OCR Announces HIPAA Enforcement Action Against Self-Funded Group Health Plan, $245k
Summary
OCR announced a HIPAA enforcement action against an employer-sponsored self-funded group health plan resulting in a $245,000 payment to HHS and a two-year corrective action plan. The enforcement centered on allegations that the plan failed to conduct an adequate risk analysis as required under the HIPAA Security Rule. The 2021 security incident involved ransomware and unauthorized access to ePHI including names, Social Security numbers, dates of birth, health insurance information, and claims data. This action is part of OCR's ongoing Risk Analysis Initiative targeting organizations that fail to identify where ePHI resides, assess vulnerabilities, or document risk analysis processes.
“OCR's resolution agreement centers on a familiar but critical theme: allegations of a failure to conduct an adequate risk analysis, as required under the HIPAA Security Rule.”
Employer-sponsored self-funded health plans are directly in scope for HIPAA enforcement, and the plan itself—not the employer in its employment capacity—is the covered entity. Plan sponsors should treat HIPAA risk analysis as both a regulatory requirement and a fiduciary obligation under ERISA: the risk analysis is not merely a compliance checkbox but part of prudently selecting and monitoring service providers and protecting participant data.
About this source
JD Supra is the legal industry's open library where US law firms publish client alerts and regulatory analysis. The Healthcare section aggregates everything from partners covering CMS reimbursement, HIPAA enforcement, FDA compliance, healthcare M&A, fraud and abuse, payer-provider disputes, telehealth, and the fast-moving state regulation of healthcare AI. Around 250 alerts a month. Watch this if you run a hospital legal department, advise digital health startups, manage payer compliance, or track how state Medicaid agencies and HHS-OIG actually enforce the rules they publish. The signal-to-noise ratio is genuinely good because firms only publish when they have something concrete to say to their clients. GovPing pulls each alert with the firm name, author, and topic.
What changed
OCR announced a HIPAA enforcement action against an employer-sponsored self-funded group health plan, resulting in a $245,000 payment and two-year corrective action plan. The enforcement focused on alleged failures to conduct an adequate risk analysis as required under the HIPAA Security Rule, part of OCR's broader Risk Analysis Initiative.
For plan sponsors and employers maintaining self-funded group health plans, this case signals that OCR will hold ERISA plan structures accountable under HIPAA, not just traditional healthcare providers and insurers. Plan sponsors should ensure their risk analysis includes comprehensive data mapping across internal systems, third-party administrators, and cloud platforms; threat and vulnerability assessments for external and internal risks; likelihood and impact analysis; vendor risk integration; and documented, repeatable processes updated regularly.
Penalties
$245,000 payment to HHS and a two-year corrective action plan
Archived snapshot
Apr 27, 2026GovPing captured this document from the original source. If the source has since changed or been removed, this is the text as it existed at that time.
April 27, 2026
OCR Announces HIPAA Enforcement Action Against Self-Funded Group Health Plan
LinkedIn Facebook X ;) Embed The U.S. Department of Health and Human Services (HHS) Office for Civil Rights (OCR) recently announced a HIPAA enforcement action against an employer-sponsored group health plan. The action resulted in a payment to HHS of $245,000 and a two-year corrective action plan. While HIPAA enforcement is common in the healthcare sector, actions directly against employer-sponsored group health plans are not as common. This case, coupled with DOL guidance for ERISA fiduciaries concerning cybersecurity, underscores a growing regulatory focus not only on traditional healthcare entities, but also on the plans and ecosystems maintained by employers under ERISA.
The Incident: Ransomware, Unauthorized Access, and Plan Data
According to the breach notification sent to affected individuals, the plan sponsor experienced a security incident back in 2021 involving encryption of systems and unauthorized access to sensitive data. The data included names and Social Security numbers, along with dates of birth, health insurance and plan-related information, and claims data. Notably, the compromised data included group health plan information, not merely employment records—placing the incident squarely within HIPAA’s scope.
OCR’s Enforcement: A Focus on Risk Analysis Failures
OCR’s resolution agreement centers on a familiar but critical theme: allegations of a failure to conduct an adequate risk analysis, as required under the HIPAA Security Rule. Importantly, this enforcement action is part of OCR’s broader Risk Analysis Initiative, which has produced many enforcement actions targeting organizations the OCR alleges:
- Failed to identify where ePHI resides
- Did not assess vulnerabilities to that data
- Lacked documented risk analysis processes OCR has repeatedly emphasized that risk analysis is the foundation of HIPAA compliance—and this enforcement action confirms that this expectation applies equally to employer-sponsored health plans.
Why This Case Matters
Being one of the few taken by the OCR against employer sponsored group health plans, this case signals a willingness by OCR to look beyond providers and insurers and into ERISA plan structures. For plan sponsors, this case is a reminder that the plan—not the employer in its employment capacity—is the HIPAA covered entity, and regulators will not hesitate to hold the plan accountable.
This case also intersects with the Department of Labor’s (DOL) cybersecurity guidance for ERISA plans. DOL has made clear that plan fiduciaries have an obligation to:
- Prudently select and monitor service providers, including their cybersecurity practices
- Ensure protection of plan data
Assess risks to participant information and plan assets
In practical terms, this means:A HIPAA risk analysis is not just a compliance exercise
It is also part of a fiduciary obligation under ERISA
Key Takeaways: Conducting an Effective HIPAA Risk Analysis
OCR enforcement trends—including this case—point to consistent gaps in how organizations approach risk analysis. Plan sponsors should ensure their process includes:
- Data Mapping. To understand the threats and vulnerabilities to plan data, plans need to know where the data resides. This could be accomplished through a mapping exercise that identifies all locations of ePHI, including:
- Internal systems
- Third-party administrators (TPAs)
- Cloud platforms and other vendors
- Threat and Vulnerability Assessment. Once the plan knows the kind of data it maintains and where it is, it can assess threats and vulnerabilities. This includes evaluating:
- External threats (e.g., ransomware, phishing)
- Internal risks (e.g., access controls, workforce practices)
- Likelihood and Impact Analysis. Not all threats and vulnerabilities are the same, and plans can analyze them by looking at:
- Probability of exploitation (Likelihood of a threat materializing)
- Potential harm to participants and the plan (Impact on individuals and the plan, if it does)
- Vendor Risk Integration. Risk resides not only with the plan and plan sponsor, but also with the vendors that provide services to the plan – third party claims administrators, brokers, wellness programs, claims advocates, enrollment platforms, and other entities providing services to the plan. DOL fiduciary expectations for vendor cybersecurity also must be taken into account.
- Risk Management (Beyond Identification). Once risks have been identified, whether from the plan sponsor, business associates, or other sources, OCR expects organizations to:
- Act on identified risks
- Implement security measures proportionate to findings
- Documentation and Repeatability. Plans need to document and maintain the written, defensible analyses they engage in under HIPAA. That process should be updated regularly—not just after incidents.
- Remember HIPAA permits flexibility – not all plans are the same. Section 164.302(b) of the Security Rule provides guidance plans should keep in mind in connection with HIPAA compliance: (1) Covered entities and business associates may use any security measures that allow the covered entity or business associate to reasonably and appropriately implement the standards and implementation specifications as specified in this subpart.
(2) In deciding which security measures to use, a covered entity or business associate must take into account the following factors:
(i) The size, complexity, and capabilities of the covered entity or business associate.
(ii) The covered entity’s or the business associate’s technical infrastructure, hardware, and software security capabilities.
(iii) The costs of security measures.
(iv) The probability and criticality of potential risks to electronic protected health information.
For plan sponsors, the message is straightforward: If your group health plan handles protected health information—and it does—then a robust, well-documented, and actively managed risk analysis is not optional. It is both a regulatory requirement and a fiduciary imperative.
[View source.]
;) ;) Report
Related Posts
- Using Patient Photos in Marketing? OCR Settlement Highlights HIPAA Compliance Requirements
- OCR’s “Risk Analysis” Enforcement Initiative Continues Against Another Business Associate
- Health Fitness, OCR’s Risk Analysis Initiative, and the ERISA Fiduciary Duty to Select Plan Service Providers
Latest Posts
- OCR Announces HIPAA Enforcement Action Against Self-Funded Group Health Plan
- Mass. Court Limits Liability under PFMLA to Employers, Not Individuals See more »
DISCLAIMER: Because of the generality of this update, the information provided herein may not be applicable in all situations and should not be acted upon without specific legal advice based on particular situations.
Attorney Advertising.
©
Jackson Lewis P.C.
2026
Written by:
Jackson Lewis P.C. Contact + Follow Joseph Lazzarotti + Follow
PUBLISH YOUR CONTENT ON JD SUPRA
- ✔ Increased readership
- ✔ Actionable analytics
- ✔ Ongoing writing guidance Join more than 70,000 authors publishing their insights on JD Supra
Published In:
Cybersecurity + Follow Data Breach + Follow Data Protection + Follow Department of Health and Human Services (HHS) + Follow Department of Labor (DOL) + Follow Electronic Protected Health Information (ePHI) + Follow Employee Retirement Income Security Act (ERISA) + Follow Employer Group Health Plans + Follow Enforcement Actions + Follow Fiduciary Duty + Follow Health Insurance Portability and Accountability Act (HIPAA) + Follow HIPAA Security Rule + Follow OCR + Follow Risk Management + Follow Self-Funded Health Plans + Follow Health + Follow Labor & Employment + Follow Privacy + Follow more
Jackson Lewis P.C. on:
Solve with 2Captcha
Solve with 2Captcha
Named provisions
Mentioned entities
Related changes
Get daily alerts for JD Supra Healthcare
Daily digest delivered to your inbox.
Free. Unsubscribe anytime.
Source
About this page
Every important government, regulator, and court update from around the world. One place. Real-time. Free. Our mission
Source document text, dates, docket IDs, and authority are extracted directly from Jackson Lewis.
The summary, classification, recommended actions, deadlines, and penalty information are AI-generated from the original text and may contain errors. Always verify against the source document.
Classification
Who this affects
Taxonomy
Browse Categories
Get alerts for this source
We'll email you when JD Supra Healthcare publishes new changes.
Subscribed!
Optional. Filters your digest to exactly the updates that matter to you.