In February 2023, OCR settled with Banner Health for $1.25 million after a breach affecting nearly 3 million individuals exposed systemic failures in risk analysis and access controls. It was not a fringe case. Every year, OCR closes dozens of investigations that reveal the same pattern — a violation of HIPAA laws that could have been prevented with basic compliance infrastructure. If your organization handles protected health information (PHI), the question isn't whether you'll face scrutiny. It's whether you'll survive it.
What Actually Constitutes a Violation of HIPAA Laws
A violation of HIPAA laws occurs whenever a covered entity or business associate fails to comply with the standards set forth in 45 CFR Part 164 — the Privacy Rule, the Security Rule, or the Breach Notification Rule. That failure can be an act or an omission.
Common violations fall into predictable categories: impermissible disclosures of PHI, failure to conduct an adequate risk analysis, lack of a valid Business Associate Agreement, insufficient access controls, and failure to provide patients with a Notice of Privacy Practices. OCR's enforcement data consistently shows these same gaps appearing year after year.
What many organizations miss is that a violation doesn't require a breach. You can be found in violation of HIPAA laws simply because your policies are outdated, your workforce hasn't been trained, or you never completed a security risk analysis — even if no PHI was ever exposed.
The Four Penalty Tiers OCR Uses for HIPAA Violations
Under the HITECH Act's enforcement framework, OCR applies a tiered penalty structure based on the level of culpability:
- Tier 1: The covered entity did not know and, by exercising reasonable diligence, would not have known of the violation — $137 to $68,928 per violation.
- Tier 2: The violation was due to reasonable cause and not willful neglect — $1,379 to $68,928 per violation.
- Tier 3: The violation was due to willful neglect but was corrected within 30 days — $13,785 to $68,928 per violation.
- Tier 4: The violation was due to willful neglect and was not corrected — $68,928 per violation, with an annual cap of $2,067,813 per violation category.
These numbers, adjusted for inflation, are per violation — meaning a single systemic issue affecting thousands of records can compound into millions of dollars. OCR also has the authority to refer criminal cases to the Department of Justice, which can result in imprisonment for knowing misuse of PHI.
The Risk Analysis Failure That Drives Most Enforcement Actions
If there is one compliance gap OCR targets more than any other, it's the risk analysis requirement under 45 CFR §164.308(a)(1). In my work with covered entities, I've seen organizations confuse a vulnerability scan with a risk analysis, or complete one years ago and never update it.
OCR has made clear — through resolution agreements with entities like Premera Blue Cross ($6.85 million, 2020) and Athens Orthopedic Clinic ($1.5 million, 2020) — that a risk analysis must be comprehensive, ongoing, and documented. It must identify threats to the confidentiality, integrity, and availability of all ePHI your organization creates, receives, maintains, or transmits.
If your risk analysis hasn't been reviewed in the last 12 months, your organization is already at risk of a violation of HIPAA laws.
Impermissible Disclosures and the Minimum Necessary Standard
The minimum necessary standard under the Privacy Rule requires that your workforce limit PHI disclosures to only the information needed for a given purpose. Healthcare organizations consistently struggle with this — especially in environments where staff routinely access records they don't need for treatment, payment, or operations.
OCR investigated Memorial Hermann Health System and reached a $2.4 million settlement in 2017 after the organization disclosed a patient's PHI in a press release. Impermissible disclosures don't always make headlines, though. They happen every day when an employee accesses a coworker's medical record, when PHI is faxed to the wrong number, or when a business associate receives more information than their function requires.
Your policies must define role-based access, and your workforce must understand those boundaries.
Why Workforce Training Is a Non-Negotiable Compliance Requirement
Under 45 CFR §164.530(b), every member of your workforce must receive training on your HIPAA policies and procedures. Under the Security Rule at §164.308(a)(5), security awareness training is independently required. These are not suggestions — they are auditable obligations.
The majority of HIPAA violations I encounter trace back to untrained or undertrained staff. An employee who doesn't understand what constitutes PHI, or who hasn't been taught your organization's breach reporting procedures, is a compliance liability. OCR looks for documentation of training during every investigation.
Investing in HIPAA training and certification for your entire workforce is the single most effective step you can take to reduce violation risk. It creates a documented trail of compliance effort that OCR weighs heavily in enforcement decisions.
Business Associate Agreements: The Overlooked Violation
Every vendor, contractor, or service provider that handles PHI on your behalf must have a signed Business Associate Agreement (BAA) under 45 CFR §164.502(e). Operating without one is itself a violation of HIPAA laws — regardless of whether the business associate actually mishandles data.
In 2019, OCR settled with Medical Informatics Engineering for $100,000 in part because of deficiencies in how the organization managed business associate relationships. Your BAA must specify permissible uses and disclosures, require safeguards, mandate breach notification, and ensure the business associate's subcontractors are similarly bound.
Audit your vendor list at least annually. If any entity touches PHI without a current BAA on file, you have an open violation.
What to Do Before OCR Comes Knocking
OCR investigations are triggered by complaints (the most common source), breach reports for incidents affecting 500 or more individuals, and targeted compliance audits. You will rarely get advance warning.
The organizations that survive enforcement actions are those that can demonstrate good faith compliance efforts: a current risk analysis, documented workforce training records, updated policies, executed BAAs, and functioning technical safeguards. Corrective action plans imposed by OCR after a violation are expensive, intrusive, and last for years.
Building a defensible compliance program starts with understanding what the regulations actually require and ensuring every person in your organization meets that standard. HIPAA Certify's workforce compliance platform gives your organization the tools to train, document, and verify compliance across your entire team — so that when scrutiny arrives, you're ready.
A violation of HIPAA laws is never just a paperwork problem. It's a patient trust problem, a financial problem, and increasingly a criminal justice problem. Address the gaps now, while you still get to choose how.