De-identification of Protected Health Information: How to Anonymize PHI
The de-identification of Protected Health Information enables covered entities and business associates to use or disclose health information to third parties for any purpose without being restricted by the requirements of the HIPAA Privacy Rule. However, it is important to be aware that other laws may apply to uses and disclosures of de-identified health information. You can use our free Protected Health Information Guide to learn how to de-identify and anonymize PHI. If you de-identify PHI so that the identity of individuals cannot be determined, and re-identification of individuals is not possible, health information can be freely disclosed. Why De-Identify Protected Health Information? Protected Health Information (PHI) is individually identifiable health information – whether digital, paper, or oral – that relates to an individual’s health condition, treatment for the condition, or payment for the treatment. To protect the information, the HIPAA Privacy Rule stipulates which uses and disclosures of PHI are required or permitted, which uses and disclosures require consent or...
Sunflower Medical Group to Pay Up to $1.2 Million to Settle Class Action Data Breach Lawsuit
Kansas City, KS-based Sunflower Medical Group has agreed to pay up to $1,200,000 to settle a class action lawsuit stemming from a December 2024 ransomware attack. The ransomware attack was conducted by the Rhysida ransomware group, which gained access to its network on or around December 15, 2024. Sunflower Medical Group determined on January 7, 2025, that sensitive patient data had been stolen, including names, addresses, dates of birth, Social Security numbers, driver’s license numbers, medical information, and health insurance information. Rhysida claimed to have exfiltrated a 3-terabyte SQL database in the attack, containing the data of approximately 400,000 patients. If a ransom is not paid, Rhysida attempts to sell the stolen data and leaks any unsold data on its dark web data leak site, as was the case in this attack. Sunflower Medical Group’s file review identified 220,968 affected individuals, although the class size of the lawsuit is 255,734 individuals. Several class action lawsuits were filed against Sunflower Medical Group over the data breach. The lawsuits were...
Former Evoke Wellness Employee Obtained and Misused Patient Data
A former employee of Evoke Wellness at Hilliard has stolen and misused patient data, Conifer Value-Based Care has experienced an email account breach, and patient data was potentially stolen in a break-in at a Heart of Texas Behavioral Health Network facility. Evoke Wellness at Hilliard OCAT, LLC dba Evoke Wellness at Hilliard, a provider of behavioral health services, has reported a data breach affecting patients of its Hilliard, Ohio facility. Evoke Wellness at Hilliard was notified by law enforcement on May 20, 2025, that sensitive data had been stolen from its systems, prompting an internal investigation. Law enforcement found stolen data in the possession of the individual, and the Evoke Wellness investigation confirmed unauthorized access to the records of 1,629 patients. Data obtained by the individual included full names, addresses, phone numbers, email addresses, Social Security numbers, medical records, diagnoses and treatment information, treatment dates, lab results, prescriptions, health insurance information, driver’s license numbers, passport numbers, payment card...
Albemarle County, VA, Confirms PHI Stolen in June Ransomware Attack
Officials in Albemarle County, Virginia, have confirmed that sensitive data, including protected health information (PHI), was compromised in a June 2025 ransomware attack. The attack commenced on June 10, 2025, and was detected the following day when staff were unable to access certain files on the network. State and federal law enforcement were notified, and third-party cybersecurity experts were engaged to assist with the investigation and determine the scope of the data breach. On July 15, 2025, the investigation confirmed that the PHI of members of its self-insured health plan was compromised in the attack. The compromised PHI varied from individual to individual and may have included names, email addresses, home addresses, phone numbers, dates of birth, Social Security numbers, employee/user ID numbers, healthcare ID numbers, account/patient ID numbers, health information, dates of services, billing and claims information, medical provider names, invoice numbers for the medical care received, and health insurance information. In addition, the data of current and former...
HIPAA Training for Mental Health Centers
HIPAA training for mental health centers not only fulfills mandatory requirements to train workforce members on the HIPAA privacy and security standards, but it also provides a foundation for more stringent confidentiality standards when required by Part 2, state laws, and/or licensing authorities. Mental health centers handle information that, if improperly disclosed, can cause serious harm to patients. For this reason, most states have enacted laws or have licensing requirements that have more stringent confidentiality standards than HIPAA. In some cases, state confidentiality standards are more stringent than those required for SUD patient records by 42 CFR Part 2. It may also be the case that some state laws are conditional on the type of mental health service being provided (i.e., apply only to online MAT providers) or the type of information being protected (i.e., minors’ mental health information). Conditions may also apply depending on who patient information is being disclosed to, the purpose of the disclosure, and specific risk factors. Because of the range of state laws,...



