No Pictures, Please: Building Rock-Solid Image And Social Media Policies In Healthcare

Several patients are suing Jay Hospital in Florida and its parent system, Baptist Health Care, alleging staff members took unauthorized photographs of them while they were asleep or heavily medicated and then shared those images on Snapchat. 

The patients say they only learned of the incident months later when hospital representatives informed them that "horrible" images had been taken and offered payments reportedly up to $50,000 in exchange for signing releases with nondisclosure provisions, but the patients were never allowed to see the photos or told exactly what they depicted. 

The lawsuit, filed on behalf of multiple patients, contains allegations of invasion of privacy and other claims. The allegations describe the images as degrading. The individuals were photographed without consent while incapacitated and unclothed or partially unclothed. 

Jay Hospital stated that, once administrators became aware of the allegations, they conducted a preliminary investigation, notified authorities and affected patients, and terminated the employees involved. They declined to share further details, citing ongoing investigations and privacy concerns. 

Source: https://healthexec.com/topics/healthcare-management/legal-news/hospital-sued-after-employees-post-horrible-photos-patients-snapchat

Commentary

The above is just one example of the growing liability exposure healthcare organizations are facing from unauthorized image capture and posting by staff. 

Governance starts with a clear policy that any non-clinically necessary photography, audio, or video of patients, visitors, or coworkers is strictly prohibited without documented, informed consent consistent with HIPAA and state law. 

Policies should define what constitutes an image, including screenshots and messaging apps, and it should expressly forbid sharing, storing, or posting work-related images on personal platforms. 

Employers should restrict use of personal devices in patient-care areas, configure technical safeguards on organization?owned devices, and coordinate policy language with BYOD, confidentiality, and social media policies so there are no gaps. 

Training should include concrete examples of prohibited conduct, the dignity and privacy interests at stake, and the discipline that may follow violations, up to, and including termination and reporting to licensing boards. Incident response plans need to address prompt investigation, preservation of evidence, notification to privacy officers and regulators when required, and support for affected patients. 

Finally, regular audits, leadership reinforcement, and swift, consistent enforcement demonstrate a culture of respect for privacy and significantly reduce the risk of reputation damage, regulatory penalties, and civil litigation.

Finally, your opinion is important to us. Please complete the opinion survey:

What's New

From Opportunistic Malware To Industrialized Extortion: The Rise Of Ransomware As A Service

The DOJ announces charges against an international cybercriminal. We examine industrialized ransomware as a service and its loss exposure for all organizations.

Toxic Searches: Stopping Malware Masquerading As Legit Apps

Online criminals are leveraging Google search results to deliver malware. We examine how fake sites abuse "top results," the risks, and practical loss prevention steps.

Guarding Against Insider Sabotage: Practical Strategies For Employers

We explain how employers can reduce the risk of internal sabotage by privileged staff and respond quickly when they suspect an employee has intentionally damaged systems or data.

Latest Numbers

  • Unemployment Rate
    4.3% in Jan 2026
  • Payroll Employment
    +130,000(p) in Jan 2026
  • Average Hourly Earnings
    +$0.15(p) in Jan 2026
  • Employment Cost Index (ECI)
    +0.7% in 4th Qtr of 2025
  • Productivity
    +4.9% in 3rd Qtr of 2025

Source: Department of Labor