The Scenario
MediTrack is a mobile health app startup that helps patients with chronic conditions track medications, symptoms, and vital signs. Founded in 2019, the company has grown to 400,000 active users, many of them managing diabetes, hypertension, and COPD. The app is HIPAA-covered, and the company processes Protected Health Information (PHI) including patient demographics, medication lists, and daily health readings.
In February 2025, a security researcher at a healthcare cybersecurity nonprofit was analyzing network traffic from iOS health apps for a research project. She discovered something alarming in MediTrack’s traffic: patient health readings were being sent in plaintext JSON to a third-party analytics platform. The analytics company was Mixpanel, a widely used mobile analytics tool. But the really disturbing part was what came next in the data chain: Mixpanel shares certain data with advertising partners to enable “behavioral targeting.”
The researcher traced the data flow:
- MediTrack app → Mixpanel Analytics API (unencrypted, including PHI)
- Mixpanel → Data warehouse (where health metrics were stored)
- Mixpanel → Advertising network partners (where behavioral profiles were created)
A patient’s medication list (“taking Metformin and Lantus”) was being used to generate behavioral profiles that advertising networks could use to target patients with offers for diabetic test strips, insulin pumps, and weight loss supplements.
The researcher disclosed the finding to MediTrack’s Chief Technology Officer, David Park, through the company’s security.txt contact address. David was horrified. This was a massive privacy violation. A privacy-impact-assessment-pia had never been completed for the app. The team had chosen Mixpanel because “everyone uses it” and the onboarding was easy, but nobody had actually reviewed what data was being sent, whether it constituted PHI, or whether that data sharing violated phi-protected-health-information regulations.
David immediately called an emergency meeting with the VP of Product, the Legal Officer, and the Chief Information Security Officer. The scope of the problem became clear within an hour:
-
Unencrypted phi-protected-health-information transmission: Health data was being sent to Mixpanel in plaintext. HIPAA requires data-protection through encryption in transit. This was a “Breach” under HIPAA’s definition.
-
Unauthorized third-party data sharing: Mixpanel’s terms of service allowed sharing of analytics data with advertising partners. This violated HIPAA’s requirement that only minimum-necessary information be disclosed and only to authorized parties.
-
No privacy-by-design: The app had been built with analytics first (to track user engagement), not privacy first. Health data was flowing through the analytics SDK without any thought to pii-personally-identifiable-information or phi-protected-health-information implications.
-
Missing privacy-impact-assessment-pia: A proper PIA would have identified that Mixpanel wasn’t a HIPAA Business Associate (it wasn’t, because the company had never signed a Business Associate Agreement). A PIA would have shown that health data was flowing to advertising networks.
-
No data-sovereignty or anonymization-vs-pseudonymization controls: The data was tied to user accounts, wasn’t anonymized, and was flowing through third parties without any legal framework.
The legal officer immediately recognized the compliance crisis. They had a duty to notify users under state breach notification laws and likely under HIPAA as well. The notification deadline was 60 days from discovery.
David’s team sprang into action:
-
Immediate technical remediation: Mixpanel was immediately removed from the app. All health data transmission was encrypted. A new version of the app was pushed to the App Store with a manual update request to all users (approximately 60% of users update within 2 weeks).
-
Data flow audit: The team traced exactly what data had been shared with Mixpanel and when. The company had to estimate that approximately 2.3 million individual health readings and demographic profiles had been exposed to the advertising network over 18 months.
-
Breach notification: The company worked with legal counsel to prepare HIPAA breach notifications (sent to affected individuals) and incident reports to state attorneys general (for state-level health privacy laws). The notification explained what data had been exposed, when the exposure occurred, and what steps were being taken to prevent recurrence.
-
Business Associate Agreement reconciliation: The team commissioned a comprehensive audit of all third-party services used by the app and the backend systems. Amazingly, they found that while Mixpanel wasn’t a BAA, they had six other vendors (cloud storage, backup, analytics alternatives) that also required BAAs and the company had never signed them.
-
Privacy-by-design implementation: David made a strategic decision: MediTrack would become privacy-first. Every feature going forward would require a privacy-impact-assessment-pia before development. User data flows would be mapped and classified. Only minimum-necessary data would be collected. All third-party integrations would be evaluated for HIPAA BAA requirements.
The financial and reputational cost was severe:
- Legal and compliance costs: ~$200,000
- Breach notification costs: ~$150,000
- Data security audit and remediation: ~$300,000
- Potential HIPAA penalties: ~10K for genuine good-faith remediation, and MediTrack’s rapid response and disclosure helped)
- User churn: ~12,000 users (3%) switched to competitors
- Media coverage damage: ~$500,000 in lost trust
But the company emerged with a far more mature privacy program. Within a year, they achieved HIPAA compliance certification, and their privacy-first approach became a marketing advantage in the healthcare app market.
What Went Right
- Researcher disclosure and responsible follow-up: The security researcher disclosed the issue responsibly, and MediTrack’s security team responded rapidly without defensiveness.
- Rapid technical remediation: Removing Mixpanel from the app and encrypting data transmission was done within days of discovery.
- Transparent breach notification: Rather than minimizing the breach, the company notified users clearly about what happened and what was being done.
- Systemic audit of third-party services: The incident triggered a comprehensive review that found six other vendors without proper BAAs, preventing future similar violations.
- Privacy-by-design commitment: David transformed the incident into a strategic shift toward privacy-first architecture, which eventually became a competitive advantage.
What Could Go Wrong
- No privacy-impact-assessment-pia: If a PIA had been completed before launch, the Mixpanel data sharing would have been flagged as HIPAA-incompatible immediately.
- Phi-protected-health-information treatment as ordinary analytics data: The team treated health data like engagement metrics, without understanding that PHI requires specific handling requirements.
- No data-sovereignty or contractual controls: MediTrack had no data processing agreements with third parties, no contractual mechanisms to control data use.
- Anonymization-vs-pseudonymization not considered: Even if using Mixpanel was acceptable, the data should have been pseudonymized (removing direct identifiers) before sharing. This would have reduced (though not eliminated) the privacy violation.
- Minimum-necessary principle ignored: Health metrics useful for diagnosis (medication lists, readings) were being shared with ad networks that had no legitimate need for that level of detail.
Key Takeaways
- Privacy-by-design means privacy is a requirement, not an afterthought: Before building features or choosing third-party services, conduct a privacy-impact-assessment-pia to understand data flows and privacy implications.
- Phi-protected-health-information requires specific handling: Health data is not ordinary business data. HIPAA-covered entities must ensure data-protection (encryption), limited third-party access (BAAs), and minimum-necessary principles.
- Data-sovereignty and Business Associate Agreements are legal controls: Third parties handling PHI must be contractually bound to HIPAA compliance. This is non-negotiable.
- Anonymization-vs-pseudonymization reduces but doesn’t eliminate risk: Even non-identifiable health profiles can enable discrimination. True anonymization (irreversible de-identification) is preferable for data shared with untrusted parties.
- Breach notification is part of compliance: Most companies delay notification hoping the breach will stay quiet. Transparent, rapid notification is both legally required and builds trust better than discovery and confrontation.
Related Cases
- case-data-protection — Broader data protection strategies including encryption and handling
- case-data-classification — Classifying what data is PHI and requires special handling
- case-compliance — HIPAA and other health privacy regulations
- case-regulations-and-frameworks — Understanding phi-protected-health-information requirements