25% off all training courses Offer ends May 29, 2026
View HIPAA Courses
25% off all training courses
View HIPAA Courses
Offer ends May 29, 2026

The HIPAA Journal is the leading provider of HIPAA training, news, regulatory updates, and independent compliance advice.

OCR: Don’t Neglect Physical Security Controls for ePHI

In its August 2024 cybersecurity newsletter, OCR reminded HIPAA-regulated entities that physical security measures such as facility access controls are essential for HIPAA Security Rule compliance, and should not be thought of as check-the-box items. Physical security measures are important and can prevent data breaches and disruption to patient care.

The HIPAA Security Rule operationalizes the protections of the HIPAA Privacy Rule and establishes a set of standards for safeguarding electronic forms of protected health information (ePHI). HIPAA Security Rule compliance involves ensuring the confidentiality, integrity, and availability of ePHI, identifying and protecting against reasonably anticipated threats, protecting against reasonably anticipated uses and disclosures of ePHI, and ensuring compliance by the workforce.

Over the past few years, the biggest threats to ePHI have come from cybercriminal groups and nation-state actors, who seek access to healthcare networks to steal ePHI and prevent access to ePHI and essential IT systems. While the majority of large data breaches are due to hacking and other IT incidents, a significant percentage of data breaches involve a lack of physical safeguards. The 2023 State of Data Security Report from Forrester Research found that 17% of data breaches are due to lost and stolen devices, including desktop computers, servers, laptops, backup devices, and flash drives, yet only 7% of security decision-makers were concerned about the loss or theft of these devices resulting in a security breach.

From January 1, 2020, to December 31, 2023, OCR received more than 50 reports from HIPAA-regulated entities about data breaches that affected 500 or more individuals which were due to lost and stolen devices containing ePHI. Those breaches involved the ePHI of more than 1,000,000 individuals. While these types of breaches occur in far fewer numbers than hacking incidents, they are among the easiest data breaches to prevent through the encryption of data on electronic devices and the implementation of physical security measures.

Get The FREE
HIPAA Compliance Checklist

Immediate Delivery of Checklist Link To Your Email Address

Please Enter Correct Email Address

Your Privacy Respected

HIPAA Journal Privacy Policy

Many of the theft incidents reported to OCR involved electronic equipment stored on-premises. The theft of desktop computers and portable electronic devices containing ePHI not only violates patient privacy, it can also impact care delivery. If devices containing patient records are stolen, clinicians may be prevented from accessing patients’ ePHI, and the theft of devices used for diagnostic or treatment services could impact care delivery. Thieves have been known to damage essential IT infrastructure in addition to stealing devices, such as equipment that is required for network connectivity, cooling, or powering devices which can further impact care delivery.

OCR explains in the newsletter that if appropriate physical security measures are not implemented, ePHI is not fully secured. In 2018, OCR announced that a $3.5 million settlement had been agreed with Fresenius Medical Care North America (FMC) to resolve violations of the HIPAA Security rule that contributed to five data breaches in 2012, all of which involved the loss or theft of devices from FMC facilities and employee vehicles. Three of those incidents involved electronic devices stolen in break-ins at FMC facilities. OCR found there was a failure to conduct a risk analysis, no mechanism for encrypting data, a failure to implement policies and procedures concerning the receipt and removal of devices from its facilities, a lack of policies to address security incidents, and a failure to implement policies and facilities to safeguard its facilities and equipment stored at those facilities.

The cybersecurity newsletter focuses on the Facility Access Control standard of the HIPAA Security Rule, which requires regulated entities to implement policies and procedures to limit physical access to electronic information systems and the facility or facilities in which they are housed while ensuring that properly authorized access is allowed. Implementing physical security measures to prevent or deter unauthorized access to facilities where ePHI can be accessed is vital for compliance with this Security Rule standard, although it is only one aspect.

There are four implementation specifications under this standard, including contingency operations, a facility security plan, access and control validation procedures, and maintenance records. These are addressable specifications which means that an assessment is required to determine if they are reasonable and appropriate, and if so, those measures should be implemented. If they are not reasonable and appropriate, the reason why must be documented, and other measures should be implemented that provide an equivalent level of protection.

OCR explains each implementation specification and offers advice for regulated entities on compliance with the Facility Access Control standard and warns that these measures should not be thought of as box-checking items on a HIPAA compliance checklist. “Facility security is a vital part of a regulated entity’s overall security plan to protect PHI and should be considered holistically with an entity’s overall cybersecurity plan and HIPAA compliance program,” explained OCR.

Author: Steve Alder is the editor-in-chief of The HIPAA Journal. Steve is responsible for editorial policy regarding the topics covered in The HIPAA Journal. He is a specialist on healthcare industry legal and regulatory affairs, and has 10 years of experience writing about HIPAA and other related legal topics. Steve has developed a deep understanding of regulatory issues surrounding the use of information technology in the healthcare industry and has written hundreds of articles on HIPAA-related topics. Steve shapes the editorial policy of The HIPAA Journal, ensuring its comprehensive coverage of critical topics. Steve Alder is considered an authority in the healthcare industry on HIPAA. The HIPAA Journal has evolved into the leading independent authority on HIPAA under Steve’s editorial leadership. Steve manages a team of writers and is responsible for the factual and legal accuracy of all content published on The HIPAA Journal. Steve holds a Bachelor’s of Science degree from the University of Liverpool. You can connect with Steve via LinkedIn or email via stevealder(at)hipaajournal.com

x

Is Your Organization HIPAA Compliant?

Find Out With Our Free HIPAA Compliance Checklist

Get Free Checklist