HIPAA - Health Insurance Portability and Accountability Act Practice Test

โ–ถ

HIPAA breach news has gone from a quiet trade-press topic to front-page reading. After Change Healthcare's 2024 ransomware attack hit more than 100 million Americans, almost everyone in healthcare started watching the OCR breach portal the way traders watch the stock ticker. If you're a compliance officer, a CIO, an IT security lead, or just a curious patient who got a breach letter in the mail, this guide pulls together what you actually need to know.

You'll learn where to track HIPAA breaches in real time, what counts as a reportable incident, the biggest settlements of 2024-2026, what OCR looks for during an investigation, and how the largest healthcare organizations have responded after disaster. We'll also walk through the reporting clock, the penalty tiers, and a practical response checklist your team can borrow tomorrow.

The volume of breach news is staggering. In a typical week in 2026, the OCR portal logs five to ten new incidents affecting more than 500 individuals each, and many weeks see at least one incident affecting more than a million people. Add in the smaller-scale incidents that never appear publicly and the actual rate of reportable HIPAA events is closer to dozens per day across the United States.

Healthcare data is more valuable on criminal markets than credit cards because it doesn't expire, can't be reissued, and contains everything an attacker needs for sustained identity theft. A single full medical record commonly trades for 20 to 50 times the price of a stolen card number on dark-web markets. That economic incentive drives the persistent attacker interest, which in turn drives the constant flow of breach news. Knowing the players, their tactics, and their typical targets is now table-stakes for anyone running a healthcare security program.

Healthcare is now the most-attacked industry on the planet. In 2024, the Change Healthcare ransomware incident alone exposed records belonging to roughly a third of the U.S. population and triggered a wave of regulatory scrutiny. Reading HIPAA breach news isn't gossip, it's threat intelligence. Every entry on the OCR Wall of Shame is a free post-mortem you can use to harden your own program before you become next week's headline. Pair this reading with strong HIPAA compliance habits and the breach news cycle becomes a planning tool rather than a panic button.

So what is a HIPAA breach, technically? Under the Breach Notification Rule, it's an unauthorized acquisition, access, use, or disclosure of Protected Health Information that compromises the security or privacy of that PHI. The format doesn't matter. Electronic records, paper charts in a dumpster, a verbal disclosure overheard in an elevator, a faxed lab result sent to the wrong number, a stolen laptop, a misconfigured cloud bucket, all of it can qualify.

The presumption is that any impermissible use or disclosure is a breach unless you can demonstrate, through a documented four-factor risk assessment, that there's a low probability the PHI was compromised. Those four factors include the nature and extent of the PHI involved, the unauthorized person who accessed or received it, whether the PHI was actually acquired or viewed, and the extent to which the risk has been mitigated. Document each factor in writing. Hand-waving doesn't survive an OCR investigation.

Most reportable incidents today involve electronic PHI, but don't sleep on the analog stuff. OCR has fined hospitals for paper records dumped in shopping center trash, and one of the easiest ways to land on the Wall of Shame is a single misplaced billing letter that triggers a wider mailing audit. Verbal disclosures count too. A receptionist confirming an appointment by reading the patient's full diagnosis aloud in a crowded waiting room can become a complaint if anyone overhears and reports it. Train staff to handle minimum necessary information in every channel, not just the digital ones.

If you want the formal definition and the underlying safeguards, the HIPAA Security Rule is the document you'll keep reaching for. Cross-reference it with the Privacy Rule and the Breach Notification Rule together. The three rules interlock, and OCR investigators read them as a single regulatory package. A weakness in one almost always reveals weaknesses in the others, which is why a single complaint can cascade into a full-scope compliance review covering every safeguard you have in place.

Where to Track HIPAA Breach News

๐Ÿ“‹ Official Sources

Your first stop is the OCR Breach Portal, often called the Wall of Shame, at hhs.gov/ocr. It lists every reported breach affecting 500 or more individuals and lets you filter by year, state, entity type, and breach type. Pair it with HHS press releases, which announce major settlements and corrective action plans, and the OCR email alerts subscription for guidance updates. The Department of Justice newsroom catches the criminal cases, including insider snooping and EMR theft prosecutions.

๐Ÿ“‹ Trade Press

HIPAA Journal posts a weekly breach roundup that's become the de facto industry summary. HealthcareInfoSecurity.com covers technical details, breach causes, and vendor implications. DataBreaches.net publishes early on incidents that haven't yet hit the OCR portal. Becker's Hospital Review and Modern Healthcare cover the business and operational fallout. Together these sources will surface most major incidents within 48 hours of disclosure, often before the affected entity finishes its own internal communication.

๐Ÿ“‹ Real-Time & Community

For real-time tracking, follow security researchers on Twitter/X, subscribe to the 405(d) Task Group bulletins, and join HIMSS Cybersecurity Center forums. CISA.gov posts healthcare-sector advisories and ransomware indicators of compromise. Many ransomware groups also post victim names on dark-web leak sites, which security firms aggregate into public dashboards. Combine these feeds with OCR HIPAA enforcement news to get the full picture from initial leak to final settlement.

The OCR Wall of Shame deserves its own deep dive. Created by the HITECH Act in 2009, it's the public-facing slice of the breach reporting system. Any breach affecting 500 or more individuals appears there within weeks of being reported. The portal lists the covered entity's name, the state, the type of entity, the type of breach, the location of the breached information, the number of individuals affected, and the date the breach was reported. It does not list the names of patients.

Two things surprise people. First, there's no expiration. Once your organization's name lands on the portal, it stays in the publicly searchable archive permanently, even if the breach turns out to be smaller than first reported, even if the entity completes a corrective action plan, and even if you settle for millions. The Wall of Shame is the closest thing healthcare has to a permanent public ledger of compliance failures.

Second, smaller breaches still get reported, just not publicly listed. Incidents under 500 affected individuals must be submitted to HHS within 60 days after the end of the calendar year in which they were discovered. They're tracked, audited, and can still trigger investigations. OCR routinely uses the small-breach log to spot patterns. If your organization reports a steady stream of small incidents that share a root cause, expect a knock on the door asking why the underlying control gap hasn't been fixed.

How the OCR Wall of Shame Works

๐Ÿ”ด Who Lists
  • Threshold: Breaches affecting 500 or more individuals
  • Maintained by: HHS Office for Civil Rights
  • Required by: HITECH Act of 2009
๐ŸŸ  What It Shows
  • Entity name: Public, searchable
  • Breach type: Hacking, theft, loss, unauthorized access, improper disposal
  • Number affected: Public count, not patient names
๐ŸŸก How Long It Stays
  • Active list: Roughly 24 months on the front view
  • Archive: Permanent, fully searchable
  • Removal: Not available, even after settlement
๐ŸŸข Smaller Breaches
  • Threshold: Fewer than 500 individuals
  • Reporting: Within 60 days of calendar year end
  • Public listing: No, but logged with OCR

What actually counts as a breach? You'd be amazed how often a perfectly good compliance program loses sleep over the wrong things. The list below covers the everyday incidents that show up on the Wall of Shame. Notice how mundane most of them are. It's rarely the Hollywood-style hacker. It's a misconfigured server, a curious nurse, a missing tablet, or a hard drive that left the building without a wipe certificate.

Common Incidents That Count as HIPAA Breaches

Lost or stolen unencrypted laptop containing PHI
Email containing PHI sent to the wrong patient
Hacker accessing the EHR system through stolen credentials
Ransomware attack that encrypts hospital servers
Improper disposal of paper records in an open dumpster
Insider snooping, such as an employee reading a celebrity's chart
Mailing one patient's bill or test result to another patient
Verbal disclosure of PHI in a public area within earshot of others
Stolen smartphone or tablet with PHI and no remote wipe
Photo of a patient or chart shared on social media
Hard drive sent for disposal without certified erasure
Cloud storage bucket misconfigured to be publicly accessible

Now let's look at the breaches that defined the modern era. These aren't just trivia. They're the case studies regulators reference when they write guidance, and they shape every audit question OCR asks. The list runs from Anthem in 2015, which held the title of largest healthcare breach for nearly a decade, to Change Healthcare in 2024, which obliterated that record and reshaped the entire conversation about vendor risk in healthcare. Every name in the table below has had its incident dissected in court filings, regulatory consent orders, and industry analyses you can use as free training material.

Largest HIPAA Breaches in History

๐Ÿ”ด Change Healthcare 2024
  • Affected: 100 million plus
  • Cause: Ransomware via stolen credentials, no MFA on Citrix
  • Impact: $3.7B cleanup, ongoing OCR investigation
๐ŸŸ  Anthem 2015
  • Affected: 78.8 million
  • Cause: Phishing leading to network compromise
  • Settlement: $115M class action, $16M to OCR
๐ŸŸก AMCA 2019
  • Affected: About 26 million across labs
  • Cause: Compromised payment portal
  • Impact: Bankruptcy, downstream lab notifications
๐ŸŸข Kaiser Permanente 2024
  • Affected: 13.4 million
  • Cause: Third-party tracking pixels exposed PHI
  • Lesson: Audit every web tracker on patient pages
๐Ÿ”ต HCA Healthcare 2023
  • Affected: 11 million
  • Cause: Unsecured external storage location
  • Lesson: Inventory every cloud asset, including backups
๐ŸŸฃ Premera Blue Cross 2015
  • Affected: 11 million
  • Cause: Unencrypted PHI on workstations after intrusion
  • Settlement: $74M class action

Settlements in 2024 through 2026 tell their own story. OCR has been clearing a long backlog while simultaneously responding to fresh ransomware cases, and the dollar amounts have grown. The agency has also leaned into specific themes: patient right of access, ransomware response failures, and the absence of a current Security Risk Analysis. If you've never run a formal SRA, the recent settlement docket is a clear warning that this single failure can multiply your exposure across every other category. Get one done this quarter, even if it's a lightweight version. Documented imperfection beats undocumented diligence every time.

Recent Major HIPAA Settlements 2024-2026

๐Ÿ“‹ Headline Cases

Change Healthcare's parent UnitedHealth has spent roughly $3.7 billion on cleanup, with the OCR investigation still active. Solara Medical Supplies settled at $3 million. NewYork-Presbyterian settled at $1.3 million for tracking-pixel exposure. L.A. Care Health Plan settled at $1.3 million in 2023 for security and privacy failures. Banner Health paid $1.25 million for security control failures. These are headline numbers, but they don't include class-action settlements, which often dwarf the OCR figure.

๐Ÿ“‹ Mid-Tier Penalties

Iowa Health System paid $475,000. Multiple smaller covered entities paid in the $30,000 to $250,000 range, often for patient right of access violations where a patient simply couldn't get a copy of their own records within 30 days. The right of access initiative remains active in 2026. If you ignore patient record requests, expect a complaint and a fine that's small in dollars but expensive in reputation. Review your HIPAA violation penalties exposure annually.

๐Ÿ“‹ Trends OCR Cares About

Three patterns dominate recent enforcement. First, ransomware response failures, particularly missing or out-of-date Security Risk Analyses. Second, third-party vendor breaches where the covered entity didn't have a current Business Associate Agreement or never validated the vendor's controls. Third, web tracking pixels that quietly leaked PHI to ad networks. Expect OCR to continue pursuing all three categories aggressively through 2027 with larger average settlement sizes.

The reporting clock is something every covered entity gets wrong at least once. Here's the short version. If a breach affects 500 or more individuals, you have 60 calendar days from discovery to notify the affected individuals, HHS, and prominent media outlets in any state where 500 or more residents are affected. If a breach affects fewer than 500 individuals, you must still notify those individuals within 60 days, but you can wait until 60 days after the end of the calendar year to log the breach with HHS through the smaller-incident submission tool.

Notification letters must explain what happened, what types of PHI were involved, what the individual should do to protect themselves, what your organization is doing to investigate and prevent recurrence, and how to contact you with questions. Vague language doesn't protect you. OCR has fined entities for sending notice letters that downplayed the scope or omitted the type of PHI involved. Be precise, be helpful, and document your decision-making at every step. Keep the call center scripts and FAQ language version-controlled so investigators can see exactly what your organization told the public.

Typical HIPAA Breach Notification Timeline

alert

Breach occurs, often weeks before discovery

search

Discovery, initial triage, incident response activation

shield

Forensic investigation, scope determination, legal engagement

mail

Notification decisions, letter drafting, call center setup

clock

Notification deadline to individuals and HHS for 500+ breaches

globe

Public posting on OCR breach portal, media coverage peaks

gavel

Class action lawsuits typically filed, plaintiff firms organize

document

OCR investigation, possible settlement and corrective action plan

What Causes HIPAA Breaches in 2024-2026

65-70%
Hacking and IT incidents
15-20%
Unauthorized access or disclosure
5-10%
Theft of laptops or devices
3-5%
Loss of paper or portable media
1-3%
Improper disposal incidents
2x
Ransomware growth 2022 to 2024
60%+
Attacks exploiting missing MFA
100M+
Records exposed in Change Healthcare alone

What should you do if you receive a breach notification letter? First, read it. The letter must explain what happened, what types of PHI were involved, what the entity is doing, and what you should do. Save it as a PDF and write down the case reference number. Then accept the credit monitoring and identity theft protection your provider offers. Place a fraud alert with one of the three credit bureaus, which automatically notifies the other two.

Consider a free credit freeze, which prevents new accounts from being opened in your name without your explicit lift. Watch your inbox and phone for phishing attempts. Attackers often piggyback on breach news to impersonate the affected company, asking you to confirm your Social Security number or click links to enroll in fake monitoring services. Real notifications never demand sensitive information by phone or email and never charge you for the protection they offer.

Beyond the financial steps, review your insurance Explanation of Benefits statements for unfamiliar services. Medical identity theft is harder to detect than financial fraud and can take years to unwind because it pollutes your medical record itself, not just your billing history. If you suspect a HIPAA violation by the breached entity, you can file a complaint at hhs.gov/ocr/complaints. To understand your rights, the basics covered in what is HIPAA will help you decide which agency to contact for which problem.

What to Do If You're Affected

๐Ÿ“‹ Immediate Steps

Open the notification letter and save the reference number. Note the deadline to enroll in any free credit monitoring or identity protection service. Most offers expire 60 to 90 days after the letter is sent. Place a fraud alert by contacting Equifax, Experian, or TransUnion, then check that the alert appears on your file. Strong, unique passwords on your patient portal and your email matter even more after a breach, because attackers often use leaked data to attempt account takeovers.

๐Ÿ“‹ Longer-Term Protection

Place a free credit freeze with all three bureaus. It blocks new credit accounts unless you temporarily lift the freeze. Review your insurance EOBs every month for medical services you didn't receive. Request a copy of your medical record from your providers and verify it's accurate. Use multi-factor authentication on every account you can. Watch for tax-related identity theft as well, since SSNs leaked in healthcare breaches are often used to file fraudulent returns.

๐Ÿ“‹ Reporting & Complaints

If you spot identity theft, file a report at IdentityTheft.gov. The FTC will generate a recovery plan tailored to your situation. To report a HIPAA concern, file an OCR complaint at hhs.gov/ocr/complaints within 180 days of when you knew or should have known of the violation. State attorneys general also enforce HIPAA under the HITECH Act, so a parallel state complaint can be useful, particularly in California, New York, and Texas where AG offices are active in healthcare cases.

Compliance officers reading this are probably already running a mental gap analysis. Good. The recurring failures behind major breaches are remarkably consistent. There's almost always a missing or stale Security Risk Analysis. Access controls are too broad, with employees retaining permissions long after role changes. Encryption is patchy, especially on backups, removable media, and developer environments. Multi-factor authentication isn't enforced for administrators, vendors, or remote access. Training is annual rather than continuous.

Vendor management is paperwork-heavy but verification-light. The Business Associate Agreement gets signed once and never revisited. No one actually checks that the vendor still encrypts at rest, still has MFA on admin accounts, or still maintains the SOC 2 certification they claimed at procurement.

The Change Healthcare incident exposed exactly this gap on an industry scale, and OCR's response has been to push covered entities toward continuous vendor monitoring rather than annual questionnaire theatre. Build a quarterly review cadence with your top ten BAs and document each touchpoint. Ask for fresh evidence, not promises. Penetration test summaries, current SOC reports, and the names of the security leaders who own each control are far more useful than a stamped attestation letter that someone signed two years ago.

Free HIPAA Compliance Questions and Answers

Pros and Cons of the Public OCR Breach Portal

Pros

  • Forces transparency and accountability across the industry
  • Provides free threat intelligence for compliance teams
  • Helps patients understand which entities have been breached
  • Drives investment in security at executive level
  • Creates a permanent record useful for benchmarking
  • Supports researchers and policymakers with real data

Cons

  • No removal even after corrective action and settlement
  • Reputation damage often outlasts the security incident
  • Information disclosed is limited and can mislead casual readers
  • Smaller breaches under 500 are invisible to the public
  • Can encourage entities to delay or minimize reporting
  • Doesn't capture business associate breaches in detail

OCR Penalty Tiers (2026 Inflation-Adjusted)

๐Ÿ”ด Tier 1: No Knowledge
  • Per violation: $137 - $68,928
  • Annual cap: About $2.07M per category
  • Trigger: Entity didn't know and couldn't reasonably have known
๐ŸŸ  Tier 2: Reasonable Cause
  • Per violation: $1,379 - $68,928
  • Annual cap: About $2.07M per category
  • Trigger: Knew or should have known, but no willful neglect
๐ŸŸก Tier 3: Willful Neglect, Corrected
  • Per violation: $13,785 - $68,928
  • Annual cap: About $2.07M per category
  • Trigger: Willful neglect, corrected within 30 days
๐ŸŸข Tier 4: Willful Neglect, Not Corrected
  • Per violation: $68,928 - $2,067,813
  • Annual cap: About $2.07M per category
  • Trigger: Willful neglect, not corrected

How do healthcare organizations actually respond after a breach? Larger systems follow a fairly standard playbook. In the first 72 hours, they contain the incident, preserve evidence, and engage outside counsel along with their cyber insurer. Weeks one through four are dominated by forensic investigation and scope determination. Weeks four through eight are about preparing notifications, standing up a dedicated call center, and lining up credit monitoring vendors. After day 60, the focus shifts to OCR cooperation and class-action defense.

The smartest response teams treat the post-mortem as a separate project. They run a structured root cause analysis, document compensating controls implemented during incident response, and update their Security Risk Analysis to reflect the new reality. That documentation is what OCR will request first. If you can hand investigators a clear, contemporaneous record showing reasonable response and rapid remediation, you tilt the conversation from willful neglect toward reasonable cause, which can shave seven figures off a settlement.

Smaller covered entities and physician practices often struggle here because they don't have a dedicated security team or breach playbook. If that's you, make a deal with your cyber insurer in advance. Most carriers will give you a pre-negotiated panel of breach response vendors at preferred rates, including a forensic firm, a notification logistics provider, and outside counsel. Save those contact details where your office manager can find them at midnight on a holiday weekend, because that's exactly when the call usually comes.

Free HIPAA Medical Information Questions and Answers

What's trending in 2024 through 2026? Ransomware remains the top cause of large breaches and shows no sign of slowing. Third-party vendor breaches have become the dominant contagion vector, with the Change Healthcare model showing how a single business associate can take down operations for thousands of downstream covered entities. Tracking pixel cases continue to surface. Cyber insurance is harder to obtain and more expensive, with insurers demanding proof of MFA, EDR deployment, immutable backups, and tested incident response plans before issuing or renewing policies.

OCR's enforcement queue is also evolving. The agency is investing in technology to triage complaints faster, prioritizing right-of-access cases for quick resolution and routing major breaches into longer-cycle investigations. Expect more public corrective action plans, more named individuals in settlements, and more emphasis on ongoing reporting requirements for years after the initial incident.

State-level enforcement is picking up too. California, New York, Texas, and Massachusetts attorneys general have launched their own healthcare privacy investigations under HITECH authority and parallel state laws. Several states have passed sector-specific data privacy statutes that overlap with HIPAA but layer on faster notification timelines, broader definitions of personal information, and direct private rights of action.

The post-Change Healthcare era is one of structural pressure on the entire healthcare ecosystem from multiple regulators at once. Plan your compliance program for the most aggressive state in your footprint, not the federal floor, and you'll have less to retrofit when the next state law lands on your desk.

HIPAA Breach Response Checklist for Compliance Teams

Activate the documented incident response plan and assign a clear incident commander
Engage outside legal counsel and notify your cyber insurance carrier within 24 hours
Brief the executive team and board with a written situation report
Preserve forensic evidence: logs, images, memory captures, network flow data
Engage a qualified forensic firm to determine scope and entry vector
Identify the number of affected individuals and the categories of PHI involved
Decide on notification approach, including media notification thresholds
Draft notification letters with clear, specific language reviewed by counsel
Stand up a dedicated call center with trained staff and a knowledge base
Notify HHS within 60 days using the OCR breach reporting tool
Provide media notification when 500 or more residents of a state are affected
Document every decision, action, and remediation step for the OCR file
Implement remediation: patching, MFA, segmentation, monitoring, training
Update the Security Risk Analysis and policies to reflect lessons learned

Where should you spend your monitoring time? Subscribe to the OCR email alerts and check the breach portal weekly. Read the HIPAA Journal weekly newsletter end to end. Skim Becker's and Modern Healthcare for industry context. Set up Google Alerts for your top business associates so you hear about their incidents before they call you. Attend at least one HIPAA-focused conference per year, whether HIMSS, HCCA, or one of the regional events. The networking matters as much as the sessions because you'll learn how peers handled situations the public reporting never captures.

For free official resources, NIST Special Publication 800-66 is your detailed guide to implementing the HIPAA Security Rule. CISA.gov offers no-cost cybersecurity tools and assessments tailored to healthcare. The 405(d) Task Group, a public-private partnership, publishes the Health Industry Cybersecurity Practices document, which maps to the most common attack patterns and gives you implementation guidance for organizations of every size. None of this costs money, and all of it is more practical than the average paid framework.

The bottom line: HIPAA breach news is a steady reminder that healthcare data is under constant attack, and the cost of staying uninformed runs far higher than the cost of staying current. Build a weekly reading habit. Encrypt every device. Enforce MFA everywhere. Train staff like the breach is coming next week, and keep your incident response plan tested and ready.

Visit the OCR breach portal at least once a month, log what you see, and turn the headlines into action items for your own program. Pick one weakness from each story and fix the equivalent in your own environment within 30 days. Your future self, sitting across the table from an OCR investigator, will thank you.

HIPAA Breach News Questions and Answers

What is the OCR Wall of Shame?

It's the public-facing portal maintained by the HHS Office for Civil Rights that lists every reported HIPAA breach affecting 500 or more individuals. It's required by the HITECH Act of 2009. The portal is searchable by entity, year, type of breach, and state. Listings are permanent and can't be removed even after the entity completes a corrective action plan or pays a settlement.

How fast must a HIPAA breach be reported?

For breaches affecting 500 or more individuals, you have 60 calendar days from discovery to notify the affected individuals, HHS, and major media in any state where 500 or more residents are affected. For breaches affecting fewer than 500 individuals, you must still notify the individuals within 60 days, but you can submit the breach to HHS within 60 days after the end of the calendar year of discovery.

What was the largest HIPAA breach ever?

The 2024 Change Healthcare ransomware attack, which affected more than 100 million individuals and is now considered the largest healthcare data breach in U.S. history. Before that, Anthem's 2015 breach held the record at 78.8 million individuals. Both events triggered massive class-action settlements and OCR investigations that continue to influence enforcement priorities.

Do I need to report a breach if data was encrypted?

Generally no. If the PHI was encrypted using a method that meets the HHS guidance on rendering PHI unusable, unreadable, or indecipherable, the incident may not be a reportable breach. Encryption is considered a safe harbor under the Breach Notification Rule. That's why encryption of laptops, mobile devices, backups, and data in transit is one of the highest-leverage controls a covered entity can implement.

What happens if I don't report a HIPAA breach?

Failure to report is itself a separate violation that can dramatically increase penalties. OCR treats non-reporting as evidence of willful neglect, which moves you into the highest penalty tier with per-violation fines up to $2,067,813. State attorneys general can also pursue parallel actions. Plus, the breach almost always becomes public anyway through forensic firms, attackers themselves, or affected patients filing complaints.

How can I file a HIPAA complaint?

File a complaint at hhs.gov/ocr/complaints within 180 days of when you knew or should have known of the alleged violation. You can file online, by mail, or by fax. OCR investigates the complaint and may request documentation from the covered entity. You can also file a parallel complaint with your state attorney general, particularly in states with active healthcare privacy enforcement programs.

What's the average HIPAA breach settlement in 2026?

Recent OCR settlements average between $30,000 for smaller right-of-access cases and $15 million or more for major security failures. Class-action settlements are typically much larger, with the Anthem case settling for $115 million and several recent ransomware-related class actions exceeding $50 million. Total cost of a major breach, including remediation, legal fees, and reputational damage, often runs into the hundreds of millions.

Are tracking pixels really a HIPAA breach risk?

Yes. OCR issued specific guidance in 2022 and updated it in 2024 making clear that web tracking technologies on patient-facing pages can constitute impermissible disclosures of PHI when they share user activity with third parties without authorization. Multiple settlements have followed, including major hospital systems. If you operate a patient portal or scheduling site, audit every pixel, tag, and analytics tool right now.
HIPAA Privacy Rule Practice Test
โ–ถ Start Quiz