Skip to main content

BayCare’s $800K HIPAA Settlement Highlights Ongoing Risk from Malicious Insiders in Healthcare IT

June 2, 2025
Image: [image credit]
Photo 124522923 | Health Data © Spettacolare | Dreamstime.com

Jasmine Harris, Contributing Editor

The U.S. Department of Health and Human Services Office for Civil Rights has reached an $800,000 settlement with Florida-based BayCare Health System following a HIPAA Security Rule investigation into unauthorized access of a patient’s electronic protected health information. The breach, triggered by a complaint involving a non-clinical staff member who improperly accessed and shared the patient’s medical records, underscores a persistent vulnerability across health systems: insider threats enabled by weak access controls and insufficient auditing protocols.

OCR’s resolution agreement makes clear that this was not simply a rogue employee incident. The investigation found multiple potential violations of the HIPAA Security Rule, including failures to limit access to protected health information based on job role, a lack of consistent risk reduction practices, and an absence of routine reviews of system activity logs. In other words, BayCare had no operational framework in place to prevent or detect this kind of breach.

The breach was first reported in 2018 after the patient received unsolicited contact from an individual who possessed photos and video of her printed and digital medical records. OCR determined the data was accessed using credentials tied to a former staffer at a physician practice that shared EMR access with BayCare under a patient care continuity arrangement. That relationship, while operationally standard, became a security liability due to insufficient governance over user credentials and lack of real-time access auditing.

Under the terms of the two-year corrective action plan, BayCare is required to complete a comprehensive risk analysis, implement a formal risk management strategy, update HIPAA compliance policies, and retrain its entire workforce on the proper handling of electronic protected health information. OCR will monitor these steps to ensure full adherence to the Security Rule.

The HIPAA Security Rule mandates covered entities implement administrative, physical, and technical safeguards to ensure the confidentiality, integrity, and availability of ePHI. In practice, this means access controls must align tightly with job responsibilities, and that audit trails must be routinely reviewed to detect anomalous or unauthorized activity. The lack of these basic controls continues to drive enforcement across provider organizations, particularly when insider access is exploited in a malicious or negligent fashion.

OCR is urging all covered entities and business associates to proactively reassess their HIPAA compliance programs. Specific recommendations include identifying where and how ePHI moves across systems, conducting regular risk analyses, ensuring audit controls are enabled and reviewed, encrypting ePHI at rest and in transit, and integrating lessons from past breaches into security protocols. Additionally, workforce-specific HIPAA training should be ongoing, targeted, and role-specific — a common failure point for hybrid provider organizations.

BayCare’s case is not isolated. It reflects a broader challenge in healthcare IT governance, where shared access models between affiliated entities often outpace the internal controls needed to manage them. As provider systems become increasingly interconnected, covered entities must treat credential management, audit logs, and insider access as top-tier risks, not peripheral compliance issues.

More information on the breach notification requirements and public reporting is available via the HHS Breach Portal. To report violations of HIPAA privacy or civil rights, individuals can submit complaints directly through the HHS OCR complaint platform.