25% off all training courses Offer ends May 29, 2026
View HIPAA Courses
25% off all training courses
View HIPAA Courses
Offer ends May 29, 2026

The HIPAA Journal is the leading provider of HIPAA training, news, regulatory updates, and independent compliance advice.

April 2024 Healthcare Data Breach Report

Healthcare data breaches fell 43% month-over-month, with 54 data breaches of 500 or more records reported to the HHS’ Office for Civil Rights. That’s the lowest monthly total so far this year, the second lowest monthly breach count in the past 12 months, and well below the 12-month average of 63 HIPAA data breaches a month.

healthcare data breaches May 2023 to April 2024

April healthcare data breaches 2020-2024

While the reduction in data breaches is great news, April was the worst month of the year to date in terms of breached healthcare records. Across the 54 data breaches, 15,349,203 records were reported as exposed or impermissibly disclosed. The number of breached records is likely to increase, as 5 breaches were reported as involving 500 or 501 records – placeholders commonly used for reporting breaches when the number of affected individuals has yet to be determined.

Records breached at HIPAA-regulated entities - May 2023-April 2024

April breached healthcare records - 2020-2024

Biggest Healthcare Data Breaches Reported in April 2023

One breach that has not yet been included in the HIPAA Journal breach reports is the ransomware attack on Change Healthcare, as while this is undoubtedly the biggest data breach of the year, the number of affected individuals is still not known. At a recent House subcommittee hearing, UnitedHealth Group (UHG) CEO Andrew Witty confirmed that data was stolen in the attack but could not say how many individuals had been affected. When pressed on the issue, he said up to a third of U.S. residents may have been affected by the attack, which could mean more than 110 million Americans.

The largest confirmed data breach occurred at Kaiser Foundation Health Plan and resulted in the impermissible disclosure of the personally identifiable information of 13.4 million individuals. Like many other healthcare organizations, Kaiser added tracking technologies to its websites and apps. When individuals visited the websites or used the apps, the technologies transferred data collected during those visits to third parties such as Microsoft (Bing), Google, and X (Twitter). The HHS’ Office for Civil Rights confirmed in guidance released in December 2022 – and updated in March 2023 – that if these tools collect personally identifiable health information and transmit that data to third parties who have not signed a business associate agreement, it is a HIPAA breach.

Get The FREE
HIPAA Compliance Checklist

Immediate Delivery of Checklist Link To Your Email Address

Please Enter Correct Email Address

Your Privacy Respected

HIPAA Journal Privacy Policy

The second largest breach of the month also occurred at a health plan. Group Health Cooperative of South Central Wisconsin fell victim to a ransomware attack involving the theft of the PHI of 533,809 individuals. Several cybercriminal groups have dispensed with ransomware and instead concentrate on breaching networks, stealing data, and demanding payment to prevent the stolen data from being leaked or sold, as was the case with the attacks on Otolaryngology Associates and Optometric Physicians of Middle Tennessee.

Name of Covered Entity State Covered Entity Type Individuals Affected Cause of Breach
Kaiser Foundation Health Plan, Inc. CA Health Plan 13,400,000 Impermissible disclosure of PHI – Website tracking technologies
Group Health Cooperative of South Central Wisconsin WI Health Plan 533,809 Ransomware attack – Data theft confirmed
Otolaryngology Associates, LLC IN Healthcare Provider 316,802 Hacking incident involving theft of PHI and extortion
Knowles Smith & Associates, d/b/a Village Family Dental NC Healthcare Provider 240,214 Hacked network server – Data theft possible
LivaNova USA, Inc. TX Business Associate 180,000 Ransomware attack (LockBit) – Data theft confirmed
OrthoConnecticut PLLC CT Healthcare Provider 118,141 Hacked network server – Data theft possible
Inland Physicians Billing Services CA Healthcare Clearing House 77,434 Hacked network server – No information available
Bluebonnet Trails Community Services TX Healthcare Provider 76,165 Unauthorized access to email accounts – Data theft possible
Gaia Software, LLC CO Business Associate 56,676 Hacked network server – No information available
Bridgeway Center, Inc. FL Healthcare Provider 36,353 Hacked network server – Data theft possible
The Prudential Insurance Company of America NJ Health Plan 36,092 Ransomware attack (Blackcat) – Data theft confirmed
Blackstone Valley Community Health Care RI Healthcare Provider 34,518 Hacked network server – Data theft possible
Politzer and Durocher, PLC d/b/a Optometric Physicians of Middle Tennessee TN Healthcare Provider 29,000 Hacking incident involving theft of PHI and extortion (BianLian)
Moffitt Cancer Center and Research Institute FL Healthcare Provider 26,577 Hacked network server at an unnamed business associate – Data theft confirmed
University of Tennessee Health Science Center TN Healthcare Provider 19,353 Hacked network server at business associate (KMJ Health Solutions) – Data theft confirmed
Aspire Health Alliance MA Healthcare Provider 17,490 Hacked network server – Data theft confirmed
Cattaraugus-Allegany Board of Cooperative Education Services NY Business Associate 15,203 Hacked network server – Data theft possible
Bay Oral Surgery & Implant Center WI Healthcare Provider 13,055 Unauthorized access to email account – Data theft possible
Somerset Dental Las Vegas NV Healthcare Provider 11,321 Hacked network server – Data theft possible

Data Breach Causes and Location of Compromised PHI

Hacking and other IT incidents were the main cause of healthcare data breaches in April, accounting for 84.5% of the month’s data breaches. In terms of breached records, hacks and ransomware attacks usually account for the bulk of breached records; however, in April, unauthorized disclosures affected the most people due to the massive breach at Kaiser. The protected health information of 1,919,637 individuals was exposed or stolen in hacking and other IT incidents in April, which is 12.5% of the month’s breached records. The average breach size was 43,628 records and the median breach size was 6,812 records, both of which are up month-over-month from an average of 38,402 records (+13.6%) and a median of 3,144 records (+53.8%).

There were 8 unauthorized access/disclosure incidents reported in April involving 87.5% of the month’s breached records. Across those data breaches, the protected health information of 13,428,243 individuals was accessed without authorization or was impermissibly disclosed. The average breach size was 1,678,530 records, a month-over-month increase of 50,442.9%, and the median breach size was 4,550 records, an increase of 132.6%.

While the loss and theft of paper records and electronic devices containing PHI used to account for the majority of data breaches, these incidents are now relatively rare. There were no reported thefts in April, one loss incident involving 755 paper records, and one improper disposal incident involving 568 paper records.

Causes of April 2024 healthcare data breaches

The most common location of breached protected health information was network servers. The next most common location was email accounts, breaches of which could be reduced if phishing-resistant multi-factor authentication is implemented. More than 133,000 records were compromised in email breaches in April.

Location of PHI in April 2024 healthcare data breaches

Where did the Data Breaches Occur?

The HIPAA Breach Notification Rule requires data breaches to be reported to OCR and notifications to be issued to the affected individuals. When a data breach occurs at a business associate of a covered entity, the business associate must notify each of the affected covered entities and it is ultimately the responsibility of each covered entity to ensure that OCR and the affected individuals are notified. As OCR recently confirmed in its FAQs about the Change Healthcare ransomware attack, a covered entity may delegate the responsibility of providing individual notices to the business associate, and while this is common, some covered entities prefer to issue notifications themselves.

A consequence of that is that business associate data breaches are not always apparent on the OCR data breach portal. In April, the portal shows 34 breaches at healthcare providers (1,012,114 affected individuals), 12 breaches at business associates (1.919,637 affected individuals), 7 breaches at health plans (13,985,180 affected individuals), and one breach at a healthcare clearinghouse (77,434 affected individuals). The charts below show where the breaches occurred rather than the entity that reported them.

Data breaches at HIPAA-regulated entities - April 2024

healthcare records breached in April 2024

Geographical Distribution of Healthcare Data Breaches

Data breaches were reported by HIPAA-regulated entities in 26 U.S. states in April, with California the worst affected state in terms of the number of breaches and the number of breached records. California had 7 breaches that affected 13,502,632 individuals – 88% of the individuals affected by April data breaches. There were 5 breaches at HIPAA-regulated entities in Washington, involving the PHI of at least 15,489 individuals. That number is likely to grow considerably, as two of the breaches were reported to OCR as involving 500 and 501 records because the total number of affected individuals has yet to be determined. There were 4 breaches in Tennessee involving the records of at least 49,404 individuals. One of those breaches is still being investigated, so the total is likely to increase. While Wisconsin only suffered two breaches, it was the second worst affected state in terms of breached records, with 546,864 records breached.

State Breaches
California 7
Washington 5
Tennessee 4
Florida, New Jersey, New York, North Carolina, & Pennsylvania 3
Illinois, Maryland, Ohio, Texas & Wisconsin 2
Alabama, Arizona, Colorado, Connecticut, Georgia, Idaho, Indiana, Kentucky, Massachusetts, Montana, Nevada, New Hampshire & Rhode Island 1

HIPAA Enforcement Activity in April 2024

In 2019, OCR launched a HIPAA Right of Access enforcement initiative which continues to be an enforcement priority. In April, OCR resolved its 48th HIPAA Right of Access case under this initiative with a $100,000 civil monetary penalty imposed on the New Jersey nursing care provider Essex Residential Care, which does business as Hackensack Meridian Health, West Caldwell Care Center. Most cases under this initiative are settled with OCR; however, West Caldwell Care Center chose not to settle. West Caldwell Care Center admitted to the HIPAA Right of Access violation but disagreed with OCR’s determination and penalty amount. West Caldwell Care Center argued that imposing a civil monetary penalty “would be arbitrary and capricious and would violate the Administrative Procedure Act (APA). OCR disagreed and offered the opportunity to take the case to an Administrative Law Judge; however, on advice from its legal counsel, West Caldwell Care Center chose to waive that right and agreed to pay the penalty.

HIPAA Compliance Audits to Commence This Year

OCR Director, Melanie Fontes Rainer, has confirmed that OCR has resurrected its HIPAA audit program and audits will start to be conducted at some point in 2024. Earlier this year, OCR sent a questionnaire to HIPAA-regulated entities audited in the last round of HIPAA audits in 2016/2017 and sought feedback to improve OCR’s audit protocol. OCR is now finalizing the new audit protocol and Fontes Rainer said OCR will be conducting proactive audits this year focusing on HIPAA Security Rule compliance. OCR launched an enforcement initiative targeting the risk analysis provision of the HIPAA Security Rule in 2023, as poor risk analysis practices are frequently identified in OCR’s data breach investigations and are a significant factor contributing to data breaches. Risk analyses and risk management practices will be scrutinized in the upcoming 2024 HIPAA audits.

FTC Issues Final Rule Updating Health Breach Notification Rule

HIPAA-regulated entities are required to comply with the HIPAA Breach Notification Rule and must issue notifications in the event of a data breach. Breaches of health data at non-HIPAA-regulated entities may require notifications under the Federal Trade Commission’s (FTC) Health Breach Notification Rule. The FTC felt an update to its Health Breach Notification Rule was necessary due to the increasing number of companies collecting health data. On April 26, 2024, the FTC issued a final rule updating the Health Breach Notification Rule with new definitions and clarifications. Definitions have been broadened to include health apps and other technologies not covered by HIPAA. As is the case with the HIPAA Breach Notification Rule, notifications must be issued without undue delay and no later than 60 days from the discovery of a data breach.

Author: Steve Alder is the editor-in-chief of The HIPAA Journal. Steve is responsible for editorial policy regarding the topics covered in The HIPAA Journal. He is a specialist on healthcare industry legal and regulatory affairs, and has 10 years of experience writing about HIPAA and other related legal topics. Steve has developed a deep understanding of regulatory issues surrounding the use of information technology in the healthcare industry and has written hundreds of articles on HIPAA-related topics. Steve shapes the editorial policy of The HIPAA Journal, ensuring its comprehensive coverage of critical topics. Steve Alder is considered an authority in the healthcare industry on HIPAA. The HIPAA Journal has evolved into the leading independent authority on HIPAA under Steve’s editorial leadership. Steve manages a team of writers and is responsible for the factual and legal accuracy of all content published on The HIPAA Journal. Steve holds a Bachelor’s of Science degree from the University of Liverpool. You can connect with Steve via LinkedIn or email via stevealder(at)hipaajournal.com

x

Is Your Organization HIPAA Compliant?

Find Out With Our Free HIPAA Compliance Checklist

Get Free Checklist