates, enrollment platforms, and other entities providing services to the plan. DOL fiduciary expectations for vendor cybersecurity also must be taken into account.
  5. Risk Management (Beyond Identification). Once risks have been identified, whether from the plan sponsor, business associates, or other sources, OCR expects organizations to:
    • Act on identified risks
    • Implement security measures proportionate to findings
  6. Documentation and Repeatability. Plans need to document and maintain the written, defensible analyses they engage in under HIPAA. That process should be updated regularly—not just after incidents.
  7. Remember HIPAA permits flexibility – not all plans are the same. Section 164.302(b) of the Security Rule provides guidance plans should keep in mind in connection with HIPAA compliance: (1) Covered entities and business associates may use any security measures that allow the covered entity or business associate to reasonably and appropriately implement the standards and implementation specifications as specified in this subpart.

(2) In deciding which security measures to use, a covered entity or business associate must take into account the following factors:

(i) The size, complexity, and capabilities of the covered entity or business associate.

(ii) The covered entity’s or the business associate’s technical infrastructure, hardware, and software security capabilities.

(iii) The costs of security measures.

(iv) The probability and criticality of potential risks to electronic protected health information.

For plan sponsors, the message is straightforward: If your group health plan handles protected health information—and it does—then a robust, well-documented, and actively managed risk analysis is not optional. It is both a regulatory requirement and a fiduciary imperative.

[View source.]

;) ;) Report

Related Posts

Latest Posts

DISCLAIMER: Because of the generality of this update, the information provided herein may not be applicable in all situations and should not be acted upon without specific legal advice based on particular situations.
Attorney Advertising.

©
Jackson Lewis P.C.
2026

Written by:

Jackson Lewis P.C. Contact + Follow Joseph Lazzarotti + Follow

PUBLISH YOUR CONTENT ON JD SUPRA

  • ✔ Increased readership
  • ✔ Actionable analytics
  • ✔ Ongoing writing guidance Join more than 70,000 authors publishing their insights on JD Supra

Start Publishing »

Published In:

Cybersecurity + Follow Data Breach + Follow Data Protection + Follow Department of Health and Human Services (HHS) + Follow Department of Labor (DOL) + Follow Electronic Protected Health Information (ePHI) + Follow Employee Retirement Income Security Act (ERISA) + Follow Employer Group Health Plans + Follow Enforcement Actions + Follow Fiduciary Duty + Follow Health Insurance Portability and Accountability Act (HIPAA) + Follow HIPAA Security Rule + Follow OCR + Follow Risk Management + Follow Self-Funded Health Plans + Follow Health + Follow Labor & Employment + Follow Privacy + Follow more

Jackson Lewis P.C. on:

Solve with 2Captcha

Solve with 2Captcha

Named provisions

Risk Analysis

Get daily alerts for JD Supra Healthcare

Daily digest delivered to your inbox.

Free. Unsubscribe anytime.

About this page

What is GovPing?

Every important government, regulator, and court update from around the world. One place. Real-time. Free. Our mission

What's from the agency?

Source document text, dates, docket IDs, and authority are extracted directly from Jackson Lewis.

What's AI-generated?

The summary, classification, recommended actions, deadlines, and penalty information are AI-generated from the original text and may contain errors. Always verify against the source document.

Last updated

Classification

Agency
Jackson Lewis
Published
April 27th, 2026
Instrument
Notice
Branch
Executive
Legal weight
Non-binding
Stage
Final
Change scope
Substantive

Who this affects

Applies to
Employers Healthcare providers
Industry sector
6211 Healthcare Providers
Activity scope
HIPAA compliance Risk analysis Data breach response
Geographic scope
United States US

Taxonomy

Primary area
Data Privacy
Operational domain
Compliance
Compliance frameworks
HIPAA
Topics
Healthcare Cybersecurity

Get alerts for this source

We'll email you when JD Supra Healthcare publishes new changes.

Free. Unsubscribe anytime.

You're subscribed!