• Skip to main content
  • Skip to secondary menu
  • Skip to primary sidebar
  • Skip to secondary sidebar
  • Skip to footer

  • Opinion
  • Health IT
    • Behavioral Health
    • Care Coordination
    • EMR/EHR
    • Interoperability
    • Patient Engagement
    • Population Health Management
    • Revenue Cycle Management
    • Social Determinants of Health
  • Digital Health
    • AI
    • Blockchain
    • Precision Medicine
    • Telehealth
    • Wearables
  • Life Sciences
  • Investments
  • M&A
  • Value-based Care
    • Accountable Care (ACOs)
    • Medicare Advantage

Beyond the Breach: 10 Ways Healthcare Organizations Can Strengthen Patient Privacy

by Heather Arthur, Director of Privacy Strategy at Bluesight 09/19/2025 Leave a Comment

  • LinkedIn
  • Twitter
  • Facebook
  • Email
  • Print
Heather Arthur, Director of Privacy Strategy at Bluesight

Despite decades of investment in privacy programs, unauthorized access to patient records remains a persistent and costly challenge for healthcare organizations. 

Patient privacy breaches cost an average of $9.8 million per incident and include snooping on friends, coworkers and family members and looking into the charts of celebrities.

Clearly, the stakes are high, yet current efforts to discourage, detect, and address violations still leave room for improvement.

Here are 10 ways to strengthen patient privacy protections in your organization, enabling you to identify potential inappropriate accesses and strengthen your privacy operations. 

  1. Formalize Investigation Protocol

Develop and document standard workflows for investigations, including escalation paths for defined case categories and “look-back” periods to determine if there’s a pattern of inappropriate access

  1. Prioritize Education and Training

Carefully review patient privacy guidelines with employees as they onboard and at regular intervals afterward. Clearly communicate the importance of privacy and the consequences of unauthorized access to records. Use investigations and enforcement as further opportunities for workforce awareness – call it “education by enforcement.”

  1. Automate Reporting and Monitoring

As data volumes, staff activity, and patient visits increase across the board in healthcare, the average hospital generates 60 million auditable record-related events per month, but audits only 1,000 of them manually. Use audit logs and monitoring tools, which can be integrated with EHRs, to review all accesses to patient records and to identify any suspicious accesses. Incorporate machine learning to detect unusual behavior and compile suspicion scores. Automation can enhance the detection of potential suspicious accesses and reduce the routine review workload.

  1. Enforce Accountability

“I didn’t do it,” insists an employee caught improperly accessing records. Now what? One way to counter that claim is to hold employees accountable for all actions conducted under their User IDs. Ensure that your IT Device User Policy incorporates language that holds employees accountable for all accesses. Use audit trails, screenshots, and security camera footage, if necessary, to further verify who accessed patient information and when.

  1. Maintain Documentation and Transparency

Create and maintain detailed records of all investigations, interviews, and outcomes. Be transparent with employees and patients about investigatory processes and any breach notifications. Investigations serve as reminders to everyone to keep protected health information secure.

  1. Collaborate with HR

Some organizations include HR personnel in their investigative interviews. Others do not. Whichever process you select, ensure that you collaborate closely with HR leaders throughout the investigative and enforcement process. They are essential partners in the process of imposing corrective actions. 

  1. Prep Fully for Interviews

Gather as much evidence as possible about the potential inappropriate access before conducting the investigative interview with the suspected employee. Consider an interview template that starts with warmup questions about the user’s role and regular EHR use. Develop a rapport and ask the subject to “help you understand.” Maintain a respectful fact-finding demeanor in the conversation, but firmly challenge inconsistent statements with documented evidence. In most cases, it shouldn’t resemble an interrogation.

  1. Investigate Broadly

Be expansive in your investigation. Collaborate with IT and informatics teams to interpret audit data and replicate the user actions to establish certainty about what occurred, as needed. There are times when IT teams can also demonstrate a subject’s interest in particular conditions by analyzing ICD-10 codes. With the integration of HR data into monitoring software, this can help reveal connections between coworkers, past and present. Closed-circuit cameras can supply conclusive evidence of an inappropriate access, especially when the culprit denies all involvement. Social media, news articles, obituaries, and court dockets can reveal other connections between employee and patient that validate suspicions with circumstantial evidence. 

  1. Standardize sanctions

Treat all employees the same regardless of rank, though the severity and scope of particular breaches will vary.

  1. Adapt to Emerging Risks

Stay informed about emerging privacy challenges, such as the use of AI, new solutions, and new vendors, and adapt your policies and training accordingly.

Investigations into privacy breaches – whether through internal misuse, such as inappropriate access or through external threat actors – help ensure compliance, protect sensitive data, and maintain patient trust. These breaches can lead to serious legal, financial, and reputational consequences. Safeguarding privacy not only fulfills legal obligations, but also strengthens the patient-provider relationship. 


About Heather Arthur

Heather Arthur is the Director of Privacy Strategy at Bluesight, a company that solves supply chain inefficiencies and reduces risk by using AI and machine learning to surface actionable analytics for every step of the medication lifecycle.

  • LinkedIn
  • Twitter
  • Facebook
  • Email
  • Print

Tagged With: Cybersecurity

Tap Native

Get in-depth healthcare technology analysis and commentary delivered straight to your email weekly

Reader Interactions

Primary Sidebar

Subscribe to HIT Consultant

Latest insightful articles delivered straight to your inbox weekly.

Submit a Tip or Pitch

Featured Interview

Reach7 Diabetes Studios Founder Chun Yong on Reimagining Chronic Care with a Concierge Medical Model

Most-Read

Corti Joins Coalition for Health AI to Advance Responsible and Safe AI in Healthcare

Joint Commission and CHAI Release First-Ever Guidance for Responsible AI in Healthcare

71% of Hospitals Now Use Predictive AI, But a Digital Divide Remains

71% of Hospitals Now Use Predictive AI, But a Digital Divide Remains

PHTI Report: Virtual OUD Solutions are Effective, But Don't Substantially Reduce Costs

PHTI Report: Virtual OUD Solutions are Effective, But Don’t Substantially Reduce Costs

Bayer Exits Radiology AI Market, Discontinuing Calantic and Blackford

Bayer Exits Radiology AI Market, Discontinuing Calantic and Blackford

Oracle Health Launches AI Center of Excellence for Healthcare

Oracle Health Launches AI Center of Excellence for Healthcare

Particle Health Addresses Integration to Epic Data Despite Dispute

US Court Allows Particle’s Antitrust Claims Against Epic to Proceed

Epic Launches Comet: A New AI Platform to Predict Patient Health Journeys

Epic Launches Comet: A New AI Platform to Predict Patient Health Journeys

Preparing for the ‘Big Beautiful Bill’: How Digitization Can Streamline Medicaid Eligibility & Social Care Delivery

Preparing for the ‘Big Beautiful Bill’: How Digitization Can Streamline Medicaid Eligibility & Social Care Delivery

Evernorth Health Services Invests $3.5B in Shields Health Solutions

Evernorth Health Services Invests $3.5B in Shields Health Solutions

KLAS Report: Oracle Health Faces Customer Losses and Declining Satisfaction

KLAS Report: Oracle Health Faces Customer Losses and Declining Satisfaction

Secondary Sidebar

Footer

Company

  • About Us
  • Advertise with Us
  • Reprints and Permissions
  • Submit An Op-Ed
  • Contact
  • Subscribe

Editorial Coverage

  • Opinion
  • Health IT
    • Care Coordination
    • EMR/EHR
    • Interoperability
    • Population Health Management
    • Revenue Cycle Management
  • Digital Health
    • Artificial Intelligence
    • Blockchain Tech
    • Precision Medicine
    • Telehealth
    • Wearables
  • Startups
  • Value-Based Care
    • Accountable Care
    • Medicare Advantage

Connect

Subscribe to HIT Consultant Media

Latest insightful articles delivered straight to your inbox weekly

Copyright © 2025. HIT Consultant Media. All Rights Reserved. Privacy Policy |