Skip to content
XpioHealth

Gone But Not Deactivated: The Invisible Employees Still in Your EHR

ghost-access

Most healthcare breaches don’t start with a sophisticated cyberattack. They start with access that made sense once and never got cleaned up. A contractor who left six months ago still has login credentials. An intern with the same permissions as a senior clinician. A vendor whose access grew over three contract renewals without anyone revisiting the scope.

In behavioral health, these gaps carry outsized consequences. The data is more sensitive, the workforce turns over faster, and the regulatory floor is higher than in general healthcare. Role-based access control (RBAC) is the infrastructure that determines who can see what, when, and why. Most behavioral health leaders treat it like an IT configuration when it’s actually operating infrastructure that touches compliance, revenue, workforce efficiency, and organizational trust.

Why Behavioral Health Makes This Urgent

The behavioral health workforce experiences turnover rates that dwarf most other healthcare settings. Research published in Psychiatric Services found that annual turnover in the public behavioral health system averages approximately 30% (Fukui et al., 2024). Roughly a third of your staff cycles out every year, and every departure leaves behind an access profile that needs to be deprovisioned with precision. Clinicians, contractors, interns, on-call coverage staff, and students all create access profiles that compound quickly without active governance.

Layer on the regulatory complexity of 42 CFR Part 2, which governs the confidentiality of substance use disorder treatment records, and the stakes escalate further. The 2024 Final Rule aligns Part 2 more closely with HIPAA while introducing new breach notification obligations and enforcement through the HHS Office for Civil Rights (HHS, 2024). The compliance deadline is February 16, 2026. Organizations must be able to demonstrate that Part 2 data is appropriately controlled and that access governance is documented and defensible.

Add multi-site operations, telehealth, and the growing use of contract and temporary staff, and you have an environment where access pathways compound faster than most organizations can track. Access governance in behavioral health carries weight that general RBAC guidance doesn’t account for.

The Diagnostic Questions Every Leader Should Be Asking

NIST Special Publication 800-53 Rev. 5, the federal standard for security and privacy controls, defines least privilege as the principle that access should be restricted to the minimum necessary for assigned tasks (NIST, 2020). In practical terms, that means every role in your system should have exactly the access it needs and nothing more.

Most behavioral health organizations would struggle to pass that test today. Four diagnostic questions can reveal how wide the gap is.

Start with visibility. Can you identify everyone who currently has access to Part 2-protected data? If generating that list requires more than a few minutes, your access governance has drift you haven’t measured.

Then test defensibility. Can you demonstrate least-privilege compliance to an auditor without scrambling? OCR’s Risk Analysis Initiative, launched in late 2024, has produced ten enforcement actions focused on organizations that failed to conduct thorough security risk analyses, including a 2025 settlement with a behavioral health provider (HHS OCR, 2025). Access control documentation is a core component of that analysis.

Look at velocity. How quickly can you safely onboard or offboard a staff member? In an industry with 30% annual turnover, slow provisioning means missed appointments and delayed billing. Slow deprovisioning means orphaned accounts with active access to sensitive records.

Finally, test your crisis readiness. Do you have documented break-glass protocols for emergencies? Crisis situations require temporary elevated access. Without a documented protocol, staff either can’t get what they need or get it through workarounds that create compliance exposure.

If those questions surface familiar problems, you’re not alone. “Everyone is Staff” role sprawl is pervasive. Shared credentials used as workflow shortcuts are more common than most leaders realize.

Vendor access creeps beyond the original scope one contract renewal at a time. And the finger-pointing between IT, Compliance, and Operations about who actually owns access governance persists precisely because it’s easy to ignore until an incident forces the conversation.

The most dangerous access in your system is the access nobody remembers granting.

A Governance Model That Fits in 90 Days

If those questions revealed gaps, that clarity is the starting point. You can’t govern what you haven’t named.

Based on our experience with behavioral health organizations, the most common barrier to RBAC governance isn’t complexity. It’s unclear ownership. Access governance needs a single accountable lead, typically a joint appointment between Compliance and IT, with clear authority to make decisions and enforce standards. Without ownership, access reviews become suggestions that nobody prioritizes.

The first 30 days are about discovery. Inventory current roles and users, identify high-risk access concentrations (especially around Part 2 data), and define “real team” role categories that reflect how your workforce actually functions. Intake coordinators, clinicians, supervisors, and billing staff, among others, all need distinct access profiles that match their workflows.

Implementation happens in the next 30. Build role templates based on those real team categories, establish break-glass protocols with post-event review processes, and tighten vendor access controls to match current BAA scopes.

The final phase locks in sustainability. Launch a routine review cadence with quarterly access audits and monthly offboarding checks, build a metrics dashboard tracking time-to-access, orphaned accounts, and exception frequency, and verify that your written policies match what the system actually enforces.

A governance model that lives in a policy binder and never touches the EHR is decoration. Governance means the system reflects the rules.

The Business Case That Makes This Stick

The operational returns on RBAC governance are concrete and measurable. Contained access means a smaller blast radius when incidents occur. With over 700 large healthcare breaches reported to HHS in both 2023 and 2024 (HHS OCR Breach Portal), reducing exposure is a direct cost-avoidance strategy.

Faster onboarding through role templates cuts time-to-productivity, which directly affects appointment availability, documentation timelines, and billing cycles. Every day a new clinician waits for correct system access is a day of missed appointments, delayed documentation, and lost revenue.

Documented access governance also reduces audit remediation hours and demonstrates proactive compliance posture. OCR’s enforcement pattern is clear: organizations with thorough, current risk analyses and documented controls fare measurably better than those assembling evidence after the fact.

What would a role-by-role access audit reveal about your organization’s actual exposure?


Xpio Health works with behavioral health organizations to build access governance that holds up under scrutiny and keeps pace with workforce reality. Contact Xpio Health when you’re ready to move from diagnosis to action.
#BehavioralHealth #PeopleFirst #XpioHealth #RBAC #HealthcareCompliance #42CFRPart2


References

  1. Fukui, S., et al. Factors Influencing Turnover and Attrition in the Public Behavioral Health System Workforce: Qualitative Study. Psychiatric Services. 2024. https://pmc.ncbi.nlm.nih.gov/articles/PMC10756926/
  2. U.S. Department of Health and Human Services. Fact Sheet: 42 CFR Part 2 Final Rule. HHS.gov. 2024. https://www.hhs.gov/hipaa/for-professionals/regulatory-initiatives/fact-sheet-42-cfr-part-2-final-rule/index.html
  3. National Institute of Standards and Technology. Security and Privacy Controls for Information Systems and Organizations (SP 800-53 Rev. 5). NIST. 2020. https://csrc.nist.gov/pubs/sp/800/53/r5/upd1/final
  4. U.S. Department of Health and Human Services, Office for Civil Rights. HHS Settles HIPAA Privacy and Security Rule Investigation with Behavioral Health Provider. HHS.gov. 2025. https://www.hhs.gov/press-room/ocr-hipaa-racap-deer-oaks.html
  5. U.S. Department of Health and Human Services, Office for Civil Rights. Breach Portal: Notice to the Secretary of HHS Breach of Unsecured Protected Health Information. HHS.gov.https://ocrportal.hhs.gov/ocr/breach/breach_report.jsf

Let's build something that lasts.

Whether you're choosing your first EHR, hardening your security posture, or turning data into decisions, we're ready when you are.

Get in Touch