Intel
HIPAA Security Rule Overhaul — Final Rule Expected May 2026. Is Your Organization Ready? · Rule Update2026 HIPAA Penalty Amounts — Updated Figures Every Compliance Officer Needs · OCR EnforcementOCR Fines Employer-Sponsored Health Plan $245,000 — A Warning Every HR Department Needs to Read · OCR EnforcementAssured Imaging Fined for Never Conducting a Risk Analysis — 244,813 Patients Affected · OCR EnforcementOCR Begins Enforcing Part 2 — What Behavioral Health Providers Must Know Now · Rule Update15 Million Records Exposed — MMG Fusion Settlement Shows Business Associates Are Squarely in OCR's Crosshairs · OCR EnforcementOCR Expands Enforcement to Risk Management — What Changed in 2026 and What You Must Do Now · Rule UpdateOCR Issues $1.165 Million in Ransomware Penalties — Four Settlements in One Day · OCR EnforcementThe HIPAA Security Rule — A Complete Guide for 2026 · Security RuleUnderstanding the HIPAA Breach Notification Rule · Data BreachHIPAA breach notification overview · Data BreachHow to respond to a HIPAA breach · Data BreachHIPAA compliance checklist for covered entities · AnalysisOCR audit preparation checklist and evidence map · OCR EnforcementPatient rights under HIPAA: practical guide · Rule UpdateHIPAA staff training requirements and cadence · AnalysisHIPAA for SaaS and technology vendors · SaaS & TechnologyHIPAA Security Rule overview for compliance teams · Security RuleHIPAA Security Rule Overhaul — Final Rule Expected May 2026. Is Your Organization Ready? · Rule Update2026 HIPAA Penalty Amounts — Updated Figures Every Compliance Officer Needs · OCR EnforcementOCR Fines Employer-Sponsored Health Plan $245,000 — A Warning Every HR Department Needs to Read · OCR EnforcementAssured Imaging Fined for Never Conducting a Risk Analysis — 244,813 Patients Affected · OCR EnforcementOCR Begins Enforcing Part 2 — What Behavioral Health Providers Must Know Now · Rule Update15 Million Records Exposed — MMG Fusion Settlement Shows Business Associates Are Squarely in OCR's Crosshairs · OCR EnforcementOCR Expands Enforcement to Risk Management — What Changed in 2026 and What You Must Do Now · Rule UpdateOCR Issues $1.165 Million in Ransomware Penalties — Four Settlements in One Day · OCR EnforcementThe HIPAA Security Rule — A Complete Guide for 2026 · Security RuleUnderstanding the HIPAA Breach Notification Rule · Data BreachHIPAA breach notification overview · Data BreachHow to respond to a HIPAA breach · Data BreachHIPAA compliance checklist for covered entities · AnalysisOCR audit preparation checklist and evidence map · OCR EnforcementPatient rights under HIPAA: practical guide · Rule UpdateHIPAA staff training requirements and cadence · AnalysisHIPAA for SaaS and technology vendors · SaaS & TechnologyHIPAA Security Rule overview for compliance teams · Security Rule

OCR Enforcement

15 Million Records Exposed — MMG Fusion Settlement Shows Business Associates Are Squarely in OCR's Crosshairs

TL;DR

OCR settled with MMG Fusion LLC in March 2026 following a breach that exposed the PHI of approximately 15 million individuals. The settlement — OCR's 12th enforcement action under its Risk Analysis Initiative — found that MMG failed to conduct a risk analysis, impermissibly disclosed PHI, and failed to notify affected covered entities of the breach. Business associates are fully and directly liable under HIPAA.

OCR settled with MMG Fusion LLC in March 2026 following a breach that exposed the PHI of approximately 15 million individuals. The settlement — OCR's 12th enforcement action under its Risk Analysis Initiative — found that MMG failed to conduct a risk analysis, impermissibly disclosed PHI, and failed to notify affected covered entities of the breach. Business associates are fully and directly liable under HIPAA.

OCR's March 2026 settlement with MMG Fusion — a software company whose breach exposed 15 million individuals — is the clearest signal yet that business associates face the same enforcement scrutiny as covered entities.

medcomply.ai editorial teamPublished April 30, 2026Updated April 30, 20264 min read

When a software company's systems are breached and 15 million patients' data ends up on the dark web, OCR investigates. When that same company also fails to notify the healthcare providers it serves that the breach occurred — that is when a settlement becomes a landmark.

What happened at MMG Fusion

On March 5, 2026, OCR announced a settlement with MMG Fusion LLC, a Maryland software company, concerning potential violations of HIPAA. The settlement resolves an investigation that OCR initiated in March 2023 after receiving a complaint concerning an unreported security incident at MMG, and the posting of PHI on the dark web.

OCR's investigation determined that in December 2020, an unauthorized actor infiltrated MMG's information system and accessed PHI, including names, phone numbers, mailing addresses, email addresses, dates of birth, and dates and times of medical appointments.

The exposed data affected approximately 15 million individuals — making this one of the largest business associate breaches in OCR enforcement history.

Three violations — not one

OCR did not simply investigate the breach. It found three distinct HIPAA violations:

OCR found that MMG had potentially violated several provisions of the HIPAA Privacy, Security, and Breach Notification Rules, including: impermissibly disclosing the PHI of approximately 15 million individuals; failing to conduct an accurate and thorough risk analysis to determine the potential risks and vulnerabilities to the ePHI held by MMG; and failing to notify covered entities affected by the incident of the breach.

The third violation — failure to notify covered entities — is particularly significant. Many business associates understand they must secure PHI. Fewer understand that when a breach occurs, they have an independent legal obligation to notify every covered entity customer whose patients were affected, and they must do so within 60 days of discovery.

45 CFR §164.410

Why PHI ended up on the dark web

The investigation revealed the same gap that appears in nearly every major business associate breach investigation: no adequate risk analysis. Without a proper risk analysis, vulnerabilities go unidentified. Without identified vulnerabilities, they go unaddressed. The predictable result is exactly what happened at MMG — an unauthorized actor found an entry point that the organization did not know existed.

Warning

PHI appearing on the dark web is an automatic OCR investigation trigger. If your data surfaces on criminal forums, OCR will investigate — and they will look immediately for your risk analysis documentation.

The corrective action plan

Under the corrective action plan, MMG has committed to: conduct an accurate and thorough risk analysis; develop and implement a risk management plan to address and mitigate identified security risks; develop and maintain written HIPAA policies and procedures; ensure workforce training on Privacy and Security Rule requirements; and conduct a breach risk assessment of the December 2020 cyberattack and, to the extent possible, provide affected covered entities with accurate notice of the breach incident.

OCR will monitor the corrective action plan. The settlement amount was reduced based on OCR's consideration of MMG's financial condition — a reminder that OCR does take financial circumstances into account, but does not eliminate penalties entirely.

What this means for SaaS companies and software vendors

The MMG Fusion settlement is the clearest OCR signal yet that software companies serving healthcare clients are not operating in a compliance gray area. They are Business Associates. They are fully subject to HIPAA. And when they fail — both in security and in breach notification — OCR will hold them accountable independently of whatever their covered entity customers did or did not do.

If your company provides software, IT services, billing services, or any other function that involves PHI belonging to healthcare providers' patients, the following are non-negotiable:

Execute BAAs with every covered entity customer before touching their PHI. The BAA is not a formality — it is the legal instrument that defines your obligations and theirs.

Conduct a HIPAA Security Rule risk analysis. The same requirement that applies to hospitals applies to your company. Document it. Update it when your systems or services change.

Build a breach notification process before you need it. Know which covered entity customers you serve, how to contact them, and what information you must provide when a breach occurs. The 60-day clock runs from discovery — not from when you finish investigating.

Train your workforce on HIPAA. Every engineer, product manager, and customer success employee who touches PHI systems needs HIPAA training. This is a Security Rule requirement, not a best practice suggestion.

The MMG Fusion settlement should be read by every SaaS founder and CTO serving the healthcare market. 15 million patients. Dark web exposure. Three separate HIPAA violations. OCR monitored corrective action plan. This is what it looks like when a business associate treats HIPAA as someone else's problem.

Sources & citations

  • HHS OCR — MMG Fusion Settlement March 5 2026Open
  • 45 CFR §164.410 — Business Associate Breach NotificationOpen
  • 45 CFR §160.103 — Business Associate DefinitionOpen

All content verified against official HHS guidance and the Code of Federal Regulations.

Frequently asked questions

What is MMG Fusion and why was it subject to HIPAA?
MMG Fusion LLC is a Maryland software company that provided services to dental practices involving the creation, receipt, maintenance, or transmission of protected health information. This made it a HIPAA Business Associate, directly subject to HIPAA's Privacy, Security, and Breach Notification Rules.
How many individuals were affected by the MMG Fusion breach?
Approximately 15 million individuals had their PHI exposed. The breach occurred in December 2020 when an unauthorized actor infiltrated MMG's information system. The exposed data included names, phone numbers, addresses, email addresses, dates of birth, and dates and times of medical appointments.
What was MMG Fusion's key failure beyond the breach itself?
MMG failed to notify the covered entities it served of the breach — a direct violation of the Business Associate breach notification requirement under 45 CFR §164.410. Business associates must notify covered entities of breaches so the covered entity can fulfill their notification obligations to individuals and HHS.
Can business associates be fined directly by OCR?
Yes. Since the HITECH Act Omnibus Rule took effect in 2013, business associates are directly and independently liable for HIPAA violations. OCR can investigate and fine business associates without any involvement from the covered entity.
What should SaaS companies and software vendors learn from this case?
Three things: First, if your software touches PHI you are a Business Associate and HIPAA applies fully. Second, you must conduct a risk analysis under the Security Rule. Third, you must notify covered entity customers of breaches within 60 days — failure to do so is an independent HIPAA violation.

Not legal advice. medcomply.ai provides compliance intelligence for educational and operational planning. Consult qualified counsel for legal interpretation.