Skip to main content

HIPAA Enforcement Against Small Medical Practices: 2022–2025 Data and Trends

Last updated: April 5, 2026

TLDR

55% of OCR financial penalties from 2022–2025 targeted small practices. The leading violation is failure to conduct a security risk analysis, cited in over 75% of 2025 enforcement actions. Five documented small-practice cases range from $25,000 to $90,000. Corrective Action Plans add 2–3 years of federal oversight on top of the fine. Cooperation with OCR is the single biggest variable in final penalty amounts.

HIPAA enforcement against small medical practices is not rare. Over half of OCR’s financial penalties in recent years have targeted small providers, and the patterns are consistent enough to draw clear conclusions about what triggers investigations and what determines final penalty amounts.

This guide uses documented enforcement data from 2022–2025, including five named case studies with penalty amounts.

Why OCR Targets Small Practices

OCR’s public position is that practice size does not determine enforcement priority. A solo neurologist faces the same HIPAA obligations as a 500-bed hospital. The regulations do not scale with headcount.

OCR investigates based on complaint volume, breach reports, and targeted audit activity. Small practices generate a large share of the complaint pool, partly because patient-facing staff at smaller clinics often lack compliance training, and partly because informal processes are more common when no dedicated compliance staff exists.

<DataTableBlock caption=“OCR Enforcement Activity 2022–2025 (approximate annual figures)” columns={[“Year”, “Enforcement Actions”, “Total Collected”, “Small Practice Share”]} rows={[ [“2022”, “~22”, “varies”, “55% of financial penalties”], [“2023”, “~22”, “varies”, “majority of actions”], [“2024”, “~22”, “$9.9M”, “majority of actions”], [“2025 (through Q1)”, “ongoing”, “ongoing”, “75%+ cited risk analysis failure”], ]} />

OCR does consider financial condition when setting penalty amounts — a 3-provider clinic will not receive the same dollar penalty as a regional health system for the same violation. But financial condition affects the amount, not the decision to investigate or impose a penalty.

The Most Common Violations That Lead to Penalties

Five violation types appear in the majority of small practice enforcement actions.

Failure to conduct a security risk analysis. This is now the dominant trigger. OCR’s Risk Analysis Initiative, launched in 2022, specifically targets practices that have never completed a documented SRA. As of 2025, this deficiency appears in over 75% of enforcement actions.

PHI in review platform responses. Responding to a negative Google or Yelp review with any patient-specific information — including confirming the person was a patient — is an impermissible disclosure. OCR has brought four documented enforcement actions for this specific pattern.

No Privacy Officer designation. HIPAA requires every covered entity to designate a Privacy Officer. Many small practices have not done this formally, or have not documented the designation.

Ransomware without security safeguards. Ransomware attacks do not automatically trigger HIPAA violations, but when OCR investigates and finds no risk analysis, no encryption, and no security policies, the attack becomes evidence of Security Rule non-compliance. Every ransomware case among the five named examples below fits this pattern.

Non-cooperation with OCR. When OCR sends information requests, practices that delay, refuse, or provide incomplete responses face penalty multipliers. This is the clearest way to turn a manageable penalty into a large one.

Five Real Cases: What Practices Paid and Why

<DataTableBlock caption=“Small Practice HIPAA Enforcement Cases 2022–2025” columns={[“Practice”, “Penalty”, “Primary Violation”, “Key Factor”]} rows={[ [“Comprehensive Neurology (solo, 5 staff)”, “$25,000”, “No risk analysis + ransomware”, “Ransomware attack exposed gap; size reduced penalty”], [“Gums Dental Care”, “$70,000 CMP”, “Non-cooperation with OCR”, “Refused to respond to OCR requests; penalty multiplied”], [“Manasa Health Center”, “$30,000”, “PHI in Google review responses”, “Disclosed patient status and treatment details publicly”], [“Bryan County Ambulance Authority”, “$90,000”, “No risk analysis + ransomware”, “First Risk Analysis Initiative action; no prior SRA ever”], [“Northcutt Dental”, “$62,500”, “Patient list to political campaign”, “Disclosed patient contact list without authorization”], ]} />

Comprehensive Neurology was a solo neurologist with 5 staff. A ransomware attack encrypted patient records. OCR investigated and found no security risk analysis had ever been conducted. The $25,000 penalty reflected the practice’s small size and cooperation. Ransomware without a prior risk analysis is not treated as a technology incident — it is treated as evidence of Security Rule non-compliance.

Gums Dental Care paid $70,000 as a Civil Monetary Penalty, the formal enforcement mechanism OCR uses when resolution agreements break down. The core issue was non-cooperation: the practice did not respond adequately to OCR information requests. Non-cooperation is one of the most reliable ways to convert a negotiable settlement into a formal CMP.

Manasa Health Center faced complaints after staff responded to negative Google reviews by disclosing patient details — confirming appointments, referencing treatment, defending care decisions. Each response that confirmed a patient was seen constituted an impermissible disclosure. The $30,000 penalty was for the pattern of disclosures, not a single incident.

Bryan County Ambulance Authority paid $90,000 as the first formal action under OCR’s Risk Analysis Initiative. A ransomware attack triggered the investigation. OCR found the organization had never completed a security risk analysis in its history. The higher penalty relative to Comprehensive Neurology reflects the initiative’s intent to signal that the absence of any risk analysis is a serious ongoing failure.

Northcutt Dental provided a patient contact list to a political campaign without patient authorization. The $62,500 penalty addressed an intentional impermissible disclosure — the practice gave over patient data for a non-treatment, non-payment purpose without consent.

What Happens After a Penalty: Corrective Action Plans

Most enforcement actions include a Corrective Action Plan alongside or instead of a financial penalty. The CAP is not administrative paperwork — it is 2–3 years of federal oversight with specific reporting requirements.

The 7 standard CAP requirements that appear in most small practice agreements:

  1. Complete and document a security risk analysis within 60–90 days
  2. Develop and implement revised HIPAA policies and procedures
  3. Retrain all workforce members on the updated policies
  4. Establish an incident reporting process to OCR
  5. Designate a compliance contact person for OCR correspondence
  6. Submit quarterly or annual compliance reports to OCR
  7. Cooperate with any follow-up OCR review or audit during the CAP period

Failing to comply with any CAP requirement is itself a HIPAA violation and can trigger additional enforcement. Practices that treat the CAP as box-checking rather than genuine remediation have been subject to further OCR action.

The practical cost of a CAP often exceeds the financial penalty. A $25,000 fine paired with a 2-year CAP can generate $50,000–$100,000 in legal fees, consultant costs, and staff time before the monitoring period ends.

The Cooperation Effect

Non-cooperation is the variable with the largest effect on final penalty amounts.

When OCR sends a data request following a complaint or breach report, a practice has two options: cooperate or not cooperate. Cooperation includes providing requested documentation on time, making designated contacts available for interviews, and implementing corrective steps during the investigation.

Practices that respond promptly and demonstrate good faith remediation frequently resolve investigations with informal technical guidance — no penalty at all. Practices that delay, provide incomplete information, or ignore OCR contact move toward formal enforcement.

The Gums Dental Care case is the clearest example: a $70,000 Civil Monetary Penalty driven largely by non-cooperation, where the underlying violations were the type that typically resolve at lower amounts when handled cooperatively.

Internal vs. External Threats

HIPAA enforcement actions often follow external events — ransomware attacks, breach notifications — but the underlying violations are frequently internal workflow failures.

The internal failures include: staff using consumer SMS to coordinate patient care, sharing login credentials, using personal email for billing communications, and responding to patient reviews without a review policy. These are process failures, not technology failures — a compliance program addresses them directly.

The 55–70% of risk from external threats — ransomware, phishing, credential theft — is harder to prevent entirely but much easier to mitigate when security safeguards are in place. Encryption, multi-factor authentication, and a documented risk analysis all reduce the impact of an external breach and reduce OCR penalty exposure when one occurs.

What These Enforcement Patterns Mean for Your Practice

Four things stand out from the 2022–2025 enforcement record.

Complete a risk analysis now. It was cited in three of the five named cases above and appears in over 75% of 2025 enforcement actions. OCR’s dedicated Risk Analysis Initiative means this deficiency is actively targeted, not just discovered incidentally.

Create a review response policy. The Manasa Health Center case was entirely preventable. Write a 4-sentence policy on what staff can and cannot say in response to online reviews. Train every staff member who might touch patient-facing platforms. The compliance cost is hours; the enforcement cost was $30,000 plus a CAP.

Respond to OCR within the stated timeline. If OCR contacts your practice, respond on time with complete information. The Gums Dental case shows how non-cooperation converts a manageable situation into the worst possible outcome.

Treat the CAP as the real cost. The financial penalty is the headline number. The 2–3 year oversight period is the actual operational burden. Practices that invest in proactive compliance programs avoid both.

Like what you're reading?

Try PHIGuard free — no credit card required.

DEFINITION

Security Risk Analysis (SRA)
A required HIPAA Security Rule activity in which a covered entity identifies and evaluates threats and vulnerabilities to electronic PHI. Absence of a documented SRA is the most commonly cited deficiency in OCR enforcement actions.

DEFINITION

Corrective Action Plan (CAP)
A federal monitoring agreement OCR imposes requiring specific remediation steps. CAPs typically run 2–3 years and require regular reporting to OCR. Failure to comply with a CAP is itself a HIPAA violation.

DEFINITION

Risk Analysis Initiative
An OCR enforcement program launched in 2022 specifically targeting practices that have not completed a security risk analysis. Bryan County Ambulance Authority was the first named enforcement action under this initiative.

Q&A

What percentage of HIPAA enforcement actions target small practices?

55% of OCR financial penalties in 2022 targeted small practices. OCR enforcement is not concentrated at large health systems. Solo providers and clinics with fewer than 20 staff have been named in formal enforcement actions with penalty amounts in the $25,000–$90,000 range.

Q&A

What are the five named small-practice HIPAA enforcement cases from 2022–2025?

Comprehensive Neurology (solo neurologist, 5 staff): $25,000 — ransomware + no risk analysis. Gums Dental Care: $70,000 — non-cooperation with OCR. Manasa Health Center: $30,000 — PHI disclosed in Google review responses. Bryan County Ambulance Authority: $90,000 — first Risk Analysis Initiative case; ransomware + no prior risk analysis. Northcutt Dental: $62,500 — patient list provided to a political campaign.

Q&A

What is the internal vs. external breach breakdown for small practices?

30–45% of small practice HIPAA breach risk comes from internal workflow failures — texting PHI, unsecured email, improper access controls. 55–70% comes from external threats including ransomware and phishing. SMBs face ransomware at 4x the rate of large organizations, per Verizon DBIR data.

Want to learn more?

Do small practices actually get fined for HIPAA violations?
Yes. OCR does not exempt practices based on size. 55% of financial penalties in 2022 targeted small practices, and enforcement actions have named solo physicians with fewer than 10 staff. Practice size is considered when setting penalty amounts but not when deciding whether to investigate.
What is the most common reason small practices receive HIPAA penalties?
Failure to conduct a security risk analysis. This was cited in over 75% of 2025 OCR enforcement actions. OCR's Risk Analysis Initiative, launched in 2022, specifically targets this deficiency. The second most common trigger is non-cooperation with OCR investigators.
How much does a HIPAA penalty cost a small practice on average?
The median financial penalty for small practices runs $20,000–$35,000. However, the financial penalty is typically the smaller part of the cost. Corrective Action Plans impose 2–3 years of federal oversight with documentation, training, and reporting obligations that frequently exceed the fine in staff time and legal fees.
What is a Corrective Action Plan and how long does it last?
A CAP is a federal monitoring agreement requiring specific remediation steps. OCR checks compliance at regular intervals. CAPs typically run 2–3 years and include 7 standardized requirements: risk analysis, policy overhaul, workforce training, incident reporting, designated contacts, document submission, and cooperation obligations.
Does cooperation with OCR reduce HIPAA penalties?
Substantially. Non-cooperation can increase penalties by 10–20x. Gums Dental Care paid $70,000 largely because the practice did not respond to OCR information requests. Practices that cooperate promptly, provide requested documentation, and implement corrections quickly receive significantly lower penalties.
Which HIPAA violations are most likely to lead to ransomware attacks at small practices?
Absence of a security risk analysis and failure to implement security safeguards like encryption and access controls. SMBs face ransomware attacks at 4x the rate of large organizations. The Comprehensive Neurology and Bryan County Ambulance Authority cases both involved ransomware where no prior risk analysis existed.

Keep reading