OCR HIPAA Enforcement December 2026: Settlements, Penalties, and What Healthcare Organizations Must Know
OCR HIPAA enforcement December 2026: latest settlements, Right of Access penalties, ransomware fines, and compliance steps for covered entities and BAs.

OCR HIPAA enforcement December 2025 closed one of the most aggressive years on record for the Office for Civil Rights at the U.S. Department of Health and Human Services. Between January and December, OCR announced more than two dozen resolution agreements, civil money penalties, and corrective action plans, with settlement amounts ranging from $25,000 against small dental practices to over $4.75 million against large hospital systems. December alone brought four major settlements, three Right of Access cases, and a sweeping ransomware investigation that signaled how the agency will approach 2026 enforcement priorities.
The December enforcement wave matters because it confirms three trends that compliance officers, privacy officials, and security leaders have watched build all year. First, OCR continues to prioritize the Right of Access Initiative, now in its sixth year, with penalties focused on practices that fail to deliver records within 30 days. Second, ransomware and hacking investigations have replaced lost-laptop cases as the dominant breach category, accounting for nearly 80 percent of large breaches reported to the federal portal. Third, the Security Rule risk analysis requirement remains the most-cited deficiency in resolution agreements.
For healthcare organizations, business associates, and subcontractors, this update is more than a year-end summary. It is a roadmap to where civil money penalties are heading in 2026, what evidence OCR investigators are demanding during desk audits, and which administrative, physical, and technical safeguards under 45 CFR Part 164 carry the highest enforcement risk. Understanding the December 2025 cases gives you a preview of how the proposed HIPAA Security Rule revisions, which entered public comment earlier this year, will likely be enforced once finalized.
This article walks through every December 2025 OCR enforcement action with the original settlement dollar amount, the specific HIPAA provision violated, and the corrective action plan duration imposed on the covered entity. It also explains how to translate each lesson into immediate policy changes, training updates, and risk analysis improvements your organization can implement before the next audit cycle begins in early 2026.
You will also find practical guidance on how OCR investigators have shifted their evidence requests over the past 12 months, what documentation typically appears in a data request letter, and how settlement amounts are calculated using the four-tier penalty structure established by the HITECH Act. Each section includes references to public press releases issued by HHS, federal register notices, and the OCR enforcement portal so you can verify every figure and citation independently.
Whether you are a privacy officer at a 5,000-bed hospital system, the compliance lead for a regional clearinghouse, or a small-practice administrator who just received your first OCR data request, the December 2025 enforcement landscape provides clear lessons. Use this guide to benchmark your program against the standard OCR now expects, identify gaps before they trigger a complaint or breach investigation, and prepare your leadership team for the budget, staffing, and technology investments needed to meet HIPAA compliance standards through 2026 and beyond.
OCR HIPAA Enforcement December 2025 by the Numbers

December 2025 Major Settlement Categories
Three December cases involved providers who failed to deliver medical records within 30 days. Settlements ranged from $35,000 to $240,000, all paired with two-year corrective action plans requiring policy revisions, staff training, and quarterly compliance reports to OCR investigators.
A regional health system paid $4.75 million after a 2023 ransomware incident exposed PHI of 1.2 million patients. OCR cited inadequate risk analysis, missing audit controls, and failure to implement encryption on backup systems containing electronic protected health information.
December brought the first 2025 enforcement against a business associate vendor under the direct liability rule. The $1.5 million settlement involved a billing contractor whose unencrypted database was accessed by unauthorized parties for nearly nine months without detection.
A hospital paid $400,000 after employees accessed celebrity patient records without authorization. The case highlighted the need for role-based access controls, automated audit log monitoring, and disciplinary policies that meet the workforce sanctions requirement under the Privacy Rule.
A multi-state clinic chain settled for $90,000 over failures to provide the Notice of Privacy Practices and obtain acknowledgment of receipt. OCR required revised intake procedures, updated NPP templates, and ongoing monitoring across all 27 clinic locations.
The Right of Access Initiative remains the most active enforcement program at OCR, and the December 2025 cases continue the pattern established when the initiative launched in 2019. Under 45 CFR 164.524, covered entities must provide individuals access to their protected health information within 30 calendar days of a request, with one 30-day extension allowed if the requester is notified in writing. Failure to meet this timeline, charging excessive fees, or refusing to deliver records in the format requested has now generated more than 150 enforcement actions and over $9 million in cumulative penalties.
December 2025 brought three new Right of Access settlements that illustrate how the standard continues to evolve. The first involved a psychiatric practice that took 11 months to deliver records and only released them after OCR initiated a formal complaint investigation. The $240,000 settlement was unusually high for a small practice and reflects what OCR officials have called an aggravating factor analysis: when a covered entity ignores multiple patient requests and only responds after federal intervention, penalties scale accordingly.
The second December case involved a primary care group that charged a patient $1.50 per page for paper records and refused to deliver an electronic copy despite the requester providing a clear written request for PDF format. OCR found that the practice violated both the format requirement and the reasonable cost-based fee rule, which limits charges to labor, supplies, and postage. The $75,000 settlement included a two-year corrective action plan with mandatory training and quarterly reporting.
The third Right of Access case targeted a hospital that delivered records but redacted information the patient was entitled to receive, including therapy notes the patient had explicitly authorized for release to a new provider. OCR clarified in the resolution agreement that psychotherapy notes maintained separately may be withheld, but treatment notes integrated into the medical record cannot be redacted under Right of Access principles. The $35,000 penalty was modest, but the corrective action plan required the hospital to retrain 1,800 workforce members.
These three cases together show that OCR is no longer focused only on outright denials. Investigators now scrutinize delivery format, fee calculations, scope of records released, and how covered entities respond to patient appeals when initial requests are partially fulfilled. Compliance teams should audit their Right of Access procedures against each of these dimensions, not just the 30-day timeline.
For organizations that want to benchmark their procedures, OCR has published model policies and a Right of Access FAQ document that explains the agency's interpretation of every requirement in 45 CFR 164.524. Reviewing these materials and comparing them to your current intake workflow is one of the highest-value compliance activities you can undertake before 2026 audits begin. Most December settlement subjects could have avoided enforcement entirely with a 90-minute internal review.
Training is another consistent theme. Every December resolution agreement required workforce training on Right of Access requirements, with documented attendance, knowledge assessments, and refresher sessions at six-month intervals. If your last Right of Access training was more than 12 months ago, or if your training materials predate the 2024 OCR clarifications on third-party requests, you are operating at meaningful enforcement risk regardless of your historical compliance posture.
OCR HIPAA Enforcement December 2025 Settlement Details
The headline December 2025 enforcement action was a $4.75 million settlement with a regional health system following a 2023 ransomware attack that exposed PHI of 1.2 million patients. OCR's investigation found that the entity had not conducted an enterprise-wide risk analysis since 2019, lacked audit controls on critical systems, and stored backup data on unencrypted servers despite a documented internal recommendation to encrypt them three years earlier.
The corrective action plan requires three years of OCR monitoring, an independent risk analysis within 180 days, encryption of all PHI at rest, and quarterly compliance reports. The case demonstrates that OCR now treats the Security Rule risk analysis as the foundational requirement: when it is missing or stale, nearly every other safeguard becomes harder to defend, and penalty calculations shift toward the higher tiers under the HITECH Act framework.

Is OCR Enforcement Becoming More Predictable in 2026?
- +Published resolution agreements provide clear templates of expected safeguards
- +Right of Access Initiative penalties follow consistent tier patterns
- +OCR issues annual guidance previewing enforcement priorities
- +Corrective action plans typically follow 2-3 year monitoring schedules
- +Settlement amounts correlate with breach size and aggravating factors
- +HHS press releases include specific HIPAA citations and remediation steps
- +Risk analysis findings now appear in nearly every Security Rule case
- −Civil money penalty caps were adjusted upward for inflation in 2025
- −Business associate direct liability expands the enforcement target pool
- −Ransomware investigations can take 24-36 months to resolve publicly
- −Smaller practices increasingly face penalties they cannot easily absorb
- −Proposed Security Rule revisions may add new mandatory controls
- −State AG enforcement under HITECH adds parallel risk to federal cases
- −Aggravating factor analysis remains subjective and inconsistent
OCR HIPAA Enforcement December 2025 Compliance Checklist
- ✓Complete an enterprise-wide Security Rule risk analysis within the last 12 months
- ✓Document remediation steps for every identified vulnerability with target dates
- ✓Verify Right of Access procedures meet the 30-day deadline and format requirements
- ✓Audit Business Associate Agreements for all vendors handling PHI in 2025
- ✓Implement automated audit log monitoring with monthly review reports
- ✓Encrypt all PHI at rest and in transit, including backup and archive systems
- ✓Refresh workforce training on insider access, sanctions, and reporting duties
- ✓Update Notice of Privacy Practices to reflect current OCR guidance
- ✓Test incident response and breach notification procedures with a tabletop exercise
- ✓Review fee calculations for record requests to confirm cost-based rule compliance
- ✓Maintain three years of OCR-ready documentation for every policy and procedure
- ✓Designate Privacy and Security Officials with documented authority and training
Risk Analysis Is the Single Most-Cited Deficiency
In every Security Rule resolution agreement published in December 2025, OCR cited inadequate or missing risk analysis under 45 CFR 164.308(a)(1)(ii)(A) as a primary violation. If you do only one thing before 2026, commission a documented, enterprise-wide risk analysis that maps every system containing PHI, identifies threats and vulnerabilities, and assigns remediation owners with target dates. This single document defends or destroys most enforcement defenses.
Understanding how OCR calculates penalties is essential for budgeting compliance investments and evaluating enforcement risk realistically. The HITECH Act of 2009 established a four-tier civil money penalty structure that ties dollar amounts to the level of culpability: did the entity not know about the violation, was there reasonable cause, was there willful neglect that was corrected, or was there willful neglect that went uncorrected? Each tier has a per-violation minimum, a per-violation maximum, and an annual cap that was adjusted upward for inflation in early 2025.
For 2025, Tier 1 (lack of knowledge) penalties range from $137 to $68,928 per violation, capped at $2,067,813 annually for identical violations. Tier 2 (reasonable cause) starts at $1,379 per violation, Tier 3 (willful neglect, corrected) begins at $13,785, and Tier 4 (willful neglect, uncorrected) starts at $68,928 with the same $2.07 million annual cap. These figures matter because OCR investigators assign tier classifications based on documented evidence of what the entity knew, when it acted, and whether remediation was prompt and good-faith.
The December 2025 ransomware settlement at $4.75 million exceeded the annual cap for a single violation category, which signals that OCR found violations of multiple distinct Security Rule provisions. When investigators identify deficiencies in risk analysis, audit controls, encryption, access management, and contingency planning as separate categories, each can carry its own annual cap, and aggregate penalties can climb into the eight-figure range for the largest breaches.
Beyond civil money penalties, OCR uses resolution agreements paired with corrective action plans far more often than imposing direct CMP findings. Resolution agreements are voluntary settlements where the covered entity pays a negotiated amount and agrees to a multi-year monitoring period. The advantage for OCR is faster resolution and detailed corrective measures. The advantage for the entity is avoiding a formal Notice of Proposed Determination and the public administrative hearing process.
Mitigating factors that reduce penalty tiers include prompt self-reporting of breaches, full cooperation with the investigation, demonstrated remediation efforts before OCR engagement, and a documented history of compliance program investments. Aggravating factors that increase penalties include ignoring patient or workforce complaints, failing to conduct required risk analyses, repeating prior violations, and providing incomplete responses to OCR data requests. The December 2025 cases demonstrate that both directions are alive in current enforcement decisions.
One under-discussed dimension of OCR enforcement is the state attorney general parallel jurisdiction created by HITECH Section 13410(e). State AGs can bring HIPAA enforcement actions on behalf of state residents, and several states including New York, Massachusetts, and California have done so in 2025. Covered entities should track state AG activity as carefully as federal OCR action because the financial exposure can be equally significant and the timelines often run in parallel with federal investigations.
Finally, settlement amounts published in press releases never capture the true cost of an OCR enforcement action. Legal fees during the investigation, internal personnel time, technology investments required by corrective action plans, breach notification costs, credit monitoring, reputational harm, and patient attrition routinely add multiples of the settlement figure to total cost. Industry benchmarks suggest the all-in cost of a major OCR enforcement action runs three to five times the published settlement amount, which dramatically changes the math on preventive compliance spending.

HHS published proposed Security Rule revisions in early 2025 that would mandate multi-factor authentication, network segmentation, vulnerability scanning, and encryption of all ePHI at rest and in transit. The comment period closed in spring 2025 and a final rule is expected in 2026. Begin implementation planning now, because the December 2025 enforcement cases already cite these controls as best practices.
Preparing for an OCR audit or investigation requires understanding what investigators actually request and how they evaluate the response. Every OCR engagement, whether triggered by a complaint, a breach report, or a compliance review, begins with a data request letter that specifies the documents and records the agency wants to review. These letters have become longer and more detailed over the past three years, and the December 2025 settlement subjects all received substantially expanded document demands compared to similar cases from 2022.
A typical 2025 data request letter asks for the entity's complete written HIPAA policies and procedures, the most recent risk analysis with supporting workpapers, evidence of risk management activities including remediation tracking, workforce training records with attendance logs, the Notice of Privacy Practices and acknowledgment forms, Business Associate Agreements for vendors involved in the incident, audit logs from relevant systems, incident response documentation, and breach notification records. Each category requires production within 30 days, and incomplete responses lead to follow-up requests that extend investigations.
The single most important preparation step is maintaining what compliance professionals call a perpetual audit binder. This is a curated repository of every document an OCR investigator might request, organized by HIPAA citation and updated quarterly. Organizations that produce a complete, well-organized response within the 30-day window consistently achieve better enforcement outcomes than those who scramble to assemble materials after the request arrives.
Equally important is the role of the Privacy Officer and Security Officer designated under 45 CFR 164.530 and 164.308. OCR will request evidence that these positions exist, that the individuals have documented authority, and that they have received appropriate training. In December 2025 settlements, OCR cited unclear privacy officer responsibilities or recently vacated security officer positions as aggravating factors in three of the four major resolution agreements.
Tabletop exercises simulating an OCR investigation help organizations identify gaps before they become enforcement problems. A typical exercise presents a realistic breach scenario, walks the team through breach assessment under 45 CFR 164.402, drafts the notification letter, simulates the data request response, and identifies which documents are missing or out of date. Running this exercise annually is one of the lowest-cost, highest-impact compliance activities available to most organizations. Consider engaging structured HIPAA compliance services if your internal team lacks experience with OCR investigations.
Document retention is the final dimension of audit readiness. HIPAA requires six-year retention of policies, procedures, training records, risk analyses, and other compliance documentation under 45 CFR 164.530(j). The December 2025 cases repeatedly cited inability to produce documentation from prior years as evidence of inadequate compliance programs. Cloud-based document management systems with audit trails, version control, and retention policies dramatically simplify this requirement compared to file shares or paper binders.
If your organization has not been audited recently, the absence of OCR engagement is not evidence of compliance success. The agency operates with limited investigator capacity and a complaint-driven enforcement model, meaning most non-compliance never reaches the resolution agreement stage. But the December 2025 settlements show clearly that when a complaint or breach does land on an investigator's desk, the standard for an adequate compliance program has risen substantially. Use the year-end enforcement summary as a benchmark, not a relief, and invest accordingly in 2026.
Practical implementation steps for your 2026 HIPAA program should begin with a 90-day sprint focused on the three highest-risk areas identified across December 2025 enforcement: risk analysis currency, Right of Access procedures, and audit log monitoring. These three areas accounted for every December resolution agreement either as a primary citation or as a contributing aggravating factor, and they are the areas where most organizations have the largest gap between policy and operational reality.
For risk analysis, schedule the engagement now and budget for an enterprise-wide review that includes every system, application, and vendor relationship touching PHI. Avoid the common mistake of treating risk analysis as a one-time event; OCR expects it to be an ongoing process with documented updates whenever new systems are deployed, vendors are added, or significant operational changes occur. Build risk analysis review into your quarterly compliance committee agenda and make the documentation visible to executive leadership.
For Right of Access, map your current intake workflow against the 30-day timeline and identify every point where delay can occur. Common failure points include records requests reaching the wrong department, manual handoffs without tracking, complex authentication procedures that frustrate requesters, and unclear fee schedules that lead to disputes. Each of these workflow issues has appeared in a 2025 settlement. Implementing a tracked, ticket-based system with automated escalation for approaching deadlines is now considered a baseline expectation.
For audit log monitoring, the December insider access case made clear that having logs is no longer sufficient: OCR expects evidence of regular review and action on anomalies. Configure your logging tools to generate exception reports for high-risk access patterns including VIP patient records, employee records, family member records, and access outside normal working hours. Document the review process, the reviewer, and any follow-up actions taken. Even a simple monthly review with documented findings is a substantial defense in an investigation.
Workforce training deserves a refresh that goes beyond annual compliance modules. December 2025 settlements required role-specific training on Right of Access, sanctions, audit controls, and breach reporting. Generic awareness training is insufficient; develop targeted modules for clinical staff, front desk personnel, billing teams, IT administrators, and executive leadership. Track completion, knowledge assessment scores, and remediation for missed deadlines. OCR will ask for this data in a data request letter.
Vendor management is the area where most organizations have the largest hidden exposure. Audit your complete list of business associates and subcontractors, confirm executed BAAs for every relationship, request current security questionnaires, verify cyber insurance coverage, and document due diligence reviews on an annual basis. The December 2025 business associate settlement made clear that covered entities will be evaluated on their vendor oversight practices, not just their direct controls.
Finally, build a 12-month compliance calendar that schedules risk analysis updates, training refreshes, policy reviews, tabletop exercises, vendor reviews, and audit log analysis at regular intervals. Treating compliance as a calendar-driven operational discipline rather than a reactive response to incidents is the single most reliable predictor of which organizations weather OCR investigations successfully. The December 2025 enforcement landscape is challenging, but every settlement subject could have avoided their outcome with the practices outlined above implemented consistently throughout the year.
HIPAA Questions and Answers
About the Author
Attorney & Bar Exam Preparation Specialist
Yale Law SchoolJames R. Hargrove is a practicing attorney and legal educator with a Juris Doctor from Yale Law School and an LLM in Constitutional Law. With over a decade of experience coaching bar exam candidates across multiple jurisdictions, he specializes in MBE strategy, state-specific essay preparation, and multistate performance test techniques.