HIPAA Helper »
Mercy Medical Center »
Dec 12, 2014

This database was last updated in December 2015 ago and should only be used as a historical snapshot. More recent data on breaches affecting 500 or more people is available at the U.S. Department of Health and Human Services’ Breach Portal.

Mercy Medical Center

333 MERCY AVENUE MERCED,CA 95340

Cited by the California Department of Public Health for a violation of California’s Health and Safety Code relating to medical privacy during an inspection that began on December 12, 2014. Also cited in 34 other reports.


Report ID: PDB411, California Department of Public Health

Reported Entity: MERCY MEDICAL CENTER

Issue:

Based on staff interview, clinical record review, and administrative document review, the hospital failed to ensure confidential treatment of Patient 1's protected health information (PHI) when a hospital employee (Accounts Receivable Representative) sent a refund with the incorrect account information on it.This failure resulted in unauthorized access to Patient 1's PHI and the potential for abuse of that information.Findings:On 12/12/14 at 3 p.m., during a telephone interview, the Privacy Officer (PO) stated that The Accounts Receivable Representative sent a refund to the correct person but put Patient 1's account number on it. The PO stated the employee should have double checked the account number before sending, but this was not done.Patient 1's PHI breached included his name, account number, and date of service.The hospital's policy and procedure titled "((HIPAA) Regulation, Release of Information in Accordance with State and Federal" dated 10/2012, indicated, "It is the responsibility of the hospital to safeguard the integrity of content and the physical property of the patient chart, both paper and electronic, against loss, defacement, tampering or use by unauthorized individuals."

Outcome:

Deficiency cited by the California Department of Public Health: Patients' Rights

Do you believe your privacy has been violated? Here’s what you can do: