Awareness article
California AG HIPAA Enforcement: What Clinics Need to Know
How California's Attorney General enforces CMIA and state privacy laws alongside OCR — including the private right of action under Civil Code §56.35, AG breach enforcement under §1798.29, and what documentation California clinics need to defend against state enforcement.
Short answer
California clinics face enforcement from both OCR (federal HIPAA) and the California AG (CMIA and state breach law). CMIA's private right of action under Civil Code §56.35 allows patients to sue directly. The AG's Data Protection Unit enforces Civil Code §1798.29 for large breaches. AG investigations differ from OCR audits — they are adversarial, consumer-complaint-driven, and can move faster.
California’s enforcement landscape for medical information is meaningfully different from a HIPAA-only environment. California operates two parallel enforcement systems that apply simultaneously to small clinics: the federal OCR HIPAA enforcement system and California’s own enforcement mechanisms through the AG’s office and through private civil litigation.
For practice administrators managing compliance at a California clinic, understanding both systems is essential. An incident that triggers HIPAA’s Breach Notification Rule almost certainly also triggers California’s CMIA provisions, and the two enforcement tracks — federal and state — can proceed independently and simultaneously.
The Two Enforcement Systems in California
Federal OCR enforcement operates under HIPAA’s administrative framework. OCR investigates complaints and self-reported breaches, may conduct compliance reviews, and imposes civil monetary penalties through a tiered structure based on culpability. HIPAA violations cannot be pursued through private lawsuits — only OCR can impose penalties.
California’s system operates on two tracks:
Private litigation. California Civil Code §56.35 gives patients a direct cause of action against any provider, contractor, or employer that negligently or intentionally releases medical information in violation of the CMIA. This private right of action means that every records mishandling incident is a potential lawsuit, regardless of whether OCR is involved.
AG enforcement. The California AG’s office enforces state privacy and breach notification laws through the Data Protection Unit. AG enforcement can result in injunctions, civil penalties, and public reporting of enforcement actions — including press releases that can damage a clinic’s reputation.
CMIA Private Right of Action: Civil Code §56.35
What §56.35 provides
Under California Civil Code §56.35, a patient whose medical information is negligently released in violation of the CMIA may sue for:
- Actual damages (provable harm from the unauthorized disclosure);
- Exemplary damages of no less than $1,000 for each negligent release;
- If the violation was malicious or fraudulent, higher exemplary damages;
- Attorney’s fees and costs.
The $1,000 minimum exemplary damages per negligent release makes CMIA litigation financially viable for plaintiffs’ attorneys even when actual damages are modest. An incident that releases records for 50 patients — without any of them suffering provable financial harm — could result in $50,000 in minimum exemplary damages plus attorney’s fees.
What constitutes a negligent release under CMIA
CMIA applies to providers of health care, health care service plans, contractors, and employers. Under Civil Code §56.10, medical information may only be released with patient authorization, or under specific exceptions including treatment, payment, and healthcare operations — which are incorporated by reference from HIPAA for covered entities.
A negligent release occurs when medical information is disclosed without proper authorization and the provider failed to exercise reasonable care in its handling and disclosure procedures. Common fact patterns include:
- Sending records to the wrong patient or third party through inadequate address or fax verification;
- Responding to a fraudulent records request without adequate verification of the requester’s identity;
- Disclosures through improperly configured systems, portals, or email;
- Employee access to records outside the scope of treatment necessity.
Defending against CMIA litigation
The primary defenses in CMIA litigation are:
- The disclosure was authorized — the patient or their representative provided valid written authorization.
- The disclosure fell within a statutory exception — a recognized treatment, emergency, or public health exception applied.
- The clinic exercised reasonable care — a functioning compliance program with documented policies, training records, and access controls demonstrates that the unauthorized disclosure was an isolated failure, not a systemic negligence.
Documentation of a compliance program is evidence. Policies that exist only on paper are weak evidence. Policies with training records, audit logs, and documented periodic reviews are much stronger.
California AG Enforcement: Civil Code §1798.29
AG notification for large breaches
California Civil Code §1798.29 requires that any business that suffers a breach affecting personal information of more than 500 California residents notify the California AG within 15 business days of discovering the breach. This is one of the fastest AG notification requirements in the country — federal law gives covered entities 60 days for individual notice and requires HHS notification for breaches affecting 500 or more individuals, but does not impose a 15-business-day AG notification requirement.
For a small clinic without a dedicated incident response team, 15 business days — roughly three calendar weeks — is an extremely tight window. By the time a clinic identifies the scope of a breach, determines that it affects more than 500 Californians, and prepares a notification, the clock may already be running short.
The AG Data Protection Unit
California’s AG Data Protection Unit is the primary state enforcement office for privacy and data security matters. It receives and reviews breach notifications, investigates consumer complaints about data handling, and initiates enforcement actions under CMIA, the California Consumer Privacy Act (CCPA), and California’s general breach notification law (Civil Code §1798.82).
The Data Protection Unit publishes an annual breach report — the California Data Breach Report — that identifies common causes of breaches and enforcement priorities. Healthcare and medical records breaches consistently appear as a significant category in the report. The AG has historically prioritized healthcare enforcement when breaches involve large numbers of patients or patterns of repeated non-compliance.
How AG investigations differ from OCR audits
OCR enforces HIPAA primarily through complaint investigations and periodic desk audits. OCR investigations can be adversarial but are framed within an administrative compliance framework — OCR’s objective is to achieve compliance, not solely to punish.
California AG investigations are adversarial enforcement proceedings from the start. Common characteristics:
Initiated by complaints or breach reports. Unlike OCR’s proactive audit program, the AG typically opens investigations in response to consumer complaints, media reports, or breach notifications. A breach notification to the AG under Civil Code §1798.29 that reveals inadequate security measures can itself trigger an investigation.
Driven by subpoena. AG investigations may begin with a Civil Investigative Demand (CID) or subpoena for documents. These are legally compelled — there is no option to decline, as there is with an OCR informal inquiry.
Remedies include injunctions and penalties. The AG may seek injunctive relief to require specific compliance improvements, civil penalties under the California Consumer Privacy Act (for CCPA violations) or under other consumer protection statutes, and public reporting of the enforcement action.
Concurrent with private litigation. AG investigation and patient lawsuits under §56.35 can proceed simultaneously. An AG investigation does not preempt private litigation, and vice versa. A clinic can face both tracks at the same time.
What Documentation a California Clinic Needs
The documentation standard for defending against both CMIA litigation and AG investigation is higher than what HIPAA alone requires. In practice, California clinics should maintain:
Current written policies covering CMIA-specific obligations. This includes: the 5-business-day CMIA breach notification procedure (Civil Code §56.06), the restriction on disclosure of genetic and mental health information, and the employer health information restrictions under CMIA.
Training records showing annual CMIA training. Staff must understand CMIA’s requirements beyond HIPAA. Training records should document the date, content, and attendees for each session.
Access logs for patient records. CMIA and HIPAA both require that access to patient records be logged. An access log that shows who accessed each patient’s record, and when, is essential evidence when a disclosure incident occurs. Without it, a clinic cannot demonstrate that access was limited to authorized personnel.
Authorization forms meeting California’s standards. CMIA requires that authorization forms identify the specific information being released, the recipient, and the purpose. Authorization forms that are too generic may not satisfy CMIA even if they satisfy HIPAA’s authorization requirements.
Incident response and breach records. Documentation of how each potential breach was assessed, what the clinic determined about scope and notification obligations, and what actions were taken. See HIPAA breach notification templates for a framework to adapt.
Vendor management documentation. Under CMIA, contractors handling medical information may have direct liability. California clinics must ensure their Business Associate Agreements meet both HIPAA and CMIA requirements, and document that vendors have been assessed for CMIA compliance. See how small clinics track vendor BAAs.
AG Investigation Response: Practical Guidance
If a California clinic receives an AG inquiry, CID, or subpoena:
-
Engage legal counsel immediately. An AG investigation requires healthcare compliance legal counsel with California privacy law experience. Do not respond to AG inquiries without counsel.
-
Preserve all potentially relevant records. Issue a litigation hold on documents related to the subject of the inquiry. Destruction of records after an AG inquiry begins creates additional legal exposure.
-
Do not self-report additional violations. Responses to AG inquiries should be carefully reviewed by counsel before submission. Volunteering information about unrelated compliance gaps can expand the scope of the investigation.
-
Document remediation efforts. The AG’s office often considers remediation in determining enforcement outcomes. Evidence that the clinic identified the problem, corrected it, and implemented controls to prevent recurrence can influence the outcome.
Relationship Between OCR and California AG Enforcement
OCR and the California AG are separate enforcement authorities. An OCR investigation does not preclude AG action, and AG action does not preclude OCR investigation. A single breach incident can and does trigger parallel investigations.
The two systems use different legal standards. OCR evaluates HIPAA compliance. The AG evaluates CMIA compliance, California breach notification compliance, and in some cases CCPA or CPRA compliance. A clinic that resolves an OCR investigation with a corrective action plan is not shielded from subsequent AG action for the same underlying conduct.
Practical Compliance Posture for California Clinics
California clinics should treat the CMIA litigation and AG enforcement risk as real and distinct from OCR risk. The practical steps that reduce exposure across both systems are the same: documented policies, staff training with records, access controls, adequate authorization forms, fast breach response, and vendor management.
Use the HIPAA risk analysis worksheet as a starting point for risk analysis and add California-specific risks: CMIA private litigation exposure, 15-business-day AG notification for large breaches, and CMIA-specific authorization requirements.
See HIPAA administrative safeguards for the federal baseline requirements that support — but do not fully address — California’s additional standards.
PHIGuard supports California clinics with compliance management, incident response documentation, vendor BAA tracking, and policy management — with a BAA included at every plan level and no per-user fees. Visit phiguard.app/hipaa or review pricing.
Compliance Operations
Audit trails, access controls, policy acknowledgements, evidence handling, and vendor workflows for clinics that need defensible follow-through.
42 CFR Part 2 Updated Rules: What Clinics Treating Substance Use Disorders Must Know
42 CFR Part 2's 2024 amendments change SUD record consent, add breach notification, and partially align with HIPAA. What clinics treating SUD patients must do.
Colorado Privacy Act and HIPAA: What Colorado Clinics Must Know
Colorado Privacy Act vs. HIPAA: when Colorado clinics face CPA obligations, data subject rights, and what the CPA's health data provisions mean for small.
Sources
- California Confidentiality of Medical Information Act (Civil Code §56 et seq.) · California Legislature
- California Civil Code §56.35 — CMIA Private Right of Action · California Legislature
- California Civil Code §1798.29 — Breach Notification to AG · California Legislature
- California AG Data Protection Unit · California Department of Justice
- 45 CFR Parts 160 and 164 — HIPAA Privacy and Security Rules · eCFR