.png)
In the past week, several significant developments have surfaced that affect HIPAA compliance, healthcare data privacy and cybersecurity. Multiple breaches tied to third‑party vendors, a new genetic privacy law and insider threats underscore the diversity of risks facing healthcare organizations. Meanwhile, recent reports remind compliance teams that ransomware and poor security hygiene remain persistent threats. This newsletter distills the key events and offers guidance to help compliance teams protect patient data and stay ahead of regulatory expectations.
Regulatory & Legal Updates
South Dakota’s Genetic Data Privacy Act
What happened: South Dakota enacted the Genetic Data Privacy Act on March 23, 2026. The law applies to direct‑to‑consumer genetic testing companies and requires them to publish clear privacy policies, obtain express consent before collecting or using genetic data and obtain separate consent before sharing data with third parties or using it for marketing. Consumers may revoke consent at any time, and companies must destroy biological samples within 30 days of a revocation. Violations can result in civil penalties of up to $5,000 per violation.
Why it matters: Although HIPAA regulates genetic information held by covered entities, many genetic testing firms operate outside the HIPAA framework. This state law fills a regulatory gap and highlights growing scrutiny of genetic data. Organizations that partner with genetic testing vendors should ensure those vendors can meet South Dakota’s consent and security requirements.
Recommended actions:
- Review contracts with direct‑to‑consumer genetic testing partners to confirm they provide clear privacy policies and obtain the required consents.
- Update internal policies to ensure individuals can easily revoke consent and request destruction of genetic samples.
- Monitor other states for similar legislation, as South Dakota’s law may signal a trend toward greater regulation of genetic data.
Oklahoma’s Comprehensive Privacy Law
What happened: Oklahoma’s governor signed SB 546 on March 20, 2026 (effective Jan 1, 2027). The law applies to companies processing personal data of at least 100,000 Oklahoma residents (or 25,000 residents when the company’s main business is selling data). It grants residents rights to access, correct, delete and obtain copies of their personal data and to opt out of data sales and targeted advertising. The law defines biometric data broadly, covering photographic, audio and video data used to identify individuals. Enforcement authority rests with the state attorney general, who may issue cure notices with a 30‑day window before penalties apply.
Why it matters: This is one of the first comprehensive privacy laws enacted by a Midwestern state. Its broad scope and opt‑out provisions could affect healthcare providers’ marketing activities and vendor contracts. The law’s narrow definition of “sale” (requiring monetary consideration) will also influence data‑sharing practices.
Recommended actions:
- Conduct data mapping exercises to identify personal and biometric data collected from Oklahoma residents and determine whether your organization falls within the law’s thresholds.
- Update privacy notices and consent mechanisms to ensure patients can exercise their rights to access, correction and deletion.
- Review contracts with business associates and marketing partners to ensure data‑sharing practices comply with Oklahoma’s definition of “sale.”
HIPAA final rule on health care claims attachments and electronic signatures
What happened: On March 24 2026, the U.S. Department of Health and Human Services, through CMS, published a final rule that adopts national standards for health care claims attachments transactions and electronic signatures. The rule, effective May 23 2026 with compliance required by May 26 2028, establishes the first HIPAA standards for the electronic exchange of claims‑related supporting documentation such as medical records, images, clinical notes, telemedicine visit documentation and laboratory results. It adopts ASC X12 Version 6020 standards for transactions (X12N 275 and X12N 277) and HL7 Consolidated Clinical Document Architecture and attachments implementation guides, enabling secure, interoperable data exchange. The final rule also defines “attachment information,” “electronic signature,” and “health care claims attachments transaction,” and adopts electronic signature standards to authenticate the sender, ensure integrity and support non‑repudiation. CMS estimates the rule will save the healthcare sector up to $781 million annually by reducing manual processes and accelerating claims processing.
Why it matters: The adoption of standardized claims attachment transactions will finally retire fax machines and other outdated methods, reducing administrative burden and speeding claims adjudication. The inclusion of electronic signature standards enhances security and trust in electronic transactions. Covered entities, business associates, clearinghouses and vendors must prepare to upgrade systems and workflows to meet the new standards.
Recommended actions:
- Assess existing claims attachment workflows that rely on fax, mail or unstructured PDF formats, and plan to transition to standardized electronic transmissions.
- Engage EHR vendors, clearinghouses and revenue cycle partners early to align on implementation timelines and responsibilities.
- Review policies and procedures related to transaction security and authentication, and evaluate electronic signature solutions that meet HIPAA’s new requirements.
- Monitor additional regulatory updates, such as the pending Privacy Rule proposal, as HHS signals further HIPAA modernization.
Breach & Incident Notices
NYC Health + Hospitals network intrusion
What happened: NYC Health + Hospitals (NYC H+H), the largest public healthcare system in the U.S., discovered suspicious network activity on Feb 2, 2026. Investigators determined that an unauthorized actor accessed its network from Nov 25, 2025 through Feb 11, 2026, likely via a third‑party vendor. The compromised data includes names, medical diagnoses, medications, imaging results, treatment plans, health insurance information, billing records, biometric data, Social Security numbers, driver’s license numbers, precise geolocation, financial account details and online credentials. NYC H+H notified affected individuals, offered 24 months of credit monitoring and identity‑theft protection, reset passwords, deployed additional detection tools and revised remote‑access policies.
Why it matters: This 11‑week compromise underscores the importance of vendor oversight and threat detection. The breadth of data exposed—including biometric identifiers and precise location information—creates significant risk for identity theft, insurance fraud and targeted phishing attacks.
Recommended actions:
- Inventory all vendors with network access, assess their security controls and require multi‑factor authentication and least‑privilege access.
- Implement continuous monitoring solutions that can detect lateral movement and anomalous access patterns.
- Offer credit monitoring and identity‑theft services to affected patients and educate them on the risks of phishing and fraud.
NADAP hacking incident
What happened: NADAP, a care‑management partner for NYC H+H, detected suspicious network activity around Jan 10, 2026. By Jan 27 investigators determined that a hacker had accessed its systems and copied data belonging to up to 90,000 individuals, including names, Social Security numbers, dates of birth, medical and health information, health insurance details and tax or financial data. NADAP strengthened password requirements and implemented conditional access policies; no threat group has claimed responsibility.
Why it matters: The attack on NADAP illustrates how breaches at third‑party care managers can expose large amounts of sensitive data that mirror the information stored by covered entities. The inclusion of tax and financial data increases the risk of identity fraud and IRS scams.
Recommended actions:
- Ensure business associate agreements with care‑management vendors require prompt breach notification and robust security measures.
- Assess vendors’ use of conditional access and multi‑factor authentication to prevent password‑related compromises.
- Advise affected individuals to monitor credit reports and tax filings for unauthorized activity.
Weill Cornell Medicine insider breach
What happened: Weill Cornell Medicine discovered that a former employee accessed the electronic medical records of 516 patients for reasons unrelated to their job duties. The unauthorized access involved patient names, contact information and reasons for visits but did not include Social Security numbers or financial information. Weill Cornell notified affected patients and strengthened access controls and auditing processes.
Why it matters: Insider threats remain a significant risk even when external defenses are strong. Although the data accessed was limited, the incident highlights the need for robust user‑access monitoring and timely off‑boarding processes.
Recommended actions:
- Enforce role‑based access and regular auditing of electronic medical record systems to detect unauthorized access.
- Immediately revoke system privileges for departing employees and monitor for anomalous behavior during off‑boarding.
- Provide employees with ongoing training on confidentiality obligations and disciplinary consequences for improper access.
Commonwealth Care Alliance mailing error
What happened: On Dec 29, 2025, Commonwealth Care Alliance inadvertently mailed letters intended for one member to another, exposing the names, member identification numbers and Medicare eligibility status of 634 individuals. The organization has since implemented additional quality‑control checks to prevent similar errors.
Why it matters: Not all breaches involve cyber‑attacks; human errors in mailing and administrative processes can still trigger HIPAA breach obligations and erode patient trust.
Recommended actions:
- Review mailing workflows and implement barcode scanning or dual‑verification to ensure letters are matched to the correct recipients.
- Train staff on the importance of verifying patient identifiers before sending communications.
- Ensure mis‑mailed individuals receive prompt notifications and support for any resulting privacy concerns.
Deaconess Health System vendor breach
What happened: On Feb 2, 2026, MediCopy—a third‑party service provider for Deaconess Health System—reported that an unauthorized individual accessed its file‑sharing platform on Jan 13, 2026. Data potentially exposed include patient names, Social Security numbers, dates of birth, medical record numbers, dates of service, health insurance identification numbers and medical records. Deaconess emphasized that its own IT systems were not compromised and is offering credit monitoring to affected patients. MediCopy has strengthened security controls for its file‑sharing platform.
Why it matters: This incident demonstrates how a vendor’s file‑sharing platform can become a weak link in the security chain. Even though Deaconess’ internal systems were unaffected, sensitive patient information was still compromised.
Recommended actions:
- Audit vendors’ use of file‑sharing services and require encryption and secure transfer protocols.
- Include data‑breach indemnification clauses in contracts with third‑party vendors.
- Offer identity‑protection services to affected individuals and review internal controls for transmitting patient data to vendors.
Cybersecurity Alerts & Best‑Practice Insights
Ransomware trends and security hygiene
What happened: A recent report on ransomware incidents highlighted that healthcare continues to be one of the most targeted sectors. The average ransom demand in 2025 exceeded $1.3 million, and many attacks succeeded because of poor security hygiene—unpatched vulnerabilities, weak or reused passwords, lack of multi‑factor authentication and excessive user permissions. The report emphasizes that patching systems, enabling multi‑factor authentication, configuring user permissions appropriately and investing in security personnel are among the most effective defenses.
Why it matters: With multiple breaches this week involving third‑party vendors, the report reinforces that basic security controls remain critical. Healthcare organizations often struggle with legacy systems and resource constraints, making them attractive targets for ransomware groups.
Recommended actions:
- Establish rigorous patch‑management programs that prioritize critical vulnerabilities and ensure timely updates across all systems and devices.
- Enforce multi‑factor authentication for all remote and privileged access, including vendor and administrative accounts.
- Conduct regular access reviews to eliminate unnecessary permissions and apply least‑privilege principles.
- Invest in continuous security awareness training for staff to recognize phishing and social‑engineering tactics.
Final Thoughts
This week’s developments highlight that vendor risk remains a dominant theme: NYC H+H, NADAP and Deaconess all suffered breaches originating from third‑party providers or partners. Insider threats and human errors, as seen at Weill Cornell and Commonwealth Care Alliance, remind us that security culture and internal controls are just as important as technical defenses. State privacy laws are evolving rapidly; South Dakota’s Genetic Data Privacy Act and Oklahoma’s comprehensive privacy statute demonstrate that regulators are extending protections beyond traditional healthcare settings and may soon encompass genetic and biometric data.
Actionable takeaways:
- Conduct comprehensive risk analyses and refresh HIPAA policies in light of evolving state privacy laws.
- Strengthen vendor management by requiring multi‑factor authentication, encryption and clear breach‑notification clauses in contracts.
- Implement robust access controls, patch management and security awareness training to reduce the likelihood of ransomware and insider breaches.
- Ensure that any mis‑mailings or administrative errors are promptly investigated and corrected, with notifications and support provided to affected individuals.
By staying informed and proactively addressing these issues, compliance teams can better protect patient information and reduce regulatory and litigation risks.