HIPAA Violation: Penalties, Examples & How to Avoid Them

HIPAA violation penalties range from $100 to $1.9M per violation. Learn what counts as a violation, real examples, and how to stay compliant.

HIPAA Violation: What It Is, What It Costs, and How to Stay Safe

A HIPAA violation happens when a covered entity or business associate fails to comply with any provision of the Health Insurance Portability and Accountability Act of 1996. That sounds broad — because it is. Violations range from a nurse glancing at the wrong patient's file to a hospital leaving 3 million records exposed in a data breach. The consequences? They can be devastating.

If you work in healthcare, you've probably sat through HIPAA training. But knowing what a violation actually looks like in practice — and what the government does about it — is a different thing entirely. Let's break it down clearly.

What Makes Something a HIPAA Violation?

HIPAA protects Protected Health Information (PHI) — any data that could identify a patient and relates to their health condition, treatment, or payment. PHI includes names, addresses, Social Security numbers, medical record numbers, photos, and even appointment dates when combined with other identifiers.

A violation occurs when PHI is used, disclosed, accessed, or mishandled in a way that HIPAA doesn't permit. The four main rules under HIPAA are:

  • The Privacy Rule — controls who can access and share PHI
  • The Security Rule — requires safeguards for electronic PHI (ePHI)
  • The Breach Notification Rule — mandates reporting when PHI is compromised
  • The Omnibus Rule — extends obligations to business associates

Violations can be intentional (selling patient data, snooping on a celebrity's records) or unintentional (emailing the wrong patient, losing an unencrypted laptop). Both are enforceable — though the penalties differ significantly based on intent and harm caused.

The Four Tiers of HIPAA Violation Penalties

The Office for Civil Rights (OCR) at the U.S. Department of Health and Human Services enforces HIPAA. Civil penalties follow a tiered structure based on culpability:

Tier 1 — No Knowledge: The covered entity genuinely didn't know and couldn't have known about the violation. Minimum fine: $100 per violation, capped at $25,000 per year for identical violations.

Tier 2 — Reasonable Cause: The entity knew about the issue (or should have) but didn't act with willful neglect. Fines start at $1,000, capped at $100,000 annually.

Tier 3 — Willful Neglect, Corrected: The entity knew there was a problem and ignored it — but fixed it once caught. Fines start at $10,000, capped at $250,000 per year.

Tier 4 — Willful Neglect, Not Corrected: Knowing non-compliance with no attempt to fix it. Minimum $50,000 per violation, annual cap of $1.9 million. This is the worst-case scenario, and the OCR doesn't hesitate to impose it.

Note: these caps reset each calendar year. An entity with repeated violations can face fines year after year. And criminal penalties — handled by the DOJ — add jail time on top for the most egregious cases.

Common HIPAA Violations (With Real Examples)

Violations don't always look like Hollywood data heists. Most happen through mundane mistakes. Here are the most common types:

Unauthorized Access to PHI

An employee pulls up a coworker's, family member's, or celebrity's medical record out of curiosity. It's tempting — and it's a federal violation. Hospitals have fired and reported dozens of employees for exactly this. The OCR has investigated cases where staff accessed records of their own relatives without authorization.

Improper Disposal of PHI

Tossing patient files in a regular trash bin, leaving sign-in sheets visible to other patients, or discarding old hard drives without wiping them — all violations. In 2019, a dermatology practice was fined $150,000 partly because it disposed of medical records in a dumpster accessible to the public.

Failure to Encrypt ePHI

Encryption isn't technically mandatory under the Security Rule, but failing to encrypt and then losing a device is treated as a violation. Stolen laptops and USB drives have generated some of the largest HIPAA fines on record. A healthcare system paid $5.5 million after an unencrypted laptop was stolen from a car — containing records for 1.7 million patients.

Missing or Inadequate Business Associate Agreements

If you share PHI with a vendor (a billing company, a cloud storage provider, an IT contractor), you need a signed Business Associate Agreement (BAA). No BAA = violation. Many smaller practices get caught by this — they outsource work without realizing a BAA is legally required.

Delayed or Missing Breach Notifications

When a breach occurs, covered entities must notify affected individuals within 60 days, notify the OCR, and — for breaches affecting 500+ people in a state — notify major media outlets. Missing these deadlines, even if the breach itself wasn't the entity's fault, is a separate violation.

Social Media and HIPAA

This one catches healthcare workers off guard. Posting a photo of a patient (even without their name), discussing a case on Facebook, or responding to a negative review by revealing medical details — all HIPAA violations. The patient must give explicit written authorization before any PHI can appear publicly.

Who Investigates HIPAA Violations?

Investigations start in two ways: complaints filed by patients, employees, or business associates; and breach reports that covered entities file themselves. The OCR receives thousands of complaints each year. Most are resolved through voluntary compliance or technical assistance, but a portion result in formal investigations and financial settlements.

State attorneys general can also bring HIPAA enforcement actions, adding another layer of exposure — particularly in states with strict health privacy laws of their own.

The DOJ handles criminal referrals. Criminal violations carry penalties up to $250,000 and 10 years in prison for the most serious cases involving intentional misuse of PHI for financial gain.

HIPAA Violation vs. Breach: What's the Difference?

People use these terms interchangeably, but they're not the same thing. A breach is a specific type of violation — an impermissible use or disclosure of unsecured PHI that compromises its security or privacy. Not every violation is a breach, and not every breach triggers the full notification requirements.

HIPAA includes a harm threshold: if an entity can demonstrate through a risk assessment that the disclosure posed a low probability of compromising PHI (based on who accessed it, what was accessed, whether it was actually acquired), the incident may not qualify as a reportable breach. But the burden of proof falls on the covered entity.

What Happens When You Report a Violation?

Employees who witness HIPAA violations are encouraged — and sometimes legally protected — to report them. HIPAA includes anti-retaliation provisions: covered entities cannot fire, demote, or intimidate anyone for filing a good-faith complaint with the OCR or participating in an investigation.

Internal reporting (to a Privacy Officer or Compliance Department) is usually the first step. If internal reporting doesn't resolve the issue, external reporting to the OCR is always an option. Complaints can be filed online at hhs.gov/ocr within 180 days of discovering the violation.

How to Avoid HIPAA Violations

Most violations are preventable. The organizations that stay out of trouble share a few common practices:

  • Regular risk assessments — HIPAA requires them, but many skip them. A proper risk assessment identifies where ePHI lives and what vulnerabilities exist.
  • Annual HIPAA training — Staff should understand the rules, the consequences, and how to handle common edge cases. Training on HIPAA compliance should be refreshed yearly and documented.
  • Strong access controls — Minimum necessary access is a core Privacy Rule principle. Staff should only see the PHI they need to do their jobs. Audit logs should track who accesses what.
  • Encryption — Encrypt devices, encrypt email when sending PHI, encrypt backups. It won't eliminate all risk, but it dramatically reduces breach exposure.
  • Vendor management — Every third party that touches PHI needs a signed BAA. Review those agreements regularly, especially when changing vendors.
  • Incident response plans — Know exactly what to do when something goes wrong. Who gets notified? Who conducts the risk assessment? What's the 60-day clock? Having a plan prevents the panicked response that turns a minor incident into a major fine.

Understanding HIPAA regulations isn't just a compliance checkbox — it's how you protect patients and protect yourself. The organizations that treat HIPAA as a living practice, rather than a one-time training hurdle, are the ones that avoid the headlines.

The Biggest HIPAA Fines in History

Looking at major enforcement actions tells you a lot about where the real risks are. Here's what the data shows:

In 2016, Advocate Health Care settled for $5.55 million — still one of the largest in history — after multiple laptop thefts exposed nearly 4 million patient records. The investigation found they hadn't conducted an accurate risk analysis, had inadequate physical safeguards for devices, and lacked policies for off-site devices containing ePHI.

Premera Blue Cross paid $6.85 million in 2020 after a cyberattack exposed 10.4 million records. The OCR found Premera had failed to conduct thorough risk analyses and hadn't implemented security updates — vulnerabilities that had been identified in an audit two years before the breach.

Anthem Inc. holds the record with a $16 million settlement in 2018 after a cyberattack exposed nearly 79 million records. The breach was traced to spear-phishing emails; the subsequent investigation revealed that Anthem had failed to conduct enterprise-wide risk analysis and hadn't identified and responded to the threat in a timely way.

The pattern is consistent: large fines don't usually follow a single bad moment. They follow years of inadequate risk management, missed warning signs, and policies that existed on paper but not in practice. The HIPAA security rule violations in these cases were often predictable — and preventable.

HIPAA Violations in Small Practices

Small practices often assume the OCR focuses on hospitals and insurers. That's not true. The OCR has levied significant fines on individual physicians, small clinics, and solo practitioners. A dermatology practice in Massachusetts paid $150,000. A dental practice paid $10,000. A small physician's practice paid $30,000 for a single Instagram post that contained patient information.

Size doesn't insulate you. If anything, smaller organizations tend to have fewer resources dedicated to compliance — which means violations are more likely, not less. The hipaa training requirements apply to covered entities of every size.

If you're a small practice owner, the minimum steps are clear: conduct a risk assessment, document your policies, train your staff annually, and get BAAs in place with every vendor that handles PHI. That foundation won't prevent every problem, but it will dramatically reduce both your exposure and your penalty exposure if something does go wrong.

Preparing for the HIPAA Exam

If you're studying for HIPAA certification or a healthcare compliance exam, understanding violations is one of the highest-tested areas. Expect questions on the four tiers of penalties, the 60-day breach notification window, what constitutes PHI, and the minimum necessary standard.

Reviewing the HIPAA compliance framework in full — not just the violation examples — will give you the context to answer scenario-based questions correctly. The exam often presents a situation and asks whether it's a violation, what type it is, and what the covered entity's obligations are.

Working through practice questions is the best way to test whether you actually understand the rules versus just remembering them. HIPAA questions tend to test application, not memorization — so drilling on real scenarios matters more than reviewing bullet-point summaries.

Focus especially on:

  • The distinction between willful neglect and reasonable cause (it matters enormously for penalties)
  • The breach risk assessment four-factor test
  • When the 60-day clock starts (date of discovery, not date of breach)
  • What "minimum necessary" means in practice
  • Business Associate Agreement requirements and when they apply

If you're taking the HIPAA certification training, make sure you can walk through a breach scenario end-to-end: identify the violation type, determine whether it's a reportable breach, apply the penalty tier, and describe what the covered entity must do next. That end-to-end thinking is what separates a passing score from a failing one.

About the Author

James R. HargroveJD, LLM

Attorney & Bar Exam Preparation Specialist

Yale Law School

James R. Hargrove is a practicing attorney and legal educator with a Juris Doctor from Yale Law School and an LLM in Constitutional Law. With over a decade of experience coaching bar exam candidates across multiple jurisdictions, he specializes in MBE strategy, state-specific essay preparation, and multistate performance test techniques.